CN110738481B - Digital asset hosting risk control method, device and storage medium - Google Patents

Digital asset hosting risk control method, device and storage medium Download PDF

Info

Publication number
CN110738481B
CN110738481B CN201910901368.8A CN201910901368A CN110738481B CN 110738481 B CN110738481 B CN 110738481B CN 201910901368 A CN201910901368 A CN 201910901368A CN 110738481 B CN110738481 B CN 110738481B
Authority
CN
China
Prior art keywords
transaction
identity authentication
authentication
block chain
wind control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910901368.8A
Other languages
Chinese (zh)
Other versions
CN110738481A (en
Inventor
吴思进
李斌
曹兢
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201910901368.8A priority Critical patent/CN110738481B/en
Publication of CN110738481A publication Critical patent/CN110738481A/en
Application granted granted Critical
Publication of CN110738481B publication Critical patent/CN110738481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention provides a method, equipment and a storage medium for controlling the risk of digital asset hosting, wherein the method comprises the following steps: responding to the quotation operation of the current user, generating quotation transaction and sending the quotation transaction to a node of the first block chain for broadcasting, packaging and executing through a first contract, and recording the quotation transaction on the first block chain; accessing a third-party identity authentication distributed application to perform identity authentication, generating an identity authentication transaction and sending the identity authentication transaction to a node of a first block chain for broadcasting, packaging and executing through a first contract after the identity authentication of the third-party identity authentication distributed application is completed, generating an increased result according to the increased transaction and the identity authentication transaction to update the money-extracting amount of the current user and recording the increased result on the first block chain; and acquiring the money drawing amount of the current user. The method and the system realize separation of the trusteeship service and the wind control service and decentralization of wind control strategy configuration management.

Description

Digital asset hosting risk control method, device and storage medium
Technical Field
The application relates to the technical field of internet finance, in particular to a digital asset hosting risk control method, equipment and a storage medium.
Background
The current digital asset management mode is that a user manages the digital asset through a private key, so that the digital asset is permanently lost once the private key is lost, the information of the private key and a plurality of mnemonics configured with a fixed sequence are very difficult to remember for the user, most of users need to avoid forgetting the private key through exporting storage, screen capturing and storing, recording under an online mode and other modes, but the modes still have the problem of easy loss or easy stealing, so that the digital asset management is very inconvenient.
In view of the above problems, the applicant has previously proposed a digital asset hosting scheme (see patent CN201811151114.0 for details). In the scheme, only one wind control scheme for carrying out wind control management on the money withdrawal of the user by the escrow service end is provided, and the wind control scheme has the following defects: on one hand, the coupling of the managed service and the wind control management centralizes the wind control service, and the configuration right of a user without the option and the wind control strategy is controlled by the centralized managed service party; on the other hand, the managed service party cannot provide only managed service, but needs to provide wind control service at the same time.
Disclosure of Invention
In view of the above-mentioned deficiencies or inadequacies in the prior art, it would be desirable to provide a method, apparatus, and storage medium for digital asset hosting risk control that separates hosting services and wind control services, decentralizes configuration management wind control policies.
In a first aspect, the present invention provides a digital asset escrow risk control method applicable to a user end, where a first block chain is configured with a first contract for managing a money withdrawal amount of an escrow account, and a plurality of third-party identity authentication distributed applications specified by the first block chain are configured in a device running the user end, where the method includes:
responding to the quotation operation of the current user, generating quotation transaction and sending the quotation transaction to a node of the first block chain for broadcasting, packaging and executing through a first contract, and recording the quotation transaction on the first block chain;
accessing a third-party identity authentication distributed application to perform identity authentication, generating an identity authentication transaction and sending the identity authentication transaction to a node of a first block chain for broadcasting, packaging and executing through a first contract after the identity authentication of the third-party identity authentication distributed application is completed, generating an increased result according to the increased transaction and the identity authentication transaction to update the money-extracting amount of the current user and recording the increased result on the first block chain;
and acquiring the money drawing amount of the current user.
In a second aspect, the present invention provides a digital asset escrow risk control method applied to a blockchain node, where a first contract for managing a money withdrawal amount of an escrow account is configured on a first blockchain, the method including:
receiving, broadcasting, packaging and executing the rate-increasing transaction through a first contract, and recording the rate-increasing transaction on a first block chain; the user end generates a quota transaction in response to a quota operation of a first user, and runs a plurality of third-party identity authentication distributed applications designated by a first block chain in equipment of the user end;
receiving, broadcasting, packaging and executing identity authentication transaction through a first contract, generating a money-drawing result according to the money-drawing transaction and the identity authentication transaction to update the money-drawing amount of the first user and record the money-drawing amount on a first block chain, so that the user end can obtain the money-drawing amount of the first user; the identity authentication transaction is generated after the user side accesses the third-party identity authentication distributed application for identity authentication by the third-party identity authentication distributed application.
In a third aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a digital asset hosting risk control method provided according to embodiments of the present invention.
In a fourth aspect, the present invention also provides a storage medium storing a computer program, the computer program causing a computer to execute the digital asset hosting risk control method according to the embodiments of the present invention.
The digital asset escrow risk control method, the equipment and the storage medium provided by the embodiments of the invention configure the contract for managing the escrow account money lifting amount on the block chain, and the contract judges whether to lift the money lifting amount according to the money lifting transaction sent by the user end and the identity authentication transaction sent after the user performs the identity authentication according to the third party identity authentication specified by the block chain, so that the escrow account is controlled by the contract configured on the block chain and the third party identity authentication service party manageable by the block chain, the escrow service and the wind control service are separated, and the decentralization of the wind control strategy configuration management is realized;
the digital asset hosting risk control method, the equipment and the storage medium provided by some embodiments of the invention further improve the wind control mechanism by configuring a wind control strategy which is not limited to limit money raising in a contract and performing wind control investigation when a wind control server triggers wind control authentication.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a digital asset hosting risk control method according to an embodiment of the present invention.
Fig. 2 is a flowchart of another digital asset hosting risk control method according to an embodiment of the present invention.
FIG. 3 is a flow chart of a preferred embodiment of the method shown in FIG. 2.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a flowchart of a digital asset hosting risk control method according to an embodiment of the present invention.
As shown in fig. 1, in this embodiment, the present invention provides a method for controlling digital asset hosting risk applicable to a user side, where a first contract for managing a money drawing amount of a hosted account is configured on a first blockchain, and a plurality of third-party identity authentication distributed applications (third-party identity authentications DAPPs) specified by the first blockchain are configured in a device of the user side, where the method includes:
s12: responding to the quotation operation of the current user, generating quotation transaction and sending the quotation transaction to a node of the first block chain for broadcasting, packaging and executing through a first contract, and recording the quotation transaction on the first block chain;
s14: accessing a third-party identity authentication distributed application to perform identity authentication, generating an identity authentication transaction and sending the identity authentication transaction to a node of a first block chain for broadcasting, packaging and executing through a first contract after the identity authentication of the third-party identity authentication distributed application is completed, generating an increased result according to the increased transaction and the identity authentication transaction to update the money-extracting amount of the current user and recording the increased result on the first block chain;
s16: and acquiring the money drawing amount of the current user.
Taking 10000 XXA coins hosted by a user a, and a hosting service transferring 10000 YYY _ XXA tokens corresponding to the XXA tokens to a hosting account of the user a on a first blockchain as an example (wherein, the hosting principle may refer to patent CN 201811151114.0), in this embodiment, a first contract for managing a money-drawing amount of the hosting account is configured on the first blockchain, and three third-party identity authentications DAPP specified by the first blockchain are configured in a device of an operation user end of each user: SFRZ1, SFRZ2, SFRZ3, denomination initial configured as 500YYY _ XXA tokens per day.
Taking the example that the user A has extracted 50XXA coins on the same day, when the user A needs to extract 2000 XXA coins, the user side of the user A acquires the data of the first block chain to acquire the coin extraction amount of the coin remaining on the same day as 450XXA coins, and displays the coin extraction amount in the display interface. After knowing the information, the user A inputs the money-increasing operation of increasing the money-increasing amount of the current day to 2500XXA money to the user end.
In step S12, in response to the above-described denomination-advancing operation by the user a, the user side of the user a generates a request to advance the current-day denomination degree to the denomination transaction tx1 in the 2500XXA currency and transmits the request to the node of the first blockchain.
After receiving tx1, the node of the first block chain broadcasts tx1, packages tx1 into blocks, executes tx1 by the first contract, records tx1 on the first block chain, and waits for receiving a corresponding authentication transaction to process a quota request of tx 1.
In step S14, the user side of the user a accesses (either randomly selected, selects a default, or selected by the user) an item of third party identity authentication DAPP, for example, SFRZ1 to complete the identity authentication. In this embodiment, when the user side of the user a calls the interface to access the SFRZ1, the hash value hash (tx1) of tx1 should be provided for generating the authentication transaction; in further embodiments, other information for finding tx1 may be configured, such as a referral request number assigned by the first contract tx1, or other different information as would be understood by one skilled in the art. The specific manner of the identity authentication can be configured as any one or more of the following: the method comprises the following steps of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face identification authentication, fingerprint identification authentication, safety problem authentication and emergency contact authentication.
After the user A completes identity authentication, the SFRZ1 generates an identity authentication transaction tx2 according to the identity authentication result and hash (tx1) and sends the identity authentication transaction tx2 to the node of the first block chain.
After receiving tx2, the node of the first block chain broadcasts tx2, packs tx2 into blocks, executes tx2 through the first contract, finds tx1 according to hash (tx1), and confirms whether the identity authentication of the user A is successful according to the identity authentication result in tx 2:
if not, the quota request of tx1 fails, and the quota degree of the current day of the escrow account of the user A is unchanged;
if yes, the quotation request of tx1 is successful, and the current quotation of the escrow account of user A is modified to 2500XXA coins and recorded on the first block chain.
In step S16, the user side of the user a obtains the money-lifting amount of the user a on the current day through the data of the first block chain, and displays the money-lifting amount on the display interface, so that the user a carries out the money lifting of the 2000 XXA coins after knowing that the money lifting amount is successful.
The above embodiment takes the initial configuration of the denomination as 500 tokens/day, tx1 requesting to raise the denomination of the withdrawal of the day as an example, and the method shown in fig. 1 is exemplarily explained; in further embodiments, the monetary withdrawal amount may also be initially configured in the above method as a first fixed amount in each first period (e.g., daily, weekly, or monthly, etc.), a first proportion of a second fixed amount in each first period (which may be initially configured by the first contract and allowed to be modified by the user, or may be configured by the user himself/herself when creating the escrow account), or other different configurations that may be understood by those skilled in the art; and tx1 may request to raise a multi-day or daily withdrawal limit, etc., all to achieve the same technical effect.
In addition, it should be noted that the third-party identity authentication DAPP may be decentralized managed by a decentralized manager of the first blockchain (for example, management committee/super node/all users, depending on which type of blockchain the first blockchain is specifically configured for), when the third-party identity authentication DAPP has abnormal behaviors such as service abnormality or cheating, the user side may generate a complaint transaction according to corresponding evidence and send the complaint transaction to the node of the first blockchain to trigger a complaint flow, and regarding the management flow after triggering the complaint flow, a person skilled in the art may understand the decentralized management flow, which is not described herein again.
In the embodiment, the contract for managing the escrow account money lifting amount is configured on the blockchain, and whether the money lifting amount is lifted is judged according to the contract sent by the user end and the identity authentication transaction sent by the third party identity authentication appointed by the blockchain after the user performs identity authentication, so that the escrow account is controlled by the contract configured on the blockchain and the third party identity authentication server manageable by the blockchain, the escrow service and the wind control service are separated, and the decentralized management of the wind control strategy configuration management is realized.
In a preferred embodiment, the first contract is further configured to, when the rate-offer transaction is executed, determine whether the rate-offer transaction triggers the wind control authentication according to a preconfigured wind control policy, and record a determination result on the first block chain, so that the wind control server obtains the determination result, performs the wind control investigation when the rate-offer transaction triggers the wind control authentication, generates the wind control transaction according to the investigation result, and sends the wind control transaction to a node of the first block chain; and, performing a wind-controlled transaction to record the survey results on the first blockchain;
generating the rate-increasing result according to the rate-increasing transaction and the identity authentication transaction comprises generating the rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
Specifically, taking as an example a case where the wind control policy is configured to identify an abnormal quota request (e.g., multiple request quotas in a short time, multiple request quotas on a single day, a large number of user request quotas in a short time, an abnormal quota identified based on user characteristics, an abnormal quota identified based on business characteristics, etc.), when the first contract identifies that the quota request of tx1 is an abnormal quota request when performing quota transaction tx1, wind control authentication is triggered, and abnormal quota request information is generated and recorded on the first blockchain.
After the wind control server side obtains the abnormal quota increasing request information, manual wind control investigation or automatic wind control investigation can be performed according to a preconfigured wind control flow, a wind control transaction tx3 is generated according to the investigation result, and tx3 is sent to the node of the first block chain.
After receiving tx3, the node of the first block chain broadcasts tx3, packs tx3 into blocks, executes tx3 by the first contract, and records the investigation result on the first block chain, so that when tx2 is executed, whether the quotation request is successful is judged according to the identity authentication result and the wind control investigation result.
Preferably, to avoid that the client sends tx2 ahead of time before tx3 succeeds in tx2, which results in tx2 failing to perform successfully, tx2 needs to be retransmitted, the first contract may be configured to determine whether tx1 triggers the wind-controlled authentication when tx2 is performed:
if yes, judging whether the first block chain records the corresponding tx 3:
if yes, judging whether the quota request is successful according to tx1, tx2 and tx 3;
if not, recording tx2 on the first block chain and waiting for the corresponding tx3 before timing out; and, when tx3 is executed, determining whether a corresponding tx2 is recorded on the first block chain: if yes, then it is determined whether the request for a quota was successful based on tx1, tx2, and tx 3.
The embodiment further improves the wind control mechanism by configuring the wind control strategy which is not limited to limit money lifting in the contract and carrying out wind control investigation when the wind control service party triggers the wind control authentication.
Preferably, in any of the above methods, when the money withdrawal transaction before or after the withdrawal is configured as a payment transaction, a deferred payment parameter may be configured in the payment transaction based on a wallet retrieval scheme (see CN201410533888.5 patent), so as to combine the wind control of the escrow account with the on-chain deferred withdrawable payment.
Fig. 2 is a flowchart of another digital asset hosting risk control method according to an embodiment of the present invention. The method of fig. 2 may be performed in conjunction with the method of fig. 1.
As shown in fig. 2, in this embodiment, the present invention further provides a digital asset hosting risk control method applied to a blockchain node, where a first contract for managing a money-drawing amount of a hosted account is configured on a first blockchain, and the method includes:
s22: receiving, broadcasting, packaging and executing the rate-increasing transaction through a first contract, and recording the rate-increasing transaction on a first block chain; the user end generates a quota transaction in response to a quota operation of a first user, and runs a plurality of third-party identity authentication distributed applications designated by a first block chain in equipment of the user end;
s24: receiving, broadcasting, packaging and executing identity authentication transaction through a first contract, generating a money-drawing result according to the money-drawing transaction and the identity authentication transaction to update the money-drawing amount of the first user and record the money-drawing amount on a first block chain, so that the user end can obtain the money-drawing amount of the first user; the identity authentication transaction is generated after the user side accesses the third-party identity authentication distributed application for identity authentication by the third-party identity authentication distributed application.
The wind control principle of the method shown in fig. 2 can refer to the method shown in fig. 1, and the details are not repeated here.
FIG. 3 is a flow chart of a preferred embodiment of the method shown in FIG. 2. The method of fig. 3 may be performed in conjunction with the preferred embodiment of the method of fig. 1.
As shown in FIG. 3, in a preferred embodiment, executing the nomination transaction via the first contract in step S22 further comprises:
the method comprises the steps that when a first contract executes an offer transaction, whether the offer transaction triggers wind control authentication or not is judged according to a pre-configured wind control strategy, and a judgment result is recorded on a first block chain, so that a wind control server side obtains the judgment result, carries out wind control investigation when the offer transaction triggers the wind control authentication, generates a wind control transaction according to the investigation result and sends the wind control transaction to a node of the first block chain;
the method further comprises the following steps:
s23: performing a wind-controlled transaction by a first contract to record survey results on a first blockchain;
the generating of the rate-increasing result according to the rate-increasing transaction and the identity authentication transaction in the step S24 includes:
and generating a rate-increasing result according to the rate-increasing transaction, the identity authentication transaction and the investigation result.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 4, as another aspect, the present application also provides an apparatus 400 including one or more Central Processing Units (CPUs) 401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the device 400 are also stored. The CPU401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to an embodiment of the present disclosure, the digital asset hosting risk control method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing a digital asset hosting risk control method. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the digital asset hosting risk control methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A risk control method for digital asset hosting is characterized in that a first block chain is configured with a first contract for managing the money drawing amount of a hosting account, the method is suitable for a user end, and a plurality of third-party identity authentication distributed applications which are specified by the first block chain and are configured in equipment of the user end are operated, wherein the method comprises the following steps:
responding to the quotation operation of the current user, generating quotation transaction and sending the quotation transaction to a node of the first block chain for broadcasting, packaging and executing through the first contract, and recording the quotation transaction on the first block chain;
accessing the third-party identity authentication distributed application to perform identity authentication, so that after the identity authentication is completed, the third-party identity authentication distributed application generates an identity authentication transaction and sends the identity authentication transaction to a node of the first block chain for broadcasting, packaging and execution through the first contract, and generates an increased result according to the increased transaction and the identity authentication transaction to update the money-extracting amount of the current user and record the increased result on the first block chain;
and acquiring the money drawing amount of the current user.
2. The method according to claim 1, wherein the first contract is further configured to determine whether the volume offer transaction triggers a wind control authentication according to a preconfigured wind control policy when the volume offer transaction is executed, and record a determination result on the first block chain, so that a wind control server obtains the determination result, performs a wind control investigation when the volume offer transaction triggers the wind control authentication, generates a wind control transaction according to the investigation result, and sends the wind control transaction to a node of the first block chain; and, executing the wind-controlled transaction to record the survey results on the first blockchain;
generating a rate-raising result according to the rate-raising transaction and the identity authentication transaction comprises generating a rate-raising result according to the rate-raising transaction, the identity authentication transaction and the investigation result.
3. The method according to claim 1 or 2, wherein the identity authentication comprises at least one of: the method comprises the following steps of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face identification authentication, fingerprint identification authentication, safety problem authentication and emergency contact authentication.
4. The method according to claim 1 or 2, wherein the monetary denomination is initially configured as any one of: a first fixed value unit in each first period, and a first proportion of a second fixed value unit in each first period.
5. A digital asset hosting risk control method is characterized in that a first contract used for managing the money drawing amount of a hosting account is configured on a first block chain, the method is suitable for a block chain node, and the method comprises the following steps:
receiving, broadcasting, packaging and executing a rate-increasing transaction through the first contract, and recording the rate-increasing transaction on the first block chain; the user end generates the quota transaction in response to quota operation of the first user, and runs a plurality of third-party identity authentication distributed applications which are specified by the first block chain and configured in equipment of the user end;
receiving, broadcasting, packaging and executing identity authentication transaction through the first contract, generating a money withdrawal result according to the money withdrawal transaction and the identity authentication transaction to update the money withdrawal amount of the first user and record the money withdrawal amount on the first block chain, so that the user side can obtain the money withdrawal amount of the first user; the identity authentication transaction is generated after the user side accesses the third-party identity authentication distributed application for identity authentication by the third-party identity authentication distributed application.
6. The method of claim 5, wherein said executing a nomination transaction via said first contract further comprises:
the first contract judges whether the rate-offer transaction triggers the wind control authentication according to a pre-configured wind control strategy when executing the rate-offer transaction, records a judgment result on the first block chain, so that a wind control server side acquires the judgment result, carries out wind control investigation when the rate-offer transaction triggers the wind control authentication, generates the wind control transaction according to the investigation result and sends the wind control transaction to a node of the first block chain;
the method further comprises the following steps:
executing the wind-controlled transaction by the first contract to record the survey results on the first blockchain;
the generating a rate-raising result according to the rate-raising transaction and the identity authentication transaction comprises:
and generating a quota improving result according to the quota improving transaction, the identity authentication transaction and the investigation result.
7. The method according to claim 5 or 6, wherein the identity authentication comprises at least one of: the method comprises the following steps of mobile phone verification code authentication, mailbox verification code authentication, identity card authentication, face identification authentication, fingerprint identification authentication, safety problem authentication and emergency contact authentication.
8. The method of claim 5 or 6, wherein the monetary denomination is initially configured as either: a first fixed value unit in each first period, and a first proportion of a second fixed value unit in each first period.
9. An electronic device, characterized in that the electronic device comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-8.
10. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-8.
CN201910901368.8A 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium Active CN110738481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910901368.8A CN110738481B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910901368.8A CN110738481B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Publications (2)

Publication Number Publication Date
CN110738481A CN110738481A (en) 2020-01-31
CN110738481B true CN110738481B (en) 2022-09-13

Family

ID=69269495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910901368.8A Active CN110738481B (en) 2019-09-23 2019-09-23 Digital asset hosting risk control method, device and storage medium

Country Status (1)

Country Link
CN (1) CN110738481B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493024A (en) * 2018-09-29 2019-03-19 杭州复杂美科技有限公司 Digital asset trustship method, equipment and storage medium
CN109544339A (en) * 2018-11-16 2019-03-29 海南新软软件有限公司 A kind of price steadiness type digital asset converts into method, apparatus and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991512A (en) * 2016-01-21 2017-07-28 阿里巴巴集团控股有限公司 Risk treating method and apparatus
CN106447434A (en) * 2016-09-14 2017-02-22 全联征信有限公司 Personal credit ecological platform
WO2018175666A1 (en) * 2017-03-21 2018-09-27 Dappsters, LLC Blockchain systems and methods
US20180285971A1 (en) * 2017-03-31 2018-10-04 International Business Machines Corporation Management of consumer debt collection using a blockchain and machine learning
US20190197831A1 (en) * 2017-11-03 2019-06-27 Signal Zero, Inc. Systems and Methods to Generate New Units of a Coin or Currency Having Inherent Value in a Digital Environment
CN108009441B (en) * 2017-11-23 2023-05-30 创新先进技术有限公司 Method and apparatus for resource transfer and funds transfer
CN108810868B (en) * 2018-05-31 2021-10-15 中国联合网络通信集团有限公司 Operation method of shared package and shared package system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493024A (en) * 2018-09-29 2019-03-19 杭州复杂美科技有限公司 Digital asset trustship method, equipment and storage medium
CN109544339A (en) * 2018-11-16 2019-03-29 海南新软软件有限公司 A kind of price steadiness type digital asset converts into method, apparatus and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Privacy in Bitcoin Transactions:New Chanllenges from Blockchain Scalability Solutions";Srdjan Sladojevic等;《Computational Intelligence and Neuroscience》;20160622;第26-44页 *
"基于区块链的数字资产信托业务创新与探索";潘云鹏;《现代商业》;20181218;第93-94页 *

Also Published As

Publication number Publication date
CN110738481A (en) 2020-01-31

Similar Documents

Publication Publication Date Title
US10068437B2 (en) Automatic teller machine inventory and distribution system
AU2018323233A1 (en) Resource transfer method, fund payment method and apparatus, and electronic device
US20180349990A1 (en) Point-of-sale system for real-time risk assessment, instant message-based collaborative guarantorship, and method for using the same
CN109544335B (en) Transaction data processing method, device, equipment and storage medium based on blockchain
US20220141217A1 (en) Authentication server, and non-transitory storage medium
CN108600250A (en) Authentication method
CN108961034A (en) System and method, storage medium based on user behavior certification
CN108270789A (en) Internetbank activating method, equipment, system and computer readable storage medium
CN106296154A (en) Transaction methods and system
CN110738481B (en) Digital asset hosting risk control method, device and storage medium
CN110738480B (en) Digital asset hosting risk control method, device and storage medium
JP7021601B2 (en) Control programs, control methods, and information processing equipment
WO2016135419A1 (en) Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers
JP7176158B1 (en) LEARNING MODEL EVALUATION SYSTEM, LEARNING MODEL EVALUATION METHOD, AND PROGRAM
CN112200396B (en) Resource transfer and allocation method and device
JP6559398B2 (en) Approval request method, approval request program, and bank system
US10216830B2 (en) Multicomputer processing of client device request data using centralized event orchestrator and link discovery engine
CN112686666A (en) Electronic wallet transaction method and device for railway business system
CN112101915A (en) Financial service management and control data processing method and device
CN112184460A (en) House maintenance fund management method, equipment and storage medium
CN111932800A (en) Security verification method and device
US20240037530A1 (en) Dynamic NFT-Based Frictionless Transaction System
JP6476344B2 (en) Cash transaction system and cash transaction method
JP7176157B1 (en) LEARNING MODEL CREATION SYSTEM, LEARNING MODEL CREATION METHOD AND PROGRAM
CN114926183A (en) Application login method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant