CN110009317A - The monitoring method and device of resource transfers data - Google Patents

The monitoring method and device of resource transfers data Download PDF

Info

Publication number
CN110009317A
CN110009317A CN201811613528.0A CN201811613528A CN110009317A CN 110009317 A CN110009317 A CN 110009317A CN 201811613528 A CN201811613528 A CN 201811613528A CN 110009317 A CN110009317 A CN 110009317A
Authority
CN
China
Prior art keywords
resource
data
network
business side
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811613528.0A
Other languages
Chinese (zh)
Inventor
王德胜
齐翔
赖艳丽
左星
杨志雄
张英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811613528.0A priority Critical patent/CN110009317A/en
Publication of CN110009317A publication Critical patent/CN110009317A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This specification embodiment provides the monitoring method and device of a kind of resource transfers data, based on the trustable network of decentralization, data management is carried out to each business side by trustable network, first business side passes through the first network as trustable network, it obtains and data is shifted by the first resource that the second node that first network has been added is issued, and the fourth node publication Secondary resource transfer data of first network are added, wherein first resource transfer data and Secondary resource transfer data respectively include the resource transfers data recorded by different business sides, it is possible thereby to be verified to resource transfers data.Since characteristic can not be distorted using trustable network, the network characterization of transparent circulation and the decentralization of each business side's information is realized, so that problem occurs for any one participant, data storage will not be influenced, which can reduce the risk of resource transfers business.

Description

The monitoring method and device of resource transfers data
Technical field
This specification one or more embodiment is related to field of computer technology, more particularly to carries out resource by computer The method and apparatus for shifting data monitoring.
Background technique
Resource transfers be vital phenomena very common in people's daily life occurs, for example, user or mechanism A to Family or mechanism B borrow money, then are transferred to A by B as " money " of resource.Wherein, resource here can be actual resource, can also To be the virtual resource on network, can also be has the mark of identical value, such as bank with actual resource in the network platform Card remaining sum, etc..Certain risk is often related to during resource transfers.Resource transfers quantity is larger, the loss of the resource side of producing Risk is often higher.Particularly, if vast resources is concentrated (such as financing) by a side, one to opposite another party or For multiple users, risk is higher.Therefore, most important for the supervision during resource transfers.
Summary of the invention
This specification one or more embodiment describes the monitoring method and device of a kind of resource transfers data, using can Communication network can not distort and trackability, resource transfers data are supervised, thus during reducing resource transfers Risk.
According in a first aspect, providing a kind of monitoring method of resource transfers data, the method is by corresponding to the first net First business side of the first node in network executes, and the first network is the trustable network of decentralization;The described method includes:
First resource is obtained from the first network and shifts data, and first resource transfer data are by being added described the The second node of one network is distributed to the first network, and the second node corresponds to the second business side, for according to third The guarantee resource that business side provides issues resource to multiple users and raises information, and the first resource transfer data include, described Second business policy produces the record data of resource to the multiple user based on resource recruitment information;
Secondary resource is obtained from the first network and shifts data, and Secondary resource transfer data are by being added described the The fourth node of one network is distributed to the first network, and the fourth node corresponds to the 4th business side, each for completing The resource transfers of business side, the Secondary resource shift data and include, that the 4th business policy records each business side, Resource relevant to resource recruitment information is transferred to data and/or resource produces data;
Data are shifted based on the first resource and Secondary resource transfer data carry out data verification.
In some embodiments, the first business side has key pair, and the key pair includes the first business side The first public key and the first private key, the second business side, the 4th business side save first public key respectively, with respectively The first resource is shifted into data, Secondary resource transfer data by being distributed to described the after first public key encryption One network.
In some embodiments, the first resource transfer data include that multiple users are based on resource and raise information and turn The contract information that first pipelined data of resource and user and the second business side are raised about resource out;
It is described based on the first resource transfer data and the Secondary resource transfer data carry out data verification include: by Whether first pipelined data is compared with the contract information, therein at least one of following consistent with determination: transfer Resource share, resource transfers time.
In some embodiments, the Secondary resource transfer data include that multiple users are based on resource and raise information and turn The second pipelined data of resource and the second business side, the third business side are based on resource and raise information and be transferred to out The third pipelined data of resource;
The first resource transfer data and Secondary resource transfer data progress data verification of being based on include: logical Second pipelined data and the third pipelined data are crossed, the multiple user is verified and information is raised based on resource and is produced Resource, if be transferred to the third business side.
In some embodiments, the first resource transfer data include that multiple users are based on resource and raise information and turn First pipelined data of resource out, the Secondary resource transfer data include that multiple users are based on resource and raise information and produce Second pipelined data of resource;
It is described based on the first resource transfer data and the Secondary resource transfer data carry out data verification include: by Whether first pipelined data and second pipelined data are compared, true to verify first pipelined data.
In some embodiments, the method also includes: from the first network obtain by the first network has been added Third node be distributed to the resource of the first network and raise scheme and resource and prove data, the third node corresponds to institute Third business side is stated, by providing the guarantee resource, so that the second business side is described in third business side publication Resource raises information, and the resource proves that data include, the proof data for guaranteeing resource;Based on the resource recruitment side Case proves that data are verified to the resource.
In some embodiments, described that scheme is raised based on the resource, data, which carry out verifying packet, to be proved to the resource Include at least one of following: verifying the resource proves the authenticity of data;Verify the resource share for guaranteeing resource, if no The resource share that scheme is arranged is raised lower than the resource.
In some embodiments, the method also includes: from the first network obtain by the first network has been added The 5th node be distributed to the resource of the first network compared with Nuclear Data, the 5th node corresponds to the 5th business side, described For guaranteeing that resource is verified to described, the resource includes the 5th business side to described compared with Nuclear Data for 5th business side Guarantee resource relatively core as a result, and/or the 5th business side whether for the third business side provide resource guarantee guarantee As a result;The resource is verified compared with Nuclear Data.
In some embodiments, the method also includes: by the resource of the second business side raise approval of qualification and Put on record data, be distributed to the first network, so that each node in the first network obtains the approval of qualification and puts on record Data.
According to second aspect, a kind of monitoring device of resource transfers data is provided, described device is set in first network First node, the first node correspond to the first business side, and the first network is the trustable network of decentralization;It is described Device includes:
First acquisition unit is configured to obtain first resource transfer data from the first network, and the first resource turns It moves data and the first network is distributed to by the second node that the first network has been added, the second node corresponds to second Business side, the guarantee resource for being provided according to third business side issue resource to multiple users and raise information, first money Source transfer data include that second business policy raises information based on the resource to the multiple user and produces resource Record data;
Second acquisition unit is configured to obtain Secondary resource transfer data from the first network, and the Secondary resource turns It moves data and the first network is distributed to by the fourth node that the first network has been added, the fourth node corresponds to the 4th Business side, for completing the resource transfers of each business side, the Secondary resource transfer data include the 4th business policy Data are transferred to each business side record, relevant to resource recruitment information resource and/or resource produces data;
Authentication unit, is configured to the first resource transfer data and Secondary resource transfer data carry out data Verifying.
According to the third aspect, a kind of computer readable storage medium is provided, computer program is stored thereon with, when described When computer program executes in a computer, enable computer execute first aspect method.
According to fourth aspect, a kind of calculating equipment, including memory and processor are provided, which is characterized in that described to deposit It is stored with executable code in reservoir, when the processor executes the executable code, the method for realizing first aspect.
By the monitoring method and device of the resource transfers data that this specification embodiment provides, with the credible of decentralization Based on network, data management is carried out to each business side by trustable network, the first business side passes through the as trustable network One network obtains and shifts data by the first resource that the second node that first network has been added is issued, and the first net has been added The fourth node publication Secondary resource of network shifts data, and wherein first resource transfer data and Secondary resource transfer data are wrapped respectively It includes by the resource transfers data of different business side's records, it is possible thereby to be verified to resource transfers data.It can due to utilizing Communication network can not distort characteristic, realize the network characterization of transparent circulation and the decentralization of each business side's information, so that Problem occurs for any one participant, will not influence on data storage, it is thus possible to reduce the wind of resource transfers business Danger.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others Attached drawing.
Fig. 1 shows the operating flow diagram of a specific example of existing resource transfers business;
Fig. 2 shows the implementation configuration diagrams of this specification embodiment;
Fig. 3 shows the flow chart of the monitoring method of the resource transfers data according to one embodiment;
The monitoring method that Fig. 4 shows the resource transfers data of one embodiment of this specification disclosure is applied to P2P finance Effect diagram in product operating;
Fig. 5 shows the schematic block diagram of the monitoring device of the resource transfers data according to one embodiment.
Specific embodiment
With reference to the accompanying drawing, the scheme provided this specification is described.
The background of this specification scheme is illustrated first.It is especially a large amount of to raise during existing resource transfers In the case where resource, in fact it could happen that such as resource flows to opaque, each side and deposits the problems such as card is inconsistent.It is logical with financing enterprise below It crosses for the business that P2P platform (peer to peer lending, network loan platform) is financed, illustrates present in it Problem.
Referring to FIG. 1, the operating process substantially process of P2P financial product is as follows: financing enterprise proposes financing package, and will Assets, which are pledged or mortgaged, gives P2P enterprise (corresponding aforementioned P2P platform);P2P enterprise is by the assets keeping of financing enterprise in cooperation Business bank, while assets progress assets are packaged into finance product (i.e. P2P financial product) and sold in P2P platform;It is a People investor or investment institution are by buying the finance product, by fund by business bank's trustship in third party's trustship account Or mechanism;Financing enterprise obtains required financing fund by third party's trustship account or mechanism, is used for enterprise operation demand. In some implementations, may be incorporated into guarantee agency, the financing business of financing enterprise assured, with ensure financing enterprise because In the case where the fund of unexpected insolvency individual investor or investment institution, user's loss is made up by guarantee agency.
Wherein, the fund flow bank (such as above-mentioned business bank) that P2P financial product is related to can be and produce with P2P finance Any bank of publication enterprise (the above-mentioned P2P enterprise) cooperation of product, is also possible to a certain family specially specified or several commercial silvers Row.The fund of all P2P financial products requires to circulate by this or these specified business bank.
Put on record in general, financial product can be issued to P2P enterprise by the regulatory agency by government authorization and carry out authorization, And in the operation process of the above P2P financial product, P2P financial product is supervised.Above-mentioned regulatory agency is, for example, silver prison Meeting, Banking Regulatory Bureau, finance are done etc..
In the above process, it is understood that there may be the problem of have:
Assets oversold: the Typical Representative of assets in general is bill, it is possible that the phenomenon that a ticket oversold, once melt The case where money enterprise can not fulfil, can cause damages directly to investor;
Funds flow is opaque: regulatory agency often during entire fund flow, can not in real time or quasi real time see To the flow direction of fund;P2P enterprise may occur from the behavior melted, i.e. financing enterprise and P2P enterprise is a company, or exist Some directly or indirectly incidence relations, such as investment relation, parent company and subsidiary company etc.;
Financing package deposits card inconsistence problems: financing enterprise in order to smoothly take financing fund by various audits, It is unsmooth and opaque using information flow, inconsistent audit is provided to guarantee agency, P2P platform, business bank, regulatory agency Material;
Investor's financing contract deposits card problem: investor is often electronic contract in platform purchase P2P financial product at present And taken care of by P2P platform, if electronic contract is broken one's promise or had modified to P2P platform, investor can not collect evidence.
In order to solve problem above, this specification embodiment provides a kind of implementation framework based on trustable network, such as Fig. 2 institute Show.Referring to FIG. 2, trustable network is the distributed network of decentralization.Trustable network may include multiple nodes, such as node 101,102,103,104,105, etc..Each node in trustable network can realize distributed storage by common recognition mechanism, And each node stores total data.That is, each node can upload data to trustable network, meanwhile, Ge Gejie Point uploads the data of trustable network, other nodes can obtain.The realization mechanism of trustable network can guarantee each node Data can not be tampered, and problem occurs for any one node, will not be influenced on data storage, to guarantee the true of data Property.Data in trustable network can also be encrypted by Encryption Algorithm, promote data safety grade.The trustable network is for example It can be block chain network etc..Number of nodes in trustable network can be any reasonable quantity, although Fig. 2 is illustratively drawn The node of fixed quantity is gone out, but the trustable network number of nodes in this specification has not been constituted and limited.
Wherein, the node of trustable network can be with certain terminal device calculated with storage capacity.It is appreciated that one A node may include one or more equipment, it is not limited here.Trustable network node can be carried out by corresponding business side Maintenance.In this specification embodiment, each node is the node that the first network as trustable network is added, and corresponding different Business side.
It is worth noting that can correspond with business side and node, same node can also be corresponded to multiple business sides, This is without limitation.The life such as first node, second node, third node, fourth node, the 5th node in this specification embodiment Name is only distinguished from the business function of corresponding business side, without distinguishing to physical device.Business side, it is believed that be Related side in a certain business generating process, for example, by network loan platform (peer to peer lending, P2P may include following one or more business side) in the business of platform financing: P2P platform, financing enterprise, business bank, Participate in the users (common netizen) provided funds, monitoring party etc..
By the corresponding different nodes in each business side, the data that each business side can be made to upload first network have Authenticity, the features such as can not distorting, is traceable, so as to effectively be supervised to resource transfers.The following specifically describes pass through Monitoring method of the first network to resource transfers data.
Fig. 3 shows the monitoring method flow chart of the resource transfers data according to one embodiment.The executing subject of this method It can be the corresponding first business side of first node in first network.That is, the first business side is in the present embodiment Monitoring party.First network is, for example, trustable network shown in Fig. 2, and first node is, for example, node 201 shown in Fig. 2 etc..First industry Business side can pass through each node interaction data in first node and first network.In the business financed by P2P platform, First business side can be monitoring party, such as finance is done, silver-colored Insurance Regulatory Commission/office etc..For ease of description, in the present embodiment, lead to The one-to-one mode of node and business side is crossed to be illustrated.
If Fig. 3 shows, method includes the following steps: step 31, first resource is obtained from first network and shifts data, first Resource transfers data are distributed to first network by the second node that first network has been added, and second node corresponds to the second business Side, the guarantee resource for being provided according to third business side issue resource to multiple users and raise information, and first resource shifts number According to including, the second business policy to multiple users based on resource raise information and to the record number of second business side's transferring resource According to;Step 32, Secondary resource being obtained from first network and shifting data, Secondary resource shifts data by being added the of first network Four nodes are distributed to first network, and fourth node corresponds to the 4th business side, for completing the resource transfers of each business side, the Two resource transfers data include that resource that the 4th business policy records each business side, relevant to resource recruitment information turns Enter data and/or resource produces data;Step 33, data are carried out based on first resource transfer data and Secondary resource transfer data Verifying.
Firstly, first business side obtains first resource from first network by first node and shifts data in step 31. Here, first resource transfer data can be the data that first network is distributed to by the second node that first network has been added.It should Node 202 in second node, such as Fig. 2, can correspond to the second business side.Second business side can be used as resource transfers industry The intermediary agency of business, for facilitating the resource transfers business of other two sides, such as P2P platform.
It is appreciated that the second business side is used as intermediary agency, multiple resource sides of being transferred to and the resource side of producing can be faced.This In, resource is transferred to a side and is known as third business side.That is, for some specifically resource transfers business, one Third business side can obtain resource by multiple resource sides of being transferred to.Second business side can turn according to the resource of third business side Request is moved, raises information to multiple resource sides of producing (user) publication resource.It multiple resource sides of producing can be according to such money It raises information and chooses whether to produce resource in source.Further, publication resource in the second third business side business Fang Wei raises information Before, the guarantee resource of third business side can also be first obtained, provides guarantee to produce resource for multiple resource sides of producing.
Wherein, guarantee that resource can raise for resource and foundation is provided.In some embodiments, guarantee that resource can be used for protecting Demonstrate,prove authenticity, the information resources of validity that resource is raised.Such as major disease patient is from the information etc. of underprivileged home.? In other embodiments, guarantee that resource can be the resource of value for the resource for no less than needing to raise.Guarantee that resource can be Tangible (such as housing resources) are also possible to invisible (such as intellectual property resource, equity resource), can be single resource, It can also be composed of multiple resources, herein without limitation.
For it easier comprehension, using resource transfer service as financing business as an example, third business side can be financing Enterprise, the second business can be with for some P2P platform, multiple resources produce can be with multiple users for the P2P platform.Financing Enterprise can carry out financing business with the cooperation of P2P platform.When cooperation, financing enterprise needs to provide assets (such as house property, copyright first Etc.) as resource is guaranteed, it mortgages and/or pledges and give P2P platform.P2P platform can be issued after confirmation for financing enterprise Resource raises information.For example, P2P platform can raise resource information package into finance product, the user towards P2P platform raises Collect resource.The user of P2P platform can complete resource and produce by buying finance product.Optionally, for finance product and Speech, it will usually make a promise return, therefore, the guarantee resource that financing enterprise is supplied to P2P platform can also be higher by the financing amount of money, have more It part can be suitable with promise return.Guarantee resource at this time can not give user cost and return in financing enterprise In the case of, for providing the user with compensation, to reduce or eliminate loss.
Resource is produced since multiple users can raise information by the resource of the second business side, the second business side It has been can recorde that, information is raised based on resource for multiple users and produces the record data of resource, as being uploaded to the first net The first resource of network shifts data.In the example of aforementioned financing business, multiple users' of second business side's P2P platform record The record data for producing resource may include that multiple users buy the transaction journal data of finance product, can also be flat including P2P Platform is supplied to financing contract data of user, etc..In one embodiment, first resource transfer data not only may include the The record data for producing resource based on resource recruitment information for multiple users of two business sides record, can also include being directed to Guarantee resource of third business side etc. records data.
It should be readily apparent to one skilled in the art that the second business side raises the publisher of information as resource, and have direct A possibility that obtaining the resource that user produces, it is therefore, involved during the supervision to the second business side, resource are raised in order to realize And resource can also be taken care of or be interfered by the 4th business side's (such as business bank etc.).
As a result, by step 32, the first business side obtains Secondary resource from first network by first node and shifts data, Secondary resource shifts data and is distributed to first network by the fourth node that first network has been added.Wherein, fourth node here Node 204 in e.g. Fig. 2, can correspond to the 4th business side.Resource transfers data can be to be carried out by the 4th business side The data of record.
Specifically, the 4th business side can be the resource management platform that each business Fang Jun approves, for completing each business The resource transfers of side.Such as in the business for being related to fund, the 4th business side can be business bank etc..It is with business bank Example, in financing business example above-mentioned, P2P platform can take care of the guarantee that third business side provides by business bank and provide Source, user can buy finance product by business bank's account, and financing enterprise can obtain the money raised by business bank Gold.In some optional realizations, resource of the 4th business side to the multiple users for raising acquisition of information by above-mentioned resource Management can also be realized by the special resource deposit mechanism of another party (such as special fund trustship department etc.), with and other Resource distinguishes management.
In this way, the resource transfers activity of each business side all passes through the progress of the 4th business side.4th business side can recorde Various resources flow direction between each business side.Correspondingly, first network is uploaded to by fourth node by the 4th business side Secondary resource transfer data may include, that the 4th business policy records each business side, relevant to resource recruitment information Resource is transferred to data and/or resource produces data.Such as in above-mentioned financing business, business bank is directed to the guarantor of P2P platform record Demonstrate,prove the hosted data of resource, user is bought by business bank in the transaction journal data of P2P platform purchase finance product, user The flowing water information etc. of the corresponding funds flow of finance product of P2P platform publication.
By step 31, step 32 it is found that since the related data of record is uploaded to decentralization by each business side First network flows to data and resource and tends to be transparent.
Further, in order to which the funds flow to each business side realizes supervision, by step 33, the first business side is based on First resource shifts data and Secondary resource transfer data carry out data verification.
Embodiment according to one aspect shifts data for first resource and/or Secondary resource shifts data, the first industry Business side can verify data itself.
In one embodiment, first resource transfer data include that multiple users are based on resource and raise information and produce money The contract information that first pipelined data in source and user and the second business side are raised about resource.To first resource transfer data Verifying may include: to be compared the first pipelined data with contract information, with determination it is therein it is at least one of following whether one It causes: transferring resource share, resource transfers time.
It is appreciated that in the resource transfers contract of the second business side and user, it will usually arrange the resource share of transfer, turn The items such as shift time.By the resource share in the first pipelined data of verifying and contract information whether consistent, transfer time whether With (such as resource transfers occur contract signing after predetermined amount of time in) in it is one or more, can be to avoid second Business side is played tricks or is damaged in the interests of multiple users, such as above-mentioned financing business, and P2P platform is avoided to break one's promise or modify electronics The problem of contract, investor can not collect evidence.Specifically, if in the resource share that user produces in the first pipelined data and contract Unanimously, then otherwise do not passed through by verifying.If transfer time matches, by verifying, otherwise do not pass through.
In another embodiment, Secondary resource transfer data include that multiple users are based on resource and raise information and produce Second pipelined data of resource and the second business side and/or third business side raise information based on resource and are transferred to resource Third pipelined data.To Secondary resource transfer data verifying may include: by the second pipelined data and third pipelined data, Verify the resource that multiple users raise information based on resource and produce, if be transferred to third business side.So, it can be ensured that logical The resource for crossing the publication of the second business side, which raises the resource that information is raised, to reach third business side according to agreement.Further Ground can solve because of the opaque problem of funds flow.It, can be to avoid in this way, in aforementioned P2P financial product operation process P2P enterprise caused by funds flow is opaque is from the problems such as melting.
According to the embodiment of another aspect, first resource transfer data may include that multiple users are raised based on resource Information and the first pipelined data for producing resource, Secondary resource transfer data may include that multiple users are based on resource and raise letter Cease and produce the second pipelined data of resource;Data are shifted based on first resource and Secondary resource transfer data carry out data verification It may include: to be compared the first pipelined data and the second pipelined data, it is whether true to verify the first pipelined data.
As can be seen from the above description, first resource transfer data and Secondary resource shift data, are by a business Different business side record resource transfers data therefore, can be to the resource of each business side by the comparison of two item datas Transfer data are mutually authenticated, to realize the supervision to each business side.For example, the first business side can shift first resource Resource share, the time etc. that the multiple users recorded in data are produced based on resource recruitment information shift number with Secondary resource It is compared according to the resource share that multiple users of middle record raise information based on resource and produce, to verify the second business policy The authenticity of the record data of information is raised to resource.
According to a possible design, before the second third business side business Fang Wei issues resource recruitment information, may be used also Guarantee that resource is verified with what is provided third business side.Third business side can provide resource recruitment side to the second business side Case and for guarantee resource resource prove data.Wherein, resource transfers scheme, which includes at least, raises the amount of money, can also include money Source uses one or more in repayment scheme under duration, recruitment validity period, promise return, time of payment, fortuitous event etc. ?.Resource proves that data can be third business side and raise the proof data that scheme provides the guarantee resource of guarantee for resource.Such as It is preceding described, when resource is raised gratuitously to raise, guarantee that resource can be true, effective information resources, according to applied field Scape is different, and resource proves that data are not also identical.Such as under the major disease fund raised scene of underprivileged home, resource is proved Data can be hospital the diagnosis of disease is proved, family's poverty prove etc..When it is of equal value or paid recruitment that resource, which is raised, Guarantee that resource can also provide the value for equaling or exceeding raised resource.At this point, guaranteeing that the resource of resource proves data for example It can be the Certificate of House Property, intellectual property certificate etc..Wherein, resource proves that data can be saved by modes such as picture, videos.
For unified supervision, resource can be raised scheme and resource by third business side proves data, passes through third section Point (node 203 in such as Fig. 2) packing is uploaded to first network, so that other business sides obtain related data from first network. In one embodiment, the first business side can obtain these data from first network by first node, and be raised according to resource Collection scheme proves that data are verified to resource.
Still by taking aforementioned financing business as an example, financing enterprise can by financing package (resource recruitment scheme), and for The proof data (resource proof data) for the assets that P2P platform is mortgaged and/or pledged, are all uploaded to first network.Monitoring party (the One business side) can based on the financing amount of money etc. involved in financing package, to the proof data of the assets mortgaged and/or pledged into Row verifying.Such as: on the one hand, monitoring party can verify mortgage and/or whether the proof data for the assets pledged are true, effective; On the other hand, the assets that monitoring party can verify mortgage and/or pledge, if be enough to compensate the financing amount of money (such as one ten Whether the financing business of ten thousand RMB, the assets mortgaged and/or pledged have equal or higher value) etc..
It is appreciated that each business side can be made to obtain since related data is uploaded to first network by third business side The related data taken is consistent, and can be proved to avoid third traffic direction each side offer different resource recruitment scheme and resource The case where data.
In one embodiment, information is raised in order to further ensure that multiple users are directed to the resource that the second business side issues And the resource benefit produced, it may be incorporated into the business side for carrying out resource guarantee, i.e. the 5th business side.5th business side is permissible Data, which are checked, to be proved to the resource that third business side provides, and generates resource compared with Nuclear Data.The resource can be with compared with Nuclear Data The verification result of authenticity verification is carried out to the guarantee resource that third business side provides including the 5th business side.The resource is compared with nucleus number According to can also include guarantee result that whether the 5th business side assures third business side (such as confirmation is assured).Further Corresponding data can be uploaded to first network by the 5th node (two nodes 205 in such as Fig. 2) by ground, the 5th business side.Such as This, each business side including the first business side can be from the above-mentioned resource of first network compared with Nuclear Data.First business side is also The resource can be verified compared with Nuclear Data.For example, the first business side can further verify the guarantor of third business side offer Resource is demonstrate,proved, can also verify whether the 5th business side tenders guarantee.Optionally, guarantee agency can will guarantee that resource is compiled Number, the unique corresponding Xiang Ziyuan of a number.In this way, can be to avoid assets oversold above-mentioned the problems such as.
By taking financing business as an example, monitoring party can determine that the financing behavior of financing enterprise is with reference to above-mentioned verification result data No conjunction rule.In addition, P2P platform can also be determined whether with reference to guarantee agency (the 5th business side) verification result data for financing enterprise Industry issues resource and raises information, and business bank can also determine whether to provide money for financing enterprise with reference to above-mentioned verification result data Golden management service, etc..(investment of finance product can not be bought to the user for participating in financing according to financing package in financing enterprise Person) when of equal value or higher value resource compensation is provided, monitoring party or P2P platform can also be according to the verification results of guarantee agency Data, the guarantee resource that financing enterprise is provided are cashed, to compensate user's loss.When verification result data has the problems such as practising fraud When, monitoring party may also require that guarantee agency's burden is corresponding and repay responsibility.
According to a kind of embodiment, the first business side can also will raise approval of qualification and standby to the resource of the second business side Case data, are distributed to first network, so that each node in first network obtains approval of qualification and data of putting on record.In this way, each Business side can verify the qualification of the second business side, provide foundation for corresponding service behavior.
It is appreciated that may have many nodes in network since first network is the trustable network of decentralization.For relating to And information of sensitive data or private data, such as user involved in first resource transfer data, the transfer amount of money etc., the first net Each node in network can obtain.Therefore, according to a kind of embodiment, the first business side can also have key pair, should Key pair may include the first public key and the first private key, other business sides, such as the second business side, the 4th business side, and difference can To save first public key, data relevant to resource transfers business are distributed to after first public key encryption respectively One network.First network, the 4th industry are distributed to after first resource transfer data are passed through the first public key encryption such as the second business side Business side is by Secondary resource transfer data by being distributed to first network after the first public key encryption.In this way, when the first business side passes through After first node obtains the data encrypted by the first public key, it can be decrypted by the first private key.
Similarly, other business sides also can have secret key pair, can only be by right when the data need for confidentiality of a business side It is limited the data of need for confidentiality be able to should to be passed through respectively this when limited business side of the node in first network is checked After the public key of business side encrypts respectively, it is distributed to first network respectively, so that corresponding service side passes through own private key ciphertext data It is checked, this is no longer going to repeat them.
It is worth noting that not limiting its technical solution although this specification is described in conjunction with financing for scene Concrete application can be also used for major disease mutual assistance and raise money the scene of platform etc, it is not limited here.
Referring to FIG. 4, still illustrating the effect that this specification embodiment reaches by taking P2P financial product circulation process as an example.Such as Shown in Fig. 4, during the circulation of P2P financial product, by the monitoring method of the resource transfers data of this specification embodiment, respectively A business side mutually supervision is realized by the trustable network (first network) of decentralization.In the trustable network, finance does/office Or silver-colored Insurance Regulatory Commission/office (the first business side), P2P enterprise (the second business side), financing enterprise (third business side), business bank (the 4th business side), guarantee agency (the 5th business side) etc., can be credible to this by corresponding node trustable network access Web Publishing data, and data are obtained from the trustable network.Wherein: P2P enterprise can recorde the money of investor (multiple users) Produce number data, transaction journal data, financing trade contract (first resource transfer data) etc.;Financing enterprise can provide financing Scheme guarantees that resource, assets (guaranteeing resource) prove data etc.;Business bank can recorde the fund flowing water of each business side (Secondary resource transfer data) etc.;Guarantee agency can guarantee that resource is checked to what financing enterprise provided, such as according to money Producing proves that assets are numbered in data;Finance does/and the authorization that can upload P2P enterprise of office or silver-colored Insurance Regulatory Commission/office puts on record data, And it is verified at any time by the funds flow data that trustable network obtains each business side.Simultaneously as record It wrong can not be somebody's turn to do in the data of first network, it is ensured that the authenticity of each business number formulary evidence.
Above procedure is looked back, this specification embodiment passes through trustable network pair based on the trustable network of decentralization Each business side carries out data management, can not distort characteristic using trustable network, realize the transparent circulation of each business side's information. Resource transfers service related information quasi real time uploads, and can combine supervision implementation principle and intelligent contract technology, provide in user Damage prevents trouble before it happens before occurring.The network characterization of decentralization will not deposit data so that problem occurs for any one participant Storage influences.In short, the monitoring method of resource transfers data can reduce the risk of resource transfers business.Further, also Data can all be encrypted, be stored by ciphertext, promote data safety grade.
According to the embodiment of another aspect, a kind of monitoring device of resource transfers data is also provided.Fig. 5 is shown according to one The schematic block diagram of the monitoring device of the resource transfers data of embodiment.As shown in figure 5, the monitoring device of resource transfers data 500 include: first acquisition unit 51, is configured to obtain first resource transfer data from first network, first resource shifts data Second node by first network has been added is distributed to first network, and second node corresponds to the second business side, for according to the The guarantee resource that three business sides provide issues resource to multiple users and raises information, and it includes the second industry that first resource, which shifts data, Business policy produces the record data of resource to multiple users based on resource recruitment information;Second acquisition unit 52, configuration Data are shifted to obtain Secondary resource from first network, Secondary resource shifts data and sent out by the fourth node that first network has been added Cloth to first network, fourth node corresponds to the 4th business side, and for completing the resource transfers of each business side, Secondary resource turns Moving data includes, it is that the 4th business policy record each business side, be transferred to the relevant resource of resource recruitment information data and/ Or resource produces data;Authentication unit 53, is configured to first resource transfer data and Secondary resource transfer data are counted According to verifying.
According to a possible design, the first business side has key pair, and key pair includes the first public affairs of the first business side Key and the first private key, the second business side, the 4th business side save the first public key respectively, with respectively by first resource shift data, Secondary resource transfer data are by being distributed to first network after the first public key encryption.
In embodiment on the one hand, first resource transfer data include that multiple users are based on resource and raise information and turn The contract information that first pipelined data of resource and user and the second business side are raised about resource out;
Authentication unit 53 is further configured to:
First pipelined data is compared with contract information, it is therein at least one of following whether consistent with determination: to turn Move resource share, resource transfers time.
In embodiment on the other hand, Secondary resource transfer data include, multiple users be based on resource raise information and The second pipelined data and the second business side and/or third business side for producing resource are based on resource and raise information and be transferred to money The third pipelined data in source;
Authentication unit 53 is further configured to:
By the second pipelined data and third pipelined data, the money that multiple users raise information based on resource and produce is verified Source, if be transferred to third business side.
In the embodiment of another aspect, first resource transfer data include, multiple users be based on resource raise information and The first pipelined data of resource is produced, Secondary resource transfer data include that multiple users are based on resource and raise information and produce money Second pipelined data in source;
Authentication unit 53 is further configured to:
First pipelined data and the second pipelined data are compared, it is whether true to verify the first pipelined data.
In a possible design, device 500 can also include:
Third acquiring unit (not shown) is configured to obtain from first network and be sent out by the third node that first network has been added The resource of cloth to first network raises scheme and resource proves data, and third node corresponds to third business side, by providing guarantor Resource is demonstrate,proved, so that the second business side is that third business side issues resource recruitment information, resource proves that data include guaranteeing resource Prove data;
Authentication unit 53 proves that data are verified to resource but also it may be configured such that based on resource recruitment scheme.
In one further embodiment, authentication unit 53 is configurable to by least one of following, based on resource Recruitment scheme proves that data are verified to resource:
Verifying resource proves the authenticity of data;
Verifying guarantees the resource share of resource, if raises the resource share that scheme is arranged not less than resource.
In one embodiment, device 500 can also include:
4th acquiring unit (not shown) is configured to obtain from first network and be sent out by the 5th node that first network has been added Cloth to first network resource compared with Nuclear Data, the 5th node corresponds to the 5th business side, and the 5th business side is used for guaranteeing resource Verified, resource compared with Nuclear Data include the 5th business side to the relatively core for guaranteeing resource as a result, and/or the 5th business side whether be Third business side provides the guarantee result of resource guarantee;
Authentication unit 53 is but also it may be configured such that verify resource compared with Nuclear Data.
In one embodiment, device 500 can also include:
Release unit (not shown) is configured to that approval of qualification and data of putting on record, hair will be raised to the resource of the second business side Cloth is to first network, so that each node in first network obtains the approval of qualification and data of putting on record.
It is worth noting that device 500 shown in fig. 5 is that device corresponding with the embodiment of the method shown in Fig. 3 is implemented , the corresponding description in the embodiment of the method shown in Fig. 3 is equally applicable to device 500, and details are not described herein.
By apparatus above, data management is carried out to each business side by trustable network, utilizes can not usurping for trustable network Change the network characterization of characteristic and decentralization, so that problem occurs for any one participant, shadow will not occur to data storage It rings.To realize in resource transfers business, the transparent circulation of each business side's information is provided before damage occurs in user and is prevented in not So, the risk of resource transfers business can be reduced.
According to the embodiment of another aspect, a kind of computer readable storage medium is also provided, is stored thereon with computer journey Sequence enables computer execute method described in conjunction with Figure 3 when the computer program executes in a computer.
According to the embodiment of another further aspect, a kind of calculating equipment, including memory and processor, the memory are also provided In be stored with executable code, when the processor executes the executable code, realize the method in conjunction with described in Fig. 3.
Those skilled in the art are it will be appreciated that in said one or multiple examples, function described in the invention It can be realized with hardware, software, firmware or their any combination.It when implemented in software, can be by these functions Storage in computer-readable medium or as on computer-readable medium one or more instructions or code transmitted.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention Protection scope, all any modification, equivalent substitution, improvement and etc. on the basis of technical solution of the present invention, done should all Including within protection scope of the present invention.

Claims (20)

1. a kind of monitoring method of resource transfers data, the method is by the first industry of the first node corresponded in first network Business side executes, and the first network is the trustable network of decentralization;The described method includes:
First resource is obtained from the first network and shifts data, and the first resource transfer data are by being added first net The second node of network is distributed to the first network, and the second node corresponds to the second business side, for according to third business The guarantee resource just provided issues resource to multiple users and raises information, and the first resource transfer data include described second Business policy produces the record data of resource to the multiple user based on resource recruitment information;
Secondary resource is obtained from the first network and shifts data, and the Secondary resource transfer data are by being added first net The fourth node of network is distributed to the first network, and the fourth node corresponds to the 4th business side, for completing each business The resource transfers of side, the Secondary resource transfer data include the 4th business policy records each business side and institute It states resource and raises that the relevant resource of information is transferred to data and/or resource produces data;
Data are shifted based on the first resource and Secondary resource transfer data carry out data verification.
2. according to the method described in claim 1, wherein, the first business side has key pair, and the key pair includes institute The first public key and the first private key of the first business side are stated, the second business side, the 4th business side save described respectively One public key, the first resource is shifted data respectively, Secondary resource transfer data pass through first public key encryption After be distributed to the first network.
3. according to the method described in claim 1, wherein, the first resource transfer data include that multiple users are based on resource It raises information and produces the first pipelined data of resource and contract information that user and the second business side are raised about resource;
It is described to include: based on first resource transfer data and Secondary resource transfer data progress data verification
First pipelined data is compared with the contract information, with determination it is therein it is at least one of following whether one It causes:
Transferring resource share, resource transfers time.
4. according to the method described in claim 1, wherein, the Secondary resource transfer data include that multiple users are based on resource It raises information and produces the second pipelined data of resource and the second business side, the third business side are raised based on resource Collection information and be transferred to the third pipelined data of resource;
It is described to include: based on first resource transfer data and Secondary resource transfer data progress data verification
By second pipelined data and the third pipelined data, verify the multiple user be based on resource raise information and The resource produced, if be transferred to the third business side.
5. according to the method described in claim 1, wherein, the first resource transfer data include that multiple users are based on resource It raises information and produces the first pipelined data of resource, the Secondary resource transfer data include that multiple users are raised based on resource Collection information and produce the second pipelined data of resource;
It is described to include: based on first resource transfer data and Secondary resource transfer data progress data verification
First pipelined data and second pipelined data are compared, it is whether true to verify first pipelined data It is real.
6. according to the method described in claim 1, wherein, the method also includes:
The resource that the first network is distributed to by the third node that the first network has been added is obtained from the first network Recruitment scheme and resource prove data, and the third node corresponds to the third business side, by providing the guarantee resource, So that the second business side is that the third business side issues the resource recruitment information, the resource proves that data include, The proof data for guaranteeing resource;
Scheme is raised based on the resource, data, which are verified, to be proved to the resource.
7. it is described that scheme is raised based on the resource according to the method described in claim 6, wherein, number is proved to the resource It is included at least one of the following: according to verifying is carried out
Verifying the resource proves the authenticity of data;
Verify the resource share for guaranteeing resource, if raise the resource share that scheme is arranged not less than the resource.
8. according to the method described in claim 6, wherein, the method also includes:
The resource that the first network is distributed to by the 5th node that the first network has been added is obtained from the first network Compared with Nuclear Data, the 5th node corresponds to the 5th business side, and the 5th business side is for guaranteeing that resource is tested to described Card, the resource include the 5th business side to the relatively core for guaranteeing resource as a result, and/or the 5th industry compared with Nuclear Data Business side whether for the third business side provide resource guarantee guarantee result;
The resource is verified compared with Nuclear Data.
9. according to the method described in claim 1, wherein, the method also includes:
Approval of qualification and data of putting on record will be raised to the resource of the second business side, the first network is distributed to, for institute Each node stated in first network obtains the approval of qualification and data of putting on record.
10. a kind of monitoring device of resource transfers data, described device is set to the first node in first network, this described first Node corresponds to the first business side, and the first network is the trustable network of decentralization;Described device includes:
First acquisition unit is configured to obtain first resource transfer data from the first network, and the first resource shifts number It is distributed to the first network according to the second node by the first network has been added, the second node corresponds to the second business Side, the guarantee resource for being provided according to third business side issue resource to multiple users and raise information, and the first resource turns Moving data includes, and second business policy produces the record of resource to the multiple user based on resource recruitment information Data;
Second acquisition unit is configured to obtain Secondary resource transfer data from the first network, and the Secondary resource shifts number It is distributed to the first network according to the fourth node by the first network has been added, the fourth node corresponds to the 4th business Side, for completing the resource transfers of each business side, the Secondary resource transfer data include that the 4th business policy is to each A business side's record, relevant to resource recruitment information resource is transferred to data and/or resource produces data;
Authentication unit, is configured to the first resource transfer data and Secondary resource transfer data carry out data and test Card.
11. device according to claim 10, wherein the first business side has key pair, and the key pair includes The first public key and the first private key of the first business side, described in the second business side, the 4th business side save respectively First public key, the first resource is shifted data respectively, Secondary resource transfer data are added by first public key The first network is distributed to after close.
12. device according to claim 10, wherein the first resource transfer data include that multiple users are based on money It raises information and produces the first pipelined data of resource and contract information that user and the second business side are raised about resource in source;
The authentication unit is further configured to:
First pipelined data is compared with the contract information, with determination it is therein it is at least one of following whether one It causes:
Transferring resource share, resource transfers time.
13. device according to claim 10, wherein the Secondary resource transfer data include that multiple users are based on money Source raise information and produce resource the second pipelined data and the second business side, the third business side be based on resource It raises information and is transferred to the third pipelined data of resource;
The authentication unit is further configured to:
By second pipelined data and the third pipelined data, verify the multiple user be based on resource raise information and The resource produced, if be transferred to the third business side.
14. device according to claim 10, wherein the first resource transfer data include that multiple users are based on money Source raises information and produces the first pipelined data of resource, and the Secondary resource transfer data include that multiple users are based on resource It raises information and produces the second pipelined data of resource;
The authentication unit is further configured to:
First pipelined data and second pipelined data are compared, it is whether true to verify first pipelined data It is real.
15. device according to claim 10, wherein described device further include:
Third acquiring unit is configured to be distributed to from first network acquisition by the third node that the first network has been added The resource of the first network raises scheme and resource proves data, and the third node corresponds to the third business side, leads to It crosses and the guarantee resource is provided, so that the second business side is that the third business side issues the resource recruitment information, institute Stating resource proves that data include, the proof data for guaranteeing resource;
The authentication unit is additionally configured to, and raises scheme based on the resource, proves that data are verified to the resource.
16. device according to claim 15, wherein the authentication unit is further configured to by following at least one , scheme is raised based on the resource, data, which are verified, to be proved to the resource:
Verifying the resource proves the authenticity of data;
Verify the resource share for guaranteeing resource, if raise the resource share that scheme is arranged not less than the resource.
17. Zhang Zhi according to claim 15, wherein described device further include:
4th acquiring unit is configured to be distributed to from first network acquisition by the 5th node that the first network has been added For the resource of the first network compared with Nuclear Data, the 5th node corresponds to the 5th business side, the 5th business side for pair Described to guarantee that resource is verified, the resource includes the 5th business side to the relatively core knot for guaranteeing resource compared with Nuclear Data Whether fruit and/or the 5th business side for the third business side provide the guarantee result of resource guarantee;
The authentication unit is additionally configured to, and is verified to the resource compared with Nuclear Data.
18. device according to claim 10, wherein described device further include:
Release unit is configured to that approval of qualification and data of putting on record will be raised to the resource of the second business side, is distributed to described First network, so that each node in the first network obtains the approval of qualification and data of putting on record.
19. a kind of computer readable storage medium, is stored thereon with computer program, when the computer program in a computer When execution, computer perform claim is enabled to require the method for any one of 1-9.
20. a kind of calculating equipment, including memory and processor, which is characterized in that be stored with executable generation in the memory Code realizes method of any of claims 1-9 when the processor executes the executable code.
CN201811613528.0A 2018-12-27 2018-12-27 The monitoring method and device of resource transfers data Pending CN110009317A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811613528.0A CN110009317A (en) 2018-12-27 2018-12-27 The monitoring method and device of resource transfers data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811613528.0A CN110009317A (en) 2018-12-27 2018-12-27 The monitoring method and device of resource transfers data

Publications (1)

Publication Number Publication Date
CN110009317A true CN110009317A (en) 2019-07-12

Family

ID=67165325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811613528.0A Pending CN110009317A (en) 2018-12-27 2018-12-27 The monitoring method and device of resource transfers data

Country Status (1)

Country Link
CN (1) CN110009317A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106327173A (en) * 2016-08-22 2017-01-11 布比(北京)网络技术有限公司 Network payment method and network payment device
CN107025602A (en) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 A kind of financial asset transaction system construction method based on alliance's chain
CN108681966A (en) * 2018-05-11 2018-10-19 阿里巴巴集团控股有限公司 A kind of information monitoring method and device based on block chain
CN108696514A (en) * 2018-04-27 2018-10-23 腾讯科技(深圳)有限公司 Resource collects task management method, device, storage medium and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106327173A (en) * 2016-08-22 2017-01-11 布比(北京)网络技术有限公司 Network payment method and network payment device
CN107025602A (en) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 A kind of financial asset transaction system construction method based on alliance's chain
CN108696514A (en) * 2018-04-27 2018-10-23 腾讯科技(深圳)有限公司 Resource collects task management method, device, storage medium and system
CN108681966A (en) * 2018-05-11 2018-10-19 阿里巴巴集团控股有限公司 A kind of information monitoring method and device based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
产品汪: "P2P资金托管流程", 《HTTPS://WWW.JIANSHU.COM/P/CC119271C36A》 *

Similar Documents

Publication Publication Date Title
US12061984B2 (en) Architectures, systems and methods for program defined transaction system and decentralized cryptocurrency system
Cohn et al. Smart after all: Blockchain, smart contracts, parametric insurance, and smart energy grids
Asharaf et al. Decentralized computing using blockchain technologies and smart contracts: Emerging research and opportunities: Emerging research and opportunities
JP2020536322A (en) Transaction privacy in public distributed ledger system
Rodeck et al. What is blockchain
CN111260485A (en) Mutual-aid insurance method, equipment and medium based on block chain
CN110033263A (en) The acquisition of user characteristics value, application method and device based on block chain
Pouwelse et al. Laws for creating trust in the blockchain age
Scharfman Decentralized Finance (DeFi) Fraud and Hacks: Part 3
유순덕 et al. A Study on Improvement for Service Proliferation Based on Blockchain
Mas et al. Bitcoin-like protocols and innovations
Deshmukh et al. A Survey on Blockchain and Cryptocurrency-Based Systems
Adam Blockchain Technology for Business Processes
CN110009317A (en) The monitoring method and device of resource transfers data
Hassan Blockchain technology and its potential effect on the banking industry (China Case Study)
KR20190051366A (en) Method, system and non-transitory computer-readable recording medium for supporting securities short sale using distributed ledger
Hu [Retracted] Application Analysis of Block Technology Based on Block Chain Computer Model in the False Identification of the Catalog List of the Financial Department of Multinational Companies
Ahire Blockchain: the future?
Hammer The Blockchain Ecosystem
Khan The Blockchain Technology and Bitcoin: The Way Forward, or a Recipe for Financial Disaster?
Jami The Future of Decentralized Blockchain and Artificial Intelligence
Okoye New applications of blockchain technology to voting and lending
Duivestein et al. Design to Disrupt
Dudgeon Service of Process via NFT Airdrops: The Pathway to Private Litigation for Injured Web3 Plaintiffs
Rajpoot et al. A Comprehensive Analysis of Block Chain-Based Crypto Currency Systems for Real-World Adoption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201014

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201014

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190712