CN110519261A - A kind of methods of risk assessment across chain operation - Google Patents
A kind of methods of risk assessment across chain operation Download PDFInfo
- Publication number
- CN110519261A CN110519261A CN201910786331.5A CN201910786331A CN110519261A CN 110519261 A CN110519261 A CN 110519261A CN 201910786331 A CN201910786331 A CN 201910786331A CN 110519261 A CN110519261 A CN 110519261A
- Authority
- CN
- China
- Prior art keywords
- business
- assessment
- block chain
- risk assessment
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/147—Network analysis or design for predicting network behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention relates to block chain technical fields, specifically disclose a kind of methods of risk assessment across chain operation, comprising: send business operation solicited message, request the second business block chain business of operation to the first service server;Authentication server carries out identity veritification, and identity carries out risk assessment after veritifying successfully, including the first assessment and the second assessment, risk assessment carry out identity veritification by rear second service server again, corresponding business then executed after veritifying successfully.The present invention can carry out risk assessment to the service request from different blocks chain, consequently facilitating docking a variety of electric business platforms or transaction related platform or other types platform, can manage the credit assessment of the user from different platform system simultaneously;And user's prestige is updated by block chain Technique dynamic, and then business risk can be efficiently controlled.
Description
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of methods of risk assessment across chain operation.
Background technique
As the application of block chain technology is more universal, wherein the problem of also with.The behaviour carried out under block chain
Make whether to be really the operation of user's actual wishes;Even user's actual wishes, operation is with the presence or absence of risk or what brings
Risk;These problems are all in need of consideration.It is therein potential especially for the operation for intersecting progress under different blocks chain
Risk can be more.Whether these risks can be estimated in advance, and it is improper to occur to avoid subsequent operation.These problems are all urgently
It is to be solved.
Summary of the invention
In order to solve problem existing in the prior art, the purpose of the present invention is to provide a kind of effectively across chain operation
Methods of risk assessment.
To achieve the above object, the present invention uses following scheme.
A kind of methods of risk assessment across chain operation, comprising:
Business operation solicited message, request the second industry of operation are sent to the first service server by the first business block chain
Business block chain business;
The solicited message is sent to authentication server by the first service server;
The identity that authentication server carries out service request side is veritified;
When identity veritifies failure, operation requests failure information is returned to the first service server;
When identity is veritified successfully, risk assessment is carried out to requested business operation;Risk assessment includes the first assessment
With the second assessment;
When risk assessment does not pass through, authentication server will request failure information to be sent to the first service server;
When risk assessment passes through, the operation requests information is sent to the second service server by authentication server;
After second service server receives operation requests information, the identity for carrying out service request side is veritified, and identity is veritified
By rear, then the operation requests are responded, executes corresponding business operation;
When identity veritifies failure, then request failure information is returned.
As a preferred embodiment, the first assessment includes downloading and the second associated service class of business block chain type of service
The score data of type carries out scoring assessment, and scoring score is greater than or equal to predetermined value, then the first assessment passes through;Otherwise the first assessment
Do not pass through.
Further, the second assessment includes being clustered using operation history of the SOM clustering method to requesting party,
Using deep neural network method, activity classification prediction model is established according to cluster result, business operation is carried out to requesting party
Probability is predicted.
As a preferred embodiment, the second assessment further includes being associated analysis to cluster result, utilizes the first business block
The business association relationship of chain and the second business block chain assesses requesting party to the evolutionary operator probability of the second business block chain.
It specifically, further include being associated in analysis to cluster result, if the second business block chain exists and first
The associated business of business block chain and first assessment pass through, then second assessment pass through, if the second business block chain is not present
Business associated with the first business block chain, and activity classification prediction model is big to the prediction probability of the second business operation type
In predetermined value, then the second assessment passes through;Other situations are determined as that the second assessment does not pass through.
Preferably, the Rating Model of risk assessment is,
Define basic data, comprising: primitive operation type, associated keyword, raw score and the score for corresponding to business
Growth ratio, default score;
Obtain business operation, and Auto-matching basic data;
Such as be matched to primitive operation type or associated keyword, then defining this action type is the initial form, and
Give corresponding scoring;
If match less than primitive operation type and associated keyword, then thus action type automatically create one it is similar
The initial form of type scores as default score predetermined;
The action type of definition and score are broadcast to each running node by authenticating block chain.
