CN110955729A - Block chain based cheating client information sharing method, equipment and system - Google Patents

Block chain based cheating client information sharing method, equipment and system Download PDF

Info

Publication number
CN110955729A
CN110955729A CN201911211811.5A CN201911211811A CN110955729A CN 110955729 A CN110955729 A CN 110955729A CN 201911211811 A CN201911211811 A CN 201911211811A CN 110955729 A CN110955729 A CN 110955729A
Authority
CN
China
Prior art keywords
information
chain
transaction information
client
alliance chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911211811.5A
Other languages
Chinese (zh)
Inventor
梁栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN201911211811.5A priority Critical patent/CN110955729A/en
Publication of CN110955729A publication Critical patent/CN110955729A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention provides a block chain-based cheating client information sharing method, a block chain-based cheating client information sharing system, computer equipment and a computer readable storage medium, and relates to the technical field of data processing. The method comprises the following steps: building a block chain alliance chain, adding each organization into the alliance chain to serve as a node of the alliance chain, and achieving a consensus rule; the enterprise collects the generated cheating client information through a corresponding wind control system, signs the cheating client information as transaction information and then spreads the transaction information to the alliance chain; and the alliance chain screens out organizations with accounting right from the organizations according to the consensus rule so as to realize the sharing of the fraudulent customer information. According to the invention, by means of characteristics of decentralization, reckoning and the like of the block chain, the risk client list is shared by all the institutions together, a final fraud list library is formed, and the healthy digital financial ecology is maintained.

Description

Block chain based cheating client information sharing method, equipment and system
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data sharing technology, and in particular, to a block chain-based method for sharing fraudulent client information, a block chain-based system for sharing fraudulent client information, a computer device, and a computer-readable storage medium.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
At present, with the rise of the internet, more and more financial scenes have a fraud phenomenon. Moreover, the client has the characteristic of fleeing from one organization to another, continuous fraud and the development of digital financial fraud are glancing, and the client has penetrated into various links of financial marketing, registration, loan, payment and the like.
In the prior art, fraudulent customers of all banks are screened out by all banks through the wind control system respectively. Because the service types, the wind control rules and the system designs of all banks are different and all systems are mutually independent, the screened cheating client information cannot be suitable for other organizations, and all organizations cannot share blacklist clients, so that more and more cheating clients can move across, the digital financial ecology is seriously damaged, and great economic loss is caused.
Therefore, how to provide a new solution, which can solve the above technical defects, is a technical problem to be solved in the art.
Disclosure of Invention
In view of the above, the present invention provides a block chain-based method for sharing fraudulent client information, a block chain-based device for sharing fraudulent client information, a business system, a computer device, and a computer-readable storage medium, which combine various organizations to share a risk client list together by means of characteristics of decentralization and traceability of a block chain, so as to form a final fraud list blacklist library, which is shared in a federation chain, and is beneficial to fighting against fraud among platforms together and maintaining a healthy digital financial ecology.
In order to achieve the above object, the present invention provides a block chain-based method for sharing fraudulent client information, the method comprising:
building a block chain alliance chain, adding each organization into the alliance chain to serve as a node of the alliance chain, and achieving a consensus rule;
the enterprise collects the generated cheating client information through a corresponding wind control system, signs the cheating client information as transaction information and then spreads the transaction information to the alliance chain;
and the alliance chain screens out organizations with accounting right from the organizations according to the consensus rule so as to realize the sharing of the fraudulent customer information.
In the preferred embodiment of the present invention, the node joining the federation chain is authenticated and then assigned with the authority, public key and private key.
In a preferred embodiment of the present invention, signing the fraudulent client information as transaction information and then propagating the signed fraudulent client information to the federation chain comprises:
the institution takes the fraudulent customer information as transaction information, and broadcasts the transaction information to a alliance chain after carrying out digital signature through a private key of the institution, wherein the transaction information comprises a customer identity number, a customer grade, a customer type and record content;
and the nodes are diffused through a P2P network, so that the transaction information is not lost in the propagation process.
In a preferred embodiment of the present invention, the method further comprises:
and other nodes which receive the transaction information after the network diffusion verify the transaction information and diffuse the verification result to the alliance chain.
In a preferred embodiment of the present invention, the league chain screening out institutions with accounting right from the institutions according to the consensus rule to realize the sharing of the fraudulent customer information comprises:
the alliance chain screens out a target node according to the consensus rule in combination with the transaction information, wherein the consensus rule is achieved by adopting a POW algorithm;
granting accounting rights to the target node;
and the target node packs the transaction information generated in a time period into blocks, adds the blocks into the main chain of the alliance chain to realize the sharing of the cheating customer information, and simultaneously obtains a credit right.
In a preferred embodiment of the present invention, the method further comprises:
the alliance chain obtains a query request sent by an organization with the point meeting the query requirement;
and triggering a query contract according to the query request to query to obtain a blacklist of the fraudulent client so as to perform corresponding wind control.
One of the objects of the present invention is to provide a block chain based rogue client information sharing device, comprising:
the alliance chain building module is used for building an alliance chain of the block chain, and each organization is added into the alliance chain to serve as a node of the alliance chain and reach an consensus rule;
the client information collection module is used for collecting the generated cheating client information through a wind control system corresponding to the mechanism;
the client information publishing module is used for signing the fraudulent client information as transaction information and then spreading the transaction information to the alliance chain;
and the client information sharing module is used for screening out the institutions with the accounting right from the institutions according to the consensus rule through the alliance chain so as to realize the sharing of the fraudulent client information.
In a preferred embodiment of the present invention, the client information publishing module includes:
the client information signature module is used for taking the fraudulent client information as transaction information, performing digital signature through a private key of the organization and broadcasting the transaction information to a alliance chain, wherein the transaction information comprises a client identity card number, a client grade, a client type and record content;
and the transaction information diffusion module is used for diffusing the transaction information among the nodes through a P2P network, so that the transaction information is not lost in the propagation process.
In a preferred embodiment of the present invention, the system further comprises:
and the transaction information verification module is used for verifying the transaction information by other nodes which receive the transaction information after the network diffusion, and diffusing a verification result into the alliance chain.
In a preferred embodiment of the present invention, the client information sharing module includes:
the target node screening module is used for screening out a target node by combining the alliance chain with the transaction information according to the consensus rule, wherein the consensus rule is achieved by adopting a POW algorithm;
the accounting right granting module is used for granting the accounting right to the target node;
and the credit interest acquisition module is used for packaging transaction information generated in a time period into blocks through the target node, adding the blocks into the main chain of the alliance chain to realize the sharing of the cheating customer information, and acquiring a credit interest.
In a preferred embodiment of the present invention, the system further comprises:
the query request acquisition module is used for acquiring a query request sent by a mechanism with the integral meeting the query requirement through the alliance chain;
and the client information query module is used for triggering a query contract to query according to the query request to obtain a blacklist of the fraudulent client so as to perform corresponding wind control.
One of the objects of the present invention is to provide a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements a block chain based rogue client information sharing method when executing the computer program.
One of the objects of the present invention is to provide a computer-readable storage medium storing a program for executing a block chain-based fraudulent client information sharing method.
The invention has the advantages that the invention provides a block chain-based cheating client information sharing method, block chain-based cheating client information sharing equipment, a service system, computer equipment and a computer readable storage medium, the block chain technology is utilized, the cheating client information consensus among different organizations is realized by means of the characteristics of decentralization and non-falsification of the block chain, the final cheating client blacklist library is determined, other organizations in the alliance chain can share the list, the cheating client database can be shared among the organizations, the cheating client can be prevented jointly, and people who have cheating clients are difficult to walk.
In order to make the aforementioned and other objects, features and advantages of the invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a block chain-based federation chain structure diagram constructed in an embodiment of the present invention;
FIG. 2 is a schematic diagram of a fraudulent client information sharing system according to an embodiment of the present invention;
FIG. 3 is a flow chart illustrating a block chain based method for sharing information of a fraudulent client in accordance with an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a block chain-based rogue client information sharing system according to an embodiment of the present invention;
fig. 5 is a flowchart of a block chain-based method for sharing fraudulent client information according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, method or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
In the prior art, with the rise of the internet, more and more financial scenes have a fraud phenomenon, and the client has the characteristic of fleeing from one organization to another organization, continuous fraud and the development of digital financial fraud are glancing, and the client has penetrated into various links of financial marketing, registration, loan, payment and the like.
The blockchain technique originated in 2008 in a paper "bitcoin: a point-to-point electronic cash system is considered as a fifth subversion innovation in recent years due to the explosive growth situation of block chain technology research and application, and the block chain technology is a prototype of next-generation cloud computing and is expected to realize the transition from the current information internet to the value internet.
The block chain has the characteristics of decentralization, time sequence data, programmability, safety and credibility. The external attack is resisted by means of strong calculation force formed by consensus algorithms such as workload certification and the like of each node of the distributed system, the data of the block chain is guaranteed not to be tampered, and the data is guaranteed to be safe and reliable.
The alliance chain is built inside an enterprise, the operation of the system is determined inside the enterprise, only a few nodes have modification authority, and meanwhile the authenticity and the partial decentralization characteristic of the block chain are reserved.
The alliance chain is between the public chain and the alliance chain, is jointly initiated by a plurality of mechanisms and has the characteristic of partial decentralization.
Based on this, the inventor of the application researches a client risk information sharing scheme based on the block chain, and combines various institutions to share the risk client list together by virtue of characteristics of decentralization, tracking and the like of the block chain to form a final fraud list blacklist library which is shared in a alliance chain, so that the fraud phenomenon can be struck among platforms together, and the healthy digital financial ecology can be maintained.
Specifically, fig. 4 is a schematic structural diagram of a block chain-based fraudulent client information sharing system according to an embodiment of the present invention, please refer to fig. 4, where the system includes:
and the alliance chain building module 100 is used for building an alliance chain of the block chain, and each organization is added to the alliance chain to serve as a node of the alliance chain and reach a consensus rule.
In the present invention, it is necessary to first build a federation chain, then attract institutions such as banks, insurance, tax authorities, wires, etc. to join this federation chain, and to reach an agreement for the consensus validation of fraudulent customer information, with which the parties are seriously respected. In a specific embodiment, the first construction of the alliance chain platform requires review by the financial regulatory authority and a certain cost investment.
Fig. 1 is a schematic structural diagram of a block chain-based federation chain constructed in an embodiment of the present invention, as shown in fig. 1, organizations such as bank a, insurance G, tax bureau C, electric wire D, etc. are added to the federation chain as nodes of a platform.
In one embodiment of the present invention, the consensus rule may be achieved using a POW algorithm. Specifically, in an embodiment of the present invention, the protocol between the nodes follows the following principle:
protocol 1: the nodes can effectively and stably communicate with each other based on a distributed mechanism.
Protocol 2: and the nodes joining the alliance chain need to be verified, and the authority, the public key and the private key are distributed after verification.
Protocol 3: each node can collect high-risk user information through its own wind control system.
In addition, in one embodiment of the invention, the consensus rule can also specify which node issues more fraudulent customer information and has high quality, so that the node can obtain the billing right, package the information issued by the node into blocks and add the blocks into the main chain, and have bonus points.
And the client information collection module 200 is used for collecting the generated cheating client information through the wind control system corresponding to the organization.
The client information issuing module 300 is configured to sign the fraudulent client information as transaction information and then spread the transaction information to the federation chain.
In one embodiment of the present invention, the client information publishing module 300 includes:
the client information signature module is used for taking the fraudulent client information as transaction information, performing digital signature through a private key of the organization and broadcasting the transaction information to a alliance chain, wherein the transaction information comprises a client identity card number, a client grade, a client type and record content;
and the transaction information diffusion module is used for diffusing the transaction information among the nodes through a P2P network, so that the transaction information is not lost in the propagation process.
That is, in a specific embodiment, each node issues the respective collected fraudulent client information, and the transaction information is digitally signed and then propagated to other nodes in the federation chain.
Specifically, each node issues a fraudulent customer as a transaction message, which is digitally signed by the private key of the institution. The transaction information includes: customer identification number, customer grade, customer type, record content and the like. The nodes are diffused through the P2P network, and the transaction is guaranteed not to be lost in the propagation process. And generating a string of characters by adopting a hash algorithm according to the fraudulent client information, encrypting the transaction by using a private key of the organization, and broadcasting the encrypted transaction to the alliance chain.
In one embodiment of the present invention, the system further comprises:
and the transaction information verification module is used for verifying the transaction information by other nodes which receive the transaction information after the network diffusion, and diffusing a verification result into the alliance chain. That is, after receiving the record, the other institution nodes verify the transaction information, i.e. decrypt the transaction information by using the public key, and broadcast the verification result to the alliance chain after the verification is passed.
In one embodiment of the present invention, the system further comprises:
and the customer information sharing module 400 is used for screening out the institutions with the accounting right from the institutions according to the consensus rule through the alliance chain so as to realize the sharing of the fraudulent customer information.
In one embodiment of the present invention, the client information sharing module includes:
and the target node screening module is used for screening the target node by combining the alliance chain with the transaction information according to the consensus rule, wherein the consensus rule is achieved by adopting a POW algorithm.
And the accounting right granting module is used for granting the accounting right to the target node.
In one embodiment of the invention, according to the consensus algorithm, after the consensus verification of most institutions, the institution nodes which issue the most fraudulent customers are screened out to obtain the accounting right and give reward points.
Specifically, the nodes compete for the block accounting right in the period of time through a consensus algorithm, if a certain node acquires the accounting right, the transaction generated in the period of time is recorded into a new block of the node, and meanwhile, a credit right is acquired. The consensus algorithm based on P0W is mainly used for selecting the nodes with the most cheating clients and the highest quality. In order to prevent some nodes from maliciously publishing duplicate customer records, the records are compared with a fraudulent customer base, and if the publication duplicate records are found, the nodes are deprived of the right to compete for billing rights. After each transaction is sent out, the timestamp is covered, so that the transaction is not repeated, and the information of the latest transaction is conveniently searched.
In one embodiment of the present invention, the consensus verification rule is as follows: the consensus algorithm on which the node consensus verification in the network depends is to adopt a POW mechanism. Among them, the POW consensus mechanism is a mechanism based on workload certification. In the mechanism, each node participating in the computational competition is called a miner, and the process of solving the random number is called ore excavation. Each miner will perform a new round of mining when receiving a transaction or a new tile is added to the tile chain. The mining process is a process for solving a mathematical problem, a target value is calculated before mining each time, the target value is related to a difficulty coefficient, a random number is generated in each mining process of a miner, the random number is hashed with the hash value of the unique identification block, the generated result is compared with the target value, if the random number is smaller than the target value, the mining is considered to be successful, and if the random number is not smaller than the target value, the random number is reproduced to continue to operate until the random number is smaller than the target value. Since the whole process is irreversible hash, the random number can be solved only by continuous calculation. If some miners want to make block chains wrong, this can only be done if more than 50% of the calculation power is pooled for mining, which is impossible to accomplish with public chains. Because the consistency of the nodes of the whole network can be maintained by the POW consensus mechanism.
The client information sharing module further comprises:
and the credit interest acquisition module is used for packaging transaction information generated in a time period into blocks through the target node, adding the blocks into the main chain of the alliance chain to realize the sharing of the cheating customer information, and acquiring a credit interest. I.e. the node that got the accounting right, packs the records generated during this time into blocks and adds them to the backbone of the federation chain. All the cheating client information which is identified and verified commonly is stored in the main chain, marked as blacklist clients and stored in a cheating blacklist library of the block chain for sharing with other mechanisms, and therefore the early warning capability of nodes of other mechanisms can be improved conveniently.
In one embodiment of the present invention, the system further comprises:
the query request acquisition module is used for acquiring a query request sent by a mechanism with the integral meeting the query requirement through the alliance chain;
and the client information query module is used for triggering a query contract to query according to the query request to obtain a blacklist of the fraudulent client so as to perform corresponding wind control.
That is, other agencies need to deduct points if they need to query or use the fraud client blacklist repository. If the score reaches the query threshold, then the query is allowed, otherwise it cannot be queried and used. The inquiry adopts an intelligent contract mode, and an inquiry blacklist is written into a contract.
The system for sharing information of the fraudulent client based on the block chain includes that, firstly, each enterprise joins in the alliance chain, each enterprise serving as an alliance chain node achieves consensus, a set of agreement for the consensus of the fraudulent client is established among the enterprises, and all the enterprises strictly adhere to and mutually acknowledge the agreement. Secondly, each enterprise signs the transaction information and spreads the signed transaction information to other nodes of the alliance chain through the cheating customer information generated by early warning of the respective wind control system. When the transaction information is transmitted to other nodes, the other nodes can decrypt the transaction information by using the public key to verify the transaction information. Each node contends for accounting right through a consensus mechanism, issues the most cheating customer information, and a mechanism with the highest quality obtains the accounting right, packs and records all transactions in the period of time, assembles the transactions into blocks, covers a timestamp, and appends the blocks into a main chain to form a cheating customer blacklist library. The black list can be shared among the institutions, but the library can be viewed and shared only by spending certain points, and the viewing process is realized by adopting an intelligent contract.
Furthermore, although in the above detailed description several unit modules of the system are mentioned, this division is not mandatory only. Indeed, the features and functions of two or more of the units described above may be embodied in one unit, according to embodiments of the invention. Also, the features and functions of one unit described above may be further divided into embodiments by a plurality of units. The terms "module" and "unit" used above may be software and/or hardware that realizes a predetermined function. While the modules described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
Having described the system for blockchain-based fraudulent client information sharing in accordance with an exemplary embodiment of the present invention, the method of an exemplary embodiment of the present invention is now described with reference to the accompanying drawings. The implementation of the method can be referred to the above overall implementation, and repeated details are not repeated.
At present, each bank fraud client is screened out through a wind control system by each bank, and the service types, wind control rules and system designs of each organization are different, so that the screened fraud client information cannot be used in systems of other organizations, and each organization cannot share blacklist clients, thus causing the fraud clients to flee everywhere, causing fraud in different financial institution platforms, and causing great economic loss.
The invention utilizes the block chain technology, realizes the common identification of the cheating client information among different organizations by means of the characteristics of decentralization and non-falsification of the block chain, determines the final blacklist library of the cheating client, and other organizations in the alliance chain can share the list, thereby being beneficial to sharing the database of the cheating client among the organizations, commonly preventing the cheating client and ensuring that people who have the cheating client are difficult to walk.
Specifically, fig. 5 is a schematic flowchart of a block chain-based method for sharing fraudulent client information according to an embodiment of the present invention, please refer to fig. 5, where the method includes:
s101: and constructing a block chain alliance chain, and adding each mechanism into the alliance chain to serve as a node of the alliance chain and achieving a consensus rule.
In the present invention, it is necessary to first build a federation chain, then attract institutions such as banks, insurance, tax authorities, wires, etc. to join this federation chain, and to reach an agreement for the consensus validation of fraudulent customer information, with which the parties are seriously respected. In a specific embodiment, the first construction of the alliance chain platform requires review by the financial regulatory authority and a certain cost investment.
Fig. 1 is a schematic structural diagram of a block chain-based federation chain constructed in an embodiment of the present invention, as shown in fig. 1, organizations such as bank a, insurance G, tax bureau C, electric wire D, etc. are added to the federation chain as nodes of a platform.
In one embodiment of the present invention, the consensus rule may be achieved using a POW algorithm. Specifically, in an embodiment of the present invention, the protocol between the nodes follows the following principle:
protocol 1: the nodes can effectively and stably communicate with each other based on a distributed mechanism.
Protocol 2: and the nodes joining the alliance chain need to be verified, and the authority, the public key and the private key are distributed after verification.
Protocol 3: each node can collect high-risk user information through its own wind control system.
In addition, in one embodiment of the invention, the consensus rule can also specify which node issues more fraudulent customer information and has high quality, so that the node can obtain the billing right, package the information issued by the node into blocks and add the blocks into the main chain, and have bonus points.
S102: and collecting the generated cheating customer information through a wind control system corresponding to the organization, and taking the cheating customer information as transaction information to sign and then spreading the information to the alliance chain.
In one embodiment of the invention, the steps include:
the institution takes the fraudulent customer information as transaction information, and broadcasts the transaction information to a alliance chain after carrying out digital signature through a private key of the institution, wherein the transaction information comprises a customer identity number, a customer grade, a customer type and record content;
and the nodes are diffused through a P2P network, so that the transaction information is not lost in the propagation process.
That is, in a specific embodiment, each node issues the respective collected fraudulent client information, and the transaction information is digitally signed and then propagated to other nodes in the federation chain.
Specifically, each node issues a fraudulent customer as a transaction message, which is digitally signed by the private key of the institution. The transaction information includes: customer identification number, customer grade, customer type, record content and the like. The nodes are diffused through the P2P network, and the transaction is guaranteed not to be lost in the propagation process. And generating a string of characters by adopting a hash algorithm according to the fraudulent client information, encrypting the transaction by using a private key of the organization, and broadcasting the encrypted transaction to the alliance chain.
In one embodiment of the invention, the method further comprises:
and after the network is diffused, other nodes receiving the transaction information verify the transaction information, and diffuse the verification result into the alliance chain. That is, after receiving the record, the other institution nodes verify the transaction information, i.e. decrypt the transaction information by using the public key, and broadcast the verification result to the alliance chain after the verification is passed.
Referring to fig. 5, the method further includes:
s103: and the alliance chain screens out organizations with accounting right from the organizations according to the consensus rule so as to realize the sharing of the fraudulent customer information.
And the alliance chain screens out a target node by combining the transaction information according to the consensus rule, wherein the consensus rule is achieved by adopting a POW algorithm.
And granting accounting right to the target node.
In one embodiment of the invention, according to the consensus algorithm, after the consensus verification of most institutions, the institution nodes which issue the most fraudulent customers are screened out to obtain the accounting right and give reward points.
Specifically, the nodes compete for the block accounting right in the period of time through a consensus algorithm, if a certain node acquires the accounting right, the transaction generated in the period of time is recorded into a new block of the node, and meanwhile, a credit right is acquired. The consensus algorithm based on P0W is mainly used for selecting the nodes with the most cheating clients and the highest quality. In order to prevent some nodes from maliciously publishing duplicate customer records, the records are compared with a fraudulent customer base, and if the publication duplicate records are found, the nodes are deprived of the right to compete for billing rights. After each transaction is sent out, the timestamp is covered, so that the transaction is not repeated, and the information of the latest transaction is conveniently searched.
In one embodiment of the present invention, the consensus verification rule is as follows: the consensus algorithm on which the node consensus verification in the network depends is to adopt a POW mechanism. Among them, the POW consensus mechanism is a mechanism based on workload certification. In the mechanism, each node participating in the computational competition is called a miner, and the process of solving the random number is called ore excavation. Each miner will perform a new round of mining when receiving a transaction or a new tile is added to the tile chain. The mining process is a process for solving a mathematical problem, a target value is calculated before mining each time, the target value is related to a difficulty coefficient, a random number is generated in each mining process of a miner, the random number is hashed with the hash value of the unique identification block, the generated result is compared with the target value, if the random number is smaller than the target value, the mining is considered to be successful, and if the random number is not smaller than the target value, the random number is reproduced to continue to operate until the random number is smaller than the target value. Since the whole process is irreversible hash, the random number can be solved only by continuous calculation. If some miners want to make block chains wrong, this can only be done if more than 50% of the calculation power is pooled for mining, which is impossible to accomplish with public chains. Because the consistency of the nodes of the whole network can be maintained by the POW consensus mechanism.
And packaging transaction information generated in a time period into blocks through the target node, and adding the blocks into a main chain of the alliance chain to realize the sharing of the fraudulent customer information and obtain a credit right. I.e. the node that got the accounting right, packs the records generated during this time into blocks and adds them to the backbone of the federation chain. All the cheating client information which is identified and verified commonly is stored in the main chain, marked as blacklist clients and stored in a cheating blacklist library of the block chain for sharing with other mechanisms, and therefore the early warning capability of nodes of other mechanisms can be improved conveniently.
In one embodiment of the invention, the method further comprises:
the alliance chain obtains a query request sent by an organization with the point meeting the query requirement;
and triggering a query contract according to the query request to query to obtain a blacklist of the fraudulent client so as to perform corresponding wind control.
That is, other agencies need to deduct points if they need to query or use the fraud client blacklist repository. If the score reaches the query threshold, then the query is allowed, otherwise it cannot be queried and used. The inquiry adopts an intelligent contract mode, and an inquiry blacklist is written into a contract.
The block chain-based method for sharing the information of the fraudulent client can realize mutual identification and sharing of the blacklist of the fraudulent client among the large institutions added into the alliance chain through the alliance chain, and greatly solves the fraud risk in the aspect of digital finance.
The invention also provides computer equipment which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the block chain-based cheating client information sharing method.
The present invention also provides a computer-readable storage medium storing a program for executing a block chain-based fraudulent client information sharing method.
It should be noted that while the operations of the method of the present invention are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions. Having described exemplary embodiments of the present invention, a system of exemplary embodiments of the present invention will now be described with reference to the accompanying drawings. The implementation of the system can be referred to the above overall implementation, and repeated details are not repeated.
The technical solution of the present invention will be described in detail with reference to specific examples.
Fig. 2 is a schematic structural diagram of a fraudulent client information sharing system according to an embodiment of the present invention, please refer to fig. 2, in which the system includes the following four virtual modules:
the collection module 1: each organization node collects fraudulent customer information generated by the respective system.
And the release module 2: and each node signs the collected fraudulent client information and spreads the fraudulent client information into a block chain.
A consensus module 3: and other nodes receiving the information carry out verification, and the verification result is diffused into the block chain, wherein the consensus rule is determined according to the POW algorithm: which node issues much fraudulent customer information and has high quality, the node can obtain the accounting right, and the transaction information packaging block issued by the node can be added into the main chain and has reward.
And the query module 4: the method mainly provides the right of sharing the cheating client blacklist library for other clients in a alliance chain, but a certain integral is needed for inquiring the blacklist, if the node has enough integral, the inquiry is triggered, the contract is automatically inquired, and the mechanism can share the cheating client blacklist to further carry out corresponding wind control.
Fig. 3 is a schematic flowchart of a block chain-based method for sharing fraudulent client information according to an embodiment of the present invention, please refer to fig. 3, which includes:
s1: firstly, a alliance chain is established, N mechanisms are added into the alliance chain to serve as nodes in the alliance chain, and anti-fraud list sharing mutual identification protocols are formed among the nodes. The organization joining the federation chain, distributing private and public keys and permissions
S2: after joining the alliance chain, each institution issues respective fraud client records through respective wind control systems. Wherein the high risk credit record format: timestamp, user identity, risk type, etc. Each organization records the fraudulent customer as a transaction, digitally signs the transaction with the private key, and broadcasts the transaction into the federation chain.
S3: after receiving the record, other organizations verify the transaction, namely decrypt the transaction by using the public key, and broadcast the verification result to the alliance chain after the verification is passed.
S4: after the consensus verification of most institutions, based on the consensus algorithm, the institution nodes which issue the most cheat clients in the institutions are selected, the accounting right is obtained, and meanwhile, reward points are given.
S5: and the institution acquiring the accounting right records the cheating client in the period of time, packs the cheating client into blocks, adds the blocks into the alliance chain, and stores the blocks into the cheating client blacklist library. Such other agencies may need to deduct points if they need to query or use a high-risk blacklist library. The query is in the form of a smart contract, and if the point reaches a query threshold, the query is allowed. Otherwise, the points are insufficient and cannot be inquired and used.
In summary, the present invention provides a block chain-based method for sharing fraudulent client information, a block chain-based system for sharing fraudulent client information, a computer device, and a computer-readable storage medium, which construct a federation chain and automatically query in an intelligent contract manner, that is, consumption points are exchanged for the usage rights of a blacklist of fraudulent clients. In addition, when some organizations repeatedly release fraudulent customer information, punishment measures are adopted, accounting rights are deprived, and certain points are deducted.
The invention has the advantages that:
1. by adopting the technology of the alliance chain, each node joins the alliance chain and agrees on the information verification of the fraudulent client.
2. And an intelligent contract technology is adopted, so that point exchange is automatically realized to obtain the checking right of the blacklist library of the fraudulent client.
3. And a block chain consensus mechanism is adopted, so that the non-tampering property of the transaction is realized.
Improvements to a technology can clearly be distinguished between hardware improvements (e.g. improvements to the circuit structure of diodes, transistors, switches, etc.) and software improvements (improvements to the process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit.
Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), HDCal, JHDL (Java Hardware Description Language), langue, Lola, HDL, laspam, hardsradware (Hardware Description Language), vhjhd (Hardware Description Language), and vhigh-Language, which are currently used in most popular applications.
It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of software products, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and include instructions for causing a computer system (which may be a personal computer, a server, or a network system, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable systems, tablet-type systems, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics systems, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or systems, and the like.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing systems that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage systems.
While the present application has been described with examples, those skilled in the art will appreciate that there are numerous variations and permutations of the present application without departing from the spirit of the application, and it is intended that the appended claims encompass such variations and modifications as fall within the true spirit of the application.

Claims (14)

1. A blockchain-based method for sharing information of a fraudulent client, the method comprising:
building a block chain alliance chain, adding each organization into the alliance chain to serve as a node of the alliance chain, and achieving a consensus rule;
the enterprise collects the generated cheating client information through a corresponding wind control system, signs the cheating client information as transaction information and then spreads the transaction information to the alliance chain;
and the alliance chain screens out organizations with accounting right from the organizations according to the consensus rule so as to realize the sharing of the fraudulent customer information.
2. The method of claim 1, wherein nodes joining the federation chain are authenticated and assigned with an authority, a public key, and a private key.
3. The method of claim 2, wherein signing the rogue customer information as transaction information for dissemination to the federation chain comprises:
the institution takes the fraudulent customer information as transaction information, and broadcasts the transaction information to a alliance chain after carrying out digital signature through a private key of the institution, wherein the transaction information comprises a customer identity number, a customer grade, a customer type and record content;
and the nodes are diffused through a P2P network, so that the transaction information is not lost in the propagation process.
4. The method of claim 3, further comprising:
and other nodes which receive the transaction information after the network diffusion verify the transaction information and diffuse the verification result to the alliance chain.
5. The method of claim 4, wherein the federation chain screening out enterprises from the enterprises having billing rights according to the consensus rule to enable sharing of the fraudulent customer information comprises:
the alliance chain screens out a target node according to the consensus rule in combination with the transaction information, wherein the consensus rule is achieved by adopting a POW algorithm;
granting accounting rights to the target node;
and the target node packs the transaction information generated in a time period into blocks, adds the blocks into the main chain of the alliance chain to realize the sharing of the cheating customer information, and simultaneously obtains a credit right.
6. The method of claim 5, further comprising:
the alliance chain obtains a query request sent by an organization with the point meeting the query requirement;
and triggering a query contract according to the query request to query to obtain a blacklist of the fraudulent client so as to perform corresponding wind control.
7. A blockchain-based rogue customer information sharing system, the system comprising:
the alliance chain building module is used for building an alliance chain of the block chain, and each organization is added into the alliance chain to serve as a node of the alliance chain and reach an consensus rule;
the client information collection module is used for collecting the generated cheating client information through a wind control system corresponding to the mechanism;
the client information publishing module is used for signing the fraudulent client information as transaction information and then spreading the transaction information to the alliance chain;
and the client information sharing module is used for screening out the institutions with the accounting right from the institutions according to the consensus rule through the alliance chain so as to realize the sharing of the fraudulent client information.
8. The system of claim 7, wherein nodes joining the federation chain are authenticated and assigned with an authority, a public key, and a private key.
9. The system of claim 8, wherein the client information publishing module comprises:
the client information signature module is used for taking the fraudulent client information as transaction information, performing digital signature through a private key of the organization and broadcasting the transaction information to a alliance chain, wherein the transaction information comprises a client identity card number, a client grade, a client type and record content;
and the transaction information diffusion module is used for diffusing the transaction information among the nodes through a P2P network, so that the transaction information is not lost in the propagation process.
10. The system of claim 9, further comprising:
and the transaction information verification module is used for verifying the transaction information by other nodes which receive the transaction information after the network diffusion, and diffusing a verification result into the alliance chain.
11. The system of claim 10, wherein the client information sharing module comprises:
the target node screening module is used for screening out a target node by combining the alliance chain with the transaction information according to the consensus rule, wherein the consensus rule is achieved by adopting a POW algorithm;
the accounting right granting module is used for granting the accounting right to the target node;
and the credit interest acquisition module is used for packaging transaction information generated in a time period into blocks through the target node, adding the blocks into the main chain of the alliance chain to realize the sharing of the cheating customer information, and acquiring a credit interest.
12. The system of claim 11, further comprising:
the query request acquisition module is used for acquiring a query request sent by a mechanism with the integral meeting the query requirement through the alliance chain;
and the client information query module is used for triggering a query contract to query according to the query request to obtain a blacklist of the fraudulent client so as to perform corresponding wind control.
13. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the block chain based rogue client information sharing method according to any of claims 1 to 6 when executing the computer program.
14. A computer-readable storage medium storing a block chain-based rogue client information sharing method according to any one of claims 1 to 6.
CN201911211811.5A 2019-12-02 2019-12-02 Block chain based cheating client information sharing method, equipment and system Pending CN110955729A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911211811.5A CN110955729A (en) 2019-12-02 2019-12-02 Block chain based cheating client information sharing method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911211811.5A CN110955729A (en) 2019-12-02 2019-12-02 Block chain based cheating client information sharing method, equipment and system

Publications (1)

Publication Number Publication Date
CN110955729A true CN110955729A (en) 2020-04-03

Family

ID=69979564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911211811.5A Pending CN110955729A (en) 2019-12-02 2019-12-02 Block chain based cheating client information sharing method, equipment and system

Country Status (1)

Country Link
CN (1) CN110955729A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556148A (en) * 2020-04-27 2020-08-18 中国银行股份有限公司 Data sharing method, data sharing platform and device
CN112134710A (en) * 2020-09-21 2020-12-25 南京工程学院 Blacklist recording method and system based on block chain
CN112200583A (en) * 2020-10-28 2021-01-08 交通银行股份有限公司 Knowledge graph-based fraud client identification method
CN112215602A (en) * 2020-10-12 2021-01-12 支付宝(杭州)信息技术有限公司 Data query method, device and system and electronic equipment
CN112511309A (en) * 2020-11-19 2021-03-16 从法信息科技有限公司 Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment
CN112804340A (en) * 2021-01-26 2021-05-14 中国人寿保险股份有限公司上海数据中心 Insurance concern list data interaction system and method based on block chain
CN112862505A (en) * 2021-03-03 2021-05-28 中国工商银行股份有限公司 Anti-fraud information sharing method and device based on block chain
CN112884488A (en) * 2021-02-22 2021-06-01 湖南大学 Block chain-based fraud prevention crowd funding method and system
CN113542220A (en) * 2021-06-09 2021-10-22 浙江泰科数联信息技术有限公司 Data security sharing method based on block chain
CN113610640A (en) * 2021-09-30 2021-11-05 浙江网商银行股份有限公司 Event wind control method, device, equipment and storage medium based on alliance chain
CN113657994A (en) * 2021-08-20 2021-11-16 中国银行股份有限公司 Loan risk management control method and device based on alliance chain
US11343313B1 (en) 2021-01-28 2022-05-24 International Business Machines Corporation Fault tolerant periodic leader rotation for blockchain
CN114679258A (en) * 2020-12-24 2022-06-28 上海图灵加佳网络科技有限公司 Method for sharing risk client information among banks, storage medium and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN109347789A (en) * 2018-08-21 2019-02-15 平安科技(深圳)有限公司 The sharing method and medium of server, fraud customer information based on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN109347789A (en) * 2018-08-21 2019-02-15 平安科技(深圳)有限公司 The sharing method and medium of server, fraud customer information based on block chain

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556148A (en) * 2020-04-27 2020-08-18 中国银行股份有限公司 Data sharing method, data sharing platform and device
CN111556148B (en) * 2020-04-27 2022-10-21 中国银行股份有限公司 Data sharing method, data sharing platform and device
CN112134710A (en) * 2020-09-21 2020-12-25 南京工程学院 Blacklist recording method and system based on block chain
CN112215602A (en) * 2020-10-12 2021-01-12 支付宝(杭州)信息技术有限公司 Data query method, device and system and electronic equipment
CN112200583A (en) * 2020-10-28 2021-01-08 交通银行股份有限公司 Knowledge graph-based fraud client identification method
CN112200583B (en) * 2020-10-28 2023-12-19 交通银行股份有限公司 Knowledge graph-based fraudulent client identification method
CN112511309A (en) * 2020-11-19 2021-03-16 从法信息科技有限公司 Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment
CN112511309B (en) * 2020-11-19 2022-07-08 从法信息科技有限公司 Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment
CN114679258A (en) * 2020-12-24 2022-06-28 上海图灵加佳网络科技有限公司 Method for sharing risk client information among banks, storage medium and electronic equipment
CN112804340A (en) * 2021-01-26 2021-05-14 中国人寿保险股份有限公司上海数据中心 Insurance concern list data interaction system and method based on block chain
US11343313B1 (en) 2021-01-28 2022-05-24 International Business Machines Corporation Fault tolerant periodic leader rotation for blockchain
CN112884488A (en) * 2021-02-22 2021-06-01 湖南大学 Block chain-based fraud prevention crowd funding method and system
CN112884488B (en) * 2021-02-22 2024-03-22 湖南大学 Block chain-based fraud prevention crowd funding method and system
CN112862505A (en) * 2021-03-03 2021-05-28 中国工商银行股份有限公司 Anti-fraud information sharing method and device based on block chain
CN113542220A (en) * 2021-06-09 2021-10-22 浙江泰科数联信息技术有限公司 Data security sharing method based on block chain
CN113657994A (en) * 2021-08-20 2021-11-16 中国银行股份有限公司 Loan risk management control method and device based on alliance chain
CN113610640B (en) * 2021-09-30 2021-12-28 浙江网商银行股份有限公司 Event wind control method, device, equipment and storage medium based on alliance chain
CN113610640A (en) * 2021-09-30 2021-11-05 浙江网商银行股份有限公司 Event wind control method, device, equipment and storage medium based on alliance chain

Similar Documents

Publication Publication Date Title
CN110955729A (en) Block chain based cheating client information sharing method, equipment and system
CN109964446B (en) Consensus method based on voting
Wu et al. A comprehensive survey of blockchain: From theory to IoT applications and beyond
Baza et al. B-ride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain
Lokhava et al. Fast and secure global payments with stellar
Wang et al. Challenges of blockchain in new generation energy systems and future outlooks
Chen et al. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology
Lopez et al. A multi-layered blockchain framework for smart mobility data-markets
Di Francesco Maesa et al. Data-driven analysis of bitcoin properties: exploiting the users graph
Scherer Performance and scalability of blockchain networks and smart contracts
JP6689946B2 (en) Method of managing resources in any one of a plurality of nodes communicating with each other via a network, and computer apparatus operating as any one of a plurality of nodes communicating with each other via a network
US20190303622A1 (en) Bicameral framework for fast and tamper-resistant blockchain validation
Alshaikhli et al. Evolution of Internet of Things from blockchain to IOTA: A survey
Ali et al. Blockchain and the future of the internet: A comprehensive review
ul Hassan et al. Blockchain and the future of the internet: a comprehensive review
Wang et al. Performance benchmarking and optimization for blockchain systems: A survey
Tkachuk et al. A survey on blockchain-based telecommunication services marketplaces
Chiu et al. My data, my control: a secure data sharing and access scheme over blockchain
Adler et al. Building scalable decentralized payment systems
Wang et al. Exploring unfairness on proof of authority: Order manipulation attacks and remedies
Zhang et al. Deconstructing Blockchains: Concepts, Systems, and Insights.
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
Flood et al. Blockchain’s future: can the decentralized blockchain community succeed in creating standards?
TWM586416U (en) Implementing a multi-center, distributed verification system for transactions based on blockchain technology
Bilal et al. Blockchain technology: Opportunities & challenges

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination