CN114124545A - Data credible cochain and identity authentication terminal for supply chain finance - Google Patents

Data credible cochain and identity authentication terminal for supply chain finance Download PDF

Info

Publication number
CN114124545A
CN114124545A CN202111416312.7A CN202111416312A CN114124545A CN 114124545 A CN114124545 A CN 114124545A CN 202111416312 A CN202111416312 A CN 202111416312A CN 114124545 A CN114124545 A CN 114124545A
Authority
CN
China
Prior art keywords
supply chain
chain platform
data
module
downstream supply
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111416312.7A
Other languages
Chinese (zh)
Inventor
高鹏
袁兰
吴飞
周伟华
高峰
潘晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Mjoys Big Data Technology Co ltd
Original Assignee
Hangzhou Mjoys Big Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Mjoys Big Data Technology Co ltd filed Critical Hangzhou Mjoys Big Data Technology Co ltd
Priority to CN202111416312.7A priority Critical patent/CN114124545A/en
Publication of CN114124545A publication Critical patent/CN114124545A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a data credible uplink and identity authentication terminal for supply chain finance, which comprises an upstream supply chain platform, a downstream supply chain platform, an identity authentication terminal and a data storage database, wherein the upstream supply chain platform is in signal connection with the downstream supply chain platform through a router, the upstream supply chain platform and the downstream supply chain platform are both in signal connection with the identity authentication terminal, the upstream supply chain platform is in signal connection with the data storage database, and the upstream supply chain platform comprises a financial data processing module, a financial data receiving module, a financial data decryption module and an identity result receiving module. According to the invention, the identity authentication terminal is connected between the upstream supply chain platform and the downstream supply chain platform, the identity authentication terminal authenticates the user information of the downstream supply chain platform, and under the condition of successful verification, a trust communication channel is established between the upstream supply chain platform and the downstream supply chain platform, so that the security of the upstream financial data is ensured.

Description

Data credible cochain and identity authentication terminal for supply chain finance
Technical Field
The invention relates to an identity authentication terminal, in particular to a data credible uplink and identity authentication terminal for supply chain finance, and belongs to the technical field of finance.
Background
Finance is an economic activity for increasing the value of currency through currency financing, which is a general term for currency and capital financing, and comprises two forms of indirect investment and financing with banks as centers and direct investment and financing with investment banks as centers. Mainly referring to various activities related to currency circulation and bank credit. The main contents comprise: issuing, putting, circulating and returning money; the absorption and withdrawal of various deposits; issuing and withdrawing of various loans; bank accounting, cashier, transfer, settlement, insurance, investment, trust, lease, exchange, cash-out, mortgage, securities trading and international trade and non-trade settlement, gold silver trading, export, import, etc.
In the process of data transmission between the upstream and downstream of the current financial supply chain, the identity of the downstream of the supply chain is not authenticated, so that the data information uploaded on the downstream of the supply chain is unsafe, and the security of the data transmission between the upstream and downstream of the supply chain is affected.
Disclosure of Invention
The present invention provides a trusted data uplink and identity authentication terminal for supply chain finance, so as to solve the problem that the data information uploaded downstream of the supply chain is unsafe and the security of the data transmission upstream and downstream of the supply chain finance is affected because the identity of the downstream of the supply chain is not authenticated in the data transmission process upstream and downstream of the supply chain at present in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: the system comprises an upstream supply chain platform, a downstream supply chain platform, an identity authentication terminal and a data storage database, wherein the upstream supply chain platform is in signal connection with the downstream supply chain platform through a router, the upstream supply chain platform and the downstream supply chain platform are both in signal connection with the identity authentication terminal, and the upstream supply chain platform is in signal connection with the data storage database;
the upstream supply chain platform comprises a financial data processing module, a financial data receiving module, a financial data decryption module and an identity result receiving module;
the downstream supply chain platform comprises a financial data acquisition module, a financial data uploading module, a financial data encryption module and an identity information uploading module;
the identity authentication terminal comprises an identity information acquisition module, an identity information verification module, an identity information certificate generation module and a result feedback module;
the data storage database stores supply chain financial data.
As a preferred technical solution of the present invention, the financial data processing module: the system comprises a data storage data block, a data processing data block and a data processing data block, wherein the data storage data block is used for processing financial data sent by a downstream supply chain platform, analyzing the sent financial data, determining the data condition of the financial downstream supply chain and uploading the processed data to the data storage data block for storage;
the financial data receiving module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for receiving financial data sent by a downstream supply chain platform;
the financial data decryption module: decrypting the encrypted financial data sent by the downstream supply chain platform;
the identity result receiving module: the system comprises a downstream supply chain platform, an identity authentication terminal, a downstream supply chain platform and an upstream supply chain platform, wherein the downstream supply chain platform is used for receiving the verification result of the identity authentication terminal on the downstream supply chain platform information, determining that the identity information of the downstream supply chain platform is credible, establishing a communication channel between the upstream supply chain platform and the downstream supply chain platform, uploading financial data on the downstream supply chain platform, failing to verify the identity information, not establishing connection between the upstream supply chain platform and the downstream supply chain platform, and feeding back that the identity information of the downstream supply chain platform fails to verify and cannot establish connection.
As a preferred technical solution of the present invention, the financial data acquisition module: the system is used for acquiring the identity information and financial data information of financial users;
the financial data uploading module: after the identity authentication terminal verifies the identity information security of the downstream supply chain platform, the upstream supply chain platform and the downstream supply chain platform establish a communication channel, and the downstream supply chain platform data are uploaded through the financial data uploading module;
the financial data encryption module: encrypting the acquired financial data;
the identity information uploading module: and uploading the user identity information acquired by the downstream supply chain platform to an identity authentication terminal.
As a preferred technical solution of the present invention, the financial data encryption method includes: the symmetric encryption algorithm DES comprises the following steps:
the first step is as follows: converting the financial data into a character string plaintext;
the second step is that: different code pages are designated through Encoding, and the character string plaintext is converted into codes corresponding to the different code pages and expressed as byte stream plaintext;
the third step: and converting the byte stream plaintext into the byte stream ciphertext through an encryption algorithm.
As a preferred technical solution of the present invention, the identity information acquiring module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for acquiring user identity information uploaded by a downstream supply chain platform;
the identity information verification module: authentication of user information for downstream supply chain platform information delivery
The identity information certificate generation module: the downstream supply chain platform user information passes the verification and automatically generates a verification certificate;
the result feedback module: and the downstream supply chain platform user information passes the verification and sends the verification certificate to the upstream supply chain platform, and the downstream supply chain platform user information fails the verification and sends the verification failure information to the downstream supply chain platform.
As a preferred technical solution of the present invention, the authentication of the identity information based on Token authentication includes the following steps:
the first step is as follows: the downstream supply chain platform sends a request for a user name and a password;
the second step is that: acquiring user information of a data storage database, and comparing the user information with user data sent by a downstream supply chain platform;
and thirdly, performing the step of. Returning a signed token to the downstream supply chain platform;
the fourth step: the downstream supply chain platform stores the token and requests the signed token each time;
the fifth step: the identity information verification module verifies the token and returns data.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention relates to a trusted uplink and identity authentication terminal for data of supply chain finance.
2. According to the data credible uplink and identity authentication terminal for supply chain finance, the downstream supply chain platform and the upstream supply chain platform are transmitted through safe encryption, so that the data uploading safety is effectively ensured, and the leakage of transmitted data is avoided.
Drawings
FIG. 1 is a block diagram of the modules of the present invention;
fig. 2 is a flowchart of the process of the identity authentication terminal according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides a technical solution of a trusted data uplink and identity authentication terminal for supply chain finance:
according to the embodiment shown in fig. 1-2, the system comprises an upstream supply chain platform, a downstream supply chain platform, an identity authentication terminal and a data storage database, wherein the upstream supply chain platform is in signal connection with the downstream supply chain platform through a router, the upstream supply chain platform and the downstream supply chain platform are both in signal connection with the identity authentication terminal, and the upstream supply chain platform is in signal connection with the data storage database;
the upstream supply chain platform and the downstream supply chain platform are verified through the identity authentication terminal and the downstream supply chain platform user information, and under the condition that the verification is passed, a data communication channel is established between the upstream supply chain platform and the downstream supply chain platform, so that the safety of data uploading of the downstream supply chain platform is ensured.
The upstream supply chain platform comprises a financial data processing module, a financial data receiving module, a financial data decryption module and an identity result receiving module;
the financial data processing module: the system comprises a data storage data block, a data processing data block and a data processing data block, wherein the data storage data block is used for processing financial data sent by a downstream supply chain platform, analyzing the sent financial data, determining the data condition of the financial downstream supply chain and uploading the processed data to the data storage data block for storage;
the financial data receiving module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for receiving financial data sent by a downstream supply chain platform;
financial data decryption module: decrypting the encrypted financial data sent by the downstream supply chain platform;
an identity result receiving module: the system comprises a downstream supply chain platform, an identity authentication terminal, a downstream supply chain platform and an upstream supply chain platform, wherein the downstream supply chain platform is used for receiving the verification result of the identity authentication terminal on the downstream supply chain platform information, determining that the identity information of the downstream supply chain platform is credible, establishing a communication channel between the upstream supply chain platform and the downstream supply chain platform, uploading financial data on the downstream supply chain platform, failing to verify the identity information, not establishing connection between the upstream supply chain platform and the downstream supply chain platform, and feeding back that the identity information of the downstream supply chain platform fails to verify and cannot establish connection.
And the upstream supply chain platform processes the uploaded financial data, confirms the identity information authenticated by the identity authentication terminal and establishes a communication channel with the downstream supply chain platform.
The downstream supply chain platform comprises a financial data acquisition module, a financial data uploading module, a financial data encryption module and an identity information uploading module;
the financial data acquisition module: the system is used for acquiring the identity information and financial data information of financial users;
financial data upload module: after the identity authentication terminal verifies the identity information security of the downstream supply chain platform, the upstream supply chain platform and the downstream supply chain platform establish a communication channel, and the downstream supply chain platform data are uploaded through the financial data uploading module;
financial data encryption module: encrypting the acquired financial data;
the financial data encryption method comprises the following steps: the symmetric encryption algorithm DES comprises the following steps:
the first step is as follows: converting the financial data into a character string plaintext;
the second step is that: different code pages are designated through Encoding, and the character string plaintext is converted into codes corresponding to the different code pages and expressed as byte stream plaintext;
the third step: and converting the byte stream plaintext into the byte stream ciphertext through an encryption algorithm.
Identity information uploads the module: uploading user identity information acquired by a downstream supply chain platform to an identity authentication terminal;
the identity authentication terminal comprises an identity information acquisition module, an identity information verification module, an identity information certificate generation module and a result feedback module;
the data storage database stores supply chain financial data.
An identity information acquisition module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for acquiring user identity information uploaded by a downstream supply chain platform;
identity information verification module: authentication of user information for downstream supply chain platform information delivery
Identity information certificate generation module: the downstream supply chain platform user information passes the verification and automatically generates a verification certificate;
a result feedback module: and the downstream supply chain platform user information passes the verification and sends the verification certificate to the upstream supply chain platform, and the downstream supply chain platform user information fails the verification and sends the verification failure information to the downstream supply chain platform.
The identity information verification is based on Token verification, and comprises the following steps:
the first step is as follows: the downstream supply chain platform sends a request for a user name and a password;
the second step is that: acquiring user information of a data storage database, and comparing the user information with user data sent by a downstream supply chain platform;
and thirdly, performing the step of. Returning a signed token to the downstream supply chain platform;
the fourth step: the downstream supply chain platform stores the token and requests the signed token each time;
the fifth step: the identity information verification module verifies the token and returns data.
In the description of the present invention, it is to be understood that the indicated orientations or positional relationships are based on the orientations or positional relationships shown in the drawings and are only for convenience in describing the present invention and simplifying the description, but are not intended to indicate or imply that the indicated devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and are not to be construed as limiting the present invention.
In the present invention, unless otherwise explicitly specified or limited, for example, it may be fixedly attached, detachably attached, or integrated; can be mechanically or electrically connected; the terms may be directly connected or indirectly connected through an intermediate, and may be communication between two elements or interaction relationship between two elements, unless otherwise specifically limited, and the specific meaning of the terms in the present invention will be understood by those skilled in the art according to specific situations.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. A data credible uplink and identity authentication terminal for supply chain finance comprises an upstream supply chain platform, a downstream supply chain platform, an identity authentication terminal and a data storage database, and is characterized in that the upstream supply chain platform and the downstream supply chain platform are in signal connection through a router, the upstream supply chain platform and the downstream supply chain platform are both in signal connection with the identity authentication terminal, and the upstream supply chain platform is in signal connection with the data storage database;
the upstream supply chain platform comprises a financial data processing module, a financial data receiving module, a financial data decryption module and an identity result receiving module;
the downstream supply chain platform comprises a financial data acquisition module, a financial data uploading module, a financial data encryption module and an identity information uploading module;
the identity authentication terminal comprises an identity information acquisition module, an identity information verification module, an identity information certificate generation module and a result feedback module;
the data storage database stores supply chain financial data.
2. The terminal of claim 1, wherein the terminal comprises: the financial data processing module: the system comprises a data storage data block, a data processing data block and a data processing data block, wherein the data storage data block is used for processing financial data sent by a downstream supply chain platform, analyzing the sent financial data, determining the data condition of the financial downstream supply chain and uploading the processed data to the data storage data block for storage;
the financial data receiving module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for receiving financial data sent by a downstream supply chain platform;
the financial data decryption module: decrypting the encrypted financial data sent by the downstream supply chain platform;
the identity result receiving module: the system comprises a downstream supply chain platform, an identity authentication terminal, a downstream supply chain platform and an upstream supply chain platform, wherein the downstream supply chain platform is used for receiving the verification result of the identity authentication terminal on the downstream supply chain platform information, determining that the identity information of the downstream supply chain platform is credible, establishing a communication channel between the upstream supply chain platform and the downstream supply chain platform, uploading financial data on the downstream supply chain platform, failing to verify the identity information, not establishing connection between the upstream supply chain platform and the downstream supply chain platform, and feeding back that the identity information of the downstream supply chain platform fails to verify and cannot establish connection.
3. The terminal of claim 1, wherein the terminal comprises: the financial data acquisition module: the system is used for acquiring the identity information and financial data information of financial users;
the financial data uploading module: after the identity authentication terminal verifies the identity information security of the downstream supply chain platform, the upstream supply chain platform and the downstream supply chain platform establish a communication channel, and the downstream supply chain platform data are uploaded through the financial data uploading module;
the financial data encryption module: encrypting the acquired financial data;
the identity information uploading module: and uploading the user identity information acquired by the downstream supply chain platform to an identity authentication terminal.
4. The terminal of claim 3, wherein the terminal comprises: the financial data encryption method comprises the following steps: the symmetric encryption algorithm DES comprises the following steps:
the first step is as follows: converting the financial data into a character string plaintext;
the second step is that: different code pages are designated through Encoding, and the character string plaintext is converted into codes corresponding to the different code pages and expressed as byte stream plaintext;
the third step: and converting the byte stream plaintext into the byte stream ciphertext through an encryption algorithm.
5. The terminal of claim 1, wherein the terminal comprises: the identity information acquisition module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for acquiring user identity information uploaded by a downstream supply chain platform;
the identity information verification module: authentication of user information for downstream supply chain platform information delivery
The identity information certificate generation module: the downstream supply chain platform user information passes the verification and automatically generates a verification certificate;
the result feedback module: and the downstream supply chain platform user information passes the verification and sends the verification certificate to the upstream supply chain platform, and the downstream supply chain platform user information fails the verification and sends the verification failure information to the downstream supply chain platform.
6. The terminal of claim 5, wherein the terminal comprises: the identity information verification is based on Token verification and comprises the following steps:
the first step is as follows: the downstream supply chain platform sends a request for a user name and a password;
the second step is that: acquiring user information of a data storage database, and comparing the user information with user data sent by a downstream supply chain platform;
and thirdly, performing the step of. Returning a signed token to the downstream supply chain platform;
the fourth step: the downstream supply chain platform stores the token and requests the signed token each time;
the fifth step: the identity information verification module verifies the token and returns data.
CN202111416312.7A 2021-11-25 2021-11-25 Data credible cochain and identity authentication terminal for supply chain finance Pending CN114124545A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111416312.7A CN114124545A (en) 2021-11-25 2021-11-25 Data credible cochain and identity authentication terminal for supply chain finance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111416312.7A CN114124545A (en) 2021-11-25 2021-11-25 Data credible cochain and identity authentication terminal for supply chain finance

Publications (1)

Publication Number Publication Date
CN114124545A true CN114124545A (en) 2022-03-01

Family

ID=80373537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111416312.7A Pending CN114124545A (en) 2021-11-25 2021-11-25 Data credible cochain and identity authentication terminal for supply chain finance

Country Status (1)

Country Link
CN (1) CN114124545A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996676A (en) * 2022-08-01 2022-09-02 北京云成金融信息服务有限公司 Supply chain financial platform authentication system and method based on historical data analysis

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684798A (en) * 2013-12-31 2014-03-26 南京理工大学连云港研究院 Authentication system used in distributed user service
CN104318437A (en) * 2014-10-11 2015-01-28 上海众人科技有限公司 Online payment system and payment method for virtual prepaid card
CN105429991A (en) * 2015-12-02 2016-03-23 成都汇合乾元科技有限公司 Efficient data transmission method for mobile terminal
CN108881290A (en) * 2018-07-17 2018-11-23 深圳前海微众银行股份有限公司 Digital certificate application method, system and storage medium based on block chain
CN109088871A (en) * 2018-08-14 2018-12-25 深圳市人民政府金融发展服务办公室 Datagram delivery method and system based on block chain technology
CN110299996A (en) * 2018-03-22 2019-10-01 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN110493237A (en) * 2019-08-26 2019-11-22 深圳前海环融联易信息科技服务有限公司 Identity management method, device, computer equipment and storage medium
US20190386975A1 (en) * 2017-06-19 2019-12-19 Alibaba Group Holding Limited Authentication method and device, and blockchain-based authentication data processing method and device
WO2020099690A1 (en) * 2018-11-16 2020-05-22 Financiera Española de Crédito a Distancia EFC, S.A. Method and system for financing purchases with strengthened client authentication
CN111865985A (en) * 2020-07-21 2020-10-30 安徽高山科技有限公司 Supply chain financial data maintenance method based on block chain
WO2021022737A1 (en) * 2019-08-08 2021-02-11 南京中诚区块链研究院有限公司 Financial security depository receipt system and method based on blockchain

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684798A (en) * 2013-12-31 2014-03-26 南京理工大学连云港研究院 Authentication system used in distributed user service
CN104318437A (en) * 2014-10-11 2015-01-28 上海众人科技有限公司 Online payment system and payment method for virtual prepaid card
CN105429991A (en) * 2015-12-02 2016-03-23 成都汇合乾元科技有限公司 Efficient data transmission method for mobile terminal
US20190386975A1 (en) * 2017-06-19 2019-12-19 Alibaba Group Holding Limited Authentication method and device, and blockchain-based authentication data processing method and device
CN110299996A (en) * 2018-03-22 2019-10-01 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN108881290A (en) * 2018-07-17 2018-11-23 深圳前海微众银行股份有限公司 Digital certificate application method, system and storage medium based on block chain
CN109088871A (en) * 2018-08-14 2018-12-25 深圳市人民政府金融发展服务办公室 Datagram delivery method and system based on block chain technology
WO2020099690A1 (en) * 2018-11-16 2020-05-22 Financiera Española de Crédito a Distancia EFC, S.A. Method and system for financing purchases with strengthened client authentication
WO2021022737A1 (en) * 2019-08-08 2021-02-11 南京中诚区块链研究院有限公司 Financial security depository receipt system and method based on blockchain
CN110493237A (en) * 2019-08-26 2019-11-22 深圳前海环融联易信息科技服务有限公司 Identity management method, device, computer equipment and storage medium
CN111865985A (en) * 2020-07-21 2020-10-30 安徽高山科技有限公司 Supply chain financial data maintenance method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李建;何永忠;沈昌祥;周正;王青龙;: "可信移动平台身份管理框架", 计算机应用研究, no. 12 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996676A (en) * 2022-08-01 2022-09-02 北京云成金融信息服务有限公司 Supply chain financial platform authentication system and method based on historical data analysis

Similar Documents

Publication Publication Date Title
US10911456B2 (en) Systems and methods for device push provisioning
CN104838629B (en) Use mobile device and the method and system that are authenticated by means of certificate to user
CN101848090B (en) Authentication device and system and method using same for on-line identity authentication and transaction
US20150327072A1 (en) Method and system for provisioning access data to mobile device
CN101662469B (en) Method and system based on USBKey online banking trade information authentication
CN102202300A (en) System and method for dynamic password authentication based on dual channels
CN107784499B (en) Secure payment system and method of near field communication mobile terminal
WO2012167941A1 (en) Method to validate a transaction between a user and a service provider
GB2483515A (en) User Identity Authentication
TWI591553B (en) Systems and methods for mobile devices to trade financial documents
CN101221641A (en) On-line trading method and its safety affirmation equipment
US20200279258A1 (en) Mobile payments using multiple cryptographic protocols
CN112419021B (en) Electronic invoice verification method, system, storage medium, computer equipment and terminal
US12008568B1 (en) Systems and methods for an authorized identification system
EP2533486A1 (en) Method to validate a transaction between a user and a service provider
CN114124545A (en) Data credible cochain and identity authentication terminal for supply chain finance
CN104657860A (en) Mobile banking security authentication method
CN102811203B (en) Method for identifying ID, system and user terminal in the Internet
CN101425901A (en) Control method and device for customer identity verification in processing terminals
US20180322502A1 (en) Data security system using interaction channel code
TW201421393A (en) System for interactive 2-D barcode transaction data transmission and validation of mobile device and method thereof
CN102609842A (en) Payment cipher device based on hardware signature equipment, and application method of payment cipher device
US11574310B2 (en) Secure authentication system and method
Nashwan et al. Mutual chain authentication protocol for SPAN transactions in Saudi Arabian banking
KR101250230B1 (en) Two channel authentication system and method based position value

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination