CN107194281A - A kind of anti-fake system based on block chain technology - Google Patents

A kind of anti-fake system based on block chain technology Download PDF

Info

Publication number
CN107194281A
CN107194281A CN201710377671.3A CN201710377671A CN107194281A CN 107194281 A CN107194281 A CN 107194281A CN 201710377671 A CN201710377671 A CN 201710377671A CN 107194281 A CN107194281 A CN 107194281A
Authority
CN
China
Prior art keywords
data
user
subsystem
shared
submission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710377671.3A
Other languages
Chinese (zh)
Other versions
CN107194281B (en
Inventor
杨珩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Zhidaochuangyu Information Technology Co Ltd
Original Assignee
Chengdu Zhidaochuangyu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Zhidaochuangyu Information Technology Co Ltd filed Critical Chengdu Zhidaochuangyu Information Technology Co Ltd
Priority to CN201710377671.3A priority Critical patent/CN107194281B/en
Publication of CN107194281A publication Critical patent/CN107194281A/en
Application granted granted Critical
Publication of CN107194281B publication Critical patent/CN107194281B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of anti-fake system based on block chain technology, the system includes data acquisition subsystem, data storage subsystem, system management subsystem, engine builds subsystem and monitoring Report Subsystem, based on traditional anti-fraud model, a data validity is constructed with reference to the technical characterstic of block chain, data promptness, System Error-tolerance Property and system reliability can obtain the anti-fake system of more efficient guarantee simultaneously, stored with trustization is gone, collective safeguards and functional interface is shared, the features such as data safety is reliable, it compensate for data sharing each side data standard disunity in traditional anti-fraud platform, system maintenance ability is uneven and the more low deficiency of various resources comprehensive utilization ratio, reach the anti-effect cheated, and then ensure the property safety of netizen.

Description

A kind of anti-fake system based on block chain technology
Technical field
Technical field, specially a kind of anti-fraud system based on block chain technology are cheated the present invention relates to cyberspace is counter System.
Background technology
The composition of anti-fake system includes the sons such as data acquisition, data storage, fraud detection, system administration, monitoring form System.The Collaboration of each subsystem, builds a complete anti-fake system.By building, effective network is counter to cheat Scheme, with the various frauds of effective monitoring cyberspace and can reduce netizen's property loss in cyberspace.
Existing technical scheme is mainly using traditional several subsystems as impetus, with reference to the business characteristic of itself, Build anti-fake system easily and effectively.
1)Data Collection is responsible in data acquisition, and screening, field is cut, data loading.Cyberspace using internet as carrier, Data acquisition object includes website, camera, router, industrial control equipment, and other internet devices.Data type includes handing over Easy data, reputation data, illegal data etc..The mode of data acquisition also has many kinds, and main mode is empty to network Between these objects carry out reptile, filter out effective data and arranged.Certainly, data acquisition also includes data exchange and net People's report data etc..
It is characterized in obtaining data from traditional data source channel, the system of filtering out can stablize the data inputting of identification System, and deep processing processing is carried out to data, handled while carrying out certain classification to data.
2)Typing rule storehouse, prestige record storehouse, information bank, testing result storehouse of the data of storage etc..Data storage and dimension Shield is also an important ring in anti-fake system, and the source of anti-fraud data often compares many, and data interaction is frequent.Number According to reliability and it is maintainable often finally determine anti-fake system whether the operation that can stablize.
It is characterized in building high in the clouds data storage, selectes suitable database and the data of collection are stored.Tables of data Then it is designed according to the type of data, and the database in high in the clouds is optimized, it is ensured that the stable operation of database.
3)Fraud detection is the kernel subsystems of anti-fake system.Fraud detection content scores including prestige, rule detection, Fraud storage etc..The system mainly includes regulation engine and prestige rating engine.Detecting result data can timely and effectively be sent out Existing fraud information, it is convenient to make corresponding processing for fraud as early as possible.The process of fraud detection is actually that data are dug The process of pick, data mining is the fusion of many technologies, and the technology being related to has statistical inference, machine learning, visualization, parallel processing Deng.
It is characterized in, according to the analysis and arrangement to cheating data, forming a set of relatively effective rule base.In combination with number According to many algorithms of excavation, automatic business processing is carried out to existing gathered data, and then detect authentic and valid information.
4)System administration is mainly responsible for ensureing the stable operation of whole system, it can to the parameter of each subsystem engine and Rule enters Mobile state management.It is also responsible for effectively connecting each subsystem, enables a system to the operation of efficient stable.
It is characterized in arranging the functional characteristics of each subsystem, extracts configurable part out, entered by system management module Row unified management.Certain monitoring is carried out to each several part of system simultaneously, once unstable situation occurs in system, then and Times It is alert.
5)Form is monitored primarily to helping risk manager to carry out effective monitoring to fraud.By to fraud The analysis and arrangement of data, can be to the type of fraud, and source, trend carry out visual presentation.Meanwhile, the system is also equipped with The ability being estimated to existing parameter and rule, can be adjusted according to the change for cheating situation to existing rule. Because monitoring form is the system that business personnel directly contacts, design rationality the making the system that is directly connected to of the subsystem Use effect.
According to the characteristics of business, design and more intuitively monitor form, the characteristics of to fraud, be distributed, originate, becoming Gesture carries out visual displaying.
Above-mentioned technical scheme is as relatively more traditional anti-fraud model, and each subsystem division of labor is clear and definite, finally by risk pipe Reason personnel carry out management and control to whole system, reach and control risk, the purpose of combat fraud behavior.However, being applied in actual Cheng Zhong, can have some limitations, and cause system particularly efficient not run.It is primarily present following problem:
1)Although the sources coverage rate of the gathered data of the system is wider, the reliability of data is not ensured that, it is whole Individual model be all built upon data source it is true and reliable on the basis of.So during gathered data, need to put into a large amount of Be operated in the examination to gathered data.While the reliability in order to ensure system, for indefinite data of originating, can be adopted The attitude that comparison is careful is taken, this large amount of data cannot play due effect.
2)The system takes data centralization to store, because data volume may be huger, can use distributed storage Mode.But according to CAP(Consistency、Availability、Partition tolerance)Theorem, the one of data Cause property, availability and subregion fault-tolerance can not be met simultaneously in any distributed system.To existing data, due to planting Potential O&M risk is planted, the missing of data is likely to result in, maliciously distorts, so will also result in the result reliability of system Reduction.
3)During fraud detection, the subjective factor of regulation engine is excessive, may directly affect the processing of fraud information Resultant error is excessive.
4)The stability of system places one's entire reliance upon effective management to whole system, and there is also potential risk.When system not Can stable operation when, it is impossible to the data in event interval are effectively managed, the promptnesses of data, validity all without Method is guaranteed.
The content of the invention
In view of the above-mentioned problems, it is an object of the invention to provide a kind of data validity, data promptness, System Error-tolerance Property The anti-fake system based on block chain technology of more efficient guarantee can be obtained simultaneously with system reliability, can be made up traditional anti- Cheat data sharing each side data standard disunity, system maintenance ability in platform uneven, and various resources integrate profit With rate it is more low not enough the shortcomings of.Technical scheme is as follows:
A kind of anti-fake system based on block chain technology, including following subsystem:
A:Data acquisition subsystem:
The data acquisition unit for going trustization is built, the collector does not limit submission data object and data acquisition target;
Data to submission first carry out preliminary screening, then the confirmation through at least three users;
Data are encrypted and submit the ID for auditing user according to user and data to be bound with the data submitted number;
Data do not receive anyone after submitting and data are modified, and only receive data submitter and are carried in the way of submitting new data Revocation application is handed over, be can be traced with the data submitted before guarantee;
After revocation application confirms through at least three users, to applying for that the ID of submitter is marked;
B:Data storage subsystem:
The data storage that collective safeguards is built, a set of primary database is safeguarded by the shared side of fraud data jointly;
And submit user and data to audit by data to store a set of comprising total data in each comfortable server of oneself of user Database;
The data for ensureing each node using block chain technology can not be changed;
Data in primary database are encrypted, it is to avoid each user is directly viewable to shared data;
C:System management subsystem:
The shared web platforms of constructing system management, open data sharing receives and the basic api interface of management data management;
Receive the plug-in unit of user's submission, it is allowed to which the integrated plug-in unit of user enters traveling one to the local result data to inquiring of user Walk automatic business processing;
Manage the public key of user:The public key of oneself is submitted to high in the clouds management platform and shares to other users by each user;
Data submit user, and management platform extracts the public key progress data encryption that arbitrary data audits user beyond the clouds, then encryption Data afterwards are issued data examination & verification user in the form of P2P and audited, and data audit user to carrying out phase after data deciphering The review operations answered;
D:Engine builds subsystem:
Constructing system engine and engine user;
System engine shares web platforms to system administration and submits operation API, waits version updating to be integrated into automatically processing for system In;
Engine user shares to the shared web platforms of system administration by wanting user oneself to develop, or in the form of plug-in unit, for shared each Side is used;
E:Monitor Report Subsystem:
Structure safely and effectively monitors form, and shares web platforms submission inquiry api interface or form plug-in unit to system administration;
User is according to self-demand, by above-mentioned plug-in unit to locally.
Further, data are encrypted specially in the data acquisition subsystem:Data submission side obtains data Audit after the public key of official to being transferred to data examination & verification user after data encryption;Data are audited user and decrypted by the private key of oneself Data are audited.
The beneficial effects of the invention are as follows:
1)The present invention can significantly improve system reliability, the stability of a system, System Error-tolerance Property and the data of anti-fraud scheme Truly, effectively it is and timely;
2)The present invention no longer " fights separately ", not only effectively prevent data maintenance in traditional anti-fake system difficult, regular Disunity, each according to handle respective data the need for each then share to other shared sides and so that data corruption is asked Topic, it is thus also avoided that because one party server instability problem causes shortage of data, the error of processing script logic, updated not in time The problems such as;
3)The present invention also causes functional interface and plug-in unit to be able to maximum utilization, saves the public cost for safeguarding the platform;
4)Participant in present system includes data submission side, data examination & verification side and data user, and generally risk is commented Estimate mechanism or risk assessment person;
5)Each division of labor of the invention is clear and definite, and functional independence, rights management is clear;Data submission side and examination & verification Fang Jun only have limited Data check authority and are unlikely to make to have carried out encryption in main split's leaking data, data transmission procedure, make data each The safety of link is obtained for effective guarantee;
6)The present invention has accomplished the separation of role in the overall aspect of scheme, also compensate for traditional anti-each participant of fraud platform Interface is chaotic, it is inconsistent the problems such as;
7)The present invention takes corresponding measure the characteristics of comprehensive respective, is finally reached the anti-effect cheated using anti-fake system as foundation Really, so ensure netizen property safety.
Brief description of the drawings
Fig. 1 is the structural representation of the anti-fake system of the invention based on block chain technology.
Fig. 2 is public key management flow chart in present system management subsystem.
Embodiment
The present invention is described in further details with specific embodiment below in conjunction with the accompanying drawings.In order to avoid conventional solution In risk and defect that may be present, the system optimizes from each subsystem of the following aspects, builds a set of new counter take advantage of Cheat solution.Shown in schematic diagram Fig. 1 of the program:
First, the data acquisition unit for going trustization is built.The collector does not limit submission data object, and the collection of data is not limited yet Object(It can be Added User with seamless).System carries out automatic detection first to the data of submission, and preliminary screening is carried out to data. Data submit object to include individual consumer or qualified unit user, and each data are submitted except preliminary screening, in addition it is also necessary to its The confirmation of his at least three users.Each user also has a public key and private key, for the encryption to data, it is ensured that the data exist The safety in limited range before into final shared fraud platform.With for data submission side obtains data examination & verification official Examination & verification side is given to Data Encryption Transmission after the public key of side, examination & verification side is audited by the private key ciphertext data of oneself.Each data Submit ID(Including submitting data user and examination & verification data user)Bound with the data of submission.After data submission not Data can be modified by anyone, only data submitter can submit revocation apply, need also exist for other at least three The confirmation of user, can be marked after confirming successfully to the ID of this submission(And it is non-delete).Revocation be also by data more Newly arrive the effect reached, this data before can guarantee that submits record to still have, and the data of submission can be traced.Therefore the data The data of shared data platform are irreversible in gatherer process.So it is possible to prevente effectively from may in when multiparty data is shared The regular disunity of the processing data of appearance, the problem of standard is inconsistent.
Thus data acquisition subsystem scheme is described as follows:The data acquisition unit for going trustization is built, the collector is not Limit submits data object and data acquisition target;Data to submission first carry out preliminary screening, then through at least three users really Recognize;Data are encrypted, and submit the ID for auditing user according to user and data to be bound with the data submitted number;Data Do not receive anyone after submission to be modified data, only receive the revocation application of data submitter submission;Revocation application is through extremely After few three users confirm, to applying for that the ID of submitter is marked.
Then, the data storage that collective safeguards is built.The shared side of fraud data safeguards a set of database jointly(It is shared Primary database).The data are by user(The data submitter of shared data platform and auditor)In each leisure server of oneself A set of database is stored, the data of each user are full dose data, and the node each submitted records ID and relevant information. Utilize block chain technology, it is ensured that the data of each node can not be changed.Due to inherently one decentralization of block chain Database a, side of any data storage stores whole data, so that either party is impossible to folk prescription change number According to storehouse, so block chain technology can ensure that the data of each node can not be changed.The data in primary database are carried out simultaneously Encryption:Primary database encryption refers to the data encryption into primary database, and the data encryption of this part is independent, mainly pin To using data side, it is each in a set of database of local maintenance, and because each side all stores portion, therefore either party can not Energy altered data is submitted to real master library, meanwhile, it is synchronized after newest data, the secret key pair master data of oneself can be used The part that storehouse has permission is decrypted, and with reference to the plug-in unit of cloud platform, carries out the utilization of fraud data.So the data of primary database All it is by encryption, although each with storing a data per family, but shared data can not be directly viewable.Multi-user Data storage be intended merely to ensure data uniformity and reliability, can not only reach anti-tamper purpose, it is thus also avoided that Traditional data are because the data disaster that the multinode problem of single node or finite region is brought.
Thus data storage subsystem scheme is described as follows:The data storage that collective safeguards is built, by fraud data Shared side safeguards a set of primary database jointly;And submit user and data to audit in each comfortable server of oneself of user by data The a set of database for including total data of storage;The data for ensureing each node using block chain technology can not be changed;To master Data in database are encrypted, it is to avoid each user is directly viewable to shared data;
Then, constructing system is managed, that is, builds a shared web platform.The subsystem is used to open the shared of data, for connecing By with management data management basis API(Application Programming Interface application programming interfaces)Connect Mouth, plug-in unit and client public key etc..Only confirm by multiple keepers, can be just updated to when the system version of next time updates In system.Meanwhile, also receive the plug-in unit of user's submission, as a shared platform, user can be with integrated plug-in unit to user's sheet Ground carries out further automatic business processing to the result data inquired.Because plug-in unit is all the handling implement of automation, for Be exactly the data of primary database and measure what body made, locally only need to these integrated instruments, obtain the reality for oneself wanting to obtain When form or data results.The system is additionally operable to manage the public key of each user, and user can submit the public key of oneself Other users are shared to high in the clouds management system, data submitter can extract arbitrary user in the high in the clouds(Examination & verification side)Public key Carry out data encryption(Asymmetric encryption), then the data after encryption with P2P(Peer-to-peer, it is point-to-point)Form hair Audited to examination & verification side, examination & verification side can be to carrying out corresponding review operations after data deciphering.Its schematic diagram such as Fig. 2 institutes Show.
Thus system management subsystem scheme is described as follows:The shared web platforms of constructing system management, open data sharing, Receive and the basic api interface of management data management;Receive the plug-in unit of user's submission, it is allowed to which the integrated plug-in unit of user is local to user Further automatic business processing is carried out to the result data inquired;Manage the public key of user:Each user submits the public key of oneself Other users are shared to high in the clouds management platform;Data submit user, and management platform extracts arbitrary data examination & verification user's beyond the clouds Public key carry out data encryption, then the data after encryption issued in the form of P2P data examination & verification user audited, data audit User is to carrying out corresponding review operations after data deciphering.
Again, automation rule engine and rating engine based on proportional system are built.The engine is also classified into system engine And engine user, it so can greatly avoid the regular disunity problem of shared data each side.System engine need to be to system pipes Platform submits operation API, waits version updating to be integrated into the automatically processing of system, these processing can only be limited and tight Lattice, the rule that can be reached common understanding with more integrated shared each side., can also be with and engine user then needs user oneself to develop The form of plug-in unit shares to system administration web platforms, is used for shared each side.
Thus engine builds subsystem scheme and is described as follows:Constructing system engine and engine user;System engine is to system The shared web platforms of management submit operation API, wait version updating to be integrated into the automatically processing of system;Engine user is by wanting User oneself develops, or shares to the shared web platforms of system administration in the form of plug-in unit, is used for shared each side.
Finally, build and safely and effectively monitor form.The subsystem be also required to web platforms submit inquiry api interface or Form plug-in unit, and these api interfaces are only needed in local runtime, and platform only serves the effect of shared instrument.User can root According to the demand of itself, these plug-in units of web platforms to local.It so can quickly go out form, each side also can profit Developed with respective favourable resource set, reach the effect that resource maximum is utilized.
Thus monitoring Report Subsystem scheme is described as follows:Structure safely and effectively monitors form, and common to system administration Enjoy web platforms and submit inquiry api interface or form plug-in unit;User is according to self-demand, by above-mentioned plug-in unit to locally.
Because the data of primary database are encryption data, therefore only possess effective(The limited time limit)Account and key User can be inquired about using above subsystem, and taken appropriate measures for anti-fraud.And other users It is secondary role, primarily serves the effect of supervision and the safeguards system operation of system.They can share(Submit)Data, but simultaneously Without using data.Sum it up, can so reach the effect of role's segmentation, different roles are provided as needed.Submit Data be also the later stage it is traceable, if there is not conforming to rule data or abnormal data, in order to be sufficiently accurate it may be desired to data submission side " revocation "(It is actual To submit a record again)Data.AC module provides function by the web platforms of system administration, can also be amounted to certainly not being inconsistent User as defined in platform base is enjoyed to reject(Cancel ID validity).

Claims (2)

1. a kind of anti-fake system based on block chain technology, it is characterised in that including following subsystem:
A:Data acquisition subsystem:
The data acquisition unit for going trustization is built, the collector does not limit submission data object and data acquisition target;
Data to submission first carry out preliminary screening, then the confirmation through at least three users;
Data are encrypted and submit the ID for auditing user according to user and data to be bound with the data submitted number;
Data do not receive anyone after submitting and data are modified, and only receive data submitter and are carried in the way of submitting new data Revocation application is handed over, be can be traced with the data before guarantee;
After revocation application confirms through at least three users, to applying for that the ID of submitter is marked;
B:Data storage subsystem:
The data storage that collective safeguards is built, a set of primary database is safeguarded by the shared side of fraud data jointly;
And submit user and data to audit by data to store a set of comprising total data in each comfortable server of oneself of user Database;
The data for ensureing each node using block chain technology can not be changed;
Data in primary database are encrypted, it is to avoid each user is directly viewable to shared data;
C:System management subsystem:
The shared web platforms of constructing system management, open data sharing receives and the basic api interface of management data management;
Receive the plug-in unit of user's submission, it is allowed to which the integrated plug-in unit of user enters traveling one to the local result data to inquiring of user Walk automatic business processing;
Manage the public key of user:The public key of oneself is submitted to high in the clouds management platform and shares to other users by each user;
Data submit user, and management platform extracts the public key progress data encryption that arbitrary data audits user beyond the clouds, then encryption Data afterwards are issued data examination & verification user in the form of P2P and audited, and data audit user to carrying out phase after data deciphering The review operations answered;
D:Engine builds subsystem:
Constructing system engine and engine user;
System engine shares web platforms to system administration and submits operation API, waits version updating to be integrated into automatically processing for system In;
Engine user shares to the shared web platforms of system administration by wanting user oneself to develop, or in the form of plug-in unit, for shared each Side is used;
E:Monitor Report Subsystem:
Structure safely and effectively monitors form, and shares web platforms submission inquiry api interface or form plug-in unit to system administration;
User is according to self-demand, by above-mentioned plug-in unit to locally.
2. the anti-fake system according to claim 1 based on block chain technology, it is characterised in that the data acquisition Data are encrypted specially in system:To being transmitted after data encryption after the public key of data submission side acquisition data examination & verification official User is audited to data;Data examination & verification user is audited by the private key ciphertext data of oneself.
CN201710377671.3A 2017-05-25 2017-05-25 A kind of anti-fake system based on block chain technology Active CN107194281B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710377671.3A CN107194281B (en) 2017-05-25 2017-05-25 A kind of anti-fake system based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710377671.3A CN107194281B (en) 2017-05-25 2017-05-25 A kind of anti-fake system based on block chain technology

Publications (2)

Publication Number Publication Date
CN107194281A true CN107194281A (en) 2017-09-22
CN107194281B CN107194281B (en) 2019-07-16

Family

ID=59874411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710377671.3A Active CN107194281B (en) 2017-05-25 2017-05-25 A kind of anti-fake system based on block chain technology

Country Status (1)

Country Link
CN (1) CN107194281B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446278A (en) * 2018-09-21 2019-03-08 贵州途遇旅行网科技有限公司 A kind of big data management platform system based on block chain
CN111209299A (en) * 2020-04-20 2020-05-29 四川新网银行股份有限公司 Real-time judgment method for anti-fraud of finance
CN111400402A (en) * 2020-03-13 2020-07-10 支付宝(杭州)信息技术有限公司 Data sharing method, device and equipment based on block chain
CN112862505A (en) * 2021-03-03 2021-05-28 中国工商银行股份有限公司 Anti-fraud information sharing method and device based on block chain
US20210192526A1 (en) * 2018-03-07 2021-06-24 David Charles Kuchar Blockchain transaction safety
US11429999B2 (en) 2018-10-31 2022-08-30 Buy It Mobility Networks Inc. Computer system for providing payments, incentives, and fraud protection within or across industries

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101014072A (en) * 2007-02-15 2007-08-08 北京互联易通信息技术有限公司 Method and apparatus for obtaining and analyzing data information aimed at data object
CN104766240A (en) * 2015-03-24 2015-07-08 中国银行股份有限公司 Electronic banking data processing system and method
CN106355095A (en) * 2016-11-23 2017-01-25 吉林大学 Method for identifying fraud website by utilizing fuzzy theory
US20170046651A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101014072A (en) * 2007-02-15 2007-08-08 北京互联易通信息技术有限公司 Method and apparatus for obtaining and analyzing data information aimed at data object
CN104766240A (en) * 2015-03-24 2015-07-08 中国银行股份有限公司 Electronic banking data processing system and method
US20170046651A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
CN106355095A (en) * 2016-11-23 2017-01-25 吉林大学 Method for identifying fraud website by utilizing fuzzy theory

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210192526A1 (en) * 2018-03-07 2021-06-24 David Charles Kuchar Blockchain transaction safety
US11830004B2 (en) * 2018-03-07 2023-11-28 Strong Force TX Portfolio 2018, LLC Blockchain transaction safety
US20240086930A1 (en) * 2018-03-07 2024-03-14 Strong Force TX Portfolio 2018, LLC Blockchain transaction safety
CN109446278A (en) * 2018-09-21 2019-03-08 贵州途遇旅行网科技有限公司 A kind of big data management platform system based on block chain
US11429999B2 (en) 2018-10-31 2022-08-30 Buy It Mobility Networks Inc. Computer system for providing payments, incentives, and fraud protection within or across industries
CN111400402A (en) * 2020-03-13 2020-07-10 支付宝(杭州)信息技术有限公司 Data sharing method, device and equipment based on block chain
CN111209299A (en) * 2020-04-20 2020-05-29 四川新网银行股份有限公司 Real-time judgment method for anti-fraud of finance
CN112862505A (en) * 2021-03-03 2021-05-28 中国工商银行股份有限公司 Anti-fraud information sharing method and device based on block chain

Also Published As

Publication number Publication date
CN107194281B (en) 2019-07-16

Similar Documents

Publication Publication Date Title
CN107194281A (en) A kind of anti-fake system based on block chain technology
CN108804928A (en) The secure and trusted block chain and management method of data in a kind of traceability system
CN106485167B (en) Credit recording system and method based on block chain
CN109729168A (en) A kind of data share exchange system and method based on block chain
CN108805409B (en) Key basic equipment information management method based on block chain
CN108830709A (en) A kind of crowdsourcing transaction system based on block chain
CN110321721A (en) Electronic health record access control method based on block chain
CN107909369A (en) Based on the common recognition method, apparatus merchandised across chain and storage medium
CN108776929A (en) Bill processing method, system based on block chain database and readable storage medium storing program for executing
CN107103054A (en) The intelligent contract asynchronous execution storage system and implementation method of a kind of privately owned block chain
CN109691016A (en) Distributing real time system and Verification System
CN108876497A (en) Resource transfers method, apparatus and third-party server
CN107798466A (en) A kind of Urban Operation administrative center system
CN103473636B (en) A kind of system data element of collection, analysis and distribution network business information
CN107995120A (en) Construct the method and multi-tiling catenary system of multi-tiling chain
CN108351882A (en) Method and apparatus for the distributed data base in network
CN107871204A (en) A kind of Urban Operation centric system architecture and engineering system
CN102663008B (en) Government integrated business platform business library and construction method of base library
CN109711817A (en) Data processing method, device and system based on block chain
CN109214784A (en) A kind of method, client, server and the system of fire-fighting inspection management
CN112685766A (en) Enterprise credit investigation management method and device based on block chain, computer equipment and storage medium
CN102103777A (en) Network tax declaration system and tax declaration method thereof for fiscal cash register
CN109784857A (en) Data processing method, device and system based on block chain
CN107958703A (en) A kind of remote information management by synchronization and ballot system based on MDT
CN109829690A (en) Data processing method, device and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: 9/F, Building C, No. 28, North Tianfu Avenue, China (Sichuan) Pilot Free Trade Zone, Hi tech Zone, Chengdu, 610000, Sichuan

Patentee after: CHENGDU KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 610000, 11th floor, building 2, No. 219, Tianfu Third Street, hi tech Zone, Chengdu, Sichuan Province

Patentee before: CHENGDU KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.