CN110738481A - Digital asset hosting risk control method, device and storage medium - Google Patents

Digital asset hosting risk control method, device and storage medium Download PDF

Info

Publication number
CN110738481A
CN110738481A CN201910901368.8A CN201910901368A CN110738481A CN 110738481 A CN110738481 A CN 110738481A CN 201910901368 A CN201910901368 A CN 201910901368A CN 110738481 A CN110738481 A CN 110738481A
Authority
CN
China
Prior art keywords
transaction
identity authentication
authentication
wind control
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910901368.8A
Other languages
Chinese (zh)
Other versions
CN110738481B (en
Inventor
吴思进
李斌
曹兢
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201910901368.8A priority Critical patent/CN110738481B/en
Publication of CN110738481A publication Critical patent/CN110738481A/en
Application granted granted Critical
Publication of CN110738481B publication Critical patent/CN110738481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides digital asset hosting risk control methods, equipment and storage media, wherein the method comprises the steps of responding to a current user's rate-raising operation, generating a rate-raising transaction and sending the rate-raising transaction to a node of a block chain for broadcasting, packaging and executing through a contract, recording the rate-raising transaction on the block chain, accessing a third-party identity authentication distributed application for identity authentication, generating an identity authentication transaction after the identity authentication is completed by the third-party identity authentication distributed application and sending the identity authentication transaction to a node of a block chain for broadcasting, packaging and executing through a contract, generating a rate-raising result according to the rate-raising transaction and the identity authentication transaction to update the current user's rate-raising and record the current user's rate-raising result on the block chain, and acquiring the current user's rate-raising of money.

Description

Digital asset hosting risk control method, device and storage medium
Technical Field
The application relates to the technical field of internet finance, in particular to digital asset hosting risk control method, equipment and storage medium.
Background
The current digital asset management mode is generally that a user manages through a private key, so that the digital asset can be permanently lost once the private key is lost, the private key information and a plurality of mnemonics configured with a fixed sequence are very difficult to remember for the user, most of users need to avoid forgetting the private key through exporting storage, screen capturing storage, online recording and other modes, but the modes still have the problem of easy loss or easy theft, so that the digital asset management is very inconvenient.
In view of the above problems, the applicant has previously proposed digital asset hosting schemes (see CN201811151114.0 patent), in which only kinds of wind control schemes for performing wind control management on user money lifting by a hosting service are provided, and the wind control schemes have the defects that in the aspect of , the hosting service is centralized due to the coupling of the hosting service and the wind control management, a user does not have the option, and the configuration right of a wind control policy is controlled by a centralized hosting service party, and in the aspect of , the hosting service party cannot provide only the hosting service but needs to provide the wind control service at the same time.
Disclosure of Invention
In view of the above-described deficiencies or inadequacies in the prior art, it would be desirable to provide a method, apparatus, and storage medium for digital asset hosting risk control that separates hosting services and wind control services, decentralised configuration management wind control policies.
In , the invention provides methods for risk control of digital asset hosting at a user end, wherein a contract for managing the money drawing amount of a hosted account is configured on a blockchain, and a plurality of third-party identity authentication distributed applications specified by a blockchain are configured in a device of the user end, and the method comprises the following steps:
in response to the current user's rating operation, generating and sending a rating transaction to a node of blockchain for broadcasting, packaging and executing through contract, and recording the rating transaction on blockchain;
accessing a third-party identity authentication distributed application for identity authentication, generating an identity authentication transaction and sending the identity authentication transaction to a node of an th block chain for broadcasting, packaging and executing through a th contract after the identity authentication of the third-party identity authentication distributed application is completed, generating an increased result according to the increased transaction and the identity authentication transaction to update the money-increasing amount of the current user and recording the increased result on the th block chain;
and acquiring the money drawing amount of the current user.
In a second aspect, the present invention provides methods for risk control of digital asset escrow suitable for blockchain nodes, wherein a blockchain is configured with a contract for managing the withdrawal limit of an escrow account, and the method includes:
receiving, broadcasting, packaging and executing the quotation transaction through contracts, and recording the quotation transaction on a blockchain, wherein the quotation transaction is generated by a user terminal in response to the quotation operation of a user, and a plurality of third-party identity authentication distributed applications designated by the blockchain are configured in equipment of the user terminal;
receiving, broadcasting, packaging and executing identity authentication transaction through contract, generating a quota result according to quota transaction and identity authentication transaction to update the money-drawing amount of the th user and record the money-drawing amount on the block chain so that the user end can obtain the money-drawing amount of the th user, wherein the identity authentication transaction is generated after the user end accesses the third-party identity authentication distributed application for identity authentication.
In a third aspect, the present invention also provides devices comprising or more processors and memory, wherein the memory contains instructions executable by the or more processors to cause the or more processors to perform the digital asset hosting risk control methods provided according to embodiments of the present invention.
In a fourth aspect, the present invention further provides storage media storing computer programs for causing a computer to execute the digital asset hosting risk control methods provided according to the embodiments of the present invention.
The digital asset escrow risk control method, the equipment and the storage medium provided by the embodiments of the invention configure the contract for managing the escrow account money lifting amount on the block chain, and the contract judges whether to lift the money lifting amount according to the money lifting transaction sent by the user end and the identity authentication transaction sent after the user performs the identity authentication according to the third party identity authentication specified by the block chain, so that the escrow account is controlled by the contract configured on the block chain and the third party identity authentication service party manageable by the block chain, the escrow service and the wind control service are separated, and the decentralization of the wind control strategy configuration management is realized;
the digital asset hosting risk control method, equipment and storage medium provided by the embodiments of the invention further configure a wind control strategy not limited to limit money raising in a contract, and a wind control server performs wind control investigation when triggering wind control authentication, and further perfect a wind control mechanism.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a risk control method for managing digital assets according to an embodiment of the present invention .
Fig. 2 is a flowchart of another digital asset hosting risk control methods provided by an embodiment of the present invention.
Fig. 3 is a flow chart of preferred embodiments of the method of fig. 2.
Fig. 4 is a schematic structural diagram of devices provided in an embodiment of of the present invention.
Detailed Description
The present application is described in further detail in with reference to the drawings and the examples, it being understood that the specific examples are set forth herein for the purpose of illustration only and are not intended to be limiting.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a risk control method for managing digital assets according to an embodiment of the present invention .
As shown in fig. 1, in this embodiment, the present invention provides methods for controlling digital asset hosting risk for a user end, where a blockchain is configured with a contract for managing the money drawing amount of a hosted account, and a device running the user end is configured with a plurality of third-party identity authentication distributed applications (third-party identity authentication DAPP) specified by a blockchain, where the method includes:
s12, in response to the current user' S quota operation, generating quota transactions and sending the quota transactions to the nodes of the block chain for broadcasting, packaging and executing through the contract, and recording the quota transactions on the block chain;
s14, accessing the third-party identity authentication distributed application for identity authentication, generating an identity authentication transaction and sending the identity authentication transaction to a node of a block chain for broadcasting, packaging and executing through a contract after the identity authentication of the third-party identity authentication distributed application is completed, generating a money-withdrawing result according to the money-withdrawing transaction and the identity authentication transaction to update the money-withdrawing amount of the current user and recording the money-withdrawing amount on the block chain;
s16: and acquiring the money drawing amount of the current user.
For example, a user A hosts 10000 XXA coins, and a hosting service end transfers corresponding 10000 YYY _ XXA tokens to a hosting account of the user A on an th blockchain (wherein, the hosting principle can refer to CN201811151114.0 patent), in the embodiment, a th contract for managing the money lifting amount of the hosting account is configured on a th blockchain, three third party identity authentications DAPP specified by th blockchain are configured in a device of a running user end of each user, SFRZ1, SFRZ2 and SFRZ3, and the money lifting amount is initially configured to be 500 YYYY _ XXA tokens/day.
Taking the example that the user A has extracted 50XXA coins on the same day, when the user A needs to extract 2000 XXA coins, the user side of the user A acquires the residual coin lifting amount of 450XXA coins on the same day by acquiring the data of the th block chain and displays the coin lifting amount in the display interface, and after the user A acquires the information, the user side inputs the money lifting operation of lifting the coin lifting amount of the same day to 2500XXA coins.
In step S12, in response to the above mentioned denomination-raising operation by the user a, the user side of the user a generates a request to raise the current day denomination degree to the denomination trade tx1 of the 2500XXA currency and sends it to the node of the th blockchain.
After the node of the block chain receives tx1, broadcasts tx1, packs tx1 into blocks, executes tx1 by the contract of , records tx1 on the block chain , and waits for receiving a corresponding authentication transaction to process a quota request of tx 1.
In step S14, the user side of the user a accesses (may randomly select, select a default item, or be selected by the user) third-party authentication DAPP, for example, accesses SFRZ1 to complete authentication, wherein in this embodiment, the user side of the user a should provide a hash value hash of tx1 (tx1) when invoking the interface to access SFRZ1 for generating an authentication transaction, and in further embodiments, other information for searching for tx1, for example, may be configured to be an amount-providing request number assigned to tx1, or other different information that may be understood by those skilled in the art.
After the user A completes identity authentication, the SFRZ1 generates an identity authentication transaction tx2 according to an identity authentication result and hash (tx1) and sends the identity authentication transaction tx2 to a node of a block chain .
After receiving tx2, broadcasts tx2, packs tx2 into blocks, executes tx2 according to the above contract, finds tx1 according to hash (tx1), and confirms whether the identity authentication of the user A is successful according to the identity authentication result in tx 2:
if not, the quota request of tx1 fails, and the quota degree of the current day of the escrow account of the user A is unchanged;
if yes, the quotation request of tx1 is successful, and the quotation of the current date of the managed account of user A is modified to 2500XXA and recorded on the block chain.
In step S16, the user end of the user a obtains the money-drawing amount of the user a on the current day through the data of the block chain, and displays the money-drawing amount on the display interface, so that the user a can perform the money-drawing of the 2000 XXA coins after knowing that the money-drawing amount is successful.
The above embodiment exemplifies the method shown in fig. 1 by using the initial configuration of the denomination as 500 tokens/day, tx1 requests to raise the denomination of the withdrawal on the current day, in further embodiments, the initial configuration of the denomination of the withdrawal in the above method may be also, according to actual needs, the fixed quota in every th cycle (for example, every day, every week or every month, etc.), the proportion of the second fixed quota in every th cycle (which may be initially configured by and allowed to be modified by the user, or may be configured by the user himself when creating the escrow account), or other different configurations that may be understood by those skilled in the art, and tx1 may request to raise the withdrawal on multiple days or days, etc., all of which may achieve the same technical effect.
In addition, it should be noted that the third-party identity authentication DAPP may be decentralized managed by a decentralized manager of the blockchain (for example, management committee/super node/all users, depending on which types of blockchains the blockchain is specifically configured for), when there is abnormal behavior such as service abnormality or cheating in the third-party identity authentication DAPP, the user side may generate a complaint transaction according to corresponding evidence and send the complaint transaction to the node of the blockchain to trigger the complaint procedure, and regarding the management procedure after triggering the complaint procedure, a person skilled in the art may understand the decentralized management procedure, which is not described herein again.
In the embodiment, the contract for managing the escrow account money lifting amount is configured on the blockchain, and whether the money lifting amount is lifted is judged according to the contract sent by the user end and the identity authentication transaction sent by the third party identity authentication appointed by the blockchain after the user performs identity authentication, so that the escrow account is controlled by the contract configured on the blockchain and the third party identity authentication server manageable by the blockchain, the escrow service and the wind control service are separated, and the decentralized management of the wind control strategy configuration management is realized.
In a preferred embodiment, the contract is further used for judging whether the rate-offer transaction triggers wind control authentication according to a pre-configured wind control strategy when the rate-offer transaction is executed, recording a judgment result on the blockchain, so that a wind control server side obtains the judgment result, performs wind control investigation when the rate-offer transaction triggers the wind control authentication, generates a wind control transaction according to the investigation result and sends the wind control transaction to a node of the th blockchain, and executes the wind control transaction to record the investigation result on the th blockchain;
generating the rate-increasing result according to the rate-increasing transaction and the identity authentication transaction comprises generating the rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
Specifically, taking as an example a configuration of a pneumatic control policy to identify an abnormal quota request (e.g., multiple quota request in a short time, multiple quota request in a single day, large quota request in a short time, abnormal quota identified based on user characteristics, abnormal quota identified based on business characteristics, etc.), when a quota request of tx1 is identified as an abnormal quota request when a quota transaction tx1 is executed by an contract, a pneumatic control authentication is triggered, and abnormal quota request information is generated and recorded on block chain.
After the wind control server acquires the abnormal quota increasing request information, manual wind control investigation or automatic wind control investigation can be performed according to a preconfigured wind control flow, a wind control transaction tx3 is generated according to the investigation result, and tx3 is sent to the node of the block chain.
After receiving tx3, the th blockchain node broadcasts tx3, packs tx3 into blocks, executes tx3 according to the th contract, and records the investigation result on the th blockchain, so that when tx2 is executed, whether the quota request is successful is judged according to the identity authentication result and the wind control investigation result.
Preferably, to avoid that the client sends tx2 in advance before tx3 succeeds in execution and tx2 cannot succeed in execution, tx2 needs to be retransmitted, th contract may be configured to determine whether tx1 triggers the wind-controlled authentication when tx2 is executed:
if yes, judging whether the th block chain records the corresponding tx 3:
if yes, judging whether the quota request is successful according to tx1, tx2 and tx 3;
if not, recording tx2 on the block chain and waiting for the corresponding tx3 before timeout, and judging whether the block chain has the corresponding tx2 when executing tx3, if yes, judging whether the quota request is successful according to tx1, tx2 and tx 3.
The above embodiment further configures a wind control policy not limited to limit note-lifting in a contract, and a wind control service party performs wind control investigation when triggering wind control authentication, so that further improves a wind control mechanism.
Preferably, in any method, when the money withdrawal transaction before or after the withdrawal is configured as a payment transaction, a deferred payment parameter can be configured in the payment transaction based on a wallet retrieval scheme (see CN201410533888.5 patent), so as to combine the wind control of the escrow account with the on-chain deferred withdrawable payment.
Fig. 2 is a flowchart of another digital asset hosting risk control method provided by an embodiment of of the present invention, the method shown in fig. 2 may be executed in conjunction with the method shown in fig. 1.
As shown in fig. 2, in this embodiment, the present invention further provides digital asset hosting risk control methods suitable for blockchain nodes, where a blockchain is configured with a contract for managing the money-drawing amount of a hosted account, and the method includes:
s22, receiving, broadcasting, packaging and executing the quotation transaction through a contract, and recording the quotation transaction on a blockchain, wherein the quotation transaction is generated by a user end in response to a quotation operation of a -th user, and a plurality of third-party identity authentication distributed applications specified by a blockchain are configured in equipment of the user end;
s24, receiving, broadcasting, packaging and executing identity authentication transaction through contract, generating a quota result according to quota transaction and identity authentication transaction to update the money providing amount of user and record the money providing amount on block chain, so that the user end can obtain user money providing amount, wherein the identity authentication transaction is generated after the user end accesses the third party identity authentication distributed application for identity authentication.
The wind control principle of the method shown in fig. 2 can refer to the method shown in fig. 1, and the details are not repeated here.
Fig. 3 is a flow chart of preferred embodiments of the method of fig. 2 the method of fig. 3 may be performed in conjunction with the preferred embodiment of the method of fig. 1.
As shown in fig. 3, in the preferred embodiment, executing the nomination transaction via the th contract in step S22 further includes:
the th contract judges whether the rated transaction triggers wind control authentication according to a preconfigured wind control strategy when the rated transaction is executed, records the judgment result on the th block chain, so that the wind control service side can acquire the judgment result, perform wind control investigation when the rated transaction triggers the wind control authentication, generate the wind control transaction according to the investigation result and send the wind control transaction to the th block chain node;
the method further comprises the following steps:
s23, executing a wind-controlled transaction through a contract to record the investigation result on a block chain;
the generating of the rate-increasing result according to the rate-increasing transaction and the identity authentication transaction in the step S24 includes:
and generating a rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
Fig. 4 is a schematic structural diagram of devices provided in an embodiment of of the present invention.
As shown in fig. 4, as another aspect, the present application also provides kinds of devices 400, including or more Central Processing Units (CPUs) 401, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM)403, in the RAM403, various programs and data necessary for the operation of the device 400 are also stored, the CPU401, the ROM402, and the RAM403 are connected to each other by a bus 404, and an input/output (I/O) interface 405 is also connected to the bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
For example, embodiments of the present disclosure include computer program products comprising a computer program tangibly embodied on a machine-readable medium, the computer program containing program code for performing the digital asset hosting risk control method.
In yet another aspect, the present application further provides computer-readable storage media, which may be the computer-readable storage media included in the apparatus of the above embodiments, or the computer-readable storage media that exists separately and is not assembled into a device, the computer-readable storage media stores or or more programs, and the programs are used by or or more processors to execute the digital asset hosting risk control method described in the present application.
It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures, for example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved, it being noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, may be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1, digital asset hosting risk control method, wherein a contract for managing a money drawing amount of a hosted account is configured on a blockchain, the method is applicable to a user side, and a plurality of third-party identity authentication distributed applications specified by the blockchain are configured in equipment of the user side, and the method comprises the following steps:
in response to the current user's rating operation, generating and sending a rating transaction to the blockchain node for broadcasting, packaging and executing through the contract, and recording the rating transaction on the blockchain;
accessing the third-party identity authentication distributed application for identity authentication, so that after the identity authentication is completed, the third-party identity authentication distributed application generates an identity authentication transaction and sends the identity authentication transaction to a node of the th block chain for broadcasting, packaging and executing through the th contract, and generates an increased result according to the increased transaction and the identity authentication transaction to update the money-drawing amount of the current user and record the increased result on the th block chain;
and acquiring the money drawing amount of the current user.
2. The method of claim 1, wherein the contract is further used for judging whether the offered transaction triggers wind control authentication according to a pre-configured wind control strategy when the offered transaction is executed, recording a judgment result on the blockchain so that a wind control service terminal can acquire the judgment result, carry out wind control investigation when the offered transaction triggers the wind control authentication, generate a wind control transaction according to an investigation result and send the wind control transaction to a node of the blockchain;
generating a rate-raising result according to the rate-raising transaction and the identity authentication transaction comprises generating a rate-raising result according to the rate-raising transaction, the identity authentication transaction and the investigation result.
3. The method of claim 1 or 2, wherein the identity authentication comprises at least items of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face recognition authentication, fingerprint recognition authentication, security problem authentication, and emergency contact authentication.
4. The method as claimed in claim 1 or 2, wherein the monetary value is initially allocated to items, which are fixed quota per period, th ratio of the second fixed quota per period.
5, digital asset hosting risk control method, wherein a blockchain is configured with a contract for managing the drawing amount of a hosting account, the method is suitable for blockchain nodes, and the method comprises the following steps:
receiving, broadcasting, packaging and executing a quota transaction through the contract, and recording the quota transaction on the blockchain, wherein the quota transaction is generated by a user side in response to a quota operation of a user, and a plurality of third-party identity authentication distributed applications specified by the blockchain are configured in equipment of the user side;
receiving, broadcasting, packaging and executing identity authentication transaction through the contract, generating a quota result according to the quota transaction and the identity authentication transaction to update the money drawing amount of the th user and record the money drawing amount on the block chain so that the user side can obtain the money drawing amount of the th user, wherein the identity authentication transaction is generated by the third-party identity authentication distributed application after the user side accesses the third-party identity authentication distributed application for identity authentication.
6. The method of claim 5, wherein said executing a nominated transaction via said th contract further comprises:
the th contract judges whether the volume-providing transaction triggers the wind control authentication according to a pre-configured wind control strategy when executing the volume-providing transaction, records the judgment result on the th block chain, so that a wind control service end acquires the judgment result, performs wind control investigation when the volume-providing transaction triggers the wind control authentication, generates the wind control transaction according to the investigation result and sends the wind control transaction to the th block chain node;
the method further comprises the following steps:
executing the wind-controlled transaction by the contract to record the survey results on the blockchain;
the generating a rate-raising result according to the rate-raising transaction and the identity authentication transaction comprises:
and generating a rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
7. The method of claim 5 or 6, wherein the identity authentication comprises at least items of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face recognition authentication, fingerprint recognition authentication, security problem authentication, and emergency contact authentication.
8. The method as claimed in claim 5 or 6, wherein the monetary value is initially configured as items including a th fixed value in each cycle and a th ratio of a second fixed value in each cycle.
An apparatus of the type 9, , comprising:
or more processors;
a memory for storing or more programs,
the or more programs, when executed by the or more processors, cause the or more processors to perform the method of any of claims 1-8.
storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any of claims 1-8 to .
CN201910901368.8A 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium Active CN110738481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910901368.8A CN110738481B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910901368.8A CN110738481B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Publications (2)

Publication Number Publication Date
CN110738481A true CN110738481A (en) 2020-01-31
CN110738481B CN110738481B (en) 2022-09-13

Family

ID=69269495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910901368.8A Active CN110738481B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Country Status (1)

Country Link
CN (1) CN110738481B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447434A (en) * 2016-09-14 2017-02-22 全联征信有限公司 Personal credit ecological platform
CN106991512A (en) * 2016-01-21 2017-07-28 阿里巴巴集团控股有限公司 Risk treating method and apparatus
CN108009441A (en) * 2017-11-23 2018-05-08 阿里巴巴集团控股有限公司 Resource transfers and the method and apparatus of fund transfer
US20180276626A1 (en) * 2017-03-21 2018-09-27 Dappsters, LLC Blockchain systems and methods
US20180285971A1 (en) * 2017-03-31 2018-10-04 International Business Machines Corporation Management of consumer debt collection using a blockchain and machine learning
CN108810868A (en) * 2018-05-31 2018-11-13 中国联合网络通信集团有限公司 The operating method and shared set meal system of shared set meal
CN109493024A (en) * 2018-09-29 2019-03-19 杭州复杂美科技有限公司 Digital asset trustship method, equipment and storage medium
CN109544339A (en) * 2018-11-16 2019-03-29 海南新软软件有限公司 A kind of price steadiness type digital asset converts into method, apparatus and system
US20190197831A1 (en) * 2017-11-03 2019-06-27 Signal Zero, Inc. Systems and Methods to Generate New Units of a Coin or Currency Having Inherent Value in a Digital Environment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991512A (en) * 2016-01-21 2017-07-28 阿里巴巴集团控股有限公司 Risk treating method and apparatus
CN106447434A (en) * 2016-09-14 2017-02-22 全联征信有限公司 Personal credit ecological platform
US20180276626A1 (en) * 2017-03-21 2018-09-27 Dappsters, LLC Blockchain systems and methods
US20180285971A1 (en) * 2017-03-31 2018-10-04 International Business Machines Corporation Management of consumer debt collection using a blockchain and machine learning
US20190197831A1 (en) * 2017-11-03 2019-06-27 Signal Zero, Inc. Systems and Methods to Generate New Units of a Coin or Currency Having Inherent Value in a Digital Environment
CN108009441A (en) * 2017-11-23 2018-05-08 阿里巴巴集团控股有限公司 Resource transfers and the method and apparatus of fund transfer
CN108810868A (en) * 2018-05-31 2018-11-13 中国联合网络通信集团有限公司 The operating method and shared set meal system of shared set meal
CN109493024A (en) * 2018-09-29 2019-03-19 杭州复杂美科技有限公司 Digital asset trustship method, equipment and storage medium
CN109544339A (en) * 2018-11-16 2019-03-29 海南新软软件有限公司 A kind of price steadiness type digital asset converts into method, apparatus and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SRDJAN SLADOJEVIC等: ""Privacy in Bitcoin Transactions:New Chanllenges from Blockchain Scalability Solutions"", 《COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE》 *
潘云鹏: ""基于区块链的数字资产信托业务创新与探索"", 《现代商业》 *

Also Published As

Publication number Publication date
CN110738481B (en) 2022-09-13

Similar Documents

Publication Publication Date Title
US20240013072A1 (en) Processing machine learning attributes
US20230198971A1 (en) Resource transfer setup and verification
US20230316276A1 (en) Child Support & Centralized Distribution Network
US20180039770A1 (en) Multi-Factor Profile and Security Fingerprint Analysis
US20230196316A1 (en) Systems and methods for real-time, distributed processing of group bill payments
CN109598598A (en) Transaction processing method and device, electronic equipment based on block chain
CN105577602B (en) Data push method and device based on open application programming interface
CN109598504A (en) Transaction processing method and device, electronic equipment based on block chain
US11916936B2 (en) Techniques for incentivized intrusion detection system
CN109214676A (en) A kind of service order processing method, device, server and storage medium
CN112200450A (en) Customer service distribution method, device and medium
CN110033282A (en) Complaining method and device
CN107464121A (en) Electronic account is reported the loss, solves extension, business management method, device and equipment
CN108961034A (en) System and method, storage medium based on user behavior certification
CN110807209B (en) Data processing method, device and storage medium
WO2014043360A1 (en) Multi-factor profile and security fingerprint analysis
KR102078566B1 (en) Method and system of preventing loss of a cryptocurrency
CN108270789A (en) Internetbank activating method, equipment, system and computer readable storage medium
CN110738480B (en) Digital asset hosting risk control method, device and storage medium
CN112101915A (en) Financial service management and control data processing method and device
CN113327169B (en) Claims settlement method and device based on block chain and electronic equipment
CN110738481B (en) Digital asset hosting risk control method, device and storage medium
CN102567875A (en) Third-party-dominant electronic debt repayment method and system
FR3033205A1 (en) METHOD OF TRANSACTING WITHOUT PHYSICAL SUPPORT OF A SECURITY IDENTIFIER AND WITHOUT TOKEN, SECURED BY STRUCTURAL DECOUPLING OF PERSONAL AND SERVICE IDENTIFIERS.
WO2023276073A1 (en) Learning model evaluation system, learning model evaluation method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant