CN110738480B - Digital asset hosting risk control method, device and storage medium - Google Patents

Digital asset hosting risk control method, device and storage medium Download PDF

Info

Publication number
CN110738480B
CN110738480B CN201910900284.2A CN201910900284A CN110738480B CN 110738480 B CN110738480 B CN 110738480B CN 201910900284 A CN201910900284 A CN 201910900284A CN 110738480 B CN110738480 B CN 110738480B
Authority
CN
China
Prior art keywords
transaction
identity authentication
authentication
block chain
wind control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910900284.2A
Other languages
Chinese (zh)
Other versions
CN110738480A (en
Inventor
吴思进
曹兢
李斌
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201910900284.2A priority Critical patent/CN110738480B/en
Publication of CN110738480A publication Critical patent/CN110738480A/en
Application granted granted Critical
Publication of CN110738480B publication Critical patent/CN110738480B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a method, equipment and a storage medium for controlling the risk of digital asset hosting, wherein the method comprises the following steps: responding to the quotation operation of the current user, generating quotation transaction and sending the quotation transaction to a node of the first block chain for broadcasting, packaging and executing through a first contract, and recording the quotation transaction on the first block chain; acquiring identity authentication service information recorded on a first block chain to access at least one third-party identity authentication service and perform identity authentication, so that after identity authentication is completed, a corresponding third-party identity authentication service end generates identity authentication transactions and sends the identity authentication transactions to nodes of the first block chain for broadcasting, packaging and execution through a first contract, and generating an increased result according to the increased transactions and the identity authentication transactions so as to update the money-carrying amount of a current user and record the increased result on the first block chain; and acquiring the money drawing amount of the current user. The method and the system realize separation of the trusteeship service and the wind control service and decentralization of wind control strategy configuration management.

Description

Digital asset hosting risk control method, device and storage medium
Technical Field
The application relates to the technical field of internet finance, in particular to a digital asset hosting risk control method, equipment and a storage medium.
Background
The current digital asset management mode is that a user manages the digital asset by a private key, so that the digital asset is permanently lost once the private key is lost, the private key information and a plurality of mnemonic words configured with a fixed sequence are very difficult to remember for the user, most of users need to avoid forgetting the private key by exporting, storing, screen capturing, recording on line and other modes, but the modes still have the problem of easy loss or theft, so that the digital asset management is very inconvenient.
In view of the above problems, the applicant has previously proposed a digital asset hosting scheme (see patent CN201811151114.0 for details). In the scheme, only one wind control scheme for carrying out wind control management on money withdrawal of a user by a trusteeship service end is provided, and the wind control scheme has the following defects: on one hand, the coupling of the managed service and the wind control management centralizes the wind control service, and the configuration right of a user without the option and the wind control strategy is controlled by the centralized managed service party; on the other hand, the managed service party cannot only provide the managed service, but needs to provide the wind control service at the same time.
Disclosure of Invention
In view of the above-mentioned deficiencies or inadequacies in the prior art, it would be desirable to provide a method, apparatus, and storage medium for digital asset hosting risk control that separates hosting services and wind control services, decentralizes configuration management wind control policies.
In a first aspect, the present invention provides a digital asset hosting risk control method applicable to a user side, where a first contract for managing a money drawing amount of a hosting account is configured on a first block chain, and the method includes:
responding to the quotation operation of the current user, generating quotation transaction and sending the quotation transaction to a node of the first block chain for broadcasting, packaging and executing through a first contract, and recording the quotation transaction on the first block chain;
acquiring identity authentication service information recorded on a first block chain to access at least one third-party identity authentication service and perform identity authentication so that after the identity authentication is completed by a corresponding third-party identity authentication service terminal, generating an identity authentication transaction and sending the identity authentication transaction to a node of the first block chain for broadcasting, packaging and executing through a first contract, generating a money-drawing result according to the money-drawing transaction and the identity authentication transaction so as to update the money-drawing amount of a current user and recording the money-drawing amount on the first block chain;
and acquiring the money drawing amount of the current user.
In a second aspect, the present invention provides a digital asset hosting risk control method suitable for blockchain nodes, where a first contract for managing a money-drawing amount of a hosted account is configured on a first blockchain, the method including:
receiving, broadcasting, packaging and executing the rate-increasing transaction through a first contract, and recording the rate-increasing transaction on a first block chain; the method comprises the steps that a user end generates a quota transaction in response to quota operation of a first user;
receiving, broadcasting, packaging and executing identity authentication transaction through a first contract, generating a money-drawing result according to the money-drawing transaction and the identity authentication transaction to update the money-drawing amount of the first user and record the money-drawing amount in a first block chain, so that the user end can obtain the money-drawing amount of the first user; the identity authentication transaction is generated after the third-party identity authentication server side acquires identity authentication service information recorded on the first block chain at the user side to access corresponding third-party identity authentication service and perform identity authentication.
In a third aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a digital asset hosting risk control method provided according to embodiments of the present invention.
In a fourth aspect, the present invention also provides a storage medium storing a computer program, the computer program causing a computer to execute the digital asset hosting risk control method according to the embodiments of the present invention.
The digital asset escrow risk control method, the equipment and the storage medium provided by the embodiments of the invention configure a contract for managing the escrow account money extracting amount on the block chain, and the contract judges whether the money extracting amount is increased according to the money extracting transaction sent by the user end and the identity authentication transaction sent by the third party identity authentication appointed by the block chain after the user performs identity authentication, so that the escrow account can be completed together by the contract configured on the block chain and the third party identity authentication service party manageable by the block chain, the escrow service and the wind control service are separated, and the decentralized of the wind control strategy configuration management is realized;
the digital asset hosting risk control method, the equipment and the storage medium provided by some embodiments of the invention further improve the wind control mechanism by configuring a wind control strategy which is not limited to limit money raising in a contract and performing wind control investigation when a wind control server triggers wind control authentication.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a digital asset hosting risk control method according to an embodiment of the present invention.
Fig. 2 is a flowchart of another digital asset hosting risk control method according to an embodiment of the present invention.
FIG. 3 is a flow chart of a preferred embodiment of the method shown in FIG. 2.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a digital asset hosting risk control method according to an embodiment of the present invention.
As shown in fig. 1, in this embodiment, the present invention provides a digital asset hosting risk control method applicable to a user terminal, where a first contract for managing a money drawing amount of a hosted account is configured on a first block chain, and the method includes:
s12: responding to the quotation operation of the current user, generating quotation transaction and sending the quotation transaction to a node of the first block chain for broadcasting, packaging and executing through a first contract, and recording the quotation transaction on the first block chain;
s14: acquiring identity authentication service information recorded on a first block chain to access at least one third-party identity authentication service and perform identity authentication, so that after identity authentication is completed, a corresponding third-party identity authentication service end generates identity authentication transactions and sends the identity authentication transactions to nodes of the first block chain for broadcasting, packaging and execution through a first contract, and generating an increased result according to the increased transactions and the identity authentication transactions so as to update the money-carrying amount of a current user and record the increased result on the first block chain;
s16: and acquiring the money drawing amount of the current user.
For example, a user a hosts 10000 XXA coins, and the hosting server transfers corresponding 10000 YYY _ XXA tokens to a hosting account of the user a on a first blockchain (wherein the hosting principle can refer to patent CN 201811151114.0), in this embodiment, a first contract for managing a money-withdrawal amount of the hosting account is configured on the first blockchain, and the money-withdrawal amount is initially configured as 500YYY _ XXA tokens/day.
Taking the example that the user A has extracted 50XXA coins on the same day, when the user A needs to extract 2000 XXA coins, the user side of the user A acquires the data of the first block chain to acquire the coin extraction amount of the coin remaining on the same day as 450XXA coins, and displays the coin extraction amount in the display interface. After knowing the information, the user A inputs the money-increasing operation of increasing the money-increasing amount of the current day to 2500XXA money to the user end.
In step S12, in response to the above-described denomination-advancing operation by the user a, the user side of the user a generates a request to advance the current-day denomination degree to the denomination transaction tx1 in the 2500XXA currency and transmits the request to the node of the first blockchain.
After receiving tx1, the node of the first block chain broadcasts tx1, packs tx1 into blocks, executes tx1 through the first contract, records tx1 on the first block chain, and waits for receiving a corresponding authentication transaction to process a quota request of tx 1.
In step S14, the user side of the user a obtains the identity authentication service information recorded on the first blockchain, selects and accesses a third-party identity authentication service, for example, an identity authentication service provided by a certain third-party identity authentication platform, and completes identity authentication according to the prompt of the platform. In this embodiment, when accessing the third-party authentication service according to the interface provided in the authentication service information, the user side of the user a further sends a hash value of tx1 (tx1) for use in generating an authentication transaction; in further embodiments, other information for finding tx1 may be configured, such as a referral request number assigned by the first contract tx1, or other different information as would be understood by one skilled in the art. The specific manner of the identity authentication can be configured as any one or more of the following: the method comprises the following steps of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face identification authentication, fingerprint identification authentication, safety problem authentication and emergency contact authentication.
After the identity authentication of the user A is completed, the server side of the third-party identity authentication platform generates an identity authentication transaction tx2 according to an identity authentication result and hash (tx1) and sends the identity authentication transaction tx2 to the node of the first block chain.
After receiving tx2, the node of the first block chain broadcasts tx2, packs tx2 into blocks, executes tx2 through the first contract, finds tx1 according to hash (tx1), and confirms whether the identity authentication of the user A is successful according to the identity authentication result in tx 2:
if not, the quota request of tx1 fails, and the quota degree of the current day of the escrow account of the user A is unchanged;
if yes, the quotation request of tx1 is successful, and the quotation of the current date of the escrow account of user A is modified to 2500XXA and recorded on the first block chain.
In step S16, the user side of the user a obtains the money-lifting amount of the user a on the current day through the data of the first block chain, and displays the money-lifting amount on the display interface, so that the user a carries out the money lifting of the 2000 XXA coins after knowing that the money lifting amount is successful.
The above embodiment takes the initial configuration of the denomination of money improvement as 500 tokens/day, the user a selects a third-party identity authentication service, tx1 requests to improve the money improvement amount of the day as an example, and the method shown in fig. 1 is exemplarily explained; in further embodiments, the monetary withdrawal degree may also be initially configured as a first fixed quota per first period (for example, daily, weekly or monthly, etc.) in the above method according to actual needs, a first proportion of a second fixed quota per first period (which may be initially configured by the first contract and allowed to be modified by the user, or may be configured by the user himself/herself when creating the escrow account), or other different configurations that may be understood by those skilled in the art; the wind control strategy can be configured to require a user to access a plurality of third-party identity authentication services respectively, and corresponding service terminals send identity authentication transactions respectively; and tx1 may request to raise a multi-day or daily withdrawal limit, etc., all to achieve the same technical effect.
Moreover, it should be noted that the above-mentioned identity authentication service information and the corresponding third-party identity authentication service parties may be decentralized managed by a decentralized management party of the first block chain (for example, management committee/super node/all users, depending on which type of block chain the first block chain is specifically configured for), when the third-party identity authentication service party has abnormal behaviors such as abnormal service or cheating, the user side may generate a complaint transaction according to the corresponding evidence and send the complaint transaction to the node of the first block chain to trigger the complaint process, and regarding the management process after triggering the complaint process, a skilled person in the art may understand the decentralized management process, and details are not repeated here.
In the embodiment, the contract for managing the escrow account money lifting amount is configured on the blockchain, and whether the money lifting amount is lifted is judged according to the contract sent by the user end and the identity authentication transaction sent by the third party identity authentication appointed by the blockchain after the user performs identity authentication, so that the escrow account is controlled by the contract configured on the blockchain and the third party identity authentication server manageable by the blockchain, the escrow service and the wind control service are separated, and the decentralized management of the wind control strategy configuration management is realized.
In a preferred embodiment, the first contract is further configured to, when the rate-offer transaction is executed, determine whether the rate-offer transaction triggers the wind control authentication according to a preconfigured wind control policy, and record a determination result on the first block chain, so that the wind control server obtains the determination result, performs the wind control investigation when the rate-offer transaction triggers the wind control authentication, generates the wind control transaction according to the investigation result, and sends the wind control transaction to a node of the first block chain; and, performing a wind-controlled transaction to record the survey results on the first blockchain;
generating the rate-increasing result according to the rate-increasing transaction and the identity authentication transaction comprises generating the rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
Specifically, taking as an example a configuration in which the wind control policy is configured to identify an abnormal quota request (e.g., multiple request quotations in a short time, multiple request quotations on a single day, a large number of user request quotations in a short time, an abnormal quota identified based on user characteristics, an abnormal quota identified based on business characteristics, etc.), when the first contract identifies that the quota request of tx1 is an abnormal quota request when performing quota transaction tx1, wind control authentication is triggered, and abnormal quota request information is generated and recorded on the first blockchain.
After the wind control server side obtains the abnormal quota increasing request information, manual wind control investigation or automatic wind control investigation can be performed according to a preconfigured wind control flow, a wind control transaction tx3 is generated according to the investigation result, and tx3 is sent to the node of the first block chain.
After receiving tx3, the node of the first block chain broadcasts tx3, packs tx3 into blocks, executes tx3 through the first contract, and records the investigation result on the first block chain, so that when executing tx2, whether the quotation request is successful is judged according to the identity authentication result and the wind control investigation result.
Preferably, to avoid that the client sends tx2 ahead of time before tx3 succeeds in tx2, which results in tx2 failing to perform successfully, tx2 needs to be retransmitted, the first contract may be configured to determine whether tx1 triggers the wind-controlled authentication when tx2 is performed:
if yes, judging whether the first block chain records the corresponding tx 3:
if yes, judging whether the quota request is successful according to tx1, tx2 and tx 3;
if not, recording tx2 on the first block chain and waiting for the corresponding tx3 before timing out; and, when tx3 is executed, determining whether a corresponding tx2 is recorded on the first block chain: if yes, then it is determined whether the request for a quota was successful based on tx1, tx2, and tx 3.
The embodiment further improves the wind control mechanism by configuring a wind control strategy which is not limited to limit money lifting in the contract and carrying out wind control investigation when the wind control service party triggers the wind control authentication.
Preferably, in any of the above methods, when the money withdrawal transaction before or after the withdrawal is configured as a payment transaction, a deferred payment parameter may be configured in the payment transaction based on a wallet retrieval scheme (see CN201410533888.5 patent), so as to combine the wind control of the escrow account with the on-chain deferred withdrawable payment.
Fig. 2 is a flowchart of another digital asset hosting risk control method according to an embodiment of the present invention. The method of fig. 2 may be performed in conjunction with the method of fig. 1.
As shown in fig. 2, in this embodiment, the present invention further provides a digital asset hosting risk control method applied to a blockchain node, where a first contract for managing a money-drawing amount of a hosted account is configured on a first blockchain, and the method includes:
s22: receiving, broadcasting, packaging and executing the rate-increasing transaction through a first contract, and recording the rate-increasing transaction on a first block chain; the method comprises the steps that a user end generates a quota transaction in response to quota operation of a first user;
s24: receiving, broadcasting, packaging and executing identity authentication transaction through a first contract, generating a money-drawing result according to the money-drawing transaction and the identity authentication transaction to update the money-drawing amount of the first user and record the money-drawing amount on a first block chain, so that the user end can obtain the money-drawing amount of the first user; the identity authentication transaction is generated after the third-party identity authentication server side acquires identity authentication service information recorded on the first block chain at the user side to access corresponding third-party identity authentication service and perform identity authentication.
The wind control principle of the method shown in fig. 2 can refer to the method shown in fig. 1, and the details are not repeated here.
FIG. 3 is a flow chart of a preferred embodiment of the method shown in FIG. 2. The method of fig. 3 may be performed in conjunction with the preferred embodiment of the method of fig. 1.
As shown in FIG. 3, in a preferred embodiment, executing the nomination transaction via the first contract in step S22 further comprises:
the method comprises the steps that when a first contract executes an offer transaction, whether the offer transaction triggers wind control authentication or not is judged according to a pre-configured wind control strategy, and a judgment result is recorded on a first block chain, so that a wind control server side obtains the judgment result, carries out wind control investigation when the offer transaction triggers the wind control authentication, generates a wind control transaction according to the investigation result and sends the wind control transaction to a node of the first block chain;
the method further comprises the following steps:
s23: performing a wind-controlled transaction by a first contract to record survey results on a first blockchain;
the generating of the rate-increasing result according to the rate-increasing transaction and the identity authentication transaction in the step S24 includes:
and generating a rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 4, as another aspect, the present application also provides an apparatus 400 including one or more Central Processing Units (CPUs) 401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the device 400 are also stored. The CPU401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as needed, so that a computer program read out therefrom is mounted in the storage section 408 as needed.
In particular, according to an embodiment of the present disclosure, the digital asset hosting risk control method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing a digital asset hosting risk control method. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the digital asset hosting risk control methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A method for controlling risk of hosting digital assets, wherein a first contract for managing a money withdrawal amount of a hosting account is configured on a first block chain, the method is applicable to a user side, and the method comprises the following steps:
responding to the quotation operation of the current user, generating quotation transaction and sending the quotation transaction to a node of the first block chain for broadcasting, packaging and executing through the first contract, and recording the quotation transaction on the first block chain;
acquiring identity authentication service information recorded on the first block chain to access at least one third-party identity authentication service and perform identity authentication, so that after the identity authentication is completed, a corresponding third-party identity authentication service end generates an identity authentication transaction and sends the identity authentication transaction to a node of the first block chain for broadcasting, packaging and execution through the first contract, and according to the money lifting transaction and the identity authentication transaction, a money lifting amount of the current user is updated and recorded on the first block chain;
and acquiring the money drawing amount of the current user.
2. The method according to claim 1, wherein the first contract is further configured to determine whether the volume offer transaction triggers a wind control authentication according to a preconfigured wind control policy when the volume offer transaction is executed, and record a determination result on the first block chain, so that a wind control server obtains the determination result, performs a wind control investigation when the volume offer transaction triggers the wind control authentication, generates a wind control transaction according to the investigation result, and sends the wind control transaction to a node of the first block chain; and, performing the wind-controlled transaction to record the survey results on the first blockchain;
the generating a rate result according to the rate transaction and the identity authentication transaction comprises generating a rate result according to the rate transaction, the identity authentication transaction and the investigation result.
3. The method according to claim 1 or 2, wherein the identity authentication comprises at least one of: mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face recognition authentication, fingerprint recognition authentication, safety problem authentication and emergency contact authentication.
4. The method according to claim 1 or 2, wherein the monetary denomination is initially configured as any one of: a first fixed value unit in each first period, and a first proportion of a second fixed value unit in each first period.
5. A digital asset hosting risk control method is characterized in that a first contract used for managing the money drawing amount of a hosting account is configured on a first block chain, the method is suitable for a block chain node, and the method comprises the following steps:
receiving, broadcasting, packaging and executing a rate-increasing transaction through the first contract, and recording the rate-increasing transaction on the first block chain; wherein the rate-increasing transaction is generated by the user terminal in response to a rate-increasing operation of the first user;
receiving, broadcasting, packaging and executing identity authentication transaction through the first contract, generating a money withdrawal result according to the money withdrawal transaction and the identity authentication transaction to update the money withdrawal amount of the first user and record the money withdrawal amount on the first block chain, so that the user side can obtain the money withdrawal amount of the first user; and the identity authentication transaction is generated after a third-party identity authentication server side acquires identity authentication service information recorded on the first block chain at the user side to access corresponding third-party identity authentication service and perform identity authentication.
6. The method of claim 5, wherein said executing a nominated transaction via said first contract further comprises:
the first contract judges whether the rate-offer transaction triggers the wind control authentication according to a pre-configured wind control strategy when executing the rate-offer transaction, records a judgment result on the first block chain, so that a wind control server side acquires the judgment result, carries out wind control investigation when the rate-offer transaction triggers the wind control authentication, generates the wind control transaction according to the investigation result and sends the wind control transaction to a node of the first block chain;
the method further comprises the following steps:
executing the wind-controlled transaction by the first contract to record the survey results on the first blockchain;
the generating a referral result according to the referral transaction and the identity authentication transaction comprises:
and generating a quota improving result according to the quota improving transaction, the identity authentication transaction and the investigation result.
7. The method according to claim 5 or 6, wherein the identity authentication comprises at least one of: the method comprises the following steps of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face identification authentication, fingerprint identification authentication, safety problem authentication and emergency contact authentication.
8. The method of claim 5 or 6, wherein the monetary denomination is initially configured as either: a first fixed value unit in each first period, and a first proportion of a second fixed value unit in each first period.
9. An electronic device, characterized in that the electronic device comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-8.
10. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-8.
CN201910900284.2A 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium Active CN110738480B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910900284.2A CN110738480B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910900284.2A CN110738480B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Publications (2)

Publication Number Publication Date
CN110738480A CN110738480A (en) 2020-01-31
CN110738480B true CN110738480B (en) 2022-09-13

Family

ID=69269480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910900284.2A Active CN110738480B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Country Status (1)

Country Link
CN (1) CN110738480B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447434A (en) * 2016-09-14 2017-02-22 全联征信有限公司 Personal credit ecological platform
CN106991512A (en) * 2016-01-21 2017-07-28 阿里巴巴集团控股有限公司 Risk treating method and apparatus
CN108009441A (en) * 2017-11-23 2018-05-08 阿里巴巴集团控股有限公司 Resource transfers and the method and apparatus of fund transfer
CN108810868A (en) * 2018-05-31 2018-11-13 中国联合网络通信集团有限公司 The operating method and shared set meal system of shared set meal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018175666A1 (en) * 2017-03-21 2018-09-27 Dappsters, LLC Blockchain systems and methods
US20180285971A1 (en) * 2017-03-31 2018-10-04 International Business Machines Corporation Management of consumer debt collection using a blockchain and machine learning
US20190340587A1 (en) * 2017-11-03 2019-11-07 Signal Zero, Inc. Systems and Methods to Maintain a Limited Supply of a Total Number of Existing Units of a Coin in a Platform
CN109493024B (en) * 2018-09-29 2021-02-09 杭州复杂美科技有限公司 Digital asset hosting method, apparatus, and storage medium
CN109544339A (en) * 2018-11-16 2019-03-29 海南新软软件有限公司 A kind of price steadiness type digital asset converts into method, apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991512A (en) * 2016-01-21 2017-07-28 阿里巴巴集团控股有限公司 Risk treating method and apparatus
CN106447434A (en) * 2016-09-14 2017-02-22 全联征信有限公司 Personal credit ecological platform
CN108009441A (en) * 2017-11-23 2018-05-08 阿里巴巴集团控股有限公司 Resource transfers and the method and apparatus of fund transfer
CN108810868A (en) * 2018-05-31 2018-11-13 中国联合网络通信集团有限公司 The operating method and shared set meal system of shared set meal

Also Published As

Publication number Publication date
CN110738480A (en) 2020-01-31

Similar Documents

Publication Publication Date Title
US10068437B2 (en) Automatic teller machine inventory and distribution system
AU2018323233A1 (en) Resource transfer method, fund payment method and apparatus, and electronic device
US10043180B2 (en) System and method for secure transactions at a mobile device
CN109544335B (en) Transaction data processing method, device, equipment and storage medium based on blockchain
CN109670968A (en) Processing method, device, equipment and the computer storage medium of insurance data
CN108600250A (en) Authentication method
CN108961034A (en) System and method, storage medium based on user behavior certification
CN109978317A (en) Abnormal transaction processing method, interaction platform and computer readable storage medium
US20100094756A1 (en) System and method for rapid financial transactions through an open financial exchange or wire transfer
EP3262553B1 (en) Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers
CN110738480B (en) Digital asset hosting risk control method, device and storage medium
CN110738481B (en) Digital asset hosting risk control method, device and storage medium
US11887111B2 (en) Electronic currency offline payment method and payment collection method
CN114596088A (en) Digital currency transaction method and system and digital currency card application device
US20180164956A1 (en) Multicomputer Processing of Client Device Request Data with Centralized Event Orchestration
CN112686666A (en) Electronic wallet transaction method and device for railway business system
US10216830B2 (en) Multicomputer processing of client device request data using centralized event orchestrator and link discovery engine
CN112184460A (en) House maintenance fund management method, equipment and storage medium
CN112101915A (en) Financial service management and control data processing method and device
CN111767535A (en) Method and device for resetting bank card password online
CN112488860B (en) Method and system for processing group list
CN116777447B (en) Quick fee refund method, system, terminal and storage medium
CN111127003B (en) Wallet account payment method, device and storage medium
US20240037530A1 (en) Dynamic NFT-Based Frictionless Transaction System
JP7176157B1 (en) LEARNING MODEL CREATION SYSTEM, LEARNING MODEL CREATION METHOD AND PROGRAM

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant