[go: up one dir, main page]

CN112507350A - Authentication method and device for assisting execution of audit service - Google Patents

Authentication method and device for assisting execution of audit service Download PDF

Info

Publication number
CN112507350A
CN112507350A CN202011291288.4A CN202011291288A CN112507350A CN 112507350 A CN112507350 A CN 112507350A CN 202011291288 A CN202011291288 A CN 202011291288A CN 112507350 A CN112507350 A CN 112507350A
Authority
CN
China
Prior art keywords
encryption string
request instruction
string
legal document
assisting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011291288.4A
Other languages
Chinese (zh)
Other versions
CN112507350B (en
Inventor
叶冬花
唐伟杰
刘雯
温沛霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202011291288.4A priority Critical patent/CN112507350B/en
Publication of CN112507350A publication Critical patent/CN112507350A/en
Application granted granted Critical
Publication of CN112507350B publication Critical patent/CN112507350B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Bioethics (AREA)
  • Primary Health Care (AREA)
  • Technology Law (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an authentication method and an authentication device for assisting in executing checking and controlling business, which are used for artificial intelligence authentication in the financial field, and the method comprises the following steps: acquiring an assistance check and control request instruction and a legal document corresponding to the assistance check and control request instruction; generating an encryption string according to a preset strategy according to key elements in the assistance check request instruction; the authentication is carried out according to the generated encryption string, the encryption string carried by the assistant check request instruction and the encryption string in the legal document, wherein the encryption string is generated as a verification code through an encryption technology, and a mode of matching the encryption string is used for replacing a mode of identifying and matching multiple elements, so that the processing workload is simplified, the check execution efficiency is improved, the identification and matching elements are reduced, the probability of influencing the identification and matching accuracy due to poor definition of a scanning piece is reduced, and the identification and matching accuracy, safety and check execution efficiency are improved; the introduction of the encryption technology prevents malicious tampering, further improves the accuracy and the safety, and realizes traceability in the whole checking process.

Description

Authentication method and device for assisting execution of audit service
Technical Field
The present invention relates to the technical field of assisting in executing a checking service, and in particular, to an authentication method and apparatus for assisting in executing a checking service.
Background
When assisting the authorized organ to execute the check and control business, financial institutions such as banks receive the request instruction for assisting check and control and legal documents submitted by the authorized organ, and the request instruction is matched with the legal documents to allow the check and control business to be executed only when the request instruction is matched with the legal documents, so that the unauthorized check and control and network tampering attack are prevented.
Legal documents are typically scanned copies of pdf documents or paper documents, in a relatively fixed format. Before the request command is matched with the legal document, key elements such as an execution case number, a legal document name, a legal document number, a checking and controlling execution mechanism, a checking and controlling executor, a checked and controlled person, a bank account number, a frozen amount and the like in the legal document are identified and converted into characters, and then the characters can be matched with the key elements in the request command.
FIG. 1 is a flow chart of a conventional checking and controlling business, as shown in FIG. 1, in which an authorized authority generates a legal document; the method comprises the steps that an authorized organ worker submits a check and control instruction, then an authorized organ internal check and approval process is carried out, a request file/message is generated after the check and approval is passed, then, the file/message is encrypted and signed, then, the file/message is sent to a financial institution, the financial institution checks and decrypts the check and control request instruction, the financial institution identifies legal document key elements, the financial institution matches the request instruction with the legal document key elements, check and control business processing is carried out after matching is consistent, then, check and control business processing result feedback files/messages are generated, the feedback file/message is encrypted and signed, and then, the feedback file/message is fed back to the authorized organ, the authorized organ checks and decrypts, and the authorized organ processes a check and control result.
In the existing mode, in the financial institution processing process, the number of elements needing character recognition is large, the recognition effect is influenced by the fact that individual elements on a scanning piece are not clear, manual intervention is needed for confirming recognition, and the matching quantity is large and the matching efficiency is low.
At present, the checking and controlling business volume is larger and larger, the criminal case of a suspect is more and more concealed, the fund transfer efficiency is higher and higher, and the time is money or even life. How to improve the efficiency of assisting the inspection and control execution to obtain the assets and transaction information of the inspected person as soon as possible and to take precautionary measures as soon as possible to reduce the loss becomes very urgent.
Disclosure of Invention
To solve the problems in the prior art, the present invention provides an authentication method and apparatus, an electronic device, and a computer-readable storage medium for assisting in performing a checking service, which can at least partially solve the problems in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, an authentication method for assisting in performing a checking service is provided, including:
acquiring an assistance check and control request instruction and a legal document corresponding to the assistance check and control request instruction;
generating an encryption string according to a preset strategy according to key elements in the assistance check request instruction;
and authenticating according to the generated encryption string, the encryption string carried by the assistant checking request instruction and the encryption string in the legal document.
Further, the authenticating according to the generated encryption string, the encryption string carried by the assisted investigation request instruction and the encryption string in the legal document includes:
judging whether the generated encryption string is consistent with the encryption string carried by the assistance check request instruction;
if yes, judging whether the generated encryption string is consistent with the encryption string in the legal document;
and if the generated encryption string is consistent with the encryption string in the legal document, the authentication is passed.
Further, before generating the encryption string according to the key element in the assistance check request instruction according to the preset policy, the method further includes:
and extracting the key elements in the assistance checking request instruction.
Further, before the determining whether the generated encryption string is consistent with the encryption string in the legal document, the method further includes:
the encrypted string in the legal instrument is identified.
Further, the encryption string carried by the assistance check request instruction is generated according to the corresponding key element according to the preset strategy when the authorized organization generates the assistance check request instruction.
Further, the encryption in the legal document is generated by the authorized authority according to the preset strategy and the corresponding key elements when the legal document is generated.
Further, the key elements include: an executive case number, a legal document identifier, a survey executive identifier, and/or a survey executive identifier.
In a second aspect, an authentication apparatus for assisting in performing a checking service is provided, including:
the data acquisition module is used for acquiring an assistance check and control request instruction and a legal document corresponding to the assistance check and control request instruction;
the encrypted string generating module is used for generating an encrypted string according to a preset strategy and key elements in the assistance check request instruction;
and the authentication module authenticates according to the generated encryption string, the encryption string carried by the assistant checking request instruction and the encryption string in the legal document.
In a third aspect, an electronic device is provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the processor implements the steps of the authentication method for assisting in performing a checking service.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, carries out the above-mentioned steps for assisting in performing an authentication method for auditing services.
The invention provides an authentication method and a device for assisting in executing checking and controlling business, which are used for artificial intelligent authentication in the financial field, and the method comprises the following steps: acquiring an assistance check and control request instruction and a legal document corresponding to the assistance check and control request instruction; generating an encryption string according to a preset strategy according to key elements in the assistance check request instruction; the authentication is carried out according to the generated encryption string, the encryption string carried by the assistant check request instruction and the encryption string in the legal document, wherein the encryption string is generated as a verification code through an encryption technology, and a mode of matching the encryption string is used for replacing a mode of identifying and matching multiple elements, so that the processing workload is simplified, the check execution efficiency is improved, the identification and matching elements are reduced, the probability of influencing the identification and matching accuracy due to poor definition of a scanning piece is reduced, and the identification and matching accuracy, safety and check execution efficiency are improved; in addition, the introduction of the encryption technology prevents malicious tampering, further improves the accuracy and the safety, and realizes the traceability of the whole checking and controlling process.
In order to make the aforementioned and other objects, features and advantages of the invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without inventive work. In the drawings:
FIG. 1 is a flow chart of a conventional audit service;
FIG. 2 is a schematic diagram of an architecture between the server S1 and the client device B1 according to an embodiment of the present invention;
FIG. 3 is a block diagram of the server S1, the client device B1 and the database server S2 according to an embodiment of the present invention;
fig. 4a is a first flowchart illustrating an authentication method for assisting in performing a checking service according to an embodiment of the present invention;
FIG. 4b shows the detailed steps of step S300 in an embodiment of the present invention;
fig. 5 is a flowchart illustrating a second authentication method for assisting in performing a checking service according to an embodiment of the present invention;
fig. 6 is a third flowchart illustrating an authentication method for assisting in performing a checking service according to an embodiment of the present invention;
FIG. 7 is a flow of inspection and control services in an embodiment of the present invention;
fig. 8 is a block diagram of an authentication apparatus for assisting in performing a checking service according to an embodiment of the present invention;
fig. 9 is a block diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without any creative effort shall fall within the protection scope of the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of this application and the above-described drawings, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In the existing mode, in the financial institution processing process, the number of elements needing character recognition is large, the recognition effect is influenced by the fact that individual elements on a scanning piece are not clear, manual intervention is needed for confirming recognition, and the matching quantity is large and the matching efficiency is low.
In order to at least partially solve the technical problems in the prior art, embodiments of the present invention provide an authentication method for assisting in performing a checking service, in which an encryption string is generated by an encryption technique as a verification code, and a way of matching the encryption string is used to replace a way of identifying and matching multiple elements, thereby simplifying processing workload, improving checking efficiency, reducing elements for identification and matching, reducing the probability of influencing identification and matching accuracy due to poor definition of a scanning element, and improving identification and matching accuracy, security, and checking efficiency; in addition, the introduction of the encryption technology prevents malicious tampering, further improves the accuracy and the safety, and realizes the traceability of the whole checking and controlling process.
