CN114996676A - Supply chain financial platform authentication system and method based on historical data analysis - Google Patents

Supply chain financial platform authentication system and method based on historical data analysis Download PDF

Info

Publication number
CN114996676A
CN114996676A CN202210917988.2A CN202210917988A CN114996676A CN 114996676 A CN114996676 A CN 114996676A CN 202210917988 A CN202210917988 A CN 202210917988A CN 114996676 A CN114996676 A CN 114996676A
Authority
CN
China
Prior art keywords
information
module
supply chain
user identity
financial data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210917988.2A
Other languages
Chinese (zh)
Inventor
杨琨
葛大伟
李健
刘奎阳
何亘
段国强
杨立寨
王振宇
汪进
王凯飞
何立军
李辰辉
余纪良
苏建新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuncheng Financial Information Service Co ltd
Original Assignee
Beijing Yuncheng Financial Information Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuncheng Financial Information Service Co ltd filed Critical Beijing Yuncheng Financial Information Service Co ltd
Priority to CN202210917988.2A priority Critical patent/CN114996676A/en
Publication of CN114996676A publication Critical patent/CN114996676A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2291User-Defined Types; Storage management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of network financial security, in particular to an authentication system and method of a supply chain financial platform based on historical data analysis. The method comprises the following steps: step S1: acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to an upstream supply chain module, and uploading the user identity information to an identity authentication module; step S2: receiving and processing financial data information sent by a downstream supply chain module, and judging whether to establish connection with the downstream supply chain module based on the financial data information; step S3: storing financial data information and user identity information; step S4: and performing identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result. The security authentication system for the supply chain financial platform has the advantages of resisting repudiation, security and confidentiality, identity credibility and the like.

Description

Supply chain financial platform authentication system and method based on historical data analysis
Technical Field
The invention relates to the technical field of network financial security, in particular to an authentication system and method of a supply chain financial platform based on historical data analysis.
Background
The supply chain refers to a functional network structure which is formed by forming intermediate products and final products around a core enterprise from kit parts, and finally sending the products to consumers through a sales network to connect suppliers, manufacturers, distributors and end users into a whole. The business idea of supply chain management is to optimize the supply chain as a whole through cooperation between enterprises from the perspective of consumers. Successful supply chain management can coordinate and integrate all activities in the supply chain, eventually becoming an integrated process of seamless connectivity.
Supply chain finance is a financial service derived based on modern supply chain management, and comprises the steps of research and development, purchasing, logistics, selling and the like, financial service development is carried out, basic information of financing enterprises and the trade conditions of the financing enterprises in the whole supply chain network are observed, the possibility that assets with poor liquidity are appeared in the future is judged by starting from up and down real transactions, and the operation capacity and the risk resistance of small and medium-sized enterprises can be judged more objectively under the management of the modern supply chain background, so that the financing scale and risk of the enterprises are judged.
However, with the rapid development of the internet and social media, the traditional financial model is gradually shifted to the internet, and the characteristics of trading at any time and place in the virtual world are expected to bring about a great expansion to the internet finance. Under the development trend, extremely strong safety guarantee is needed for the aspects of self information, fund, transaction safety and the like of all the parties participating in the finance of the supply chain. Therefore, how to provide an authentication system and method for a supply chain financial platform based on historical data analysis is a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The invention aims to provide a supply chain financial platform authentication system and method based on historical data analysis.
The invention improves the problem of information isolated island of a supply chain financial platform in the prior art, improves the interactivity of data information by sharing an upstream supply chain and a downstream supply chain with an identity authentication module and a data storage module, eliminates the isolated island effect of the financial data information, improves the interaction efficiency of the supply chain financial platform data, and simultaneously carries out identity verification on user identity information through the identity authentication module to ensure that the authentication result has uniqueness, thereby preventing the trade on the supply chain financial platform from being repudiated.
The invention improves the problem that the user needs to verify the identity information every time in the prior art, the invention marks the user identity information of the verified user, stores the marked identity information in the database, matches the marked identity information when the user identity information of the user is detected again, and directly passes the verification of the user according to the matching result, thereby avoiding the problem that the verification needs to be carried out every time.
In order to achieve the purpose, the invention provides the following technical scheme:
an authentication system for a supply chain financial platform based on historical data analysis, comprising: the system comprises an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module;
the downstream supply chain module is used for acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
the upstream supply chain module is used for receiving and processing the financial data information sent by the downstream supply chain module and judging whether to establish connection with the downstream supply chain module or not based on the financial data information;
the data storage module is used for storing the financial data information and the user identity information, and is also used for establishing a historical database, and historical financial data information corresponding to the user identity information is stored in the historical database;
the data storage module is further used for carrying out data analysis on financial data information and historical financial data information corresponding to the current user identity information and judging whether to upload the current user identity information to the identity authentication module or not according to a data analysis result;
the identity authentication module is used for carrying out identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result.
In some embodiments of the present application, the data storage module is further configured to perform data analysis on the financial data information corresponding to the current user identity information and historical financial data information, and includes:
extracting current attribute information in the financial data information corresponding to the current user identity information and extracting historical attribute information in the historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, if the data analysis result is that the analysis is not passed, stopping uploading the user identity information to the identity authentication module, uploading the financial data information corresponding to the current user identity information to the upstream supply chain module, and informing a user of an upstream supply chain to confirm the financial data information by the upstream supply chain module;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs a user of an upstream supply chain to confirm the financial data information;
the identity authentication module is internally provided with a database and is also used for marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information when the identity authentication module receives the user identity information, and directly judging that the identity authentication result is passed if the matching result is consistent.
In some embodiments of the present application, the upstream supply chain module comprises: the system comprises a data processing module, a data receiving module, a data decryption module and an identity verification module;
the data processing module is used for preprocessing the financial data information sent by the downstream supply chain module and uploading the preprocessed data information to the data storage module for storage;
the data receiving module is used for receiving the financial data information sent by the downstream supply chain module;
the data decryption module is used for decrypting the encrypted financial data information sent by the downstream supply chain module;
the identity authentication module is configured to receive the identity authentication result, establish a communication channel with the downstream supply chain module when the user identity information of the downstream supply chain module is trusted, upload the financial data information by the downstream supply chain module, and when the user identity information of the downstream supply chain module is not trusted, not establish a connection with the downstream supply chain module and feed back the identity authentication result to the downstream supply chain module.
In some embodiments of the present application, the downstream supply chain module comprises a data acquisition module, a data upload module, a data encryption module, and an identity information module;
the data acquisition module is used for acquiring the financial data information and user identity information corresponding to the financial data information;
the data uploading module is used for uploading the financial data information acquired by the downstream supply chain module;
the data encryption module is used for encrypting the acquired financial data information;
the identity information module is used for uploading the acquired user identity information to the identity authentication module.
In some embodiments of the application, the data encryption module is further configured to convert the financial data information into a text string plaintext, specify different code pages by Encoding, convert the text string plaintext into codes corresponding to the different code pages, output the codes as a byte stream plaintext, and convert the byte stream plaintext into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
In order to achieve the above object, the present invention further provides a method for authenticating a supply chain financial platform based on historical data analysis, which is applied in a system including an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module, and includes:
step S1: acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
step S2: receiving and processing the financial data information sent by the downstream supply chain module, and judging whether to establish connection with the downstream supply chain module based on the financial data information;
step S3: storing the financial data information and the user identity information, and establishing a historical database, wherein historical financial data information corresponding to the user identity information is stored in the historical database;
step S4: performing identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result;
the step S3 further includes: and performing data analysis on financial data information and historical financial data information corresponding to the current user identity information, and judging whether to upload the current user identity information to the identity authentication module according to a data analysis result.
In some embodiments of the present application, the step S3 further includes:
extracting current attribute information in the financial data information corresponding to the current user identity information and extracting historical attribute information in the historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, if the data analysis result is that the analysis is not passed, stopping uploading the user identity information to the identity authentication module, uploading the financial data information corresponding to the current user identity information to the upstream supply chain module, and informing a user of an upstream supply chain to confirm the financial data information by the upstream supply chain module;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs a user of an upstream supply chain to confirm the financial data information;
the step S4 further includes: and establishing a database, marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information with the marked identity information when the user identity information is received, and directly judging that the identity verification result is passed if the matching result is consistent.
In some embodiments of the present application, the step S1 further includes:
preprocessing the financial data information sent by the downstream supply chain module, and uploading the preprocessed data information to the data storage module for storage;
receiving the financial data information sent by the downstream supply chain module;
decrypting the encrypted financial data information sent by the downstream supply chain module;
receiving the authentication result, establishing a communication channel between the upstream supply chain module and the downstream supply chain module when the user identity information of the downstream supply chain module is trusted, uploading the financial data information by the downstream supply chain module, and when the user identity information of the downstream supply chain module is not trusted, not establishing connection between the upstream supply chain module and the downstream supply chain module and feeding back the authentication result to the downstream supply chain module.
In some embodiments of the present application, the step S2 further includes:
acquiring the financial data information and user identity information corresponding to the financial data information;
uploading the financial data information acquired by a downstream supply chain module;
encrypting the acquired financial data information;
and uploading the acquired user identity information to the identity authentication module.
In some embodiments of the present application, the encrypting the obtained financial data information includes:
converting the financial data information into a character string plaintext, designating different code pages through Encoding, converting the character string plaintext into codes corresponding to the different code pages, outputting the codes as a byte stream plaintext, and converting the byte stream plaintext into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
Compared with the prior art, the supply chain financial platform authentication system and method based on historical data analysis have the beneficial effects that:
the financial data information sent by the downstream supply chain module is received and processed, whether connection is established with the downstream supply chain module is judged based on the financial data information, the financial data information and the user identity information corresponding to the financial data information are obtained, the financial data information is uploaded to the upstream supply chain module, the user identity information is uploaded to the identity authentication module, the user identity information corresponding to the financial data information is received, the identity authentication is carried out based on the user identity information to obtain the authentication result, whether the authentication is passed or not is judged according to the authentication result, and the financial data information and the user identity information are stored. The invention has the advantages of resisting the repudiation, having uniqueness and non-repudiation on the financial data information based on the user identity information, having safety confidentiality, ensuring the safety of the system and the user transaction data through the encryption verification of the financial data information, having identity credibility, and ensuring the legality and credibility of the identity of the user subject participating in the financial activities by verifying whether the user identity information is credible or not and further establishing a communication channel.
Drawings
FIG. 1 is a functional block diagram of an authentication system for a supply chain financial platform based on historical data analysis in accordance with the present invention;
FIG. 2 is a flow chart of the method of the present invention for authentication of a supply chain financial platform based on historical data analysis.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
In the description of the present application, it is to be understood that the terms "center", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience in describing the present application and simplifying the description, but do not indicate or imply that the referred device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be construed as limiting the present application.
The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless otherwise specified.
In the description of the present application, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be directly connected or indirectly connected through an intermediate member, or they may be connected to each other through an intermediate member. The specific meaning of the above terms in this application will be understood to be a specific case for those of ordinary skill in the art.
With the rapid development of the internet and social media, the traditional financial model is gradually shifted to the internet, and the characteristics of conducting transactions at any time and place in the virtual world are expected to bring about a great expansion to the internet finance. Under the development trend, extremely strong safety guarantee is needed for the aspects of self information, fund, transaction safety and the like of all the parties participating in the finance of the supply chain. Therefore, how to provide an authentication system and method for a supply chain financial platform based on historical data analysis is a technical problem that needs to be solved urgently by those skilled in the art.
Therefore, the supply chain financial platform authentication system and method based on historical data analysis provided by the invention have the advantages of uniqueness, security and confidentiality, identity credibility and the like by carrying out identity verification on user identity information.
Referring to fig. 1, an embodiment of the disclosure provides an authentication system for a supply chain financial platform based on historical data analysis, including: the system comprises an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module;
the downstream supply chain module is used for acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
the upstream supply chain module is used for receiving and processing the financial data information sent by the downstream supply chain module and judging whether to establish connection with the downstream supply chain module based on the financial data information;
the data storage module is used for storing financial data information and user identity information and establishing a historical database, and historical financial data information corresponding to the user identity information is stored in the historical database;
the data storage module is also used for carrying out data analysis on financial data information corresponding to the current user identity information and historical financial data information and judging whether to upload the current user identity information to the identity authentication module or not according to a data analysis result;
the identity authentication module is used for carrying out identity authentication on the identity information of the user to obtain an identity authentication result and judging whether the identity authentication result passes the authentication or not according to the identity authentication result.
In an embodiment of the present application, the data storage module is further configured to perform data analysis on the financial data information corresponding to the current user identity information and the historical financial data information, and includes:
extracting current attribute information in financial data information corresponding to current user identity information and extracting historical attribute information in historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs the user of the upstream supply chain to confirm the financial data information;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis results are that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis results are that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs the user of the upstream supply chain to confirm the financial data information;
the identity authentication module is internally provided with a database and is also used for marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information when receiving the user identity information, and directly judging that the identity authentication result is passed if the matching result is consistent.
In one particular embodiment of the present application, the upstream supply chain module comprises: the system comprises a data processing module, a data receiving module, a data decryption module and an identity verification module;
the data processing module is used for preprocessing the financial data information sent by the downstream supply chain module and uploading the preprocessed data information to the data storage module for storage;
the data receiving module is used for receiving financial data information sent by the downstream supply chain module;
the data decryption module is used for decrypting the encrypted financial data information sent by the downstream supply chain module;
the identity authentication module is used for receiving an identity authentication result, when the user identity information of the downstream supply chain module is credible, the upstream supply chain module and the downstream supply chain module establish a communication channel, the downstream supply chain module uploads financial data information, and when the user identity information of the downstream supply chain module is not credible, the upstream supply chain module and the downstream supply chain module do not establish connection and feed the identity authentication result back to the downstream supply chain module.
In a specific embodiment of the present application, the downstream supply chain module includes a data acquisition module, a data upload module, a data encryption module, and an identity information module;
the data acquisition module is used for acquiring financial data information and user identity information corresponding to the financial data information;
the data uploading module is used for uploading the financial data information acquired by the downstream supply chain module;
the data encryption module is used for encrypting the acquired financial data information;
the identity information module is used for uploading the acquired user identity information to the identity authentication module.
In a specific embodiment of the application, the data encryption module is further configured to convert financial data information into a plaintext character string, specify different code pages by Encoding, convert the plaintext character string into codes corresponding to the different code pages, output the codes as a plaintext byte stream, and convert the plaintext byte stream into a ciphertext byte stream according to the plaintext byte stream and a preset encryption algorithm.
Based on the same technical concept, referring to fig. 2, the present invention also provides a method for authenticating a supply chain financial platform based on historical data analysis, which is applied to a system including an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module, and includes:
step S1: acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to an upstream supply chain module, and uploading the user identity information to an identity authentication module;
step S2: receiving and processing financial data information sent by a downstream supply chain module, and judging whether to establish connection with the downstream supply chain module based on the financial data information;
step S3: storing financial data information and user identity information, and establishing a historical database, wherein historical financial data information corresponding to the user identity information is stored in the historical database;
step S4: performing identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result;
step S3 further includes: and performing data analysis on the financial data information corresponding to the current user identity information and the historical financial data information, and judging whether to upload the current user identity information to the identity authentication module according to a data analysis result.
In a specific embodiment of the present application, step S3 further includes:
extracting current attribute information in financial data information corresponding to current user identity information and extracting historical attribute information in historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs the user of the upstream supply chain to confirm the financial data information;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis results are that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs the user of the upstream supply chain to confirm the financial data information;
step S4 further includes: establishing a database, marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information with the marked identity information when the user identity information is received, and directly judging that the identity verification result is passed if the matching result is consistent.
In an embodiment of the present application, step S1 further includes:
preprocessing financial data information sent by a downstream supply chain module, and uploading the preprocessed data information to a data storage module for storage;
receiving financial data information sent by a downstream supply chain module;
decrypting the encrypted financial data information sent by the downstream supply chain module;
and receiving an identity verification result, establishing a communication channel between the upstream supply chain module and the downstream supply chain module when the user identity information of the downstream supply chain module is credible, uploading financial data information by the downstream supply chain module, and when the user identity information of the downstream supply chain module is not credible, not establishing connection between the upstream supply chain module and the downstream supply chain module and feeding back the identity verification result to the downstream supply chain module.
In an embodiment of the present application, step S2 further includes:
acquiring financial data information and user identity information corresponding to the financial data information;
uploading financial data information acquired by a downstream supply chain module;
encrypting the acquired financial data information;
and uploading the acquired user identity information to an identity authentication module.
In a specific embodiment of the present application, the encrypting the acquired financial data information includes:
the financial data information is converted into a character string plaintext, different code pages are specified through Encoding, the character string plaintext is converted into codes corresponding to the different code pages and output as a byte stream plaintext, and the byte stream plaintext is converted into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
According to the first concept of the invention, the upstream supply chain and the downstream supply chain are shared with the identity authentication module and the data storage module, so that the interactivity of data information is improved, the island effect of financial data information is eliminated, the interaction efficiency of the financial platform data of the supply chain is improved, and meanwhile, the identity authentication module is used for carrying out identity authentication on the user identity information, so that the authentication result has uniqueness, and further, the condition that the transaction on the financial platform of the supply chain is repudiated is prevented.
According to the second concept of the invention, the user identity information of the verified user is marked, the marked identity information is stored in the database, when the user identity information of the user is detected again, the marked identity information is matched, and the user passes the verification directly according to the matching result, so that the problem that the verification needs to be carried out every time is avoided, historical data correlation matching is carried out according to the attribute information of the historical financial data information, the safety of the financial data information is greatly improved, and the working efficiency is greatly improved.
In summary, the authentication system and method for a supply chain financial platform based on historical data analysis provided by the present invention receive and process financial data information sent by a downstream supply chain module, and determine whether to establish a connection with the downstream supply chain module based on the financial data information, obtain user identity information corresponding to the financial data information and the financial data information, upload the financial data information to an upstream supply chain module, upload the user identity information to an identity authentication module, receive the user identity information corresponding to the financial data information, perform identity authentication based on the user identity information to obtain an authentication result, determine whether to pass the authentication according to the authentication result, and store the financial data information and the user identity information. The invention has the advantages of resisting the repudiation, having uniqueness and non-repudiation on the financial data information based on the user identity information, having safety confidentiality, ensuring the safety of the system and the user transaction data through the encryption verification of the financial data information, having identity credibility, and ensuring the legality and credibility of the identity of the user subject participating in the financial activities by verifying whether the user identity information is credible or not and further establishing a communication channel.
The above description is only an embodiment of the present invention, but not intended to limit the scope of the present invention, and any structural changes made according to the present invention should be considered as being limited within the scope of the present invention without departing from the spirit of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. Names of the modules and steps related in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
Those of skill in the art will appreciate that the various illustrative modules, method steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (10)

1. An authentication system for a supply chain financial platform based on historical data analysis, comprising: the system comprises an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module;
the downstream supply chain module is used for acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
the upstream supply chain module is used for receiving and processing the financial data information sent by the downstream supply chain module and judging whether to establish connection with the downstream supply chain module or not based on the financial data information;
the data storage module is used for storing the financial data information and the user identity information, and is also used for establishing a historical database, and historical financial data information corresponding to the user identity information is stored in the historical database;
the data storage module is further used for carrying out data analysis on financial data information and historical financial data information corresponding to the current user identity information and judging whether to upload the current user identity information to the identity authentication module or not according to a data analysis result;
the identity authentication module is used for carrying out identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result.
2. The system of claim 1, wherein the data storage module is further configured to perform data analysis on the financial data information corresponding to the current user identity information and historical financial data information, and includes:
extracting current attribute information in the financial data information corresponding to the current user identity information and extracting historical attribute information in the historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, if the data analysis result is that the analysis is not passed, stopping uploading the user identity information to the identity authentication module, uploading the financial data information corresponding to the current user identity information to the upstream supply chain module, and informing a user of an upstream supply chain to confirm the financial data information by the upstream supply chain module;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs a user of an upstream supply chain to confirm the financial data information;
the identity authentication module is internally provided with a database and is also used for marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information when the identity authentication module receives the user identity information, and directly judging that the identity authentication result is passed if the matching result is consistent.
3. The system of claim 1, wherein the upstream supply chain module comprises: the system comprises a data processing module, a data receiving module, a data decryption module and an identity verification module;
the data processing module is used for preprocessing the financial data information sent by the downstream supply chain module and uploading the preprocessed data information to the data storage module for storage;
the data receiving module is used for receiving the financial data information sent by the downstream supply chain module;
the data decryption module is used for decrypting the encrypted financial data information sent by the downstream supply chain module;
the identity authentication module is configured to receive the identity authentication result, establish a communication channel with the downstream supply chain module when the user identity information of the downstream supply chain module is trusted, upload the financial data information by the downstream supply chain module, and when the user identity information of the downstream supply chain module is not trusted, not establish a connection with the downstream supply chain module and feed back the identity authentication result to the downstream supply chain module.
4. The historical data analysis-based supply chain financial platform authentication system as claimed in claim 1, wherein the downstream supply chain module comprises a data acquisition module, a data uploading module, a data encryption module and an identity information module;
the data acquisition module is used for acquiring the financial data information and user identity information corresponding to the financial data information;
the data uploading module is used for uploading the financial data information acquired by the downstream supply chain module;
the data encryption module is used for encrypting the acquired financial data information;
the identity information module is used for uploading the acquired user identity information to the identity authentication module.
5. The system of claim 4, wherein the historical data analysis-based supply chain financial platform certification system,
the data encryption module is further used for converting the financial data information into a character string plaintext, designating different code pages through Encoding, converting the character string plaintext into codes corresponding to the different code pages, outputting the codes as a byte stream plaintext, and converting the byte stream plaintext into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
6. A supply chain financial platform authentication method based on historical data analysis is applied to a system comprising an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module, and is characterized by comprising the following steps:
step S1: acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
step S2: receiving and processing the financial data information sent by the downstream supply chain module, and judging whether to establish connection with the downstream supply chain module based on the financial data information;
step S3: storing the financial data information and the user identity information, and establishing a historical database, wherein historical financial data information corresponding to the user identity information is stored in the historical database;
step S4: performing identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result;
the step S3 further includes: and performing data analysis on the financial data information corresponding to the current user identity information and historical financial data information, and judging whether to upload the current user identity information to the identity authentication module according to a data analysis result.
7. The method for authenticating the supply chain financial platform based on the historical data analysis as claimed in claim 6, wherein the step S3 further includes:
extracting current attribute information in the financial data information corresponding to the current user identity information and extracting historical attribute information in the historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, if the data analysis result is that the analysis is not passed, stopping uploading the user identity information to the identity authentication module, uploading the financial data information corresponding to the current user identity information to the upstream supply chain module, and informing a user of an upstream supply chain to confirm the financial data information by the upstream supply chain module;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs a user of an upstream supply chain to confirm the financial data information;
the step S4 further includes: establishing a database, marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information with the user identity information when the user identity information is received, and directly judging that the identity verification result is passed if the matching result is consistent.
8. The method for authenticating the supply chain financial platform based on the historical data analysis as claimed in claim 6, wherein the step S1 further includes:
preprocessing the financial data information sent by the downstream supply chain module, and uploading the preprocessed data information to the data storage module for storage;
receiving the financial data information sent by the downstream supply chain module;
decrypting the encrypted financial data information sent by the downstream supply chain module;
receiving the identity verification result, establishing a communication channel between the upstream supply-chain module and the downstream supply-chain module when the user identity information of the downstream supply-chain module is trusted, uploading the financial data information by the downstream supply-chain module, and when the user identity information of the downstream supply-chain module is not trusted, not establishing connection between the upstream supply-chain module and the downstream supply-chain module and feeding the identity verification result back to the downstream supply-chain module.
9. The method for authenticating the supply chain financial platform based on the historical data analysis as claimed in claim 8, wherein the step S2 further comprises:
acquiring the financial data information and user identity information corresponding to the financial data information;
uploading the financial data information acquired by a downstream supply chain module;
encrypting the acquired financial data information;
and uploading the acquired user identity information to the identity authentication module.
10. The method for authenticating the supply chain financial platform based on the historical data analysis as claimed in claim 9, wherein the step of encrypting the acquired financial data information comprises:
converting the financial data information into a character string plaintext, designating different code pages through Encoding, converting the character string plaintext into codes corresponding to the different code pages, outputting the codes as a byte stream plaintext, and converting the byte stream plaintext into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
CN202210917988.2A 2022-08-01 2022-08-01 Supply chain financial platform authentication system and method based on historical data analysis Pending CN114996676A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210917988.2A CN114996676A (en) 2022-08-01 2022-08-01 Supply chain financial platform authentication system and method based on historical data analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210917988.2A CN114996676A (en) 2022-08-01 2022-08-01 Supply chain financial platform authentication system and method based on historical data analysis

Publications (1)

Publication Number Publication Date
CN114996676A true CN114996676A (en) 2022-09-02

Family

ID=83022486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210917988.2A Pending CN114996676A (en) 2022-08-01 2022-08-01 Supply chain financial platform authentication system and method based on historical data analysis

Country Status (1)

Country Link
CN (1) CN114996676A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115329156A (en) * 2022-10-14 2022-11-11 北京云成金融信息服务有限公司 Data management method and system based on historical data
CN117611191A (en) * 2023-11-27 2024-02-27 哈尔滨工程大学三亚南海创新发展基地 Method, system, computer equipment and storage medium for generating industrial chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843236A (en) * 2012-09-12 2012-12-26 飞天诚信科技股份有限公司 Generation and authentication method and system for dynamic password
US20200201966A1 (en) * 2018-12-21 2020-06-25 Oath Inc. Biometric based self-sovereign information management
CN112101810A (en) * 2020-09-23 2020-12-18 中国建设银行股份有限公司 Risk event control method, device and system
CN114124545A (en) * 2021-11-25 2022-03-01 杭州摸象大数据科技有限公司 Data credible cochain and identity authentication terminal for supply chain finance
CN114742655A (en) * 2022-06-13 2022-07-12 杭银消费金融股份有限公司 Anti-money laundering behavior recognition system based on machine learning
CN114820155A (en) * 2022-06-29 2022-07-29 北京云成金融信息服务有限公司 Data management system and method for supply chain financial platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843236A (en) * 2012-09-12 2012-12-26 飞天诚信科技股份有限公司 Generation and authentication method and system for dynamic password
US20200201966A1 (en) * 2018-12-21 2020-06-25 Oath Inc. Biometric based self-sovereign information management
CN112101810A (en) * 2020-09-23 2020-12-18 中国建设银行股份有限公司 Risk event control method, device and system
CN114124545A (en) * 2021-11-25 2022-03-01 杭州摸象大数据科技有限公司 Data credible cochain and identity authentication terminal for supply chain finance
CN114742655A (en) * 2022-06-13 2022-07-12 杭银消费金融股份有限公司 Anti-money laundering behavior recognition system based on machine learning
CN114820155A (en) * 2022-06-29 2022-07-29 北京云成金融信息服务有限公司 Data management system and method for supply chain financial platform

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115329156A (en) * 2022-10-14 2022-11-11 北京云成金融信息服务有限公司 Data management method and system based on historical data
CN117611191A (en) * 2023-11-27 2024-02-27 哈尔滨工程大学三亚南海创新发展基地 Method, system, computer equipment and storage medium for generating industrial chain

Similar Documents

Publication Publication Date Title
US20230133210A1 (en) Secure authentication system and method
US20220005048A1 (en) Real and virtual identity verification circuit, system thereof and electronic transaction method
CN108537314A (en) Product marketing system and method based on Quick Response Code
US20040250068A1 (en) Individual certification method
CA2780278A1 (en) Verification of portable consumer devices for 3-d secure services
CN110766275A (en) Data verification method and device, computer equipment and storage medium
CN110602114A (en) Block chain-based identity authentication method and device, storage medium and electronic equipment
CN103824170A (en) Mobile phone buying and selling client based on two-dimension codes, system and buying and selling management method
CN104090835A (en) eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method
CN110223159A (en) Credit data query method, apparatus, computer equipment and storage medium
CN104616389A (en) Stamp recognition method and device
CN114996676A (en) Supply chain financial platform authentication system and method based on historical data analysis
CN113761488A (en) Content network copyright tracing encryption system and encryption method
CN106030637A (en) Payment settlement system, payment settlement device, transaction terminal, payment management method, and program
US20210035217A1 (en) Updating blockchain-encoded records of rived longevity-contingent instruments
CN110070365B (en) Commodity evidence storing method and device based on block chain and electronic equipment
CN109409891B (en) Courseware sharing method and device
CN111429311A (en) Intellectual property trading sharing system and method based on block chain
CN115511646A (en) Fraud identification system applied to online transaction
US20210097610A1 (en) Utilizing blockchain-encoded records for rived longevity-contingent instruments
CN111753018B (en) E-letter method, system and computer equipment
CN113191790A (en) User demand and commodity service slot point table docking and quality tracking method and system
GB2548073A (en) System, method and apparatus for data transmission
CN117592125B (en) Reliability electronic signature method of paperless transaction system for second-hand house transaction
CN110941745A (en) Electronic contract management method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220902

RJ01 Rejection of invention patent application after publication