Methods of risk assessment across chain operation of the invention can be used computer program and realize automatically, therefore the present invention also mentions
A kind of computer readable storage devices have been supplied, computer program is stored with, the computer program is executed by processor to realize
The methods of risk assessment.
Meanwhile the present invention also provides corresponding terminal, systems to realize above-mentioned methods of risk assessment.
Beneficial effects of the present invention: the present invention provides a kind of methods of risk assessment across chain operation, are receiving user
After the operation requests of requesting party, progress user identity veritification first, to avoid there is user account by other people steal-number or hacker
The operation of attack, the machine operation of system fault etc. non-user subjectivity behavior, after the first step excludes non-subjective operational risk, then
Further progress operational risk assessment verifies user identity after risk assessment passes through and before business operation execution again, with
Potential risk brought by bad prestige user is avoided the occurrence of as far as possible.
Methods of risk assessment across chain operation of the invention can carry out risk to the service request from different blocks chain
Assessment can manage consequently facilitating docking a variety of electric business platforms or transaction related platform or other types platform from not simultaneously
With the credit assessment of the user of plateform system;And user's prestige is updated by block chain Technique dynamic, and then can be effective
Ground controls business risk.
Specific embodiment
For the ease of the understanding of those skilled in the art, below with reference to embodiment, the present invention is further illustrated, real
The content that the mode of applying refers to not is limitation of the invention.
Due to the decentralization of block chain technology, it characteristics, more and more plateform systems such as can not distort and all using.It is right
For identical platform system, the prestige of user is using unified management, and when user carries out business operation, affiliated platform can be to it
Carry out risk assessment.And when user needs cross platform system to carry out business operation, that is, transregional piece of chain carries out business operation, then
Need a kind of methods of risk assessment across chain operation.
In this regard, the embodiment of the invention provides a kind of methods of risk assessment across chain operation, method includes the following steps.
When the user under the first business block chain needs to operate the business of the second business block chain, then user Ke Tong
It crosses the first business block chain and requests operation the second business block chain business (such as the first service server to the first service server
For warehousing server, the second service server is that goods gives as security service server etc., can be two industry of business association
Business server, but it is not limited to relevance business);Authentication server carries out authentication, credit accreditation etc. to user, and certification is logical
It crosses, then Authorized operation, and feeds back to the second service server.Specifically, including as follows.
1. user terminal sends business operation solicited message by the first business block chain, solicited message includes operation requests
And personal information.
2. inquiring user after the first service server receives on block chain business operation request and userspersonal information
Personal information whether there is the first identity public key of system user;Case1: such as inquiring and there is no first identity public key,
It then generates the first identity public key for applying for first identity public key to request, and the operation requests information, user is a
People's information and first identity public key request are sent to authentication server;Case2: it is public such as to inquire that there are first identity
The operation requests information, userspersonal information and first identity public key are then sent to authentication server by key.
Authentication server inquires userspersonal information with the presence or absence of the method for the first identity public key of system user are as follows: authentication
The block cryptographic Hash in first public key request data described in server by utilizing finds first from the authentication block chain
Authorization data carries out identity validation using first authorization data and the first public key request data;At this point it is possible to by institute
It states the first core body mark for including in the first authorization data and the first public key request data to be matched, can also incite somebody to action
The cryptographic Hash for the user identifier for including in first authorization data and the first public key request data is matched, also
The the first core body for including in first authorization data and the first public key request data can be identified and the use
The cryptographic Hash of family mark matches etc..The needs for including in first authorization data and the first public key request data
When matched data successful match, then determine that the first identity public key exists;Otherwise, then determine that the first identity public key does not exist.
3. authentication server receives the operation requests information, userspersonal information and first identity public key request
Afterwards, the first identity public key of response is requested, and the first identity that identity veritification is carried out to obtain the user is veritified request and corresponded to
The first core body mark, by the first identity veritify request be sent to user terminal.
4. user terminal receives after the first identity veritifies request, the first identity of response veritifies request, acquires corresponding the
One core body data (such as fingerprint, face information, iris information etc.), generated using private key generator comprising the first identity public key and
First private key pair of the first identity private key, and the first signed data is signed using the first identity private key to obtain the first private key
First private key signature data, the first identity public key and the first core body data are sent to authentication server by signed data.
5. authentication server receives the first private key signature of user data, the first identity public key and the first core body data
Afterwards, identity veritification is carried out to user using the first core body data by the first authorization data cochain and to deposit after veritifying successfully
It stores up on the authentication block chain in authentication server;And requested according to first identity public key, it is public to obtain corresponding first
Key data, and first public key data is sent to the first service server, wherein first authorization data includes described
First private key signature data, first identity public key, the first core body data, the first core body mark, the system
The cryptographic Hash and timestamp of the user identifier of user, the first public key request data include that the first core body identifies, is described
The corresponding block cryptographic Hash of the cochain block of the cryptographic Hash of the user identifier of system user and first authorization data.
And when user identity verification is unsuccessful, then it is asked to the operation that the first service server returns to the second business block chain
Failure news is sought, the first service server relays to user terminal.
6. then further being carried out to the requested business operation of user after being authenticated to user, confirming user identity
Risk assessment.
Specifically, the authentication server obtained from other third party systems user's reference information, user is in the first industry
Business on business block chain, the second business block chain or/and other more business block chains such as is honoured an agreement/breaks a contract at the transaction letters of generations
With information, user identity authentication and user's qualification information etc..Authentication server passes through storage magnanimity, all kinds of complex data class
The structural data and unstructured data of type, and distributed frame memory mechanism and execution mechanism are used, to storage integration
Data afterwards carry out analyses and comparison processing.
Also, pass through depth convolutional neural networks, autocoder, recurrent neural network and deepness belief network even depth
Learning art analyzes the relationship between data, automatically analyzes service creation event early warning letter by multifactor superposition event model
Breath, and then predict user in the existing risk of all kinds of business operations.
In embodiments of the present invention, risk assessment includes the first assessment and the second assessment.
First assessment: the authentication server is to aforesaid operations solicited message, after being veritified by the first identity public key, authentication
Server carries out credit and risk assessment to the second business of current user operation;For the second different business block chain service class
Type, the score data for downloading the type of service (without limitation) that the second business block chain type of service is associated on scoring block carry out
Class etc. is carried out/broken a contract to scoring assessment, such as enterprise qualification class, enterprise, and scoring score is greater than or equal to predetermined value, then the first assessment is logical
It crosses.If the second business block chain type of service does not have the scoring of associated any type of service, then need in the second assessment
Comprehensive consideration is assessed again.Otherwise the first assessment does not pass through.
Second assessment: for the user's operation of authentication block, analysis module goes through user's operation with SOM clustering method
History is clustered, and using deep neural network method, establishes activity classification prediction model according to cluster result, passes through depth nerve
Stable activity classification prediction model is established in a large amount of training of network, and the probability for carrying out business operation to user is predicted.Its
In, including the association analysis to cluster result: such as user continually carries out the merchandise sales of the first business block chain, then foundation
The case where fund chain relation, user is likely to occur funds shortage, then being associated with user by a large amount of merchandise sales of user may be into
The debit operation of row the second business block chain, can determine whether that the probability of the debit operation for user across chain is bigger;As association less than
The operation of second business block chain business, then the probability of the second business block chain operation is lower.
As above, using activity classification prediction model prediction active user to the probability of the second business operation type;If there is
Associated services and first assessment pass through, then second assessment pass through, if without associated services, and prediction probability be greater than predetermined value,
Then the second assessment passes through;Other situations are determined as that the second assessment does not pass through, and authentication server will request failure information to be sent to
First service server.If risk assessment is by (i.e. second assessment pass through), then authentication server is by userspersonal information and upper
The operation requests information stated in step 2 is sent to the second service server.
Specifically, authentication service end can be used for defining user's credit assessment item, by total administrator in authentication server management
Backstage defines user's credit assessment project, and user's credit assessment project can be divided into user's qualification class, transaction shoe/promise breaking class, routine
Operate class or other more type definitions.Each type is defined, while defining corresponding score.
As one of embodiment, Rating Model of the invention can be with are as follows: the type is associated with user account
All front-end operations or business datum, by total administrator authentication server management backstage define most original type and with original
Beginning type association keyword (such as initial form be added shopping cart, associated keyword can for " adding purchase " or " do shopping
Vehicle " etc. obtains front-end operations, such as comprising this class keywords when, be denoted as " addition shopping cart " type) with corresponding raw score,
And corresponding business score growth ratio (such as: one value of sale is for 10000 yuan of the corresponding raw score of cargo
0.1, then it, then can score=downward rounding (23000/10000) * when user sells the cargo that a value is 23000 yuan
0.1), as current business be not related to amount (such as: user only carried out addition shopping cart operation, then be scored at original point).
Initially total administrator defines the basis letters such as the score growth ratio of initial form, associated keyword, raw score, corresponding business
Breath, and a default score is defined, complete the basic data of activity classification prediction model.After getting user's operation, automatic
With basic data, be such as matched to initial form or associated keyword, then defining this action type is current initial form, and
It gives and scores.As matched less than initial form and associated keyword, then thus action type automatically creates a same type
Initial form, scoring is for the time being default score predetermined, and total administrator is notified to handle in time, total administrator terminal is received
To after handling information, corrigendum in time defines the score growth ratio of initial form, associated keyword, raw score, corresponding business
The basic informations such as example, this basic data of operation by definition of user update.
The type and score of definition are broadcast to each running node by authenticating block chain.Such as: authentication server obtains
To user's qualification information, the scoring of enterprise qualification class can be defined to it.Such as: user can touch in the operation behavior of each step of each platform
Block chain scoring is sent out, specifically: block chain scoring monitors user's operation in real time, and purchase is added as user operates in platform
Object vehicle, then front end judges to be added shopping cart for routine operation class, then triggers block chain scoring, the user's operation letter that will acquire
Breath imports Rating Model, and record user is added the information such as shopping cart operation, operating time, user information and uploads to authentication block
Chain authenticates the scoring of block chain according to operation code of points predetermined, the scoring of corresponding record user's operation.It is former according to this
Reason record user is in each operation of each platform and score information.
Above-mentioned two steps assessment can carry out different definition according to different business.Different business, the business operation of definition
Scoring assessed value it is different, such as, new business is that general user can operate, then, corresponding, the first step
Assessment requirement can suitably reduce.This is those skilled in the art under the inspiration of technical solution of the present invention, according to reality
What application demand can be adjusted, still belong to the protection category of the present invention program.
7. the second service server carries out authentication to requesting party user again after risk assessment passes through.
After second service server receives on block chain business operation request and userspersonal information, inquiry user
People's information whether there is the second identity public key of the system user, case1: such as inquiring and there are no the second identity public affairs
Key then generates the second identity public key for applying for second identity public key and requests, and by the operation requests information, user
Personal information and second identity public key request are sent to authentication server;Case2: such as inquire that there are second identity
Public key carries out step 8.
The method and above-mentioned steps 2 and 3 of the second identity public key of verification method and generation with the presence or absence of the second identity public key
It is identical, that is, it is identical with the first service server that the second service server veritifies process to the identity of user, identity veritify pass through or
Process flow after obstructed is also identical as the first service server, and details are not described herein.
8. the second service server responds the business operation request after risk assessment and identity veritification all pass through, and
Response results are sent to user, the first service server and authentication server by the second business block chain;The result of response
It is the execution of business application of the user in the second business block chain, and implementing result is sent to use by the second business block chain
With no restrictions, different business block chains executes for family, the first service server and authentication server, specifically what implementing result
Result it is different.
Methods of risk assessment provided by the invention across chain operation, it is first after the operation requests for receiving user requesting party
User identity veritification is first carried out, is grasped to avoid there is user account by the machine of other people steal-number or hacker attack, system fault
The operation of work etc. non-user subjectivity behavior is further carried out operational risk and comments after the first step excludes non-subjective operational risk
Estimate, after risk assessment passes through and before business operation execution, verifies user identity, again to avoid the occurrence of bad prestige as far as possible
Potential risk brought by user.
Based on the methods of risk assessment provided in this embodiment across chain operation, the business from different blocks chain can be asked
Carry out risk assessment is asked, consequently facilitating a variety of electric business platforms or transaction related platform or other types platform are docked, it can be simultaneously
Manage the credit assessment of the user from different platform system;And user's prestige is updated by block chain Technique dynamic, into
And business risk can be efficiently controlled.
It is further to note that those of ordinary skill in the art will appreciate that: realize the above method implement whole or
This can be accomplished by hardware associated with program instructions for part steps, and foregoing routine instruction can store computer-readable in one
In storage medium or storage equipment, the program instruction when being executed, the step of executing above-mentioned methods of risk assessment;And aforementioned storage
Medium or storage equipment include but is not limited to: the various media that can store program code such as ROM, RAM, disk or CD.
Therefore correspondingly, the embodiment of the invention also provides a kind of computer readable storage devices, are stored with computer journey
Sequence, the computer program are executed by processor to realize above-mentioned methods of risk assessment.
Further, the present invention is also mating provides a kind of corresponding mobile terminal, system to realize above-mentioned risk assessment
Method, specifically:
A kind of mobile terminal, comprising:
Processor is adapted for carrying out program instruction;
Equipment is stored, storage program instruction is suitable for, described program instruction is suitable for being loaded by processor and being executed on to realize
State methods of risk assessment.
A kind of risk evaluating system across chain operation, including server;Server includes processor and storage equipment;
Processor is adapted for carrying out program instruction;
Equipment is stored, storage program instruction is suitable for, described program instruction is suitable for being loaded by processor and being executed on to realize
State methods of risk assessment.
The above is only a preferred embodiment of the present invention, for those of ordinary skill in the art, according to the present invention
Thought, there will be changes in the specific implementation manner and application range, and the content of the present specification should not be construed as to the present invention
Limitation.
Claims (9)
1. a kind of methods of risk assessment across chain operation characterized by comprising
Business operation solicited message, request the second service area of operation are sent to the first service server by the first business block chain
Block chain business;
The solicited message is sent to authentication server by the first service server;
The identity that authentication server carries out service request side is veritified;
When identity veritifies failure, operation requests failure information is returned to the first service server;
When identity is veritified successfully, risk assessment is carried out to requested business operation;Risk assessment includes the first assessment and the
Two assessments;
When risk assessment does not pass through, authentication server will request failure information to be sent to the first service server;When risk is commented
Estimate by when, the operation requests information is sent to the second service server by authentication server;
After second service server receives operation requests information, the identity for carrying out service request side is veritified, and identity veritification passes through
Afterwards, then the operation requests are responded, corresponding business operation is executed;
When identity veritifies failure, then request failure information is returned.
2. methods of risk assessment according to claim 1, which is characterized in that the first assessment includes downloading and the second business
The score data of the associated type of service of block chain type of service carries out scoring assessment, and scoring score is greater than or equal to predetermined value,
Then the first assessment passes through;Otherwise the first assessment does not pass through.
3. methods of risk assessment according to claim 1, which is characterized in that the second assessment includes, using SOM clustering
Method clusters the operation history of requesting party, using deep neural network method, establishes activity classification according to cluster result
Prediction model, the probability for carrying out business operation to service request side are predicted.
4. methods of risk assessment according to claim 3, which is characterized in that second assessment further include, to cluster result into
Row association analysis assesses service request side pair using the business association relationship of the first business block chain and the second business block chain
The evolutionary operator probability of second business block chain business.
5. methods of risk assessment according to claim 4, which is characterized in that further include being associated to cluster result
In analysis, if the second business block chain there is business associated with the first business block chain and the first assessment passes through, the
Two assessments pass through, if business associated with the first business block chain is not present in the second business block chain, and activity classification is pre-
It surveys model and predetermined value is greater than to the prediction probability of the second business operation type, then the second assessment passes through;Other situations are determined as
Second assessment does not pass through.
6. methods of risk assessment according to claim 1, which is characterized in that the Rating Model of risk assessment is to define base
Plinth data, basic data include: that the score of primitive operation type, associated keyword, raw score and corresponding business increases ratio
Example, default score;
Obtain business operation, and Auto-matching basic data;
It is such as matched to primitive operation type or associated keyword, then defining this action type is the initial form, and is given
Corresponding scoring;
As matched less than primitive operation type and associated keyword, then action type automatically creates a same type thus
Initial form scores as default score predetermined;
The action type of definition and score are broadcast to each running node by authenticating block chain.
7. a kind of computer readable storage devices, are stored with computer program, which is characterized in that the computer program is processed
Device is executed to realize methods of risk assessment described in claim 1 to 6 any one.
8. a kind of mobile terminal characterized by comprising
Processor is adapted for carrying out program instruction;
Equipment is stored, storage program instruction is suitable for, described program instruction is suitable for being loaded by processor and being executed to realize that right is wanted
Seek methods of risk assessment described in 1 to 6 any one.
9. a kind of risk evaluating system across chain operation, which is characterized in that including server;
Server includes processor and storage equipment;
Processor is adapted for carrying out program instruction;
Equipment is stored, storage program instruction is suitable for, described program instruction is suitable for being loaded by processor and being executed to realize that right is wanted
Seek methods of risk assessment described in 1 to 6 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910786331.5A CN110519261B (en) | 2019-08-23 | 2019-08-23 | Risk assessment method for cross-chain operation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910786331.5A CN110519261B (en) | 2019-08-23 | 2019-08-23 | Risk assessment method for cross-chain operation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110519261A true CN110519261A (en) | 2019-11-29 |
CN110519261B CN110519261B (en) | 2021-11-19 |
Family
ID=68626739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910786331.5A Active CN110519261B (en) | 2019-08-23 | 2019-08-23 | Risk assessment method for cross-chain operation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110519261B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110912712A (en) * | 2019-12-18 | 2020-03-24 | 东莞市大易产业链服务有限公司 | Service operation risk authentication method and system based on block chain |
CN112132198A (en) * | 2020-09-16 | 2020-12-25 | 建信金融科技有限责任公司 | Data processing method, device and system and server |
CN112163845A (en) * | 2020-09-29 | 2021-01-01 | 深圳前海微众银行股份有限公司 | Cross-block-chain transaction identity confirmation method and device |
CN112184190A (en) * | 2020-09-21 | 2021-01-05 | 支付宝(杭州)信息技术有限公司 | Service processing method and device based on block chain |
CN112288566A (en) * | 2020-10-20 | 2021-01-29 | 杭州云象网络技术有限公司 | Cross-chain transaction abnormity detection and early warning method and system based on deep neural network |
CN114139203A (en) * | 2021-12-03 | 2022-03-04 | 成都信息工程大学 | Block chain-based heterogeneous identity alliance risk assessment system and method and terminal |
CN114567451A (en) * | 2020-11-27 | 2022-05-31 | 腾讯科技(深圳)有限公司 | Identity verification method, identity verification device, computer equipment and storage medium |
CN114662147A (en) * | 2022-03-24 | 2022-06-24 | 云南电网有限责任公司信息中心 | Private information retrieval method and system suitable for large-scale database |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN108600301A (en) * | 2018-03-08 | 2018-09-28 | 青岛墨客区块链有限公司 | A kind of across chain method between block chain and main block chain |
CN109040068A (en) * | 2018-08-02 | 2018-12-18 | 中国联合网络通信集团有限公司 | Strange land authentication method, authentication server and the block chain of broadband user |
CN109257342A (en) * | 2018-09-04 | 2019-01-22 | 阿里巴巴集团控股有限公司 | Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain |
CN109327473A (en) * | 2018-12-03 | 2019-02-12 | 北京工业大学 | A kind of identity identifying method based on block chain technology |
US20190149537A1 (en) * | 2016-03-04 | 2019-05-16 | ShoCard, Inc. | Method and system for authenticated login using static or dynamic codes |
CN109784051A (en) * | 2018-12-29 | 2019-05-21 | 360企业安全技术(珠海)有限公司 | Protecting information safety method, device and equipment |
-
2019
- 2019-08-23 CN CN201910786331.5A patent/CN110519261B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190149537A1 (en) * | 2016-03-04 | 2019-05-16 | ShoCard, Inc. | Method and system for authenticated login using static or dynamic codes |
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN108600301A (en) * | 2018-03-08 | 2018-09-28 | 青岛墨客区块链有限公司 | A kind of across chain method between block chain and main block chain |
CN109040068A (en) * | 2018-08-02 | 2018-12-18 | 中国联合网络通信集团有限公司 | Strange land authentication method, authentication server and the block chain of broadband user |
CN109257342A (en) * | 2018-09-04 | 2019-01-22 | 阿里巴巴集团控股有限公司 | Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain |
CN109327473A (en) * | 2018-12-03 | 2019-02-12 | 北京工业大学 | A kind of identity identifying method based on block chain technology |
CN109784051A (en) * | 2018-12-29 | 2019-05-21 | 360企业安全技术(珠海)有限公司 | Protecting information safety method, device and equipment |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110912712A (en) * | 2019-12-18 | 2020-03-24 | 东莞市大易产业链服务有限公司 | Service operation risk authentication method and system based on block chain |
CN110912712B (en) * | 2019-12-18 | 2022-03-08 | 东莞市大易产业链服务有限公司 | Service operation risk authentication method and system based on block chain |
CN112132198A (en) * | 2020-09-16 | 2020-12-25 | 建信金融科技有限责任公司 | Data processing method, device and system and server |
CN112132198B (en) * | 2020-09-16 | 2021-06-04 | 建信金融科技有限责任公司 | Data processing method, device and system and server |
CN112184190A (en) * | 2020-09-21 | 2021-01-05 | 支付宝(杭州)信息技术有限公司 | Service processing method and device based on block chain |
CN112163845A (en) * | 2020-09-29 | 2021-01-01 | 深圳前海微众银行股份有限公司 | Cross-block-chain transaction identity confirmation method and device |
CN112163845B (en) * | 2020-09-29 | 2024-03-22 | 深圳前海微众银行股份有限公司 | Transaction identity confirmation method and device for cross-region block chain |
CN112288566B (en) * | 2020-10-20 | 2024-01-19 | 杭州云象网络技术有限公司 | Cross-chain transaction anomaly detection and early warning method and system based on deep neural network |
CN112288566A (en) * | 2020-10-20 | 2021-01-29 | 杭州云象网络技术有限公司 | Cross-chain transaction abnormity detection and early warning method and system based on deep neural network |
CN114567451A (en) * | 2020-11-27 | 2022-05-31 | 腾讯科技(深圳)有限公司 | Identity verification method, identity verification device, computer equipment and storage medium |
CN114567451B (en) * | 2020-11-27 | 2023-05-05 | 腾讯科技(深圳)有限公司 | Identity verification method, identity verification device, computer equipment and storage medium |
CN114139203A (en) * | 2021-12-03 | 2022-03-04 | 成都信息工程大学 | Block chain-based heterogeneous identity alliance risk assessment system and method and terminal |
CN114662147A (en) * | 2022-03-24 | 2022-06-24 | 云南电网有限责任公司信息中心 | Private information retrieval method and system suitable for large-scale database |
Also Published As
Publication number | Publication date |
---|---|
CN110519261B (en) | 2021-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110519261A (en) | A kind of methods of risk assessment across chain operation | |
CN111428881B (en) | Recognition model training method, device, equipment and readable storage medium | |
CN108055138B (en) | Block chain-based application distribution recording method and system | |
US20230045378A1 (en) | Non-repeatable challenge-response authentication | |
US7539746B2 (en) | Highly available transaction failure detection and recovery for electronic commerce transactions | |
CN101764819B (en) | For detecting the method and system of man-in-the-browser attacks | |
US7721336B1 (en) | Systems and methods for dynamic detection and prevention of electronic fraud | |
CN109949135A (en) | High concurrent transaction request processing method, system, equipment and storage medium | |
CN111415163B (en) | Block chain-based service processing and verifying method, system and verifying node | |
CN109344583B (en) | Threshold determination and body verification method and device, electronic equipment and storage medium | |
CN109257334A (en) | A kind of data chain loading system, method and storage medium based on block chain | |
CN110912712A (en) | Service operation risk authentication method and system based on block chain | |
US9292793B1 (en) | Analyzing device similarity | |
CN112966168B (en) | Business label query method and device for realizing privacy protection | |
CN105786581A (en) | Multistage server and method for network data operation | |
CN114219490A (en) | Transaction behavior data updating method, device, equipment and storage medium | |
CN108961034A (en) | System and method, storage medium based on user behavior certification | |
CN112187471A (en) | Data copying method, system and medium based on block chain and intelligent contract | |
CN111901321A (en) | Authentication method, device, electronic equipment and readable storage medium | |
WO2022251513A1 (en) | Method, device, and system of digital identity authentication | |
US11037146B2 (en) | Managing product returns associated with a user device | |
CN111444484B (en) | Enterprise intranet user identity portrait processing method based on unified login management | |
CN111444530B (en) | System data access authority control method and device based on block chain and modules | |
CN105635156B (en) | A kind of large-scale distributed financial terminal system | |
EP3879418B1 (en) | Identity verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523000 room 1301, unit 2, building 4, Tian'an Digital City, No. 1, Huangjin Road, Nancheng street, Dongguan City, Guangdong Province Applicant after: Dongguan Mengda Group Co.,Ltd. Address before: Room 701-703, 7th floor, Goldman Sachs technology building, phase II, Goldman Sachs Technology Park, 5 Longxi Road, Zhouxi, Nancheng District, Dongguan City, Guangdong Province, 523000 Applicant before: DONGGUAN MENGDA PLASTICIZING SCIENCE & TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |