CN110738481A - Digital asset hosting risk control method, device and storage medium - Google Patents
Digital asset hosting risk control method, device and storage medium Download PDFInfo
- Publication number
- CN110738481A CN110738481A CN201910901368.8A CN201910901368A CN110738481A CN 110738481 A CN110738481 A CN 110738481A CN 201910901368 A CN201910901368 A CN 201910901368A CN 110738481 A CN110738481 A CN 110738481A
- Authority
- CN
- China
- Prior art keywords
- transaction
- identity authentication
- authentication
- wind control
- contract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides digital asset hosting risk control methods, equipment and storage media, wherein the method comprises the steps of responding to a current user's rate-raising operation, generating a rate-raising transaction and sending the rate-raising transaction to a node of a block chain for broadcasting, packaging and executing through a contract, recording the rate-raising transaction on the block chain, accessing a third-party identity authentication distributed application for identity authentication, generating an identity authentication transaction after the identity authentication is completed by the third-party identity authentication distributed application and sending the identity authentication transaction to a node of a block chain for broadcasting, packaging and executing through a contract, generating a rate-raising result according to the rate-raising transaction and the identity authentication transaction to update the current user's rate-raising and record the current user's rate-raising result on the block chain, and acquiring the current user's rate-raising of money.
Description
Technical Field
The application relates to the technical field of internet finance, in particular to digital asset hosting risk control method, equipment and storage medium.
Background
The current digital asset management mode is generally that a user manages through a private key, so that the digital asset can be permanently lost once the private key is lost, the private key information and a plurality of mnemonics configured with a fixed sequence are very difficult to remember for the user, most of users need to avoid forgetting the private key through exporting storage, screen capturing storage, online recording and other modes, but the modes still have the problem of easy loss or easy theft, so that the digital asset management is very inconvenient.
In view of the above problems, the applicant has previously proposed digital asset hosting schemes (see CN201811151114.0 patent), in which only kinds of wind control schemes for performing wind control management on user money lifting by a hosting service are provided, and the wind control schemes have the defects that in the aspect of , the hosting service is centralized due to the coupling of the hosting service and the wind control management, a user does not have the option, and the configuration right of a wind control policy is controlled by a centralized hosting service party, and in the aspect of , the hosting service party cannot provide only the hosting service but needs to provide the wind control service at the same time.
Disclosure of Invention
In view of the above-described deficiencies or inadequacies in the prior art, it would be desirable to provide a method, apparatus, and storage medium for digital asset hosting risk control that separates hosting services and wind control services, decentralised configuration management wind control policies.
In , the invention provides methods for risk control of digital asset hosting at a user end, wherein a contract for managing the money drawing amount of a hosted account is configured on a blockchain, and a plurality of third-party identity authentication distributed applications specified by a blockchain are configured in a device of the user end, and the method comprises the following steps:
in response to the current user's rating operation, generating and sending a rating transaction to a node of blockchain for broadcasting, packaging and executing through contract, and recording the rating transaction on blockchain;
accessing a third-party identity authentication distributed application for identity authentication, generating an identity authentication transaction and sending the identity authentication transaction to a node of an th block chain for broadcasting, packaging and executing through a th contract after the identity authentication of the third-party identity authentication distributed application is completed, generating an increased result according to the increased transaction and the identity authentication transaction to update the money-increasing amount of the current user and recording the increased result on the th block chain;
and acquiring the money drawing amount of the current user.
In a second aspect, the present invention provides methods for risk control of digital asset escrow suitable for blockchain nodes, wherein a blockchain is configured with a contract for managing the withdrawal limit of an escrow account, and the method includes:
receiving, broadcasting, packaging and executing the quotation transaction through contracts, and recording the quotation transaction on a blockchain, wherein the quotation transaction is generated by a user terminal in response to the quotation operation of a user, and a plurality of third-party identity authentication distributed applications designated by the blockchain are configured in equipment of the user terminal;
receiving, broadcasting, packaging and executing identity authentication transaction through contract, generating a quota result according to quota transaction and identity authentication transaction to update the money-drawing amount of the th user and record the money-drawing amount on the block chain so that the user end can obtain the money-drawing amount of the th user, wherein the identity authentication transaction is generated after the user end accesses the third-party identity authentication distributed application for identity authentication.
In a third aspect, the present invention also provides devices comprising or more processors and memory, wherein the memory contains instructions executable by the or more processors to cause the or more processors to perform the digital asset hosting risk control methods provided according to embodiments of the present invention.
In a fourth aspect, the present invention further provides storage media storing computer programs for causing a computer to execute the digital asset hosting risk control methods provided according to the embodiments of the present invention.
The digital asset escrow risk control method, the equipment and the storage medium provided by the embodiments of the invention configure the contract for managing the escrow account money lifting amount on the block chain, and the contract judges whether to lift the money lifting amount according to the money lifting transaction sent by the user end and the identity authentication transaction sent after the user performs the identity authentication according to the third party identity authentication specified by the block chain, so that the escrow account is controlled by the contract configured on the block chain and the third party identity authentication service party manageable by the block chain, the escrow service and the wind control service are separated, and the decentralization of the wind control strategy configuration management is realized;
the digital asset hosting risk control method, equipment and storage medium provided by the embodiments of the invention further configure a wind control strategy not limited to limit money raising in a contract, and a wind control server performs wind control investigation when triggering wind control authentication, and further perfect a wind control mechanism.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a risk control method for managing digital assets according to an embodiment of the present invention .
Fig. 2 is a flowchart of another digital asset hosting risk control methods provided by an embodiment of the present invention.
Fig. 3 is a flow chart of preferred embodiments of the method of fig. 2.
Fig. 4 is a schematic structural diagram of devices provided in an embodiment of of the present invention.
Detailed Description
The present application is described in further detail in with reference to the drawings and the examples, it being understood that the specific examples are set forth herein for the purpose of illustration only and are not intended to be limiting.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a risk control method for managing digital assets according to an embodiment of the present invention .
As shown in fig. 1, in this embodiment, the present invention provides methods for controlling digital asset hosting risk for a user end, where a blockchain is configured with a contract for managing the money drawing amount of a hosted account, and a device running the user end is configured with a plurality of third-party identity authentication distributed applications (third-party identity authentication DAPP) specified by a blockchain, where the method includes:
s12, in response to the current user' S quota operation, generating quota transactions and sending the quota transactions to the nodes of the block chain for broadcasting, packaging and executing through the contract, and recording the quota transactions on the block chain;
s14, accessing the third-party identity authentication distributed application for identity authentication, generating an identity authentication transaction and sending the identity authentication transaction to a node of a block chain for broadcasting, packaging and executing through a contract after the identity authentication of the third-party identity authentication distributed application is completed, generating a money-withdrawing result according to the money-withdrawing transaction and the identity authentication transaction to update the money-withdrawing amount of the current user and recording the money-withdrawing amount on the block chain;
s16: and acquiring the money drawing amount of the current user.
For example, a user A hosts 10000 XXA coins, and a hosting service end transfers corresponding 10000 YYY _ XXA tokens to a hosting account of the user A on an th blockchain (wherein, the hosting principle can refer to CN201811151114.0 patent), in the embodiment, a th contract for managing the money lifting amount of the hosting account is configured on a th blockchain, three third party identity authentications DAPP specified by th blockchain are configured in a device of a running user end of each user, SFRZ1, SFRZ2 and SFRZ3, and the money lifting amount is initially configured to be 500 YYYY _ XXA tokens/day.
Taking the example that the user A has extracted 50XXA coins on the same day, when the user A needs to extract 2000 XXA coins, the user side of the user A acquires the residual coin lifting amount of 450XXA coins on the same day by acquiring the data of the th block chain and displays the coin lifting amount in the display interface, and after the user A acquires the information, the user side inputs the money lifting operation of lifting the coin lifting amount of the same day to 2500XXA coins.
In step S12, in response to the above mentioned denomination-raising operation by the user a, the user side of the user a generates a request to raise the current day denomination degree to the denomination trade tx1 of the 2500XXA currency and sends it to the node of the th blockchain.
After the node of the block chain receives tx1, broadcasts tx1, packs tx1 into blocks, executes tx1 by the contract of , records tx1 on the block chain , and waits for receiving a corresponding authentication transaction to process a quota request of tx 1.
In step S14, the user side of the user a accesses (may randomly select, select a default item, or be selected by the user) third-party authentication DAPP, for example, accesses SFRZ1 to complete authentication, wherein in this embodiment, the user side of the user a should provide a hash value hash of tx1 (tx1) when invoking the interface to access SFRZ1 for generating an authentication transaction, and in further embodiments, other information for searching for tx1, for example, may be configured to be an amount-providing request number assigned to tx1, or other different information that may be understood by those skilled in the art.
After the user A completes identity authentication, the SFRZ1 generates an identity authentication transaction tx2 according to an identity authentication result and hash (tx1) and sends the identity authentication transaction tx2 to a node of a block chain .
After receiving tx2, broadcasts tx2, packs tx2 into blocks, executes tx2 according to the above contract, finds tx1 according to hash (tx1), and confirms whether the identity authentication of the user A is successful according to the identity authentication result in tx 2:
if not, the quota request of tx1 fails, and the quota degree of the current day of the escrow account of the user A is unchanged;
if yes, the quotation request of tx1 is successful, and the quotation of the current date of the managed account of user A is modified to 2500XXA and recorded on the block chain.
In step S16, the user end of the user a obtains the money-drawing amount of the user a on the current day through the data of the block chain, and displays the money-drawing amount on the display interface, so that the user a can perform the money-drawing of the 2000 XXA coins after knowing that the money-drawing amount is successful.
The above embodiment exemplifies the method shown in fig. 1 by using the initial configuration of the denomination as 500 tokens/day, tx1 requests to raise the denomination of the withdrawal on the current day, in further embodiments, the initial configuration of the denomination of the withdrawal in the above method may be also, according to actual needs, the fixed quota in every th cycle (for example, every day, every week or every month, etc.), the proportion of the second fixed quota in every th cycle (which may be initially configured by and allowed to be modified by the user, or may be configured by the user himself when creating the escrow account), or other different configurations that may be understood by those skilled in the art, and tx1 may request to raise the withdrawal on multiple days or days, etc., all of which may achieve the same technical effect.
In addition, it should be noted that the third-party identity authentication DAPP may be decentralized managed by a decentralized manager of the blockchain (for example, management committee/super node/all users, depending on which types of blockchains the blockchain is specifically configured for), when there is abnormal behavior such as service abnormality or cheating in the third-party identity authentication DAPP, the user side may generate a complaint transaction according to corresponding evidence and send the complaint transaction to the node of the blockchain to trigger the complaint procedure, and regarding the management procedure after triggering the complaint procedure, a person skilled in the art may understand the decentralized management procedure, which is not described herein again.
In the embodiment, the contract for managing the escrow account money lifting amount is configured on the blockchain, and whether the money lifting amount is lifted is judged according to the contract sent by the user end and the identity authentication transaction sent by the third party identity authentication appointed by the blockchain after the user performs identity authentication, so that the escrow account is controlled by the contract configured on the blockchain and the third party identity authentication server manageable by the blockchain, the escrow service and the wind control service are separated, and the decentralized management of the wind control strategy configuration management is realized.
In a preferred embodiment, the contract is further used for judging whether the rate-offer transaction triggers wind control authentication according to a pre-configured wind control strategy when the rate-offer transaction is executed, recording a judgment result on the blockchain, so that a wind control server side obtains the judgment result, performs wind control investigation when the rate-offer transaction triggers the wind control authentication, generates a wind control transaction according to the investigation result and sends the wind control transaction to a node of the th blockchain, and executes the wind control transaction to record the investigation result on the th blockchain;
generating the rate-increasing result according to the rate-increasing transaction and the identity authentication transaction comprises generating the rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
Specifically, taking as an example a configuration of a pneumatic control policy to identify an abnormal quota request (e.g., multiple quota request in a short time, multiple quota request in a single day, large quota request in a short time, abnormal quota identified based on user characteristics, abnormal quota identified based on business characteristics, etc.), when a quota request of tx1 is identified as an abnormal quota request when a quota transaction tx1 is executed by an contract, a pneumatic control authentication is triggered, and abnormal quota request information is generated and recorded on block chain.
After the wind control server acquires the abnormal quota increasing request information, manual wind control investigation or automatic wind control investigation can be performed according to a preconfigured wind control flow, a wind control transaction tx3 is generated according to the investigation result, and tx3 is sent to the node of the block chain.
After receiving tx3, the th blockchain node broadcasts tx3, packs tx3 into blocks, executes tx3 according to the th contract, and records the investigation result on the th blockchain, so that when tx2 is executed, whether the quota request is successful is judged according to the identity authentication result and the wind control investigation result.
Preferably, to avoid that the client sends tx2 in advance before tx3 succeeds in execution and tx2 cannot succeed in execution, tx2 needs to be retransmitted, th contract may be configured to determine whether tx1 triggers the wind-controlled authentication when tx2 is executed:
if yes, judging whether the th block chain records the corresponding tx 3:
if yes, judging whether the quota request is successful according to tx1, tx2 and tx 3;
if not, recording tx2 on the block chain and waiting for the corresponding tx3 before timeout, and judging whether the block chain has the corresponding tx2 when executing tx3, if yes, judging whether the quota request is successful according to tx1, tx2 and tx 3.
The above embodiment further configures a wind control policy not limited to limit note-lifting in a contract, and a wind control service party performs wind control investigation when triggering wind control authentication, so that further improves a wind control mechanism.
Preferably, in any method, when the money withdrawal transaction before or after the withdrawal is configured as a payment transaction, a deferred payment parameter can be configured in the payment transaction based on a wallet retrieval scheme (see CN201410533888.5 patent), so as to combine the wind control of the escrow account with the on-chain deferred withdrawable payment.
Fig. 2 is a flowchart of another digital asset hosting risk control method provided by an embodiment of of the present invention, the method shown in fig. 2 may be executed in conjunction with the method shown in fig. 1.
As shown in fig. 2, in this embodiment, the present invention further provides digital asset hosting risk control methods suitable for blockchain nodes, where a blockchain is configured with a contract for managing the money-drawing amount of a hosted account, and the method includes:
s22, receiving, broadcasting, packaging and executing the quotation transaction through a contract, and recording the quotation transaction on a blockchain, wherein the quotation transaction is generated by a user end in response to a quotation operation of a -th user, and a plurality of third-party identity authentication distributed applications specified by a blockchain are configured in equipment of the user end;
s24, receiving, broadcasting, packaging and executing identity authentication transaction through contract, generating a quota result according to quota transaction and identity authentication transaction to update the money providing amount of user and record the money providing amount on block chain, so that the user end can obtain user money providing amount, wherein the identity authentication transaction is generated after the user end accesses the third party identity authentication distributed application for identity authentication.
The wind control principle of the method shown in fig. 2 can refer to the method shown in fig. 1, and the details are not repeated here.
Fig. 3 is a flow chart of preferred embodiments of the method of fig. 2 the method of fig. 3 may be performed in conjunction with the preferred embodiment of the method of fig. 1.
As shown in fig. 3, in the preferred embodiment, executing the nomination transaction via the th contract in step S22 further includes:
the th contract judges whether the rated transaction triggers wind control authentication according to a preconfigured wind control strategy when the rated transaction is executed, records the judgment result on the th block chain, so that the wind control service side can acquire the judgment result, perform wind control investigation when the rated transaction triggers the wind control authentication, generate the wind control transaction according to the investigation result and send the wind control transaction to the th block chain node;
the method further comprises the following steps:
s23, executing a wind-controlled transaction through a contract to record the investigation result on a block chain;
the generating of the rate-increasing result according to the rate-increasing transaction and the identity authentication transaction in the step S24 includes:
and generating a rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
Fig. 4 is a schematic structural diagram of devices provided in an embodiment of of the present invention.
As shown in fig. 4, as another aspect, the present application also provides kinds of devices 400, including or more Central Processing Units (CPUs) 401, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM)403, in the RAM403, various programs and data necessary for the operation of the device 400 are also stored, the CPU401, the ROM402, and the RAM403 are connected to each other by a bus 404, and an input/output (I/O) interface 405 is also connected to the bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
For example, embodiments of the present disclosure include computer program products comprising a computer program tangibly embodied on a machine-readable medium, the computer program containing program code for performing the digital asset hosting risk control method.
In yet another aspect, the present application further provides computer-readable storage media, which may be the computer-readable storage media included in the apparatus of the above embodiments, or the computer-readable storage media that exists separately and is not assembled into a device, the computer-readable storage media stores or or more programs, and the programs are used by or or more processors to execute the digital asset hosting risk control method described in the present application.
It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures, for example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved, it being noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, may be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (10)
1, digital asset hosting risk control method, wherein a contract for managing a money drawing amount of a hosted account is configured on a blockchain, the method is applicable to a user side, and a plurality of third-party identity authentication distributed applications specified by the blockchain are configured in equipment of the user side, and the method comprises the following steps:
in response to the current user's rating operation, generating and sending a rating transaction to the blockchain node for broadcasting, packaging and executing through the contract, and recording the rating transaction on the blockchain;
accessing the third-party identity authentication distributed application for identity authentication, so that after the identity authentication is completed, the third-party identity authentication distributed application generates an identity authentication transaction and sends the identity authentication transaction to a node of the th block chain for broadcasting, packaging and executing through the th contract, and generates an increased result according to the increased transaction and the identity authentication transaction to update the money-drawing amount of the current user and record the increased result on the th block chain;
and acquiring the money drawing amount of the current user.
2. The method of claim 1, wherein the contract is further used for judging whether the offered transaction triggers wind control authentication according to a pre-configured wind control strategy when the offered transaction is executed, recording a judgment result on the blockchain so that a wind control service terminal can acquire the judgment result, carry out wind control investigation when the offered transaction triggers the wind control authentication, generate a wind control transaction according to an investigation result and send the wind control transaction to a node of the blockchain;
generating a rate-raising result according to the rate-raising transaction and the identity authentication transaction comprises generating a rate-raising result according to the rate-raising transaction, the identity authentication transaction and the investigation result.
3. The method of claim 1 or 2, wherein the identity authentication comprises at least items of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face recognition authentication, fingerprint recognition authentication, security problem authentication, and emergency contact authentication.
4. The method as claimed in claim 1 or 2, wherein the monetary value is initially allocated to items, which are fixed quota per period, th ratio of the second fixed quota per period.
5, digital asset hosting risk control method, wherein a blockchain is configured with a contract for managing the drawing amount of a hosting account, the method is suitable for blockchain nodes, and the method comprises the following steps:
receiving, broadcasting, packaging and executing a quota transaction through the contract, and recording the quota transaction on the blockchain, wherein the quota transaction is generated by a user side in response to a quota operation of a user, and a plurality of third-party identity authentication distributed applications specified by the blockchain are configured in equipment of the user side;
receiving, broadcasting, packaging and executing identity authentication transaction through the contract, generating a quota result according to the quota transaction and the identity authentication transaction to update the money drawing amount of the th user and record the money drawing amount on the block chain so that the user side can obtain the money drawing amount of the th user, wherein the identity authentication transaction is generated by the third-party identity authentication distributed application after the user side accesses the third-party identity authentication distributed application for identity authentication.
6. The method of claim 5, wherein said executing a nominated transaction via said th contract further comprises:
the th contract judges whether the volume-providing transaction triggers the wind control authentication according to a pre-configured wind control strategy when executing the volume-providing transaction, records the judgment result on the th block chain, so that a wind control service end acquires the judgment result, performs wind control investigation when the volume-providing transaction triggers the wind control authentication, generates the wind control transaction according to the investigation result and sends the wind control transaction to the th block chain node;
the method further comprises the following steps:
executing the wind-controlled transaction by the contract to record the survey results on the blockchain;
the generating a rate-raising result according to the rate-raising transaction and the identity authentication transaction comprises:
and generating a rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
7. The method of claim 5 or 6, wherein the identity authentication comprises at least items of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face recognition authentication, fingerprint recognition authentication, security problem authentication, and emergency contact authentication.
8. The method as claimed in claim 5 or 6, wherein the monetary value is initially configured as items including a th fixed value in each cycle and a th ratio of a second fixed value in each cycle.
An apparatus of the type 9, , comprising:
or more processors;
a memory for storing or more programs,
the or more programs, when executed by the or more processors, cause the or more processors to perform the method of any of claims 1-8.
storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any of claims 1-8 to .
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910901368.8A CN110738481B (en) | 2019-09-23 | 2019-09-23 | Digital asset hosting risk control method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910901368.8A CN110738481B (en) | 2019-09-23 | 2019-09-23 | Digital asset hosting risk control method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110738481A true CN110738481A (en) | 2020-01-31 |
CN110738481B CN110738481B (en) | 2022-09-13 |
Family
ID=69269495
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910901368.8A Active CN110738481B (en) | 2019-09-23 | 2019-09-23 | Digital asset hosting risk control method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110738481B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106447434A (en) * | 2016-09-14 | 2017-02-22 | 全联征信有限公司 | Personal credit ecological platform |
CN106991512A (en) * | 2016-01-21 | 2017-07-28 | 阿里巴巴集团控股有限公司 | Risk treating method and apparatus |
CN108009441A (en) * | 2017-11-23 | 2018-05-08 | 阿里巴巴集团控股有限公司 | Resource transfers and the method and apparatus of fund transfer |
US20180276626A1 (en) * | 2017-03-21 | 2018-09-27 | Dappsters, LLC | Blockchain systems and methods |
US20180285971A1 (en) * | 2017-03-31 | 2018-10-04 | International Business Machines Corporation | Management of consumer debt collection using a blockchain and machine learning |
CN108810868A (en) * | 2018-05-31 | 2018-11-13 | 中国联合网络通信集团有限公司 | The operating method and shared set meal system of shared set meal |
CN109493024A (en) * | 2018-09-29 | 2019-03-19 | 杭州复杂美科技有限公司 | Digital asset trustship method, equipment and storage medium |
CN109544339A (en) * | 2018-11-16 | 2019-03-29 | 海南新软软件有限公司 | A kind of price steadiness type digital asset converts into method, apparatus and system |
US20190197831A1 (en) * | 2017-11-03 | 2019-06-27 | Signal Zero, Inc. | Systems and Methods to Generate New Units of a Coin or Currency Having Inherent Value in a Digital Environment |
-
2019
- 2019-09-23 CN CN201910901368.8A patent/CN110738481B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991512A (en) * | 2016-01-21 | 2017-07-28 | 阿里巴巴集团控股有限公司 | Risk treating method and apparatus |
CN106447434A (en) * | 2016-09-14 | 2017-02-22 | 全联征信有限公司 | Personal credit ecological platform |
US20180276626A1 (en) * | 2017-03-21 | 2018-09-27 | Dappsters, LLC | Blockchain systems and methods |
US20180285971A1 (en) * | 2017-03-31 | 2018-10-04 | International Business Machines Corporation | Management of consumer debt collection using a blockchain and machine learning |
US20190197831A1 (en) * | 2017-11-03 | 2019-06-27 | Signal Zero, Inc. | Systems and Methods to Generate New Units of a Coin or Currency Having Inherent Value in a Digital Environment |
CN108009441A (en) * | 2017-11-23 | 2018-05-08 | 阿里巴巴集团控股有限公司 | Resource transfers and the method and apparatus of fund transfer |
CN108810868A (en) * | 2018-05-31 | 2018-11-13 | 中国联合网络通信集团有限公司 | The operating method and shared set meal system of shared set meal |
CN109493024A (en) * | 2018-09-29 | 2019-03-19 | 杭州复杂美科技有限公司 | Digital asset trustship method, equipment and storage medium |
CN109544339A (en) * | 2018-11-16 | 2019-03-29 | 海南新软软件有限公司 | A kind of price steadiness type digital asset converts into method, apparatus and system |
Non-Patent Citations (2)
Title |
---|
SRDJAN SLADOJEVIC等: ""Privacy in Bitcoin Transactions:New Chanllenges from Blockchain Scalability Solutions"", 《COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE》 * |
潘云鹏: ""基于区块链的数字资产信托业务创新与探索"", 《现代商业》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110738481B (en) | 2022-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240013072A1 (en) | Processing machine learning attributes | |
US20230198971A1 (en) | Resource transfer setup and verification | |
US20230316276A1 (en) | Child Support & Centralized Distribution Network | |
US20180039770A1 (en) | Multi-Factor Profile and Security Fingerprint Analysis | |
US20230196316A1 (en) | Systems and methods for real-time, distributed processing of group bill payments | |
CN109598598A (en) | Transaction processing method and device, electronic equipment based on block chain | |
CN105577602B (en) | Data push method and device based on open application programming interface | |
CN109598504A (en) | Transaction processing method and device, electronic equipment based on block chain | |
US11916936B2 (en) | Techniques for incentivized intrusion detection system | |
CN109214676A (en) | A kind of service order processing method, device, server and storage medium | |
CN112200450A (en) | Customer service distribution method, device and medium | |
CN110033282A (en) | Complaining method and device | |
CN107464121A (en) | Electronic account is reported the loss, solves extension, business management method, device and equipment | |
CN108961034A (en) | System and method, storage medium based on user behavior certification | |
CN110807209B (en) | Data processing method, device and storage medium | |
WO2014043360A1 (en) | Multi-factor profile and security fingerprint analysis | |
KR102078566B1 (en) | Method and system of preventing loss of a cryptocurrency | |
CN108270789A (en) | Internetbank activating method, equipment, system and computer readable storage medium | |
CN110738480B (en) | Digital asset hosting risk control method, device and storage medium | |
CN112101915A (en) | Financial service management and control data processing method and device | |
CN113327169B (en) | Claims settlement method and device based on block chain and electronic equipment | |
CN110738481B (en) | Digital asset hosting risk control method, device and storage medium | |
CN102567875A (en) | Third-party-dominant electronic debt repayment method and system | |
FR3033205A1 (en) | METHOD OF TRANSACTING WITHOUT PHYSICAL SUPPORT OF A SECURITY IDENTIFIER AND WITHOUT TOKEN, SECURED BY STRUCTURAL DECOUPLING OF PERSONAL AND SERVICE IDENTIFIERS. | |
WO2023276073A1 (en) | Learning model evaluation system, learning model evaluation method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |