CN110519261A - A kind of methods of risk assessment across chain operation - Google Patents

A kind of methods of risk assessment across chain operation Download PDF

Info

Publication number
CN110519261A
CN110519261A CN201910786331.5A CN201910786331A CN110519261A CN 110519261 A CN110519261 A CN 110519261A CN 201910786331 A CN201910786331 A CN 201910786331A CN 110519261 A CN110519261 A CN 110519261A
Authority
CN
China
Prior art keywords
business
assessment
block chain
risk assessment
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910786331.5A
Other languages
Chinese (zh)
Other versions
CN110519261B (en
Inventor
章志容
李实�
彭添才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DONGGUAN MENGDA PLASTICIZING TECHNOLOGY Co Ltd
Original Assignee
DONGGUAN MENGDA PLASTICIZING TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DONGGUAN MENGDA PLASTICIZING TECHNOLOGY Co Ltd filed Critical DONGGUAN MENGDA PLASTICIZING TECHNOLOGY Co Ltd
Priority to CN201910786331.5A priority Critical patent/CN110519261B/en
Publication of CN110519261A publication Critical patent/CN110519261A/en
Application granted granted Critical
Publication of CN110519261B publication Critical patent/CN110519261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/147Network analysis or design for predicting network behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention relates to block chain technical fields, specifically disclose a kind of methods of risk assessment across chain operation, comprising: send business operation solicited message, request the second business block chain business of operation to the first service server;Authentication server carries out identity veritification, and identity carries out risk assessment after veritifying successfully, including the first assessment and the second assessment, risk assessment carry out identity veritification by rear second service server again, corresponding business then executed after veritifying successfully.The present invention can carry out risk assessment to the service request from different blocks chain, consequently facilitating docking a variety of electric business platforms or transaction related platform or other types platform, can manage the credit assessment of the user from different platform system simultaneously;And user's prestige is updated by block chain Technique dynamic, and then business risk can be efficiently controlled.

Description

A kind of methods of risk assessment across chain operation
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of methods of risk assessment across chain operation.
Background technique
As the application of block chain technology is more universal, wherein the problem of also with.The behaviour carried out under block chain Make whether to be really the operation of user's actual wishes;Even user's actual wishes, operation is with the presence or absence of risk or what brings Risk;These problems are all in need of consideration.It is therein potential especially for the operation for intersecting progress under different blocks chain Risk can be more.Whether these risks can be estimated in advance, and it is improper to occur to avoid subsequent operation.These problems are all urgently It is to be solved.
Summary of the invention
In order to solve problem existing in the prior art, the purpose of the present invention is to provide a kind of effectively across chain operation Methods of risk assessment.
To achieve the above object, the present invention uses following scheme.
A kind of methods of risk assessment across chain operation, comprising:
Business operation solicited message, request the second industry of operation are sent to the first service server by the first business block chain Business block chain business;
The solicited message is sent to authentication server by the first service server;
The identity that authentication server carries out service request side is veritified;
When identity veritifies failure, operation requests failure information is returned to the first service server;
When identity is veritified successfully, risk assessment is carried out to requested business operation;Risk assessment includes the first assessment With the second assessment;
When risk assessment does not pass through, authentication server will request failure information to be sent to the first service server;
When risk assessment passes through, the operation requests information is sent to the second service server by authentication server;
After second service server receives operation requests information, the identity for carrying out service request side is veritified, and identity is veritified By rear, then the operation requests are responded, executes corresponding business operation;
When identity veritifies failure, then request failure information is returned.
As a preferred embodiment, the first assessment includes downloading and the second associated service class of business block chain type of service The score data of type carries out scoring assessment, and scoring score is greater than or equal to predetermined value, then the first assessment passes through;Otherwise the first assessment Do not pass through.
Further, the second assessment includes being clustered using operation history of the SOM clustering method to requesting party, Using deep neural network method, activity classification prediction model is established according to cluster result, business operation is carried out to requesting party Probability is predicted.
As a preferred embodiment, the second assessment further includes being associated analysis to cluster result, utilizes the first business block The business association relationship of chain and the second business block chain assesses requesting party to the evolutionary operator probability of the second business block chain.
It specifically, further include being associated in analysis to cluster result, if the second business block chain exists and first The associated business of business block chain and first assessment pass through, then second assessment pass through, if the second business block chain is not present Business associated with the first business block chain, and activity classification prediction model is big to the prediction probability of the second business operation type In predetermined value, then the second assessment passes through;Other situations are determined as that the second assessment does not pass through.
Preferably, the Rating Model of risk assessment is,
Define basic data, comprising: primitive operation type, associated keyword, raw score and the score for corresponding to business Growth ratio, default score;
Obtain business operation, and Auto-matching basic data;
Such as be matched to primitive operation type or associated keyword, then defining this action type is the initial form, and Give corresponding scoring;
If match less than primitive operation type and associated keyword, then thus action type automatically create one it is similar The initial form of type scores as default score predetermined;
The action type of definition and score are broadcast to each running node by authenticating block chain.
Methods of risk assessment across chain operation of the invention can be used computer program and realize automatically, therefore the present invention also mentions A kind of computer readable storage devices have been supplied, computer program is stored with, the computer program is executed by processor to realize The methods of risk assessment.
Meanwhile the present invention also provides corresponding terminal, systems to realize above-mentioned methods of risk assessment.
Beneficial effects of the present invention: the present invention provides a kind of methods of risk assessment across chain operation, are receiving user After the operation requests of requesting party, progress user identity veritification first, to avoid there is user account by other people steal-number or hacker The operation of attack, the machine operation of system fault etc. non-user subjectivity behavior, after the first step excludes non-subjective operational risk, then Further progress operational risk assessment verifies user identity after risk assessment passes through and before business operation execution again, with Potential risk brought by bad prestige user is avoided the occurrence of as far as possible.
Methods of risk assessment across chain operation of the invention can carry out risk to the service request from different blocks chain Assessment can manage consequently facilitating docking a variety of electric business platforms or transaction related platform or other types platform from not simultaneously With the credit assessment of the user of plateform system;And user's prestige is updated by block chain Technique dynamic, and then can be effective Ground controls business risk.
Specific embodiment
For the ease of the understanding of those skilled in the art, below with reference to embodiment, the present invention is further illustrated, real The content that the mode of applying refers to not is limitation of the invention.
Due to the decentralization of block chain technology, it characteristics, more and more plateform systems such as can not distort and all using.It is right For identical platform system, the prestige of user is using unified management, and when user carries out business operation, affiliated platform can be to it Carry out risk assessment.And when user needs cross platform system to carry out business operation, that is, transregional piece of chain carries out business operation, then Need a kind of methods of risk assessment across chain operation.
In this regard, the embodiment of the invention provides a kind of methods of risk assessment across chain operation, method includes the following steps.
When the user under the first business block chain needs to operate the business of the second business block chain, then user Ke Tong It crosses the first business block chain and requests operation the second business block chain business (such as the first service server to the first service server For warehousing server, the second service server is that goods gives as security service server etc., can be two industry of business association Business server, but it is not limited to relevance business);Authentication server carries out authentication, credit accreditation etc. to user, and certification is logical It crosses, then Authorized operation, and feeds back to the second service server.Specifically, including as follows.
1. user terminal sends business operation solicited message by the first business block chain, solicited message includes operation requests And personal information.
2. inquiring user after the first service server receives on block chain business operation request and userspersonal information Personal information whether there is the first identity public key of system user;Case1: such as inquiring and there is no first identity public key, It then generates the first identity public key for applying for first identity public key to request, and the operation requests information, user is a People's information and first identity public key request are sent to authentication server;Case2: it is public such as to inquire that there are first identity The operation requests information, userspersonal information and first identity public key are then sent to authentication server by key.
Authentication server inquires userspersonal information with the presence or absence of the method for the first identity public key of system user are as follows: authentication The block cryptographic Hash in first public key request data described in server by utilizing finds first from the authentication block chain Authorization data carries out identity validation using first authorization data and the first public key request data;At this point it is possible to by institute It states the first core body mark for including in the first authorization data and the first public key request data to be matched, can also incite somebody to action The cryptographic Hash for the user identifier for including in first authorization data and the first public key request data is matched, also The the first core body for including in first authorization data and the first public key request data can be identified and the use The cryptographic Hash of family mark matches etc..The needs for including in first authorization data and the first public key request data When matched data successful match, then determine that the first identity public key exists;Otherwise, then determine that the first identity public key does not exist.
3. authentication server receives the operation requests information, userspersonal information and first identity public key request Afterwards, the first identity public key of response is requested, and the first identity that identity veritification is carried out to obtain the user is veritified request and corresponded to The first core body mark, by the first identity veritify request be sent to user terminal.
4. user terminal receives after the first identity veritifies request, the first identity of response veritifies request, acquires corresponding the One core body data (such as fingerprint, face information, iris information etc.), generated using private key generator comprising the first identity public key and First private key pair of the first identity private key, and the first signed data is signed using the first identity private key to obtain the first private key First private key signature data, the first identity public key and the first core body data are sent to authentication server by signed data.
5. authentication server receives the first private key signature of user data, the first identity public key and the first core body data Afterwards, identity veritification is carried out to user using the first core body data by the first authorization data cochain and to deposit after veritifying successfully It stores up on the authentication block chain in authentication server;And requested according to first identity public key, it is public to obtain corresponding first Key data, and first public key data is sent to the first service server, wherein first authorization data includes described First private key signature data, first identity public key, the first core body data, the first core body mark, the system The cryptographic Hash and timestamp of the user identifier of user, the first public key request data include that the first core body identifies, is described The corresponding block cryptographic Hash of the cochain block of the cryptographic Hash of the user identifier of system user and first authorization data.
And when user identity verification is unsuccessful, then it is asked to the operation that the first service server returns to the second business block chain Failure news is sought, the first service server relays to user terminal.
6. then further being carried out to the requested business operation of user after being authenticated to user, confirming user identity Risk assessment.
Specifically, the authentication server obtained from other third party systems user's reference information, user is in the first industry Business on business block chain, the second business block chain or/and other more business block chains such as is honoured an agreement/breaks a contract at the transaction letters of generations With information, user identity authentication and user's qualification information etc..Authentication server passes through storage magnanimity, all kinds of complex data class The structural data and unstructured data of type, and distributed frame memory mechanism and execution mechanism are used, to storage integration Data afterwards carry out analyses and comparison processing.
Also, pass through depth convolutional neural networks, autocoder, recurrent neural network and deepness belief network even depth Learning art analyzes the relationship between data, automatically analyzes service creation event early warning letter by multifactor superposition event model Breath, and then predict user in the existing risk of all kinds of business operations.
In embodiments of the present invention, risk assessment includes the first assessment and the second assessment.
First assessment: the authentication server is to aforesaid operations solicited message, after being veritified by the first identity public key, authentication Server carries out credit and risk assessment to the second business of current user operation;For the second different business block chain service class Type, the score data for downloading the type of service (without limitation) that the second business block chain type of service is associated on scoring block carry out Class etc. is carried out/broken a contract to scoring assessment, such as enterprise qualification class, enterprise, and scoring score is greater than or equal to predetermined value, then the first assessment is logical It crosses.If the second business block chain type of service does not have the scoring of associated any type of service, then need in the second assessment Comprehensive consideration is assessed again.Otherwise the first assessment does not pass through.
Second assessment: for the user's operation of authentication block, analysis module goes through user's operation with SOM clustering method History is clustered, and using deep neural network method, establishes activity classification prediction model according to cluster result, passes through depth nerve Stable activity classification prediction model is established in a large amount of training of network, and the probability for carrying out business operation to user is predicted.Its In, including the association analysis to cluster result: such as user continually carries out the merchandise sales of the first business block chain, then foundation The case where fund chain relation, user is likely to occur funds shortage, then being associated with user by a large amount of merchandise sales of user may be into The debit operation of row the second business block chain, can determine whether that the probability of the debit operation for user across chain is bigger;As association less than The operation of second business block chain business, then the probability of the second business block chain operation is lower.
As above, using activity classification prediction model prediction active user to the probability of the second business operation type;If there is Associated services and first assessment pass through, then second assessment pass through, if without associated services, and prediction probability be greater than predetermined value, Then the second assessment passes through;Other situations are determined as that the second assessment does not pass through, and authentication server will request failure information to be sent to First service server.If risk assessment is by (i.e. second assessment pass through), then authentication server is by userspersonal information and upper The operation requests information stated in step 2 is sent to the second service server.
Specifically, authentication service end can be used for defining user's credit assessment item, by total administrator in authentication server management Backstage defines user's credit assessment project, and user's credit assessment project can be divided into user's qualification class, transaction shoe/promise breaking class, routine Operate class or other more type definitions.Each type is defined, while defining corresponding score.
As one of embodiment, Rating Model of the invention can be with are as follows: the type is associated with user account All front-end operations or business datum, by total administrator authentication server management backstage define most original type and with original Beginning type association keyword (such as initial form be added shopping cart, associated keyword can for " adding purchase " or " do shopping Vehicle " etc. obtains front-end operations, such as comprising this class keywords when, be denoted as " addition shopping cart " type) with corresponding raw score, And corresponding business score growth ratio (such as: one value of sale is for 10000 yuan of the corresponding raw score of cargo 0.1, then it, then can score=downward rounding (23000/10000) * when user sells the cargo that a value is 23000 yuan 0.1), as current business be not related to amount (such as: user only carried out addition shopping cart operation, then be scored at original point). Initially total administrator defines the basis letters such as the score growth ratio of initial form, associated keyword, raw score, corresponding business Breath, and a default score is defined, complete the basic data of activity classification prediction model.After getting user's operation, automatic With basic data, be such as matched to initial form or associated keyword, then defining this action type is current initial form, and It gives and scores.As matched less than initial form and associated keyword, then thus action type automatically creates a same type Initial form, scoring is for the time being default score predetermined, and total administrator is notified to handle in time, total administrator terminal is received To after handling information, corrigendum in time defines the score growth ratio of initial form, associated keyword, raw score, corresponding business The basic informations such as example, this basic data of operation by definition of user update.
The type and score of definition are broadcast to each running node by authenticating block chain.Such as: authentication server obtains To user's qualification information, the scoring of enterprise qualification class can be defined to it.Such as: user can touch in the operation behavior of each step of each platform Block chain scoring is sent out, specifically: block chain scoring monitors user's operation in real time, and purchase is added as user operates in platform Object vehicle, then front end judges to be added shopping cart for routine operation class, then triggers block chain scoring, the user's operation letter that will acquire Breath imports Rating Model, and record user is added the information such as shopping cart operation, operating time, user information and uploads to authentication block Chain authenticates the scoring of block chain according to operation code of points predetermined, the scoring of corresponding record user's operation.It is former according to this Reason record user is in each operation of each platform and score information.
Above-mentioned two steps assessment can carry out different definition according to different business.Different business, the business operation of definition Scoring assessed value it is different, such as, new business is that general user can operate, then, corresponding, the first step Assessment requirement can suitably reduce.This is those skilled in the art under the inspiration of technical solution of the present invention, according to reality What application demand can be adjusted, still belong to the protection category of the present invention program.
7. the second service server carries out authentication to requesting party user again after risk assessment passes through.
After second service server receives on block chain business operation request and userspersonal information, inquiry user People's information whether there is the second identity public key of the system user, case1: such as inquiring and there are no the second identity public affairs Key then generates the second identity public key for applying for second identity public key and requests, and by the operation requests information, user Personal information and second identity public key request are sent to authentication server;Case2: such as inquire that there are second identity Public key carries out step 8.
The method and above-mentioned steps 2 and 3 of the second identity public key of verification method and generation with the presence or absence of the second identity public key It is identical, that is, it is identical with the first service server that the second service server veritifies process to the identity of user, identity veritify pass through or Process flow after obstructed is also identical as the first service server, and details are not described herein.
8. the second service server responds the business operation request after risk assessment and identity veritification all pass through, and Response results are sent to user, the first service server and authentication server by the second business block chain;The result of response It is the execution of business application of the user in the second business block chain, and implementing result is sent to use by the second business block chain With no restrictions, different business block chains executes for family, the first service server and authentication server, specifically what implementing result Result it is different.
Methods of risk assessment provided by the invention across chain operation, it is first after the operation requests for receiving user requesting party User identity veritification is first carried out, is grasped to avoid there is user account by the machine of other people steal-number or hacker attack, system fault The operation of work etc. non-user subjectivity behavior is further carried out operational risk and comments after the first step excludes non-subjective operational risk Estimate, after risk assessment passes through and before business operation execution, verifies user identity, again to avoid the occurrence of bad prestige as far as possible Potential risk brought by user.
Based on the methods of risk assessment provided in this embodiment across chain operation, the business from different blocks chain can be asked Carry out risk assessment is asked, consequently facilitating a variety of electric business platforms or transaction related platform or other types platform are docked, it can be simultaneously Manage the credit assessment of the user from different platform system;And user's prestige is updated by block chain Technique dynamic, into And business risk can be efficiently controlled.
It is further to note that those of ordinary skill in the art will appreciate that: realize the above method implement whole or This can be accomplished by hardware associated with program instructions for part steps, and foregoing routine instruction can store computer-readable in one In storage medium or storage equipment, the program instruction when being executed, the step of executing above-mentioned methods of risk assessment;And aforementioned storage Medium or storage equipment include but is not limited to: the various media that can store program code such as ROM, RAM, disk or CD.
Therefore correspondingly, the embodiment of the invention also provides a kind of computer readable storage devices, are stored with computer journey Sequence, the computer program are executed by processor to realize above-mentioned methods of risk assessment.
Further, the present invention is also mating provides a kind of corresponding mobile terminal, system to realize above-mentioned risk assessment Method, specifically:
A kind of mobile terminal, comprising:
Processor is adapted for carrying out program instruction;
Equipment is stored, storage program instruction is suitable for, described program instruction is suitable for being loaded by processor and being executed on to realize State methods of risk assessment.
A kind of risk evaluating system across chain operation, including server;Server includes processor and storage equipment;
Processor is adapted for carrying out program instruction;
Equipment is stored, storage program instruction is suitable for, described program instruction is suitable for being loaded by processor and being executed on to realize State methods of risk assessment.
The above is only a preferred embodiment of the present invention, for those of ordinary skill in the art, according to the present invention Thought, there will be changes in the specific implementation manner and application range, and the content of the present specification should not be construed as to the present invention Limitation.

Claims (9)

1. a kind of methods of risk assessment across chain operation characterized by comprising
Business operation solicited message, request the second service area of operation are sent to the first service server by the first business block chain Block chain business;
The solicited message is sent to authentication server by the first service server;
The identity that authentication server carries out service request side is veritified;
When identity veritifies failure, operation requests failure information is returned to the first service server;
When identity is veritified successfully, risk assessment is carried out to requested business operation;Risk assessment includes the first assessment and the Two assessments;
When risk assessment does not pass through, authentication server will request failure information to be sent to the first service server;When risk is commented Estimate by when, the operation requests information is sent to the second service server by authentication server;
After second service server receives operation requests information, the identity for carrying out service request side is veritified, and identity veritification passes through Afterwards, then the operation requests are responded, corresponding business operation is executed;
When identity veritifies failure, then request failure information is returned.
2. methods of risk assessment according to claim 1, which is characterized in that the first assessment includes downloading and the second business The score data of the associated type of service of block chain type of service carries out scoring assessment, and scoring score is greater than or equal to predetermined value, Then the first assessment passes through;Otherwise the first assessment does not pass through.
3. methods of risk assessment according to claim 1, which is characterized in that the second assessment includes, using SOM clustering Method clusters the operation history of requesting party, using deep neural network method, establishes activity classification according to cluster result Prediction model, the probability for carrying out business operation to service request side are predicted.
4. methods of risk assessment according to claim 3, which is characterized in that second assessment further include, to cluster result into Row association analysis assesses service request side pair using the business association relationship of the first business block chain and the second business block chain The evolutionary operator probability of second business block chain business.
5. methods of risk assessment according to claim 4, which is characterized in that further include being associated to cluster result In analysis, if the second business block chain there is business associated with the first business block chain and the first assessment passes through, the Two assessments pass through, if business associated with the first business block chain is not present in the second business block chain, and activity classification is pre- It surveys model and predetermined value is greater than to the prediction probability of the second business operation type, then the second assessment passes through;Other situations are determined as Second assessment does not pass through.
6. methods of risk assessment according to claim 1, which is characterized in that the Rating Model of risk assessment is to define base Plinth data, basic data include: that the score of primitive operation type, associated keyword, raw score and corresponding business increases ratio Example, default score;
Obtain business operation, and Auto-matching basic data;
It is such as matched to primitive operation type or associated keyword, then defining this action type is the initial form, and is given Corresponding scoring;
As matched less than primitive operation type and associated keyword, then action type automatically creates a same type thus Initial form scores as default score predetermined;
The action type of definition and score are broadcast to each running node by authenticating block chain.
7. a kind of computer readable storage devices, are stored with computer program, which is characterized in that the computer program is processed Device is executed to realize methods of risk assessment described in claim 1 to 6 any one.
8. a kind of mobile terminal characterized by comprising
Processor is adapted for carrying out program instruction;
Equipment is stored, storage program instruction is suitable for, described program instruction is suitable for being loaded by processor and being executed to realize that right is wanted Seek methods of risk assessment described in 1 to 6 any one.
9. a kind of risk evaluating system across chain operation, which is characterized in that including server;
Server includes processor and storage equipment;
Processor is adapted for carrying out program instruction;
Equipment is stored, storage program instruction is suitable for, described program instruction is suitable for being loaded by processor and being executed to realize that right is wanted Seek methods of risk assessment described in 1 to 6 any one.
CN201910786331.5A 2019-08-23 2019-08-23 Risk assessment method for cross-chain operation Active CN110519261B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910786331.5A CN110519261B (en) 2019-08-23 2019-08-23 Risk assessment method for cross-chain operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910786331.5A CN110519261B (en) 2019-08-23 2019-08-23 Risk assessment method for cross-chain operation

Publications (2)

Publication Number Publication Date
CN110519261A true CN110519261A (en) 2019-11-29
CN110519261B CN110519261B (en) 2021-11-19

Family

ID=68626739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910786331.5A Active CN110519261B (en) 2019-08-23 2019-08-23 Risk assessment method for cross-chain operation

Country Status (1)

Country Link
CN (1) CN110519261B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912712A (en) * 2019-12-18 2020-03-24 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN112132198A (en) * 2020-09-16 2020-12-25 建信金融科技有限责任公司 Data processing method, device and system and server
CN112163845A (en) * 2020-09-29 2021-01-01 深圳前海微众银行股份有限公司 Cross-block-chain transaction identity confirmation method and device
CN112184190A (en) * 2020-09-21 2021-01-05 支付宝(杭州)信息技术有限公司 Service processing method and device based on block chain
CN112288566A (en) * 2020-10-20 2021-01-29 杭州云象网络技术有限公司 Cross-chain transaction abnormity detection and early warning method and system based on deep neural network
CN114139203A (en) * 2021-12-03 2022-03-04 成都信息工程大学 Block chain-based heterogeneous identity alliance risk assessment system and method and terminal
CN114567451A (en) * 2020-11-27 2022-05-31 腾讯科技(深圳)有限公司 Identity verification method, identity verification device, computer equipment and storage medium
CN114662147A (en) * 2022-03-24 2022-06-24 云南电网有限责任公司信息中心 Private information retrieval method and system suitable for large-scale database

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
CN108600301A (en) * 2018-03-08 2018-09-28 青岛墨客区块链有限公司 A kind of across chain method between block chain and main block chain
CN109040068A (en) * 2018-08-02 2018-12-18 中国联合网络通信集团有限公司 Strange land authentication method, authentication server and the block chain of broadband user
CN109257342A (en) * 2018-09-04 2019-01-22 阿里巴巴集团控股有限公司 Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain
CN109327473A (en) * 2018-12-03 2019-02-12 北京工业大学 A kind of identity identifying method based on block chain technology
US20190149537A1 (en) * 2016-03-04 2019-05-16 ShoCard, Inc. Method and system for authenticated login using static or dynamic codes
CN109784051A (en) * 2018-12-29 2019-05-21 360企业安全技术(珠海)有限公司 Protecting information safety method, device and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190149537A1 (en) * 2016-03-04 2019-05-16 ShoCard, Inc. Method and system for authenticated login using static or dynamic codes
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
CN108600301A (en) * 2018-03-08 2018-09-28 青岛墨客区块链有限公司 A kind of across chain method between block chain and main block chain
CN109040068A (en) * 2018-08-02 2018-12-18 中国联合网络通信集团有限公司 Strange land authentication method, authentication server and the block chain of broadband user
CN109257342A (en) * 2018-09-04 2019-01-22 阿里巴巴集团控股有限公司 Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain
CN109327473A (en) * 2018-12-03 2019-02-12 北京工业大学 A kind of identity identifying method based on block chain technology
CN109784051A (en) * 2018-12-29 2019-05-21 360企业安全技术(珠海)有限公司 Protecting information safety method, device and equipment

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912712A (en) * 2019-12-18 2020-03-24 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN110912712B (en) * 2019-12-18 2022-03-08 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN112132198A (en) * 2020-09-16 2020-12-25 建信金融科技有限责任公司 Data processing method, device and system and server
CN112132198B (en) * 2020-09-16 2021-06-04 建信金融科技有限责任公司 Data processing method, device and system and server
CN112184190A (en) * 2020-09-21 2021-01-05 支付宝(杭州)信息技术有限公司 Service processing method and device based on block chain
CN112163845A (en) * 2020-09-29 2021-01-01 深圳前海微众银行股份有限公司 Cross-block-chain transaction identity confirmation method and device
CN112163845B (en) * 2020-09-29 2024-03-22 深圳前海微众银行股份有限公司 Transaction identity confirmation method and device for cross-region block chain
CN112288566B (en) * 2020-10-20 2024-01-19 杭州云象网络技术有限公司 Cross-chain transaction anomaly detection and early warning method and system based on deep neural network
CN112288566A (en) * 2020-10-20 2021-01-29 杭州云象网络技术有限公司 Cross-chain transaction abnormity detection and early warning method and system based on deep neural network
CN114567451A (en) * 2020-11-27 2022-05-31 腾讯科技(深圳)有限公司 Identity verification method, identity verification device, computer equipment and storage medium
CN114567451B (en) * 2020-11-27 2023-05-05 腾讯科技(深圳)有限公司 Identity verification method, identity verification device, computer equipment and storage medium
CN114139203A (en) * 2021-12-03 2022-03-04 成都信息工程大学 Block chain-based heterogeneous identity alliance risk assessment system and method and terminal
CN114662147A (en) * 2022-03-24 2022-06-24 云南电网有限责任公司信息中心 Private information retrieval method and system suitable for large-scale database

Also Published As

Publication number Publication date
CN110519261B (en) 2021-11-19

Similar Documents

Publication Publication Date Title
CN110519261A (en) A kind of methods of risk assessment across chain operation
CN111428881B (en) Recognition model training method, device, equipment and readable storage medium
CN108055138B (en) Block chain-based application distribution recording method and system
US20230045378A1 (en) Non-repeatable challenge-response authentication
US7539746B2 (en) Highly available transaction failure detection and recovery for electronic commerce transactions
CN101764819B (en) For detecting the method and system of man-in-the-browser attacks
US7721336B1 (en) Systems and methods for dynamic detection and prevention of electronic fraud
CN109949135A (en) High concurrent transaction request processing method, system, equipment and storage medium
CN111415163B (en) Block chain-based service processing and verifying method, system and verifying node
CN109344583B (en) Threshold determination and body verification method and device, electronic equipment and storage medium
CN109257334A (en) A kind of data chain loading system, method and storage medium based on block chain
CN110912712A (en) Service operation risk authentication method and system based on block chain
US9292793B1 (en) Analyzing device similarity
CN112966168B (en) Business label query method and device for realizing privacy protection
CN105786581A (en) Multistage server and method for network data operation
CN114219490A (en) Transaction behavior data updating method, device, equipment and storage medium
CN108961034A (en) System and method, storage medium based on user behavior certification
CN112187471A (en) Data copying method, system and medium based on block chain and intelligent contract
CN111901321A (en) Authentication method, device, electronic equipment and readable storage medium
WO2022251513A1 (en) Method, device, and system of digital identity authentication
US11037146B2 (en) Managing product returns associated with a user device
CN111444484B (en) Enterprise intranet user identity portrait processing method based on unified login management
CN111444530B (en) System data access authority control method and device based on block chain and modules
CN105635156B (en) A kind of large-scale distributed financial terminal system
EP3879418B1 (en) Identity verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523000 room 1301, unit 2, building 4, Tian'an Digital City, No. 1, Huangjin Road, Nancheng street, Dongguan City, Guangdong Province

Applicant after: Dongguan Mengda Group Co.,Ltd.

Address before: Room 701-703, 7th floor, Goldman Sachs technology building, phase II, Goldman Sachs Technology Park, 5 Longxi Road, Zhouxi, Nancheng District, Dongguan City, Guangdong Province, 523000

Applicant before: DONGGUAN MENGDA PLASTICIZING SCIENCE & TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant