CN110276680B - Real data acquisition method applied to Internet finance - Google Patents

Real data acquisition method applied to Internet finance Download PDF

Info

Publication number
CN110276680B
CN110276680B CN201910441730.8A CN201910441730A CN110276680B CN 110276680 B CN110276680 B CN 110276680B CN 201910441730 A CN201910441730 A CN 201910441730A CN 110276680 B CN110276680 B CN 110276680B
Authority
CN
China
Prior art keywords
data
network credit
credit institution
real
emergency center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910441730.8A
Other languages
Chinese (zh)
Other versions
CN110276680A (en
Inventor
张露晨
吴震
张林波
杨菁林
唐积强
刘正洋
王峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Scistor Technologies Co ltd
National Computer Network and Information Security Management Center
Original Assignee
Beijing Scistor Technologies Co ltd
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Scistor Technologies Co ltd, National Computer Network and Information Security Management Center filed Critical Beijing Scistor Technologies Co ltd
Priority to CN201910441730.8A priority Critical patent/CN110276680B/en
Publication of CN110276680A publication Critical patent/CN110276680A/en
Application granted granted Critical
Publication of CN110276680B publication Critical patent/CN110276680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a real data acquisition method applied to internet finance, and relates to the field of national internet finance monitoring. Firstly, combing transaction detail data of each network credit institution service to carry out service evaluation; and each network credit institution locally stores a piece of data meeting the standard, performs self-check, and accesses the self-checked data to the national internet emergency center. Then, each network credit institution carries out point burying through an SDK tool kit, and the national internet emergency center carries out correctness verification on transaction detail data accessed by each network credit institution in real time and feeds back the transaction detail data to the network credit institution; and simultaneously extracting real-time transaction data accessed by each network lending mechanism, forming a data stream according to the lending and borrowing services, and generating disclosure data around two dimensions of the lender and the borrower. And finally, the national internet emergency center opens data inspection for the user and inspects a feedback window. The invention realizes the authenticity verification of the real-time access data of the network credit institution and the aim of real-time and dynamic supervision.

Description

Real data acquisition method applied to Internet finance
Technical Field
The invention relates to the field of national internet financial monitoring, in particular to a real data acquisition method applied to internet finance.
Background
In the face of internet financial institutions with fast development, large change and wide public involvement, the traditional financial supervision means in China are obviously lagged behind. Especially, how to timely and accurately find the overall operation condition and risk condition of the network credit institution becomes a key point for solving the internet financial supervision.
At present, the internet finance (internet financial point-to-point loan platform) enterprises accessed by the national internet finance monitoring department (hereinafter referred to as the national monitoring department) are more and more, and the problem of acquiring real data becomes a huge brake for supervision and development; and the internet financial supervision department has no uniform specification and standard in the acquisition of real data.
Disclosure of Invention
The invention aims to ensure that the national monitoring department acquires real data of the Internet financial enterprise in real time, solve the problems of easy counterfeiting and difficult acquisition of enterprise data, and avoid the problems of hidden but not reported enterprise, data tampering, data false reporting, data report inactively and untimely, and the like; a real data acquisition method applied to Internet finance is provided.
The method comprises the following specific steps:
step one, aiming at each network credit institution to be supervised, combing transaction detail data of each network credit business of the company according to standards formulated by national regulatory departments, and carrying out business evaluation;
step two, each network credit institution locally stores a piece of data meeting the standard, performs self-checking on integrity, relevance and rationality, and accesses the self-checked data to a national internet emergency center according to an open interface specification to the outside;
and the national internet emergency center checks the accessed data on line and completes the real-time data access work.
And step three, each network credit institution carries out point burying through an SDK tool bag, and the national internet emergency center carries out correctness verification on transaction detail data accessed by each network credit institution in real time and feeds the transaction detail data back to the network credit institution.
And the network credit institution finishes embedding the point at the terminal App through the SDK toolkit, acquires data generated by the point embedding institution terminal App to a national internet emergency center in real time, compares the data with data accessed by the network credit institution in real time, and verifies whether the accessed data is correct.
The specific steps are described as follows:
firstly, each network credit institution realizes identity authentication through a registration certificate and a secret key provided by a national internet emergency center;
each network credit institution then calls the buried point function in the SDK toolkit to bury the point at the key service node trigger.
The key business nodes comprise recharge, withdrawal, investment, transfer, deposit and the like.
When an App terminal user clicks a key service node to trigger service, the embedded point function automatically collects transaction data, encrypts the data through an asymmetric RSA encryption algorithm, and completes encryption pushing of the data from the App terminal to a national internet emergency center through an https protocol.
And finally, the national internet emergency center takes the user as a dimension to form business transaction data of each network credit institution terminal, compares the business transaction data with transaction running data accessed by each network credit institution in real time, verifies the correctness of the access data of the network credit institution, and feeds the data back to the network credit institution.
Step four, the national internet emergency center extracts real-time transaction data accessed by each network lending mechanism, forms data flow according to lending and borrowing services, and generates disclosure data around two dimensions of a lender and a borrower;
step five, the national internet emergency center opens data inspection for the user and inspects a feedback window;
the internet user checks the information of loan, transfer, refund, borrowing, recharging, withdrawal and the like on each platform through the open window; if the user has a question about the data checking result, the real transaction data of the user which is wrongly reported and missed reported by each network credit institution is fed back through the checking feedback window, so that each network credit institution is forced to follow up spontaneously, the quality of the accessed data is highly emphasized, and the real data is actively accessed.
The invention has the advantages that:
(1) a real data acquisition method applied to Internet finance provides a solution for acquiring real data of Internet finance enterprises for the country.
(2) A real data acquisition method applied to internet finance intercepts service data generated by users of network credit institutions at terminals in real time, bypasses the actions of missing report, wrong report and counterfeiting in the network credit institutions, and realizes authenticity verification of real-time access data of the network credit institutions through verification of the access data.
(3) A real data acquisition method applied to internet finance forms a closed loop system from real-time data access of a network credit institution to access data verification, and finally data inspection and feedback are given to an excitation network credit institution to push real data in real time.
(4) A real data acquisition method applied to Internet finance provides guarantee for the national Internet finance supervision department to realize bottom data penetration monitoring.
(5) A real data acquisition method applied to Internet finance has strong practicability, helps the national Internet finance monitoring technology department (national Internet emergency center) to acquire real data of a network credit institution, and assists the Internet finance supervision department in real time and dynamic supervision.
Drawings
Fig. 1 is a schematic diagram illustrating a method for acquiring real data applied to internet finance according to the present invention.
Fig. 2 is a flowchart of a real data acquiring method applied to internet finance according to the present invention.
Fig. 3 is a schematic diagram of an embodiment of the present invention applied to real data acquisition in internet finance.
Detailed Description
The technical scheme of the invention is explained in detail in a mode of specific embodiments by combining the attached drawings.
The invention relates to a real data acquisition method applied to internet finance, which acquires real data of a network lending institution by a national internet finance monitoring technical department (a national internet emergency center) by means of science and technology and carries out real-time dynamic and timely early warning supervision. As shown in fig. 1, the scientific and technological means adopts three measures: accessing real-time data of a network credit institution; and embedding points and opening data inspection of the SDK key service nodes.
And (I) real-time data access of the network credit institution is used for acquiring bottom detailed data of the network credit institution and timely mastering the operation condition, the asset condition and the user condition of the network credit institution.
And (3) establishing a data access standard interface capable of covering the national network credit institution service for each network credit institution to be monitored, wherein the network credit institution completes the real-time access of transaction detail data of the network credit institution through the processes of service evaluation, access program development, access program debugging, data self-checking, data pushing, data reconciliation and the like.
The specific steps are described as follows:
1. business evaluation, network credit organization combing the network credit business data of the company according to the standard made by the national regulatory department
2. And (4) developing an access program, and developing a corresponding data access program by the network lending mechanism according to the interface specification and the combed transaction data according to the interface type.
3. And (3) debugging the access program, namely debugging the data access program on line through an interface address which is opened to the outside by the national Internet emergency center, and completing the debugging work of the access program.
4. Data self-check, the network credit institution needs to locally store a piece of data meeting the standard, and the accessed data is ensured to be correct and reasonable through the data integrity self-check, the relevance self-check and the rationality self-check.
5. And (4) data pushing, namely pushing qualified self-checking data to a national internet emergency center through an access program.
6. And (3) checking account of the data, regularly checking the consistency of the pushed data, and ensuring that the pushed data are normally accessed to a national internet emergency center.
The invention supports the real-time access work of the transaction detail data of various service scenes of the network credit institution.
And secondly, embedding points in SDK key service nodes, and verifying access data, namely, acquiring service data triggered by a user through a terminal in real time by making an SDK embedding point on a network credit institution terminal App, comparing the service data with the network credit institution access data, and verifying the correctness of the real-time access data of the network credit institution.
By designing a set of SDK (security data kit) point burying toolkit with identity authentication, a point burying function and a data encryption module, a network credit mechanism completes point burying at a terminal App through the SDK toolkit, data generated by the point burying mechanism terminal App is collected to a national internet emergency center in real time and is compared with data accessed by the network credit mechanism in real time, and whether the accessed data is correct is verified.
The specific steps are described as follows:
1. and identity authentication, wherein the SDK provides a set of authentication from the client to the server, and the identity authentication from the network credit institution to the national Internet emergency center is realized through a network credit institution registration certificate and a secret key provided by the national Internet emergency center.
And 2, embedding points in the SDK, wherein a network credit institution calls a point embedding function in the SDK toolkit to realize embedding points in service triggering positions of key service nodes, such as recharging, withdrawal, investment, transfer, payment and the like.
3. And data encryption, wherein when the App terminal user clicks triggering services such as recharging, cash withdrawal, investment and the like, the point-burying function automatically collects transaction data, the data is encrypted through an asymmetric RSA encryption algorithm, and the encryption pushing of the data from the App terminal to a national internet emergency center is completed through an https protocol.
4. And access data verification, namely forming business transaction data such as enterprise terminal user investment, recharging, withdrawal and deposit by taking the user as a dimension, comparing the business transaction data with real-time access transaction flow data of a network lending institution, and verifying the correctness of the access data.
The method supports the embedding of App application programs or official websites under an Android platform, an iOS platform and an H5 platform, and meanwhile intercepted service data are encrypted in an asymmetric algorithm in the whole process.
The invention realizes the verification of the correctness and the authenticity of the real-time access data of the network credit institution through the comparison of the transaction detail data of the investment or debit and credit users.
And (III) data inspection means that a national internet emergency center publicizes and reveals a data inspection window, a network credit institution finds the problem of accessing data by using a user of the network credit institution, and the initiative of real-time data access of the network credit institution to real data is enhanced through a feedback mechanism.
For the network credit institution which completes real-time data access, data flow is formed according to loan and borrowing services, data are disclosed to a lender and a borrower, and data inspection is opened to an internet user in a public mode.
The specific steps are described as follows:
1. real-time transaction data accessed by the network lending institution is extracted to generate disclosure data around two dimensions, the lender and the borrower.
2. And opening a data inspection and inspection feedback window for the internet users in a public manner.
3. And the internet user checks the information of loan, transfer, refund, borrowing, recharging, withdrawal and the like on each platform through the open window.
4. The user has a question about the data checking result, and the real transaction data of the user is wrongly reported and missed by the network credit institution through the checking feedback window, so that the enterprise is forced to follow the data automatically, the quality of the accessed data is highly emphasized, and the real data is actively accessed.
The invention pushes real and effective data to the national internet emergency center in real time by the user excitation mechanism of each network credit institution.
Through the three measures, a network credit institution is formed to access real business transaction data to a closed loop system of a national internet emergency center in real time, and the purposes of acquiring the real data by means of science and technology and carrying out real-time and dynamic supervision are achieved.
As shown in fig. 2, the specific steps are as follows:
step one, aiming at each network credit institution to be supervised, combing transaction detail data of each network credit business of the company according to standards formulated by national regulatory departments, and carrying out business evaluation;
step two, each network credit institution locally stores a piece of data meeting the standard, performs self-checking on integrity, relevance and rationality, and accesses the self-checked data to a national internet emergency center according to an open standard interface specification;
and the national internet emergency center checks the accessed data on line to complete the real-time data access work.
And step three, each network credit institution carries out point burying through an SDK tool bag, and the national internet emergency center carries out correctness verification on transaction detail data accessed by each network credit institution in real time and feeds the transaction detail data back to the network credit institution.
And the network credit institution finishes embedding the point at the terminal App through the SDK toolkit, acquires data generated by the point embedding institution terminal App to a national internet emergency center in real time, compares the data with data accessed by the network credit institution in real time, and verifies whether the accessed data is correct.
The specific steps are described as follows:
firstly, each network credit institution realizes identity authentication through a registration certificate and a secret key provided by a national internet emergency center;
each network credit institution then calls the buried point function in the SDK toolkit to bury the point at the key service node trigger.
The key business nodes comprise recharge, withdrawal, investment, transfer, deposit and the like.
When an App terminal user clicks a key service node to trigger service, the embedded point function automatically collects transaction data, encrypts the data through an asymmetric RSA encryption algorithm, and completes encryption pushing of the data from the App terminal to a national internet emergency center through an https protocol.
And finally, the national internet emergency center takes the user as a dimension to form business transaction data of each network credit institution terminal, compares the business transaction data with transaction running data accessed by each network credit institution in real time, verifies the correctness of the access data of the network credit institution, and feeds the data back to the network credit institution.
Step four, the national internet emergency center extracts real-time transaction data accessed by each network lending mechanism, forms data flow according to lending and borrowing services, and generates disclosure data around two dimensions of a lender and a borrower;
step five, the national internet emergency center opens data inspection for the user and inspects a feedback window;
the user checks the information of loan, transfer, refund, borrowing, recharging, withdrawal and the like on each platform through the open window; if the user has a question about the data checking result, the real transaction data of the user which is wrongly reported and missed reported by each network credit institution is fed back through the checking feedback window, so that each network credit institution is forced to follow up spontaneously, the quality of the accessed data is highly emphasized, and the real data is actively accessed.
Examples
As shown in fig. 3, suppose that a third user invests for a network credit institution invests for 1 ten thousand yuan on a terminal App of an enterprise, an SDK on the App terminal intercepts transaction data and user information of the third user in time, encrypts the data and pushes the data to an emergency center, and a system generates a transaction data stream by the third user. Meanwhile, the online credit institution accesses the transaction flow of Zhang III to an emergency center in real time. Comparing the Zhang III information flow collected by the SDK with the Zhang III information flow pushed by the enterprise, verifying the authenticity of the access data of the network credit institution, and feeding back the access data to the network credit institution. And the tee joint carries out data inspection through an authority data inspection window which is externally disclosed by the national internet emergency center, and if a problem exists, the authority data inspection window is timely fed back to the network credit mechanism, and the network credit mechanism is excited to actively push real data to the emergency center.

Claims (2)

1. A real data acquisition method applied to Internet finance is characterized by comprising the following specific steps:
step one, aiming at each network credit institution to be supervised, combing transaction detail data of each network credit business of the company according to standards formulated by national regulatory departments, and carrying out business evaluation;
step two, each network credit institution locally stores a piece of data meeting the standard, performs self-checking on integrity, relevance and rationality, and accesses the self-checked data to a national internet emergency center according to an open interface specification to the outside;
the national internet emergency center checks the accessed data on line and completes the real-time data access work;
thirdly, each network credit institution buries points through the SDK toolkit, and the national internet emergency center verifies the correctness of transaction detail data accessed by each network credit institution in real time and feeds the transaction detail data back to the network credit institution;
the network credit institution finishes embedding the point at the terminal App through an SDK toolkit, collects data generated by the point embedding institution terminal App to a national internet emergency center in real time, compares the data with data accessed by the network credit institution in real time, and verifies whether the accessed data is correct;
step four, the national internet emergency center extracts real-time transaction data accessed by each network lending mechanism, forms data flow according to lending and borrowing services, and generates disclosure data around two dimensions of a lender and a borrower;
step five, the national internet emergency center opens data inspection for the user and inspects a feedback window;
the internet user checks the information of loan, transfer, refund, borrowing, recharging and withdrawal on each platform through the open window; if the user has a question about the data checking result, the real transaction data of the user which is wrongly reported and missed reported by each network credit institution is fed back through the checking feedback window, so that each network credit institution is forced to follow up spontaneously, the quality of the accessed data is highly emphasized, and the real data is actively accessed.
2. The method for acquiring the actual data applied to the internet finance, as claimed in claim 1, wherein the detailed steps of the third step are described as follows:
firstly, each network credit institution realizes identity authentication through a registration certificate and a secret key provided by a national internet emergency center;
then, each network credit institution calls a buried point function in the SDK toolkit to bury a point at the triggering position of the key service node;
the key business nodes comprise recharge, withdrawal, investment, transfer and deposit;
when an App terminal user clicks a key service node to trigger a service, a buried point function automatically collects transaction data, encrypts the data through an asymmetric RSA encryption algorithm, and completes encryption pushing of the data from the App terminal to a national internet emergency center through an https protocol;
and finally, the national internet emergency center takes the user as a dimension to form business transaction data of each network credit institution terminal, compares the business transaction data with transaction running data accessed by each network credit institution in real time, verifies the correctness of the access data of the network credit institution, and feeds the data back to the network credit institution.
CN201910441730.8A 2019-05-24 2019-05-24 Real data acquisition method applied to Internet finance Active CN110276680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910441730.8A CN110276680B (en) 2019-05-24 2019-05-24 Real data acquisition method applied to Internet finance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910441730.8A CN110276680B (en) 2019-05-24 2019-05-24 Real data acquisition method applied to Internet finance

Publications (2)

Publication Number Publication Date
CN110276680A CN110276680A (en) 2019-09-24
CN110276680B true CN110276680B (en) 2021-05-07

Family

ID=67960213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910441730.8A Active CN110276680B (en) 2019-05-24 2019-05-24 Real data acquisition method applied to Internet finance

Country Status (1)

Country Link
CN (1) CN110276680B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111741024A (en) * 2020-08-04 2020-10-02 宁波均联智行科技有限公司 Differential buried point acquisition encryption method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030290A (en) * 2007-01-18 2007-09-05 财金资讯股份有限公司 Inter-trade financial-service network construction and its clearing method
US20140149278A1 (en) * 2012-11-28 2014-05-29 Barclays Bank Plc System and Method for Digital Document Management
CN104112228A (en) * 2014-08-04 2014-10-22 武汉金融资产交易所有限公司 Supervision data acquisition system and method used for small loan company
CN107067322A (en) * 2017-05-27 2017-08-18 国家计算机网络与信息安全管理中心 A kind of system and method applied to P2P network loan business data access models
CN107103548A (en) * 2011-11-17 2017-08-29 阿里巴巴集团控股有限公司 The monitoring method and system and risk monitoring and control method and system of network behavior data
CN107193986A (en) * 2017-05-27 2017-09-22 国家计算机网络与信息安全管理中心 A kind of internet finance data public's checking method
CN109710699A (en) * 2019-01-02 2019-05-03 神州数码融信软件有限公司 The back method of the method for recording of transaction data, transaction data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030290A (en) * 2007-01-18 2007-09-05 财金资讯股份有限公司 Inter-trade financial-service network construction and its clearing method
CN107103548A (en) * 2011-11-17 2017-08-29 阿里巴巴集团控股有限公司 The monitoring method and system and risk monitoring and control method and system of network behavior data
US20140149278A1 (en) * 2012-11-28 2014-05-29 Barclays Bank Plc System and Method for Digital Document Management
CN104112228A (en) * 2014-08-04 2014-10-22 武汉金融资产交易所有限公司 Supervision data acquisition system and method used for small loan company
CN107067322A (en) * 2017-05-27 2017-08-18 国家计算机网络与信息安全管理中心 A kind of system and method applied to P2P network loan business data access models
CN107193986A (en) * 2017-05-27 2017-09-22 国家计算机网络与信息安全管理中心 A kind of internet finance data public's checking method
CN109710699A (en) * 2019-01-02 2019-05-03 神州数码融信软件有限公司 The back method of the method for recording of transaction data, transaction data

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Building Investor Trust in the P2P Lending Platform with a Focus on Chinese P2P Lending Platforms;Y.W. YAN;《2016 International Conference on Identification, Information and Knowledge in the Internet of Things》;20161021;第470-474页 *
金融业XBRL格式财务报告网页呈现质量分析;周凌燕,林锦如;《集美大学学报(哲社版)》;20150430;第59-66页 *

Also Published As

Publication number Publication date
CN110276680A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
CN109711836A (en) A kind of storage method of transaction, storage network and electronic equipment
CN103338188B (en) A kind of dynamic authentication method of client side being applicable to mobile cloud
WO2020150741A1 (en) Identity management, smart contract generator, and blockchain mediating system, and related methods
WO2020073491A1 (en) Blockchain-based supply chain payment method, payment collection method, device, apparatus, and medium
US11456939B2 (en) Apparatus, computer program and method
KR102028286B1 (en) Remittance and withdraw management system based on real name account and method thereof
US10965574B2 (en) Apparatus, computer program and method
CN111738725A (en) Cross-border resource transfer authenticity auditing method and device and electronic equipment
CN114549194A (en) Right asset management service platform based on block chain and implementation method thereof
CN109816386A (en) Data get through method on a kind of chain of the unified identity authentication based on block chain
KR102259838B1 (en) Apparatus and method for building a blacklist of cryptocurrencies
CN112036995A (en) Large-scale enterprise financial data management method and system based on block chain and readable storage medium
CN109034987A (en) A kind of tax administration method and system based on block chain
CN111461881A (en) Data management method and device, computer equipment and storage medium
CN108876579A (en) A kind of tax declaration management method and system based on block chain
CN115277122A (en) Cross-border data flow and supervision system based on block chain
CN114897596A (en) Letter service platform and electronic equipment
KR20200063295A (en) The abcd-type apparatus and method of block chain for management of research funds by using randomized mesh blockchain type verifier module and smart tcv type blockchain mediation module
CN110276680B (en) Real data acquisition method applied to Internet finance
US20240161108A1 (en) Methods and systems for forensic investigations in contract networks
CN113239401A (en) Big data analysis system and method based on power Internet of things and computer storage medium
CN109146452A (en) A kind of Internet of Things cost management method and system based on block chain
CN115099800A (en) Block chain based method and device for transferring poor asset data
CN112150299B (en) Annuity data processing method, annuity data processing device, medium and electronic equipment
US20180189752A1 (en) Money transfer using an encrypted text and new global virtual currency system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant