CN112990940B - Enterprise authentication method and device - Google Patents

Enterprise authentication method and device Download PDF

Info

Publication number
CN112990940B
CN112990940B CN202110187281.6A CN202110187281A CN112990940B CN 112990940 B CN112990940 B CN 112990940B CN 202110187281 A CN202110187281 A CN 202110187281A CN 112990940 B CN112990940 B CN 112990940B
Authority
CN
China
Prior art keywords
enterprise
authentication
authenticated
guarantee
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110187281.6A
Other languages
Chinese (zh)
Other versions
CN112990940A (en
Inventor
孔飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110187281.6A priority Critical patent/CN112990940B/en
Publication of CN112990940A publication Critical patent/CN112990940A/en
Application granted granted Critical
Publication of CN112990940B publication Critical patent/CN112990940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Landscapes

  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification provides an enterprise authentication method and an enterprise authentication device, wherein the enterprise authentication method comprises the following steps: acquiring social relation data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relation data; sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol; judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not; and if so, carrying out identity authentication processing on the enterprise to be authenticated.

Description

Enterprise authentication method and device
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to an enterprise authentication method and apparatus.
Background
With the continuous development and popularization of the internet, the service range of the online service provided based on the internet gradually covers most users in most regions, and under the trend, the enterprise side providing the service also concentrates more products or services on the internet, while the enterprise providing the online service through the internet often needs to rely on identity authentication, and in many scenarios, the enterprise identity authentication needs to provide the service to the outside after passing the identity authentication, and on the basis, the influence of the enterprise identity authentication on the development of the online service of the enterprise is more and more important.
Disclosure of Invention
One or more embodiments of the present specification provide an enterprise authentication method. The enterprise authentication method comprises the following steps: the method comprises the steps of obtaining social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data. And sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises. The authentication vouching request carries an access link of an authentication vouching protocol. Judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not; and if so, performing identity authentication processing on the enterprise to be authenticated.
One or more embodiments of the present specification provide an enterprise authentication apparatus, including: the social data acquisition module is configured to acquire social relationship data of the enterprise to be authenticated, and determine an associated enterprise of the enterprise to be authenticated according to the social relationship data. A vouching request sending module configured to send an authentication vouching request to a selected target one of the associated enterprises. The authentication vouching request carries an access link of an authentication vouching protocol. An authentication condition judgment module configured to judge whether a vouching enterprise that triggers the access link and signs an authentication vouching agreement satisfies an authentication condition; if yes, operating the identity authentication processing module. And the identity authentication processing module is configured to perform identity authentication processing on the enterprise to be authenticated.
One or more embodiments of the present specification provide an enterprise authentication device, comprising: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: the method comprises the steps of obtaining social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data. And sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises. The authentication vouching request carries an access link of an authentication vouching protocol. Judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not; and if so, performing identity authentication processing on the enterprise to be authenticated.
One or more embodiments of the present specification provide a storage medium storing computer-executable instructions that, when executed, implement the following flow: the method comprises the steps of obtaining social relation data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relation data. And sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises. The authentication vouching request carries an access link of an authentication vouching protocol. Judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not; and if so, performing identity authentication processing on the enterprise to be authenticated.
Drawings
In order to more clearly illustrate one or more embodiments or technical solutions in the prior art in the present specification, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without inventive exercise;
fig. 1 is a flowchart of a processing method for enterprise authentication according to one or more embodiments of the present disclosure;
FIG. 2 is a flowchart illustrating a process of an enterprise authentication method applied to an online business scenario according to one or more embodiments of the present disclosure;
FIG. 3 is a process flow diagram of another enterprise authentication method applied to an online business scenario according to one or more embodiments of the present disclosure;
fig. 4 is a schematic diagram of an enterprise authentication device according to one or more embodiments of the present disclosure;
fig. 5 is a schematic structural diagram of an enterprise authentication device according to one or more embodiments of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in one or more embodiments of the present specification, the technical solutions in one or more embodiments of the present specification will be clearly and completely described below with reference to the drawings in one or more embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
The embodiment of the enterprise authentication method provided by the specification comprises the following steps:
referring to fig. 1, which shows a processing flow chart of an enterprise authentication method provided in this embodiment, referring to fig. 2, which shows a processing flow chart of an enterprise authentication method applied to an online business scenario provided in this embodiment, referring to fig. 3, which shows a processing flow chart of another enterprise authentication method applied to an online business scenario provided in this embodiment;
referring to fig. 1, the enterprise authentication method provided in this embodiment specifically includes step S102 to step S108.
Step S102, obtaining social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data.
In the enterprise authentication method provided by this embodiment, when an enterprise user fails to perform identity authentication through an enterprise name, an enterprise code, a legal name, a legal identity number and other elements, or performs identity authentication through the above elements without conditions, an associated enterprise that generates a social relationship with an enterprise to be authenticated is determined from social relationship data of the enterprise to be authenticated, and the associated enterprise is invited to secure identity authentication of the enterprise to be authenticated, and if a sufficient number of associated enterprises submit identity authentication guarantees of the enterprise to be authenticated within a specified time among the invited associated enterprises, identity authentication is performed on the enterprise to be authenticated based on the guarantees of the associated enterprises to the enterprise to be authenticated, so that the situation that identity authentication cannot be performed due to incomplete identity material provision or failure to provide identity material is avoided for the enterprise, a new identity authentication channel is provided for the enterprise, which is beneficial to improving the success rate of identity authentication of the enterprise, and meanwhile, interaction between the enterprises is also beneficial to enhance, and the dependence and participation of the enterprise on a platform are improved.
The social relationship data of the embodiment includes enterprise interaction data generated by social activities performed among enterprises; optionally, the social relationship data includes at least one of the following: identity certificate interaction records for identity certificate interaction in the application, historical guarantee relationship data for authentication guarantee, website association data of enterprise websites, supply relationship data or selling binding relationship data of enterprise commodities. The enterprise to be authenticated refers to an enterprise user needing identity authentication, and the associated enterprise refers to an enterprise user related to social relationship data of the enterprise to be authenticated.
For example, for an enterprise a to be subjected to real-name authentication, online exchange of digital business cards occurs between the enterprise a and the enterprise B, and the digital business card exchange records generated by the online exchange of the digital business cards of the enterprise a and the enterprise B are the digital business card exchange records of the enterprise a;
if the enterprise A invites the enterprise C or is invited by the enterprise C to perform real-name identity authentication, the historical guarantee relationship filed after the invitation or the invited to perform real-name authentication fails is the historical guarantee relationship data of the enterprise A;
the website link of the enterprise A and the website link of the enterprise D are friend links, and data for indicating that the website link of the enterprise A and the website link of the enterprise D are friend link data is website associated data of the enterprise A;
if the commodity of the enterprise A serving as an E-commerce merchant on the E-commerce platform and the commodity of the enterprise E serving as the E-commerce merchant are bundled to be sold package commodities, or the enterprise E is a logistics operator for logistics distribution of the commodity sold by the enterprise A, the commodity related data of the package commodities or the distribution related data of the commodity is acquired and used as the social relationship data of the enterprise A.
In specific implementation, in the process of determining the associated enterprise of the enterprise to be authenticated according to the social relationship data, the associated enterprise of the enterprise to be authenticated may be determined according to any one of the social relationship data provided above.
Specifically, if the obtained social relationship data is the identity credential interaction record of the enterprise to be authenticated, determining the enterprise having identity credential interaction with the enterprise to be authenticated as the associated enterprise according to the identity credential interaction record. For example, for enterprise a to be subjected to real-name authentication, online exchange of digital business cards occurs between enterprise a and enterprise B, and according to a digital business card exchange record generated by online exchange of digital business cards between enterprise a and enterprise B, enterprise B is determined to be an associated enterprise of enterprise a.
And if the acquired social relationship data is the historical guarantee relationship data of the enterprise to be authenticated, determining the historical enterprise contained in the historical guarantee relationship data as the associated enterprise. For example, for the enterprise a to be subjected to the real-name authentication, the enterprise a has been invited to or invited to perform the real-name authentication by the enterprise C, and based on the history guarantee relationship filed after the invitation or the invited to perform the real-name authentication fails, the enterprise C is determined to be the related enterprise of the enterprise a.
And if the acquired social relationship data is the website association data of the enterprise to be authenticated, determining the enterprise to which the enterprise website which is friendlily linked with the enterprise website of the enterprise to be authenticated belongs as the associated enterprise according to the website association data. For example, for enterprise a to be subjected to real-name authentication, the website link of enterprise a and the website link of enterprise D are friend links, and enterprise D is determined to be related to enterprise a.
And if the acquired social relationship data is the supply relationship data or the selling binding relationship data of the enterprise commodity of the enterprise to be authenticated, determining the enterprise having the supply relationship or the selling binding relationship with the enterprise commodity of the enterprise to be authenticated as the associated enterprise according to the supply relationship data or the selling binding relationship data. For example, for an enterprise a to be subjected to real-name authentication, if a commodity of the enterprise a on an E-commerce platform as an E-commerce merchant and a commodity of an enterprise E as an E-commerce merchant are package commodities sold in a bound manner, or the enterprise E is a logistics operator for performing logistics distribution on the commodity sold by the enterprise a, the enterprise E determines an enterprise related to the enterprise a.
In practical application, an enterprise may also perform identity authentication through 4 data elements, namely, an enterprise name, an enterprise code, a legal name and a legal identity, and in order to improve the security of an enterprise identity authentication system and the success rate of the identity authentication, the implementation manner of performing identity authentication guarantee based on social relationship data provided in this embodiment may be combined with the implementation manner of performing enterprise identity authentication according to 4 data elements, for example, the implementation manner of performing identity authentication guarantee based on social relationship data may be used as a supplement to the implementation manner of performing enterprise identity authentication according to 4 data elements, and when enterprise identity authentication fails according to 4 data elements, the implementation manner of performing identity authentication guarantee based on social relationship data provided in this embodiment is accessed to enhance the security guarantee of the enterprise identity authentication system, and when an enterprise to be authenticated fails to perform identity authentication by using 4 data elements, a convenient and effective identity authentication manner may be supplemented to an enterprise user.
Specifically, in an optional implementation manner provided by this embodiment, before obtaining social relationship data of an enterprise to be authenticated and determining, according to the social relationship data, an enterprise associated with the enterprise to be authenticated, the method further includes:
acquiring an authentication request submitted by the enterprise to be authenticated;
issuing an authentication data acquisition page to the enterprise to be authenticated to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
detecting whether the data to be authenticated collected based on each data collection interface meets the authentication condition of the corresponding authentication data dimension;
if so, confirming that the identity authentication of the enterprise to be authenticated is passed;
if not, executing a process of acquiring social relation data of the enterprise to be authenticated, and determining the enterprise associated with the enterprise to be authenticated according to the social relation data;
wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
On this basis, in order to facilitate switching to an implementation mode for performing identity authentication guarantee based on social relationship data in the process of performing enterprise identity authentication according to 4 data elements, in this embodiment, the authentication data acquisition page is configured with a guarantee authentication trigger control, and if it is detected that the guarantee authentication trigger control is triggered, switching to the implementation mode for performing identity authentication guarantee based on social relationship data, executing to obtain social relationship data of an enterprise to be authenticated, and determining an enterprise association process of the enterprise to be authenticated according to the social relationship data.
In order to enhance the initiative of the enterprise user in selecting the two identity authentication modes and improve the perception degree of the enterprise user in the switching process of the two identity authentication implementation modes, in an optional implementation manner provided by this embodiment, an invitation page for entering guarantee authentication is issued to the enterprise to be authenticated; and under the condition that the enterprise to be authenticated is detected to trigger guarantee authentication through the invitation page, entering an implementation mode of identity authentication guarantee based on social relationship data, executing a process of acquiring the social relationship data of the enterprise to be authenticated, and determining an enterprise associated process of the enterprise to be authenticated according to the social relationship data.
For example, when an enterprise a enters a real-name authentication page, a selection control for performing real-name authentication according to 4 data elements or performing real-name authentication guarantee based on social relationship data is displayed on the real-name authentication page, if the enterprise a selects to perform real-name authentication according to 4 data elements, two images, namely an enterprise business license and a legal identity photo, need to be entered into an authentication data acquisition page generated after the control is triggered, after the two images are entered, the two images are identified through Optical Character Recognition (OCR), data information of the 4 data elements, namely an enterprise name, an enterprise code, a legal name and/or a legal identity number is obtained, then whether the data information of the 4 data elements meets preset real-name authentication conditions is detected, and if yes, the real-name authentication of the enterprise a is confirmed to pass; and if not, entering a real-name authentication implementation mode for carrying out real-name authentication guarantee based on the social relationship data.
As described above, by combining the two implementation manners of performing enterprise identity authentication according to 4 data elements and performing identity authentication guarantee based on social relationship data, the security and success rate of the enterprise identity authentication are improved, in order to improve the efficiency of the identity authentication of the enterprise user and further improve the success rate of the identity authentication, in this embodiment, for the data elements that fail to be authenticated in the process of performing enterprise identity authentication according to 4 data elements, the implementation manner of performing identity authentication guarantee based on social relationship data is adopted to further authenticate the data elements that fail to be authenticated,
specifically, in an optional implementation manner provided in this embodiment, an authentication data acquisition page is issued to the enterprise to be authenticated; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the data to be authenticated, which are acquired by the enterprise to be authenticated through each data acquisition interface, are authenticated and detected;
if the authentication detection result is that the detection fails, determining the dimension of the data to be authenticated which fails to pass the detection, executing the process of obtaining the social relationship data of the enterprise to be authenticated, and determining the enterprise associated with the enterprise to be authenticated according to the social relationship data; in this case, the authentication vouch-for request sent to the associated enterprise as described below includes a vouch-for request to vouch for the data dimension to be authenticated.
Correspondingly, the identity authentication process is carried out on the enterprise to be authenticated subsequently, specifically, the authentication detection is carried out on the dimension of the data to be authenticated; and if the authentication detection result is that the enterprise to be authenticated passes the real-name authentication, confirming that the enterprise to be authenticated passes the real-name authentication, and validating the guarantee relationship.
For example, in the process that the enterprise a performs real-name authentication according to 4 data elements or performs real-name authentication based on social relationship data, two images, namely an enterprise business license and a legal identity photo, are entered in an authentication data acquisition page, after the two images are entered, the two images are identified through Optical Character Recognition (OCR), data information of the 4 data elements, namely an enterprise name, an enterprise code, a legal name and/or a legal identity number, is obtained, and then whether the data information of the 4 data elements meets preset real-name authentication conditions is detected respectively;
if the detection fails, determining that the data elements which fail to be detected are the enterprise name and the enterprise code, wherein the possible reason is that the provided enterprise business license image is wrong or unclear, under the circumstance, entering a real-name authentication implementation mode for carrying out real-name authentication guarantee based on social relationship data, specifically, in the process of carrying out real-name authentication guarantee, only an associated enterprise needs to be invited to guarantee the enterprise name and the enterprise code which are failed in authentication of the enterprise A, and the associated enterprise which has checked the enterprise business license image of the enterprise A in the previous business interaction process can be invited to guarantee the two data elements of the enterprise name and the enterprise code of the enterprise A, so that the success rate of the real-name authentication of the enterprise A is favorably improved, meanwhile, the associated enterprise which has checked the enterprise business license image of the enterprise A in the business interaction process is invited to guarantee the two data elements of the enterprise name and the enterprise code of the enterprise A, and the authenticity and the validity of the real-name authentication are favorably improved.
In addition, in practical application, in the interaction with other enterprises, the interaction with different types of enterprises may be different, and meanwhile, the understanding degrees of the enterprises to be authenticated in different interactions may also be different, in order to improve the success rate of the authentication in the authentication process of the enterprises to be authenticated to the greatest extent and ensure the validity of the authentication under the condition of improving the success rate of the authentication, in this embodiment, 4 data elements required by the enterprises to be authenticated in the authentication process are selected for guaranteeing different associated enterprises according to the understanding degrees of the associated enterprises of the enterprises to be authenticated to each data element of the enterprises to be authenticated, so as to convert the identity authentication guarantee of the associated enterprises to be authenticated into guarantee of a certain data element, thereby reducing the pressure of the associated enterprises on the identity authentication guarantee of the enterprises to be authenticated and being beneficial to improving the initiative and willingness of the enterprises to participate in the identity authentication system, in an optional implementation manner provided by this embodiment, in the process of determining the corresponding data of the enterprises to be authenticated in the authentication process of the enterprise according to the social relationship data of the enterprise to be authenticated; correspondingly, in the subsequent process of sending the authentication guarantee request to the selected target associated enterprise in the associated enterprises, the single-dimension authentication guarantee request corresponding to the authentication data dimension is sent to the associated enterprises respectively.
Step S104, sending an authentication guarantee request to a selected target related enterprise in the related enterprises.
In this embodiment, after determining the associated enterprises of the enterprise to be authenticated, an enterprise list composed of the associated enterprises may be displayed to the enterprise to be authenticated, and the enterprise to be authenticated selects one or more associated enterprises in the enterprise list as enterprises for inviting identity authentication guarantee to the enterprise to be authenticated, where the associated enterprises selected by the enterprise to be authenticated, that is, the associated enterprises selected and invited by the enterprise to be authenticated, are referred to as the target associated enterprises. In the process of inviting the target associated enterprise to perform identity authentication and guarantee on the enterprise to be authenticated, specifically, the invitation is performed in a manner that the target associated enterprise sends a message request, and the message request is the authentication and guarantee request.
It should be noted that, in the process of inviting the target associated enterprise to perform identity authentication and guaranty by the enterprise to be authenticated, if the invited target associated enterprise agrees to guaranty the identity authentication of the enterprise to be authenticated, a guaranty relationship needs to be established based on the relevant data of the target associated enterprise, and this entails accessing and reading the data of the target associated enterprise, so in order to sufficiently ensure the data privacy of the target associated enterprise, in this embodiment, the authentication and guaranty request carries an access link of an authentication and guaranty protocol, and by setting the access link of the authentication and guaranty protocol in the authentication and guaranty request, the invited target associated enterprise may access the authentication and guaranty protocol by triggering the access link, and only the target associated enterprise that signs the authentication and guaranty protocol will subsequently establish a guaranty relationship with the enterprise to be authenticated based on the signed authentication and guaranty protocol from the data of the target associated enterprise.
Optionally, the guarantee enterprise signing the authentication guarantee agreement has a guarantee relationship with the enterprise to be authenticated, and the guarantee relationship is established in the following manner: writing the identity of the guarantee enterprise signing the authentication guarantee agreement and the identity of the enterprise to be authenticated into a guarantee relation mapping table so as to establish the guarantee relation between the guarantee enterprise and the enterprise to be authenticated.
In an optional implementation manner provided in this embodiment, the sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
pushing the authentication guarantee request to a representative account of the target associated enterprise in an intra-application message pushing mode; the representative account comprises a legal account and/or an agent account with guaranteed authorization authority; and if the access link carried by the authentication guarantee request is triggered, issuing the authentication guarantee protocol to an access terminal corresponding to the account number of the representative.
In another optional implementation manner provided by this embodiment, sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
sending the authentication guarantee request to an access terminal corresponding to the representative account of the target associated enterprise; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority; and if the access link carried by the authentication guarantee request is triggered, returning the authentication guarantee protocol to the access terminal.
Step S106, judging whether the guarantee enterprise triggering the access link and signing the authentication guarantee agreement meets the authentication condition.
And in the target associated enterprises, the target associated enterprises signing the authentication guarantee agreement indicate that the target associated enterprises confirm to guarantee the identity authentication of the enterprise to be authenticated, and accordingly, the target associated enterprises signing the authentication guarantee agreement in the target associated enterprises are called as guarantee enterprises.
In specific implementation, after sending an authentication and guarantee request carrying the access link to the target associated enterprise, under the condition that a guarantee enterprise triggers the access link and signs an authentication and guarantee protocol, further judging whether the signing of the authentication and guarantee protocol by the guarantee enterprise meets a preset authentication condition, if so, executing the following step of 208, and performing identity authentication processing on the enterprise to be authenticated; if not, sending a prompt that the authentication conditions are not satisfied to the enterprise to be authenticated, or determining that the identity authentication of the enterprise to be authenticated fails.
In this embodiment, the authentication condition includes a time efficiency condition and a guarantee enterprise number condition, the time efficiency condition is used to detect whether a signing time for the guarantee enterprise to sign the authentication guarantee agreement meets a preset valid authentication time interval, and the guarantee enterprise number condition is used to detect whether the number of guarantee enterprises performing identity authentication guarantee on the enterprise to be authenticated meets requirements.
Specifically, in an optional implementation manner provided by this embodiment, in the process of determining whether the guaranty enterprise that triggers the access link and signs the authentication guaranty agreement satisfies the authentication condition, the determination may be implemented by determining a number condition of the guaranty enterprise under the aging condition, and specifically includes:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value or not;
if yes, executing the following step S108 to perform identity authentication processing on the enterprise to be authenticated;
if the signing time of the authentication guarantee agreement is not in the valid authentication time interval, determining the guarantee enterprise of which the signing time is not in the valid authentication time interval as an invalid guarantee enterprise, and filing the guarantee relationship of the invalid guarantee enterprise;
and if the number of the guarantee enterprises signing the authentication guarantee agreement does not meet the preset number threshold, sending a guarantee enterprise number shortage prompt to the enterprise to be authenticated, or determining that the identity authentication of the enterprise to be authenticated fails.
And S108, performing identity authentication processing on the enterprise to be authenticated.
As described above, for the security enterprises which sign the authentication and security agreement, the security relationship with the enterprise to be authenticated is established, and during the identity authentication process, the security relationship is valid for the enterprise to be authenticated which passes the identity authentication, and subsequently, the security relationship is also checked against the security enterprise which performs the identity authentication in the identity authentication and security manner; however, for an enterprise to be authenticated whose identity authentication fails, the guaranty relationship established with the guaranty enterprise is invalid, and the guaranty relationship may not be used subsequently, and in an optional implementation manner provided in this embodiment, performing identity authentication processing on the enterprise to be authenticated specifically includes:
performing real-name authentication on the enterprise to be authenticated based on the guarantee relationship to obtain an authentication result;
if the authentication result is that the authentication is passed, the guarantee relationship is validated and the validation state is synchronized to a guarantee relationship mapping table;
if the authentication result is that the authentication is not passed, filing the guarantee relationship, and/or deleting the guarantee relationship from the guarantee relationship mapping table.
In a specific implementation, in order to avoid mutual guarantee for identity authentication among multiple enterprises and to utilize the identity authentication for profit or malicious competition, in an optional implementation manner provided in this embodiment, for an enterprise to be authenticated that performs identity authentication in an identity authentication guarantee manner and passes authentication, an identity authentication result of the enterprise to be authenticated is verified, so as to improve the security of an enterprise identity authentication system, specifically including verifying the identity authentication result obtained after the authentication processing;
if the verification result is that the authentication is valid, the processing is not required;
if the verification result is that the authentication is invalid, searching a guarantee enterprise of the enterprise to be authenticated in a guarantee relation mapping table;
performing punishment processing on the searched guarantee enterprises; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
The enterprise authentication method provided in this embodiment is further described below by taking an application of the enterprise authentication method provided in this embodiment in an online service scenario as an example, referring to fig. 2, the enterprise authentication method applied in the online service scenario specifically includes steps S202 to S218.
Step S202, an authentication request submitted by an enterprise to be authenticated is obtained.
Step S204, an authentication data acquisition page is issued to the enterprise to be authenticated to respond to the authentication request.
The authentication data acquisition page is provided with data acquisition interfaces of various authentication data dimensions.
Step S206, detecting whether the data to be authenticated collected based on the authentication data collection page meets the authentication condition of the corresponding authentication data dimension;
if so, confirming that the identity authentication of the enterprise to be authenticated passes;
if not, the following step S208 is executed.
Step S208, an invitation page entering guarantee authentication is issued to the enterprise to be authenticated.
Step S210, under the condition that the enterprise to be authenticated is detected to trigger guarantee authentication through the invitation page, determining the dimension of the data to be authenticated which is not detected to pass.
Step S212, social relationship data of the enterprise to be authenticated is obtained, and the associated enterprise of the enterprise to be authenticated is determined according to the social relationship data.
Step S214 is to transmit an authentication guarantee request to a selected target related company among the related companies.
The authentication guarantee request carries an access link of an authentication guarantee protocol, and the authentication guarantee request is a guarantee request aiming at the dimensionality of data to be authenticated.
Step S216, judging whether the guarantee enterprise triggering the access link and signing the authentication guarantee agreement meets the authentication condition;
if yes, go to step S218;
if not, sending a prompt that the authentication conditions are not satisfied to the enterprise to be authenticated, or determining that the identity authentication of the enterprise to be authenticated fails.
Step S218, based on the guarantee relation between the guarantee enterprise and the enterprise to be authenticated, the data dimension to be authenticated is authenticated and detected.
And if the authentication detection result is that the detection is passed, confirming that the real-name authentication of the enterprise to be authenticated is passed.
The following further describes the enterprise authentication method provided in this embodiment by taking an application of the another enterprise authentication method provided in this embodiment in an online service scenario as an example, referring to fig. 3, the enterprise authentication method applied in the online service scenario specifically includes steps S302 to S314.
Step S302, an authentication request submitted by an enterprise to be authenticated is obtained.
Step S304, an authentication data acquisition page is issued to the enterprise to be authenticated to respond to the authentication request.
Step S306, if the guarantee authentication triggering control configured on the authentication data acquisition page is triggered, acquiring social relationship data of the enterprise to be authenticated.
And step S308, determining the related enterprises corresponding to the to-be-authenticated enterprises in each authentication data dimension according to the social relationship data.
Step S310, respectively sending single-dimension authentication guarantee requests corresponding to the authentication data dimensions to the associated enterprises.
Step S312, judging whether the guarantee enterprise triggering the access link and signing the authentication guarantee agreement meets the authentication condition;
if yes, go to step S314;
if not, sending a prompt that the authentication conditions are not satisfied to the enterprise to be authenticated, or determining that the identity authentication of the enterprise to be authenticated fails.
Step S314, based on the guarantee relation between the guarantee enterprise and the enterprise to be authenticated, the identity authentication processing is carried out on the enterprise to be authenticated.
An embodiment of an enterprise authentication apparatus provided in this specification is as follows:
in the above embodiments, an enterprise authentication method is provided, and an enterprise authentication apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 4, a schematic diagram of an enterprise authentication device provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The present embodiment provides an enterprise authentication apparatus, including:
a social data obtaining module 402, configured to obtain social relationship data of an enterprise to be authenticated, and determine an associated enterprise of the enterprise to be authenticated according to the social relationship data;
a vouch-for request sending module 404 configured to send an authentication vouch-for request to a selected target one of the associated enterprises; the authentication and guarantee request carries an access link of an authentication and guarantee protocol;
an authentication condition determination module 406 configured to determine whether a vouching enterprise that triggered the access link and signed an authentication vouching agreement satisfies an authentication condition;
if yes, the identity authentication processing module 408 is operated; the identity authentication processing module 408 is configured to perform identity authentication processing on the enterprise to be authenticated.
Optionally, the enterprise authentication apparatus further includes:
the authentication request acquisition module is configured to acquire an authentication request submitted by the enterprise to be authenticated;
the authentication data acquisition page issuing module is configured to issue an authentication data acquisition page to the enterprise to be authenticated so as to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the authentication condition detection module is configured to detect whether the data to be authenticated collected based on each data collection interface meets the authentication conditions of corresponding authentication data dimensions;
if not, operating the social data acquisition module 402; wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
Optionally, the authentication data collection page is configured with a warranty authentication trigger control, and if it is detected that the warranty authentication trigger control is triggered, the social data obtaining module 402 is operated.
Optionally, the enterprise authentication apparatus further includes:
the invitation page issuing module is configured to issue an invitation page entering guarantee authentication to the enterprise to be authenticated;
and running the social data acquisition module 402 under the condition that the enterprise to be authenticated is detected to trigger guarantee authentication through the invitation page.
Optionally, the guarantee request sending module 404 is specifically configured to push the authentication guarantee request to the representative account of the target associated enterprise in an intra-application message pushing manner; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority;
and if the access link carried by the authentication guarantee request is triggered, issuing the authentication guarantee protocol to an access terminal corresponding to the account number of the representative.
Optionally, the guarantee request sending module 404 is specifically configured to send the authentication guarantee request to an access terminal corresponding to the representative account of the target associated enterprise; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority;
and if the access link carried by the authentication guarantee request is triggered, returning the authentication guarantee protocol to the access terminal.
Optionally, the authentication condition determining module 406 is specifically configured to:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value or not;
if yes, the identity authentication processing module 408 is executed.
Optionally, the enterprise authentication apparatus further includes:
the verification module is configured to verify the identity authentication result obtained after the authentication processing;
the guarantee enterprise searching module is configured to search the guarantee enterprise of the enterprise to be authenticated in the guarantee relation mapping table if the verification result is that the authentication is invalid;
the penalty processing module is configured to perform penalty processing on the searched guarantee enterprise; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
Optionally, the social relationship data includes at least one of the following:
the method comprises the steps of carrying out identity certificate interaction recording of identity certificate interaction in an application, carrying out historical guarantee relation data of authentication guarantee, website association data of an enterprise website, supply relation data or selling binding relation data of enterprise commodities.
The embodiment of the enterprise authentication device provided by the specification is as follows:
corresponding to the above-described enterprise authentication method, based on the same technical concept, one or more embodiments of the present specification further provide an enterprise authentication device, where the enterprise authentication device is configured to execute the above-described enterprise authentication method, and fig. 5 is a schematic structural diagram of an enterprise authentication device provided in one or more embodiments of the present specification.
The embodiment provides an enterprise authentication device, which includes:
as shown in fig. 5, the enterprise authentication devices may vary greatly due to different configurations or capabilities, and may include one or more processors 501 and memory 502, where the memory 502 may store one or more stored applications or data. Memory 502 may be, among other things, transient storage or persistent storage. The application program stored in memory 502 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in an enterprise authentication device. Still further, processor 501 may be configured to communicate with memory 502 to execute a series of computer-executable instructions in memory 502 on an enterprise authentication device. The enterprise authentication apparatus may also include one or more power supplies 503, one or more wired or wireless network interfaces 504, one or more input-output interfaces 505, one or more keyboards 506, and the like.
In a particular embodiment, an enterprise authentication apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the enterprise authentication apparatus, and execution of the one or more programs by one or more processors includes computer-executable instructions for:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication and guarantee request carries an access link of an authentication and guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not;
and if so, carrying out identity authentication processing on the enterprise to be authenticated.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining that the enterprise-related instruction of the enterprise to be authenticated is executed according to the social relationship data, the method further includes:
acquiring an authentication request submitted by the enterprise to be authenticated;
issuing an authentication data acquisition page to the enterprise to be authenticated to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
detecting whether the data to be authenticated collected based on each data collection interface meets the authentication condition of the corresponding authentication data dimension;
if not, the social relation data of the enterprise to be authenticated is obtained, and an enterprise association instruction of the enterprise to be authenticated is determined according to the social relation data;
wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
Optionally, the authentication data collection page is configured with a warranty authentication trigger control, and if it is detected that the warranty authentication trigger control is triggered, the social relationship data of the enterprise to be authenticated is obtained, and an enterprise-related instruction of the enterprise to be authenticated is determined according to the social relationship data.
Optionally, before obtaining social relationship data of the enterprise to be authenticated and determining, according to the social relationship data, that the enterprise instruction associated with the enterprise to be authenticated is executed, the method further includes:
issuing an invitation page for entering guarantee authentication to the enterprise to be authenticated;
and under the condition that the guarantee authentication is triggered by the enterprise to be authenticated through the invitation page, executing the social relationship data of the enterprise to be authenticated, and determining an associated enterprise instruction of the enterprise to be authenticated according to the social relationship data.
Optionally, the determining whether the vouching enterprise triggering the access link and signing the authentication vouching agreement meets the authentication condition includes:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value;
if yes, the next instruction is executed.
Optionally, after the executing the identity authentication processing instruction to the enterprise to be authenticated, the method further includes:
verifying the identity authentication result obtained after the authentication treatment;
if the verification result is that the authentication is invalid, searching a guarantee enterprise of the enterprise to be authenticated in a guarantee relation mapping table;
performing punishment processing on the searched guarantee enterprises; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
Optionally, the social relationship data includes at least one of the following:
the method comprises the steps of carrying out identity certificate interaction recording of identity certificate interaction in an application, carrying out historical guarantee relation data of authentication guarantee, website association data of an enterprise website, supply relation data or selling binding relation data of enterprise commodities.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining that the enterprise-related instruction of the enterprise to be authenticated is executed according to the social relationship data, the method further includes:
issuing an authentication data acquisition page to the enterprise to be authenticated; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the data to be authenticated, which are acquired by the enterprise to be authenticated through each data acquisition interface, are authenticated and detected;
if the authentication detection result is that the detection fails, determining the dimension of the data to be authenticated which fails to pass the detection, executing the social relationship data of the enterprise to be authenticated, and determining an enterprise association instruction of the enterprise to be authenticated according to the social relationship data;
correspondingly, the authentication guarantee request comprises a guarantee request for guaranteeing the dimension of the data to be authenticated.
Optionally, the performing identity authentication processing on the enterprise to be authenticated includes:
carrying out authentication detection on the dimensionality of the data to be authenticated;
and if the authentication detection result is that the detection is passed, confirming that the enterprise to be authenticated passes the real-name authentication.
Optionally, the determining, according to the social relationship data, an associated enterprise of the enterprise to be authenticated includes:
determining the related enterprises corresponding to the enterprises to be authenticated in each authentication data dimension;
correspondingly, the sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
and respectively sending single-dimension authentication guarantee requests corresponding to the authentication data dimensions to the associated enterprises.
An embodiment of a storage medium provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the above-described enterprise authentication method.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not;
and if so, performing identity authentication processing on the enterprise to be authenticated.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining, according to the social relationship data, that the associated enterprise process of the enterprise to be authenticated is executed, the computer-executable instruction further implements the following process when executed:
acquiring an authentication request submitted by the enterprise to be authenticated;
issuing an authentication data acquisition page to the enterprise to be authenticated to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
detecting whether the data to be authenticated collected based on each data collection interface meets the authentication condition of the corresponding authentication data dimension;
if not, executing the social relationship data of the enterprise to be authenticated, and determining an associated enterprise process of the enterprise to be authenticated according to the social relationship data;
wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
Optionally, the authentication data collection page is configured with a warranty authentication trigger control, and if it is detected that the warranty authentication trigger control is triggered, the social relationship data of the enterprise to be authenticated is acquired, and an enterprise process associated with the enterprise to be authenticated is determined according to the social relationship data.
Optionally, before obtaining social relationship data of the enterprise to be authenticated and determining, according to the social relationship data, that the enterprise process associated with the enterprise to be authenticated is executed, the computer-executable instruction further implements the following process when executed:
issuing an invitation page for entering guarantee authentication to the enterprise to be authenticated;
and under the condition that the guarantee authentication is triggered by the enterprise to be authenticated through the invitation page, executing the social relationship data of the enterprise to be authenticated, and determining an associated enterprise process of the enterprise to be authenticated according to the social relationship data.
Optionally, the determining whether the vouching enterprise that triggers the access link and signs the authentication vouching agreement meets the authentication condition includes:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value;
if yes, executing the next flow.
Optionally, after the identity authentication processing procedure is executed on the enterprise to be authenticated, the computer-executable instructions further implement the following procedure when executed:
verifying the identity authentication result obtained after the authentication treatment;
if the verification result is that the authentication is invalid, searching a guarantee enterprise of the enterprise to be authenticated in a guarantee relation mapping table;
performing punishment processing on the searched guarantee enterprises; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
Optionally, the social relationship data includes at least one of the following:
identity certificate interaction records for identity certificate interaction in the application, historical guarantee relationship data for authentication guarantee, website association data of enterprise websites, supply relationship data or selling binding relationship data of enterprise commodities.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining, according to the social relationship data, that the associated enterprise process of the enterprise to be authenticated is executed, the computer-executable instruction further implements the following process when executed:
issuing an authentication data acquisition page to the enterprise to be authenticated; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the enterprise to be authenticated is authenticated and detected through the data to be authenticated collected by each data collection interface;
if the authentication detection result is that the detection fails, determining the dimension of the data to be authenticated which fails to pass the detection, executing the social relationship data of the enterprise to be authenticated, and determining the enterprise-related process of the enterprise to be authenticated according to the social relationship data;
correspondingly, the authentication guarantee request comprises a guarantee request for guaranteeing the dimension of the data to be authenticated.
Optionally, the performing identity authentication processing on the enterprise to be authenticated includes:
carrying out authentication detection on the dimensionality of the data to be authenticated;
and if the authentication detection result is that the enterprise to be authenticated passes the real-name authentication, confirming that the enterprise to be authenticated passes the real-name authentication.
Optionally, the determining, according to the social relationship data, an associated enterprise of the enterprise to be authenticated includes:
determining the related enterprises corresponding to the enterprises to be authenticated in each authentication data dimension;
correspondingly, the sending an authentication guaranty request to a selected target one of the associated businesses includes:
and respectively sending single-dimension authentication guarantee requests corresponding to the authentication data dimensions to the associated enterprises.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the enterprise authentication method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 30 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain a corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually manufacturing an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as ABEL (Advanced Boolean Expression Language), AHDL (alternate Hardware Description Language), traffic, CUPL (core universal Programming Language), HDCal, jhddl (Java Hardware Description Language), lava, lola, HDL, PALASM, rhyd (Hardware Description Language), and vhigh-Language (Hardware Description Language), which is currently used in most popular applications. It will also be apparent to those skilled in the art that hardware circuitry for implementing the logical method flows can be readily obtained by a mere need to program the method flows with some of the hardware description languages described above and into an integrated circuit.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium that stores computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be conceived to be both a software module implementing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in multiple software and/or hardware when implementing the embodiments of the present description.
One skilled in the art will appreciate that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus comprising the element.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the system embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and reference may be made to the partial description of the method embodiment for relevant points.
The above description is only an example of this document and is not intended to limit this document. Various modifications and changes may occur to those skilled in the art. Any modifications, equivalents, improvements, etc. which come within the spirit and principle of the disclosure are intended to be included within the scope of the claims of this document.

Claims (18)

1. An enterprise authentication method comprising:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets an authentication condition or not, wherein the guarantee enterprise and the enterprise to be authenticated have a guarantee relationship;
if so, performing identity authentication processing on the enterprise to be authenticated;
wherein, the identity authentication processing of the enterprise to be authenticated comprises: and performing real-name authentication on the enterprise to be authenticated based on the guarantee relationship to obtain an authentication result.
2. The enterprise authentication method of claim 1, wherein before the step of obtaining the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data is executed, the method further comprises:
acquiring an authentication request submitted by the enterprise to be authenticated;
issuing an authentication data acquisition page to the enterprise to be authenticated to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
detecting whether the data to be authenticated collected based on each data collection interface meets the authentication condition of the corresponding authentication data dimension;
if not, executing the step of acquiring the social relation data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relation data;
wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
3. The enterprise authentication method as claimed in claim 2, wherein the authentication data collection page is configured with a warranty authentication trigger control, and if the warranty authentication trigger control is triggered, the step of obtaining the social relationship data of the enterprise to be authenticated is executed, and the step of determining the enterprise associated with the enterprise to be authenticated according to the social relationship data is executed.
4. The enterprise authentication method of claim 1, wherein before the step of obtaining the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data is executed, the method further comprises:
issuing an invitation page for entering guarantee authentication to the enterprise to be authenticated;
and under the condition that the to-be-authenticated enterprise triggers guarantee authentication through the invitation page, executing the step of acquiring social relationship data of the to-be-authenticated enterprise, and determining the associated enterprise of the to-be-authenticated enterprise according to the social relationship data.
5. The method of enterprise authentication of claim 1, said sending an authentication vouching request to a selected target one of the associated enterprises comprising:
pushing the authentication guarantee request to a representative account of the target associated enterprise in an intra-application message pushing mode; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority;
and if the access link carried by the authentication guarantee request is triggered, issuing the authentication guarantee protocol to an access terminal corresponding to the account number of the representative.
6. The method of enterprise authentication of claim 1, said sending an authentication vouching request to a selected target one of the associated enterprises comprising:
sending the authentication guarantee request to an access terminal corresponding to the representative account of the target associated enterprise; the representative account comprises a legal account and/or an agent account with guaranteed authorization authority;
and if the access link carried by the authentication guarantee request is triggered, returning the authentication guarantee protocol to the access terminal.
7. The enterprise authentication method of claim 1, wherein the guaranty relationship is established as follows:
writing the identity of the guarantee enterprise signing the authentication guarantee agreement and the identity of the enterprise to be authenticated into a guarantee relation mapping table so as to establish the guarantee relation between the guarantee enterprise and the enterprise to be authenticated.
8. The enterprise authentication method as claimed in claim 7, wherein the identity authentication process is performed on the enterprise to be authenticated, further comprising:
if the authentication result is that the authentication is passed, the guarantee relationship is validated and the validation state is synchronized to a guarantee relationship mapping table;
if the authentication result is that the authentication is not passed, filing the guarantee relationship, and/or deleting the guarantee relationship from the guarantee relationship mapping table.
9. The enterprise authentication method of claim 1, wherein said determining whether a vouching enterprise that triggers the access link and signs an authentication vouching agreement satisfies an authentication condition comprises:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value;
if yes, the next step is executed.
10. The enterprise authentication method as claimed in claim 1, further comprising, after the step of performing identity authentication processing on the enterprise to be authenticated is executed:
verifying the identity authentication result obtained after the authentication treatment;
if the verification result is that the authentication is invalid, searching a guarantee enterprise of the enterprise to be authenticated in a guarantee relation mapping table;
performing punishment processing on the searched guarantee enterprises; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
11. The enterprise authentication method of claim 1, the social relationship data comprising at least one of:
the method comprises the steps of carrying out identity certificate interaction recording of identity certificate interaction in an application, carrying out historical guarantee relation data of authentication guarantee, website association data of an enterprise website, supply relation data or selling binding relation data of enterprise commodities.
12. The method of claim 11, wherein determining the associated business of the business to be authenticated according to the social relationship data comprises:
determining an enterprise with identity certificate interaction with the enterprise to be authenticated as the associated enterprise according to the identity certificate interaction record of the enterprise to be authenticated;
or,
determining a historical enterprise contained in the historical guarantee relationship data as the associated enterprise according to the historical guarantee relationship data of the enterprise to be authenticated;
or,
determining an enterprise to which an enterprise website linked with the enterprise website of the enterprise to be authenticated is friendlier to serve as the associated enterprise according to the website associated data of the enterprise to be authenticated;
or,
and determining an enterprise having a supply relationship or a selling binding relationship with the enterprise commodity of the enterprise to be authenticated as the associated enterprise according to the supply relationship data or the selling binding relationship data of the enterprise commodity of the enterprise to be authenticated.
13. The enterprise authentication method of claim 1, wherein before the step of obtaining the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data is executed, the method further comprises:
issuing an authentication data acquisition page to the enterprise to be authenticated; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the data to be authenticated, which are acquired by the enterprise to be authenticated through each data acquisition interface, are authenticated and detected;
if the authentication detection result is that the detection fails, determining the dimension of the data to be authenticated which fails to pass the detection, executing the steps of obtaining the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data;
correspondingly, the authentication guarantee request comprises a guarantee request for guaranteeing the dimension of the data to be authenticated.
14. The enterprise authentication method as claimed in claim 13, wherein said performing identity authentication processing on the enterprise to be authenticated comprises:
carrying out authentication detection on the dimensionality of the data to be authenticated;
and if the authentication detection result is that the detection is passed, confirming that the enterprise to be authenticated passes the real-name authentication.
15. The enterprise authentication method of claim 1, wherein determining the enterprise associated with the enterprise to be authenticated according to the social relationship data comprises:
determining the related enterprises corresponding to the enterprises to be authenticated in each authentication data dimension;
correspondingly, the sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
and respectively sending single-dimension authentication guarantee requests corresponding to the authentication data dimensions to the associated enterprises.
16. An enterprise authentication device comprising:
the system comprises a social data acquisition module, a social data acquisition module and a social data processing module, wherein the social data acquisition module is configured to acquire social relation data of an enterprise to be authenticated and determine an associated enterprise of the enterprise to be authenticated according to the social relation data;
a vouching request sending module configured to send an authentication vouching request to a selected target one of the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
the authentication condition judging module is configured to judge whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets an authentication condition, wherein the guarantee enterprise and the enterprise to be authenticated have a guarantee relationship;
if yes, operating an identity authentication processing module; the identity authentication processing module is configured to perform identity authentication processing on the enterprise to be authenticated;
the identity authentication processing module is configured to perform real-name authentication on the enterprise to be authenticated based on the guarantee relationship to obtain an authentication result.
17. An enterprise authentication device comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication and guarantee request carries an access link of an authentication and guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets an authentication condition or not, wherein the guarantee enterprise and the enterprise to be authenticated have a guarantee relationship;
if so, performing identity authentication processing on the enterprise to be authenticated;
wherein, the identity authentication processing of the enterprise to be authenticated comprises: and performing real-name authentication on the enterprise to be authenticated based on the guarantee relationship to obtain an authentication result.
18. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets an authentication condition or not, wherein the guarantee enterprise and the enterprise to be authenticated have a guarantee relationship;
if yes, identity authentication processing is carried out on the enterprise to be authenticated;
wherein, the identity authentication processing of the enterprise to be authenticated comprises: and performing real-name authentication on the enterprise to be authenticated based on the guarantee relationship to obtain an authentication result.
CN202110187281.6A 2021-02-18 2021-02-18 Enterprise authentication method and device Active CN112990940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110187281.6A CN112990940B (en) 2021-02-18 2021-02-18 Enterprise authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110187281.6A CN112990940B (en) 2021-02-18 2021-02-18 Enterprise authentication method and device

Publications (2)

Publication Number Publication Date
CN112990940A CN112990940A (en) 2021-06-18
CN112990940B true CN112990940B (en) 2023-04-07

Family

ID=76393524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110187281.6A Active CN112990940B (en) 2021-02-18 2021-02-18 Enterprise authentication method and device

Country Status (1)

Country Link
CN (1) CN112990940B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114782172A (en) * 2022-05-25 2022-07-22 支付宝(杭州)信息技术有限公司 Service processing method and device based on guarantee
CN114862428B (en) * 2022-07-07 2022-12-16 天津金城银行股份有限公司 Inline enterprise authentication method, terminal device and computer-readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108346061A (en) * 2018-02-12 2018-07-31 苏州朗动网络科技有限公司 Corporate authentication method, apparatus, computer equipment and storage medium
CN109509004A (en) * 2018-10-12 2019-03-22 深圳壹账通智能科技有限公司 Enterprise's real name identification method, device, computer equipment and storage medium
CN110336797A (en) * 2019-06-18 2019-10-15 阿里巴巴集团控股有限公司 Corporate authentication, certification retroactive method, device and equipment based on block chain
CN112712426A (en) * 2021-01-19 2021-04-27 上海超链信息科技有限公司 Supply chain finance application method based on block chain technology

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10812477B2 (en) * 2019-06-18 2020-10-20 Alibaba Group Holding Limited Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108346061A (en) * 2018-02-12 2018-07-31 苏州朗动网络科技有限公司 Corporate authentication method, apparatus, computer equipment and storage medium
CN109509004A (en) * 2018-10-12 2019-03-22 深圳壹账通智能科技有限公司 Enterprise's real name identification method, device, computer equipment and storage medium
CN110336797A (en) * 2019-06-18 2019-10-15 阿里巴巴集团控股有限公司 Corporate authentication, certification retroactive method, device and equipment based on block chain
CN112712426A (en) * 2021-01-19 2021-04-27 上海超链信息科技有限公司 Supply chain finance application method based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
担保公司贷款业务信用风险研究;曹盈佳;《新会计》;20120128;全文 *

Also Published As

Publication number Publication date
CN112990940A (en) 2021-06-18

Similar Documents

Publication Publication Date Title
CN110336797B (en) Enterprise authentication and authentication tracing method, device and equipment based on block chain
CN110795501A (en) Method, device, equipment and system for creating verifiable statement based on block chain
CN111311251B (en) Binding processing method, device and equipment
US20210397688A1 (en) Trusted hardware-based identity management methods, apparatuses, and devices
CN110175828B (en) User verification method and device based on bank card quick payment signing
US10812477B2 (en) Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
CN112100594B (en) Service processing method, device and equipment based on block chain
CN112200585B (en) Service processing method, device, equipment and system
CN110768968A (en) Authorization method, device, equipment and system based on verifiable statement
CN107294999B (en) Information verification processing method, device and system, client and server
CN112990940B (en) Enterprise authentication method and device
CN107070871B (en) Identity verification method and device
TW202040385A (en) System for using device identification to identify via telecommunication server and method thereof
CN111582868A (en) Transaction request processing method, device and equipment
CN112286968A (en) Service identification method, equipment, medium and electronic equipment
CN112910896A (en) Account authentication method, device, equipment and medium
CN113114678A (en) Service execution method and device
CN112434347B (en) Rental business processing method, device, equipment and system
CN115330372A (en) Payment processing method and device based on prepaid voucher
CN113497805B (en) Registration processing method, device, equipment and system
CN113011891A (en) Core body processing method and device applied to associated payment
CN111882321A (en) Identity verification processing method, device and system
CN112232337A (en) Matching method of special language characters and information verification method and device
CN113159800B (en) Identity authentication processing method and device
CN113158151B (en) Identity authentication processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant