Method, apparatus, equipment and medium for verifying authenticity of financial assets
A technology of authenticity, assets
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] see figure 2 , which shows a schematic flowchart of a method for verifying the authenticity of financial assets in the embodiment of the present application. In this embodiment, the method may include the following steps, for example:
[0056] Step 201: Obtain fund payment information and fund business information. The fund payment information is obtained by decrypting the encrypted lending / deduction fund information sent by the payment and clearing institution. The fund business information is based on the relationship between the loan assistance institution and the fund institution. obtained from the lending / debiting business.
[0057] It is understandable that due to the traditional three-party business model, the lending institution can directly transfer the fund payment information with the payment and clearing institution, and the management ability of the fund institution is weak. The loan assisting institution may maliciously deceive the fund institution, resu...
Embodiment 2
[0067] Taking the completion of the lending business in the inclusive financial business as an example, that is, the fund payment information in the above-mentioned embodiment is the lending fund information, and the fund business information includes the lending business information and the lending receipt, combined with the attached image 3 , the specific implementation of the method for verifying the authenticity of financial assets in the embodiment of the present application will be described in detail through yet another embodiment.
[0068] see image 3 , which shows a schematic flowchart of a method for verifying the authenticity of financial assets in the embodiment of the present application. In this embodiment, the method may include the following steps, for example:
[0069] Step 301: Obtain lending fund information, lending business information, and lending receipts. The lending fund information is obtained by decrypting the encrypted signature lending fund info...
Embodiment 3
[0085] see Figure 4 , which shows a schematic flowchart of a method for verifying the authenticity of financial assets in the embodiment of the present application. In this embodiment, the method may include the following steps, for example:
[0086] Step 401: Obtain fund information, deduction business information and repayment plan. The deduction fund information is obtained by decrypting the encrypted signature deduction fund information sent by the payment and clearing institution. The deduction business information and repayment plan It is obtained based on the deduction business between the lending institution and the funding institution.
[0087] Step 402: Determine whether the deduction-related content in the deduction fund information is consistent with the corresponding deduction-related content in the deduction business information; if not, perform step 403; if yes, perform step 404.
[0088] As can be seen from the above embodiment, since there are two fund busi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