In view of the above, the present application provides an authentication apparatus for assisting performing of audit business, which may be a server S1 disposed at a financial institution, referring to fig. 2, the server S1 may be communicatively connected to at least one client device B1, the client device B1 may send an assistance audit request command and a corresponding legal document to the server S1, and the server S1 may receive the assistance audit request command and the corresponding legal document online. The server S1 may perform online or offline preprocessing on the acquired assistance check request instruction and the legal document corresponding to the assistance check request instruction, and generate an encryption string according to a preset policy based on key elements in the assistance check request instruction; and authenticating according to the generated encryption string, the encryption string carried by the assistant checking request instruction and the encryption string in the legal document. Then, the server S1 may send the authentication result online to the client device B1. The client device B1 may receive the authentication result online.
In addition, referring to fig. 3, the server S1 may also be communicatively connected to at least one database server S2, the database server S2 being used for a preset policy used in encryption, the preset policy being unified with a policy for generating an encryption string in an authorized gateway. The database server S2 sends a preset policy online to the server S1.
Based on the above, the client device B1 may have a display interface so that the user can view the authentication result sent by the server S1 according to the interface.
It is understood that the client device B1 may include a smart phone, a tablet electronic device, a network set-top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), a vehicle-mounted device, a smart wearable device, etc. Wherein, intelligence wearing equipment can include intelligent glasses, intelligent wrist-watch, intelligent bracelet etc..
In practical applications, part of the authentication for assisting the execution of the audit service may be performed at the server S1 side as described above, that is, as the architecture shown in fig. 2, all the operations may be performed in the client device B1, and the client device B1 may be directly connected to the database server S2 in a communication manner. Specifically, the selection may be performed according to the processing capability of the client device B1, the limitation of the user usage scenario, and the like. This is not a limitation of the present application. If all operations are performed in the client device B1, the client device B1 may further include a processor for performing specific processing for assisting in performing authentication of audit traffic.
The server and the client device may communicate using any suitable network protocol, including network protocols not yet developed at the filing date of this application. The network protocol may include, for example, a TCP/IP protocol, a UDP/IP protocol, an HTTP protocol, an HTTPS protocol, or the like. Of course, the network Protocol may also include, for example, an RPC Protocol (Remote Procedure Call Protocol), a REST Protocol (Representational State Transfer Protocol), and the like used above the above Protocol.
Fig. 4a is a flowchart illustrating an authentication method for assisting in performing a checking service according to an embodiment of the present invention; as shown in fig. 4a, the authentication method for assisting in performing the audit service may include the following:
step S100: acquiring an assistance check and control request instruction and a legal document corresponding to the assistance check and control request instruction;
in particular, the legal document is typically a scanned piece of pdf or paper document, in a relatively fixed format.
Step S200: generating an encryption string according to a preset strategy according to key elements in the assistance check request instruction;
specifically, the preset policy is a policy agreed with the authorized authority in advance, and is also based on the auxiliary investigation and control request command generated by the authorized authority and the corresponding legal document.
Wherein, the key elements include: the preset strategy can be an encryption algorithm such as SM3 and the like.
Step S300: and authenticating according to the generated encryption string, the encryption string carried by the assistant checking request instruction and the encryption string in the legal document.
By adopting the technical scheme, the encryption string is generated by the encryption technology to serve as the verification code, the mode of matching the encryption string is used for replacing the mode of identifying and matching multiple elements, the identifying and matching elements are reduced, the processing workload is simplified, the efficiency and the accuracy of performing checking and controlling are improved, the encryption string is added in the request message and the legal document, the message and the legal document are prevented from being maliciously tampered, the safety is higher, the checking and controlling process can be traced back, and the checking and controlling information management is convenient.
In an alternative embodiment, referring to fig. 4b, this step S300 may include the following:
step S310: judging whether the generated encryption string is consistent with the encryption string carried by the assistance check request instruction;
specifically, the encryption string carried by the assisted check request instruction is generated by an authorized authority according to the preset policy and the corresponding key element when generating the assisted check request instruction.
If yes, go to step S320: if not, go to step S340;
step S320: judging whether the generated encryption string is consistent with the encryption string in the legal document;
if yes, go to step S330: if not, go to step S340;
and the encryption in the legal document is generated according to the corresponding key elements according to the preset strategy when an authorized authority generates the legal document.
Step S330: and (4) passing the authentication.
Step S340: the authentication is not passed.
In an alternative embodiment, referring to fig. 5, the authentication method for assisting in performing the audit service may further include:
step S400: and extracting key elements in the assistance checking request instruction.
In an alternative embodiment, referring to fig. 6, the authentication method for assisting in performing the audit service may further include:
step S500: an encrypted string in the legal instrument is identified.
The encrypted string in the legal document is generally printed at a fixed position in the legal document, and is recognized by technologies such as OCR and the like.
In order to make those skilled in the art better understand the present application, the following describes an authentication method for assisting in performing a checking service provided by the embodiment of the present invention in detail with reference to fig. 7;
wherein the authentication method for assisting in performing the audit transaction is performed by a financial institution.
Referring to fig. 7, a legal instrument is generated by an authority; when the legal document is generated, the related key elements of the case in the document content are automatically extracted, an encryption string (similar to a verification code on an electronic receipt of a bank) is generated according to the key elements by using an encryption algorithm such as SM3, and the encryption string is also used as the content of the legal document and is printed at a fixed position in the legal document. Key elements include, but are not limited to, executive case number, legal document name, legal document number, audit executive name, audit executive code, audit executive name, audit executive certificate number, audit executive employee id, auditee name, certificate number, bank account number, frozen amount, etc.
Then, the authorized office worker submits a checking and controlling instruction, enters an internal approval process of the authorized office, and generates a checking and controlling request file/message after approval is passed; when generating the command for assisting the execution of the checking request, the authorized organ also generates an encryption string according to the recorded key elements of the request, and the encryption string is put into the request as a check string of the request, namely the encryption string is taken as a part of the request. And then, the authorized organ encrypts and signs the check and control request file/message, and then sends the check and control request file/message to the financial institution.
After the financial institution receives the request instruction and the legal document, the financial institution signs and decrypts the legal document a priori, analyzes the checking and controlling request instruction, generates an encryption string according to the key element of the request, matches the encryption string in the request instruction, if the matching is consistent, the financial institution identifies the key element of the legal document, matches the encryption string in the request instruction with the encryption string of the legal document, performs checking and controlling service processing after matching all the time, generates a checking and controlling service processing result feedback file/message, after the feedback file/message is encrypted and signed, the financial institution feeds back the encrypted and signed feedback file/message to the authorized institution, after the authorized institution checks and decrypts the authorized institution, the authorized institution processes the checking and controlling result, and the whole checking and controlling process is completed.
And for the check result, the encrypted string is also put into a check result feedback result and returned to the authorized authority. The authorized organ is used for matching the corresponding request instruction so as to trace back each feedback result.
Based on the same inventive concept, the present application further provides an authentication apparatus for assisting in performing a checking service, which can be used to implement the method described in the foregoing embodiments, as described in the following embodiments. Since the principle of the authentication apparatus for assisting in executing the audit service to solve the problem is similar to that of the method described above, the implementation of the authentication apparatus for assisting in executing the audit service may refer to the implementation of the method described above, and repeated details are not repeated. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 8 is a block diagram of an authentication apparatus for assisting in performing a checking service according to an embodiment of the present invention. As shown in fig. 8, the authentication apparatus for assisting in performing the audit service specifically includes: a data acquisition module 10, an encrypted string generation module 20, and an authentication module 30.
The data acquisition module 10 acquires an assistance check and control request instruction and a legal document corresponding to the assistance check and control request instruction;
the encrypted string generating module 20 generates an encrypted string according to a preset strategy and according to the key elements in the assistance check request instruction;
and the authentication module 50 performs authentication according to the generated encryption string, the encryption string carried by the assistant checking request instruction and the encryption string in the legal document.
By adopting the technical scheme, the encryption string is generated by the encryption technology to serve as the verification code, the mode of matching the encryption string is used for replacing the mode of identifying and matching multiple elements, the identifying and matching elements are reduced, the processing workload is simplified, the efficiency and the accuracy of performing checking and controlling are improved, the encryption string is added in the request message and the legal document, the message and the legal document are prevented from being maliciously tampered, the safety is higher, the checking and controlling process can be traced back, and the checking and controlling information management is convenient.
The apparatuses, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or implemented by a product with certain functions. A typical implementation device is an electronic device, which may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
In a typical example, the electronic device specifically includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the steps of the authentication method for assisting in performing the audit service when executing the program.
Reference is now made to fig. 9, which illustrates a structural schematic diagram of an electronic device 600 suitable for use in implementing embodiments of the present application.
As shown in fig. 9, the electronic apparatus 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate works and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM)) 603. In the RAM603, various programs and data necessary for the operation of the system 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted as necessary on the storage section 608.
In particular, according to an embodiment of the present invention, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, an embodiment of the present invention includes a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the authentication method for assisting in performing audit traffic as described above;
in such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. An authentication method for assisting in performing audit traffic, comprising:
acquiring an assistance check and control request instruction and a legal document corresponding to the assistance check and control request instruction;
generating an encryption string according to a preset strategy according to key elements in the assistance check request instruction;
and authenticating according to the generated encryption string, the encryption string carried by the assistant checking request instruction and the encryption string in the legal document.
2. The method of claim 1, wherein the authenticating according to the generated encryption string, the encryption string carried by the assistance and investigation request command and the encryption string in the legal document comprises:
judging whether the generated encryption string is consistent with the encryption string carried by the assistance check request instruction;
if yes, judging whether the generated encryption string is consistent with the encryption string in the legal document;
and if the generated encryption string is consistent with the encryption string in the legal document, the authentication is passed.
3. The authentication method for assisting in performing audit traffic according to claim 2, wherein before generating the encryption string according to the key element in the request instruction for assisting in audit according to the preset policy, the method further comprises:
and extracting key elements in the assistance checking request instruction.
4. The authentication method for assisting in performing audit trails of claim 2, wherein before determining whether the generated encryption string matches the encryption string in the legal document, further comprising:
an encrypted string in the legal instrument is identified.
5. The authentication method as claimed in any one of claims 1 to 4, wherein the encrypted string of the assisted investigation request command is generated by an authorized entity according to the predetermined policy and the corresponding key element when generating the assisted investigation request command.
6. The authentication method for assisting the execution of audit traffic according to any of claims 1 to 4, wherein the encrypted string in the legal document is generated by the authorized authority according to the preset policy based on the corresponding key element when generating the legal document.
7. The authentication method for assisting in performing audit traffic according to any of claims 1 to 4, wherein the key elements include: an executive case number, a legal document identifier, a survey executive identifier, and/or a survey executive identifier.
8. An authentication apparatus for facilitating performing audit traffic, comprising:
the data acquisition module is used for acquiring an assistance check and control request instruction and a legal document corresponding to the assistance check and control request instruction;
the encrypted string generating module is used for generating an encrypted string according to a preset strategy and key elements in the assistance check request instruction;
and the authentication module authenticates according to the generated encryption string, the encryption string carried by the assistant checking request instruction and the encryption string in the legal document.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of any of claims 1 to 6 when executing the program for assisting in performing an authentication method for auditing services.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the authentication method for assisting in carrying out an audit service of any one of claims 1 to 6.
CN202011291288.4A 2020-11-18 2020-11-18 Authentication method and device for assisting in executing check and control service Active CN112507350B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011291288.4A CN112507350B (en) 2020-11-18 2020-11-18 Authentication method and device for assisting in executing check and control service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011291288.4A CN112507350B (en) 2020-11-18 2020-11-18 Authentication method and device for assisting in executing check and control service

Publications (2)

Publication Number Publication Date
CN112507350A true CN112507350A (en) 2021-03-16
CN112507350B CN112507350B (en) 2023-11-17

Family

ID=74956871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011291288.4A Active CN112507350B (en) 2020-11-18 2020-11-18 Authentication method and device for assisting in executing check and control service

Country Status (1)

Country Link
CN (1) CN112507350B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114548937A (en) * 2022-02-25 2022-05-27 建信金融科技有限责任公司 Cooperation method, control device and storage medium for external Cooperation system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8261320B1 (en) * 2008-06-30 2012-09-04 Symantec Corporation Systems and methods for securely managing access to data
CN105760903A (en) * 2016-04-26 2016-07-13 上海易能信息技术有限公司 Two-dimensional code printing and reading methods and apparatuses for legal document of case
CN107248064A (en) * 2017-06-07 2017-10-13 福建榕基软件股份有限公司 A kind of check and control application method and system
CN108881290A (en) * 2018-07-17 2018-11-23 深圳前海微众银行股份有限公司 Digital certificate application method, system and storage medium based on block chain
CN109656962A (en) * 2018-12-12 2019-04-19 南宁市国土测绘地理信息中心 A kind of real estate network administration of justice check and control platform
CN110163745A (en) * 2019-05-07 2019-08-23 中国工商银行股份有限公司 Hierarchical control data check and control processing system and method
CN110324309A (en) * 2019-05-17 2019-10-11 杭州亦笔科技有限公司 One kind being sent to method based on jurisdictional information
CN110348975A (en) * 2019-05-24 2019-10-18 深圳壹账通智能科技有限公司 Customs declaration information calibration method and device, electronic equipment and storage medium
CN110827177A (en) * 2018-08-13 2020-02-21 北京国双科技有限公司 Case-like document searching method and device
CN111046358A (en) * 2019-09-18 2020-04-21 四川众合悦盛科技有限公司 Method for remotely delivering and identifying and signing for legal documents
CN111079397A (en) * 2019-12-25 2020-04-28 中国建设银行股份有限公司 Task file generation method and device based on image recognition
CN112202794A (en) * 2020-09-30 2021-01-08 中国工商银行股份有限公司 Transaction data protection method and device, electronic equipment and medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8261320B1 (en) * 2008-06-30 2012-09-04 Symantec Corporation Systems and methods for securely managing access to data
CN105760903A (en) * 2016-04-26 2016-07-13 上海易能信息技术有限公司 Two-dimensional code printing and reading methods and apparatuses for legal document of case
CN107248064A (en) * 2017-06-07 2017-10-13 福建榕基软件股份有限公司 A kind of check and control application method and system
CN108881290A (en) * 2018-07-17 2018-11-23 深圳前海微众银行股份有限公司 Digital certificate application method, system and storage medium based on block chain
CN110827177A (en) * 2018-08-13 2020-02-21 北京国双科技有限公司 Case-like document searching method and device
CN109656962A (en) * 2018-12-12 2019-04-19 南宁市国土测绘地理信息中心 A kind of real estate network administration of justice check and control platform
CN110163745A (en) * 2019-05-07 2019-08-23 中国工商银行股份有限公司 Hierarchical control data check and control processing system and method
CN110324309A (en) * 2019-05-17 2019-10-11 杭州亦笔科技有限公司 One kind being sent to method based on jurisdictional information
CN110348975A (en) * 2019-05-24 2019-10-18 深圳壹账通智能科技有限公司 Customs declaration information calibration method and device, electronic equipment and storage medium
CN111046358A (en) * 2019-09-18 2020-04-21 四川众合悦盛科技有限公司 Method for remotely delivering and identifying and signing for legal documents
CN111079397A (en) * 2019-12-25 2020-04-28 中国建设银行股份有限公司 Task file generation method and device based on image recognition
CN112202794A (en) * 2020-09-30 2021-01-08 中国工商银行股份有限公司 Transaction data protection method and device, electronic equipment and medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114548937A (en) * 2022-02-25 2022-05-27 建信金融科技有限责任公司 Cooperation method, control device and storage medium for external Cooperation system
CN114548937B (en) * 2022-02-25 2024-05-14 建信金融科技有限责任公司 Method, control device and storage medium for external investigation system

Also Published As

Publication number Publication date
CN112507350B (en) 2023-11-17

Similar Documents

Publication Publication Date Title
US11201742B2 (en) Blockchain-based trustable guarantees
US11580539B2 (en) Blockchain-based trustable guarantees
WO2020098832A9 (en) Blockchain-based trustable gurantees
US11216807B2 (en) Blockchain-based trustable guarantees
US11200570B2 (en) Blockchain-based trustable guarantees
US11212104B2 (en) Blockchain-based trustable guarantees
US11182788B2 (en) Blockchain-based trustable guarantees
CN113538151B (en) Blockchain-based guarantee data processing method, node and system
CN112507350B (en) Authentication method and device for assisting in executing check and control service
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CA2997636C (en) Network-based electronic negotiable instrument system and method and device for realizing same
US11487713B1 (en) Distributed ledger regulatory auditing system and method
US20220108102A1 (en) System for distributed server network with embedded image decoder as chain code program runtime
Goswami et al. Document verification using Blockchain
CN117408804A (en) Logistics bill verification method, system, device, equipment and storage medium
CN112016920A (en) Integrated service platform, income certificate management method, device and medium
CN116977042A (en) Receipt transmission method and device, storage medium and electronic equipment
CN118427792A (en) Method and system for data processing
CN114358717A (en) Mobile exhibition method, equipment and computer readable storage medium
CN116542670A (en) Transaction processing method and device
CN115510493A (en) Resource data processing method and device based on block chain and server
CN112231656A (en) File signing and checking device, system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant