Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Post-loan supervision method based on privacy calculation

A privacy and numerical technology, applied in the information field, can solve problems such as the lack of post-loan supervision programs, and achieve the effects of improving efficiency, protecting business privacy, and protecting privacy

Active Publication Date: 2022-07-08
浙江数秦科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: at present, there is a lack of technical problems suitable for online post-loan supervision programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Post-loan supervision method based on privacy calculation
  • Post-loan supervision method based on privacy calculation
  • Post-loan supervision method based on privacy calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] A post-loan supervision method based on privacy calculation, please refer to the appendix figure 1 , including: Step A01) The loan bank generates a numerical replacement code, and the size relationship of the numerical replacement code is consistent with the corresponding value. The numerical substitution code is used when the numerical value needs to be compared in the subsequent steps, and the numerical value is not used directly, so that the specific amount of the transaction in the enterprise account can be kept secret, and the security of the enterprise's business data can be effectively protected. Step A02) The loan bank establishes tracking data, records the hash value of the ID of the issuing bank and the name of the enterprise, and publishes the smart contract on the blockchain to disclose the ID of the loan bank, the tracking start and end ratio, the restricted industry and the tracking data. The enterprise is referred to by the hash value of the enterprise na...

Embodiment 2

[0062] A post-loan supervision method based on privacy calculation, this embodiment provides a new method for establishing inadvertent transmission between a bank and a loan bank on the basis of the first embodiment. Including: Step F01) The lending bank generates a random integer for each possible value of each numerical bit, and associates the cosine value of the random integer with the corresponding value and discloses it; Step F02) The bank generates a second random The cosine value of the second random integer is sent to the lending bank; step F03) The bank uses the double angle formula to calculate the cosine value of the product of the random integer and the second random integer corresponding to the numerical value to be replaced by the code, and takes the absolute value of the cosine value of the product. The pre-set bit is used as the secret key, the bank releases the decryption smart contract, and uploads the secret key and the value to be replaced by the numerical c...

Embodiment 3

[0068] A post-loan supervision method based on privacy calculation, please refer to the appendix Image 6 , in this embodiment, the method for the loan bank to generate an asymmetric key for the value value is: step G01) to generate a private key value and a public key value, the product of the private key value and the public key value is equal to an integer multiple of 2π plus 1, The value of the private key is a positive odd number; the method for the bank to use the public key to encrypt the secret key is: Step G02) Generate an intermediate number so that the cosine value of the intermediate number retains the previous specified decimal place, and the value of the reserved decimal place is exactly the secret key Key , and at the same time ensure that the number of decimal places of the intermediate number is less than or equal to the integer number of digits of the product of the private key value and the public key value, and calculate the cosine value of the product of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information, in particular to a privacy calculation-based post-loan supervision method, which comprises the following steps that: a loan bank generates a numerical value ticode; issuing an intelligent contract public loan bank identifier, a tracking start-stop proportion, a limited industry and tracking data on the block chain; when the bank processes the fund transfer-out business, extracting the hash value of the fund transfer-out enterprise name, comparing the hash value with the intelligent contract, and if tracking data is consistent, judging whether a transaction opponent is a restricted industry or not; if the industry is the limited industry, privacy calculation is established; if the fund transfer amount is in the tracking interval, establishing casual transmission with the loan bank, and obtaining a new tracking interval ticode; the bank calculates the amount proportion of the current fund transfer amount to the total amount; establishing new tracking data, and adding the new tracking data to the smart contract for disclosure; and after a preset duration, the loan bank calculates the total amount of illegal funds transferred to the limited industry. The method has the substantive effects that inter-bank cooperation among banks is realized, and the efficiency of post-loan fund supervision is improved.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a post-loan supervision method based on privacy calculation. Background technique [0002] Banks are responsible for supervising the business of their users, such as monitoring the use of loans, managing the use of funds in special supervision accounts, and identifying some illegal financial activities. Inter-bank independent inter-bank fund supervision relies on banks to obtain offline paper materials from other banks and authorize them to submit them. There are problems such as inefficiency, non-real-time, and uncontrollable delivery process. It is difficult to detect the problem of illegal use of loans in a timely manner, and the deterrence of illegal use of loans is insufficient, and it is difficult to be competent for the task of post-loan supervision. For this reason, it is necessary to study the loan use supervision scheme that can be carried out online to detect sus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/16G06F21/62G06F21/64G06Q40/02
CPCG06F21/16G06F21/6245G06F21/64G06Q40/03
Inventor 高航张金琳
Owner 浙江数秦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products