CN111353925A - Block chain-based fraud prevention system and method - Google Patents

Block chain-based fraud prevention system and method Download PDF

Info

Publication number
CN111353925A
CN111353925A CN202010131100.3A CN202010131100A CN111353925A CN 111353925 A CN111353925 A CN 111353925A CN 202010131100 A CN202010131100 A CN 202010131100A CN 111353925 A CN111353925 A CN 111353925A
Authority
CN
China
Prior art keywords
block chain
biological characteristic
information
nodes
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010131100.3A
Other languages
Chinese (zh)
Other versions
CN111353925B (en
Inventor
李曼潇
苏恒
姚新亮
陈法山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010131100.3A priority Critical patent/CN111353925B/en
Publication of CN111353925A publication Critical patent/CN111353925A/en
Application granted granted Critical
Publication of CN111353925B publication Critical patent/CN111353925B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A block chain-based anti-fraud system and method, the said system includes the multiunit participation organization, the participation organization includes the node of the block chain, predicting the machine node, authority module and biological characteristic acquisition equipment; the block chain link points and the block chain link points of other participating mechanisms form a block chain network; the prediction machine node obtains networking addresses of prediction machine nodes of other participating structures through a block chain network, and a prediction machine network is established according to the networking addresses; recognizing the biological characteristic information to a predictive teller network for risk authentication voting, and generating voting results according to participation mechanisms voted by all predictive teller nodes; when the voting result is higher than a preset threshold value, outputting alarm information; the method comprises the steps that biological characteristic information of a user is collected by biological characteristic collection equipment and uploaded to a corresponding predicting machine node; and the authority module is respectively connected with the predictive speaker node and the biological characteristic acquisition equipment and is used for distributing risk coefficients of the risk users through the predictive speaker node according to the preset authority of the current participating mechanism.

Description

Block chain-based fraud prevention system and method
Technical Field
The present invention relates to a block chain technology processing system, and more particularly, to a block chain based fraud prevention system and method.
Background
The block chain technology has the characteristics of traceability and non-falsification through distributed calculation and storage without depending on an additional third-party management mechanism, and is commonly used in scenes such as virtual currency, evidence storage, audit management and the like. The biological identification technology is that personal identity identification is realized by closely combining a computer with scientific and technological means such as optics, acoustics, biosensors and the like and utilizing inherent characteristics (sound, five sense organs, fingerprints and the like) of a human body.
Because the internal information of a law enforcement agency system, a bank system, an urban road monitoring system, a commercial agency system, a social public transportation system and the like is not intercommunicated, the financial criminals are opaque and not shared among the agencies, and thus financial fraud is endless and difficult to solve. The invention provides a block chain-based fraud prevention system and method aiming at financial fraud scenes, wherein the block chain and a biological recognition technology are combined, the characteristics of financial fraud are collected and recognized by using the biological recognition technology, and the recorded fraud and suspect are recorded and shared among various organizations by using the block chain technology, so that on one hand, the system assists law enforcement agencies to solve a case, and on the other hand, the system helps to remind the masses of reducing victims on the premise of solving the case.
The existing mechanisms are not completely butted, law enforcement agencies are usually adopted to record relevant information of financial fraudsters in own systems and then publish the information through web pages, news and other modes, other individuals and mechanisms need to actively acquire the relevant information if needed, relevant technical means are not available to utilize the information after criminal information is acquired, and most of the information needs to identify relevant suspects or financial fraudsters through human intervention. The traditional financial fraud case solving mode has the advantages that on one hand, related financial fraud information is not shared among all institutions, so that case solving is difficult, information is not fully utilized, on the other hand, the case solving mode of criminals is identified completely by human intervention, so that the efficiency is low, the accuracy is low, and further, the lives and properties of related reporters are possibly threatened.
Disclosure of Invention
The invention aims to provide a block chain-based fraud prevention system and a block chain-based fraud prevention method, wherein each participating mechanism builds a block chain system and is provided with biological characteristic acquisition equipment, on one hand, the nodes of a law enforcement mechanism manage financial fraud information which is shared among the nodes of other mechanisms and used for identifying a suspect, and finally, the suspect information is fed back to the law enforcement mechanism through an intelligent contract, and on the other hand, the potential risk of the suspect can be more comprehensively analyzed based on the information respectively mastered by each participating mechanism; the block chain system solves the problems that financial fraud is endless and many victims are caused by non-sharing of financial fraud information, and potential victims are reminded in time to improve vigilance and are not cheated.
In order to achieve the above purpose, the system for preventing fraud based on the block chain provided by the invention comprises a plurality of groups of participating mechanisms, wherein each participating mechanism comprises a block chain node, a prediction machine node, an authority module and a biological characteristic acquisition device; the block chain link points are used for forming a block chain network with the block chain link points of other participating mechanisms; acquiring a networking address of a prediction machine node, and identifying the networking address to a block chain network; the predicting machine nodes are respectively connected with the block chain nodes and the biological characteristic equipment and are used for acquiring networking addresses of predicting machine nodes of other participating structures through a block chain network and establishing a predicting machine network according to the networking addresses; recognizing the biological characteristic information acquired by the biological characteristic acquisition equipment to the predictive teller network for risk authentication voting, and generating voting results according to the participation mechanisms voted by the predictive teller nodes; when the voting result is higher than a preset threshold value, outputting alarm information; or, receiving a voting request, comparing the biological characteristic information contained in the voting request with the biological characteristic information stored locally, generating a risk coefficient according to the comparison result and a preset authority, and issuing the risk coefficient; when the risk coefficient is higher than a preset threshold value, outputting alarm information; the biological characteristic acquisition equipment is used for acquiring biological characteristic information of a user and uploading the biological characteristic information to the corresponding predicting machine node; and the authority module is respectively connected with the preloader node and the biological characteristic acquisition equipment and is used for distributing risk coefficients of the risk users through the preloader node according to the preset authority of the current participating mechanism.
In the above block chain-based fraud prevention system, preferably, the participating institutions include law enforcement agencies, financial institutions, transportation agencies, monitoring agencies, and business agencies; the biometric information comprises a combination of one or more of a fingerprint, a voiceprint, an iris, a portrait, a vein.
In the above fraud prevention system based on the blockchain, preferably, when the participating organization is a law enforcement organization, the participating organization further includes a law enforcement module, and the law enforcement module is configured to acquire biometric information of the authenticated risk user through the biometric acquisition device; the biological characteristic information of the user with the risk of authentication is identified to the predictive speaker network through the predictive speaker node; and the block chain nodes are used for commonly identifying the biological characteristic information of the authenticated risk user and the signature information of the block chain nodes of the current law enforcement agency to the block chain network.
In the above fraud prevention system based on a blockchain, preferably, the law enforcement module further includes a verification unit, where the verification unit is configured to obtain biometric information of a user corresponding to warning information when any one of the nodes of the predictive speakers in the predictive speakers network outputs the warning information; acquiring corresponding user identity information according to the biological characteristic information; obtaining associated data of a corresponding user in a preset database according to the user identity information; and when the associated data accords with a preset rule, updating the user identity information into an authentication risk user.
In the above block chain based fraud prevention system, preferably, the block link points include a biometric module, a networking module, a consensus module and a contract module; the biological identification module is used for providing a communication channel for controlling the block chain link points of the current participating mechanism to correspond to the biological characteristic acquisition equipment; the networking module is used for connecting the networking modules of other block chain nodes, so that the block chain link points of each participating mechanism form a block chain network; the consensus module is used for finishing transaction consensus processing with other block chain nodes through a preset consensus algorithm and packaging the transaction into blocks according to a consensus result; the contract module is used for executing and processing all transactions in the block in sequence.
The invention also provides a block chain-based anti-fraud method, which comprises the following steps: a block chain network is assembled by block chain link points of each participating mechanism; the prediction machine nodes which are connected with the block chain link points in a one-to-one mode obtain networking addresses of the prediction machine nodes of other participating structures through the block chain network, and the prediction machine network is established according to the networking addresses; the method comprises the steps that biological characteristic collecting equipment connected with all the predictive speaker nodes in a one-to-one mode collects biological characteristic information of a user and uploads the biological characteristic information to the corresponding predictive speaker nodes; the predicting machine nodes recognize the biological characteristic information to the predicting machine network for risk authentication voting, and voting results are generated according to the voting participation mechanisms of the predicting machine nodes; or, receiving a voting request, comparing the biological characteristic information contained in the voting request with the biological characteristic information stored locally, generating a risk coefficient according to the comparison result and a preset authority, and issuing the risk coefficient; and when the voting result or the risk coefficient is higher than a preset threshold value, outputting alarm information.
In the above block chain-based fraud prevention method, preferably, the participating institutions include law enforcement agencies, financial institutions, transportation agencies, monitoring agencies, and business agencies; the biometric information comprises a combination of one or more of a fingerprint, a voiceprint, an iris, a portrait, a vein.
In the above block chain-based fraud prevention method, preferably, when the participating entity is a law enforcement agency, the participating entity further includes: acquiring biological characteristic information of the authentication risk user through the biological characteristic acquisition equipment; the biological characteristic information of the user with the risk of authentication is identified to the predictive speaker network through the predictive speaker node; and the block chain nodes are used for commonly identifying the biological characteristic information of the authenticated risk user and the signature information of the block chain nodes of the current law enforcement agency to the block chain network.
In the above block chain-based fraud prevention method, preferably, when the participating entity is a law enforcement agency, the participating entity further includes: when any one of the nodes of the predictive speech machine in the network of the predictive speech machine outputs alarm information, acquiring biological characteristic information of a user corresponding to the alarm information; acquiring corresponding user identity information according to the biological characteristic information; obtaining associated data of a corresponding user in a preset database according to the user identity information; and when the associated data accords with a preset rule, updating the user identity information into an authentication risk user.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
The invention has the beneficial technical effects that: managing financial fraud information by block chain nodes of the law enforcement agency, using fraud information by block chain nodes of other agencies, and managing and sharing suspect information by the block chain nodes of the law enforcement agency and the other agencies together; therefore, the block chain technology and the biological identification technology are organically combined, the financial fraud problem caused by the fact that financial criminals do not share and communicate information is solved, potential victims are timely reminded to improve vigilance, and the fraud success rate is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
fig. 1A is a block diagram of a block chain based fraud prevention system according to an embodiment of the present invention;
fig. 1B is a flowchart of a block chain-based anti-fraud method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a process of network initialization of a block chain based fraud prevention system according to an embodiment of the present invention;
FIG. 3 is a flow chart of a process for a law enforcement agency collecting and recording fraudulent information to a blockchain of a blockchain-based fraud prevention system according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a process of collecting, identifying, and recording suspect information to a blockchain by all mechanisms of a block chain-based fraud prevention system according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a process of a law enforcement agency updating records of suspect persons on a blockchain and issuing rewards to an issuer of the block chain-based fraud prevention system according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a process for updating a biometric intelligent contract by an official biometric agency of a blockchain-based fraud prevention system according to an embodiment of the present invention;
FIG. 7 is a block diagram of a block link point according to an embodiment of the present invention;
fig. 8 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be provided with reference to the drawings and examples, so that how to apply the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented. It should be noted that, unless otherwise specified, the embodiments and features of the embodiments of the present invention may be combined with each other, and the technical solutions formed are within the scope of the present invention.
Additionally, the steps illustrated in the flow charts of the figures may be performed in a computer system such as a set of computer-executable instructions and, although a logical order is illustrated in the flow charts, in some cases, the steps illustrated or described may be performed in an order different than here.
Referring to fig. 1A, the system for preventing fraud based on a blockchain provided by the present invention includes a plurality of groups of participating institutions, where each participating institution includes a blockchain node 1, a predicting machine node 2, an authority module, and a biometric feature acquisition device 3; the block chain node 1 is used for forming a block chain network with block chain link nodes 1 of other participating mechanisms; acquiring a networking address of the prediction machine node 2, and identifying the networking address to a block chain network; the predicting machine node 2 is respectively connected with the block chain node 1 and the biological characteristic equipment 3 and is used for obtaining networking addresses of predicting machine nodes 2 participating in the structure through a block chain network and establishing a predicting machine network according to the networking addresses; recognizing the biological characteristic information acquired by the biological characteristic acquisition equipment 3 to the predictive teller network for risk authentication voting, and generating voting results according to participation mechanisms voted by all predictive teller nodes; when the voting result is higher than a preset threshold value, outputting alarm information; or, receiving a voting request, comparing the biological characteristic information contained in the voting request with the biological characteristic information stored locally, generating a risk coefficient according to the comparison result and a preset authority, and issuing the risk coefficient; when the risk coefficient is higher than a preset threshold value, outputting alarm information; the biological characteristic acquisition equipment is used for acquiring biological characteristic information of a user and uploading the biological characteristic information to the corresponding predicting machine node; and the authority module is respectively connected with the preloader node and the biological characteristic acquisition equipment and is used for distributing risk coefficients of the risk users through the preloader node according to the preset authority of the current participating mechanism. Wherein the participating institutions include law enforcement agencies, financial institutions, transportation agencies, monitoring agencies, and business agencies; the biometric information comprises a combination of one or more of a fingerprint, a voiceprint, an iris, a portrait, a vein. All the block chain nodes 1 are in network connection with each other, the block chain link nodes 1 are in network connection with the predictive speech machine nodes 2, the predictive speech machine nodes 2 are in network connection with each other, and the predictive speech machine nodes 2 are in network connection with the biological characteristic acquisition equipment 3.
In the above embodiment, the blockchain node 1 refers to a node in the blockchain that undertakes the basic functions of the blockchain, such as processing a blockchain user request, completing transaction consensus, sequencing and packaging transaction data, and managing an intelligent contract node. The anti-fraud system is constructed by a plurality of participants, such as law enforcement agencies, banks, urban road monitoring systems, commercial establishment systems, social public transportation systems and the like, wherein the participants and the block link points are in one-to-one or one-to-many relationship, and each participant maintains at least one block link node. The prophetic machine node 2 is a node for checking the data outside the link acquired by the intelligent contract, and different prophetic machine nodes form a prophetic machine network which ensures that the uplink data is real and effective and is identified through the network. It should be noted that, if the biometric acquisition device in the network topology may support a TCP/IP protocol, such as wifi, a mobile operator network, or may not support a TCP/IP protocol, such as Zigbee, bluetooth, or other devices, it is necessary for the talker node to support multiple main stream communication protocols, and support a blockchain network and other devices or networks with different protocols to interconnect. The biological characteristic acquisition equipment 3 is a combination of software and hardware for acquiring biological characteristics such as fingerprints, voiceprints, irises, five sense organs, veins and the like, converts the biological characteristics into data which can be analyzed and identified by a server and is used for realizing personal identity authentication. Each participant builds biological characteristic acquisition equipment locally, then intelligent contracts of relevant operations of biological identification on the block chain can be acquired by using the biological characteristic acquisition equipment through the propheter node, the collected data outside the chain is returned to the block chain system after being checked by the propheter node, further analysis is carried out on line through the intelligent contracts, finally, the biological characteristics of a cheater or a suspect are recorded on the chain, and the information can be shared among mechanisms in the block chain system.
When the embodiment is applied to financial fraud defense, the voting can be divided into a legal citizen, a suspect and a financial fraud perpetrator aiming at the identity of the user. A legitimate citizen, i.e., a natural person without crime records, which defaults to this state; financial fraud perpetrators, i.e., natural persons recorded by law enforcement as having a financial fraud crime history; a suspect, i.e., a physical person, is identified by other than law enforcement agencies as matching a financial fraudster by biometric identification or the like. For this reason, a legitimate citizen is identified as the only situation for a financial fraudster: the law enforcement agencies intervene in the validation because they have the power and obligations to catch criminals of law violation; there are two cases where a legitimate citizen is identified as a suspect: first, law enforcement agency intervention confirmation, and second, agency confirmation exceeding a certain number. The identification of the two cases can be realized by a consensus mechanism of the block chains; based on the situation, in an embodiment of the present invention, when the participating institution is a law enforcement institution, the participating institution further includes a law enforcement module, and the law enforcement module is configured to acquire biometric information of the authenticated risk user through the biometric acquisition device; the biological characteristic information of the user with the risk of authentication is identified to the predictive speaker network through the predictive speaker node; identifying the biological characteristic information of the authentication risk user and the signature information of the block chain nodes of the current law enforcement agency to the block chain network through the block chain nodes; specifically, the law enforcement module may further include a verification unit, where the verification unit is configured to obtain biometric information of a user corresponding to the warning information when any one of the nodes of the predictive teller machine outputs the warning information; acquiring corresponding user identity information according to the biological characteristic information; obtaining associated data of a corresponding user in a preset database according to the user identity information; and when the associated data accords with a preset rule, updating the user identity information into an authentication risk user. Therefore, in actual work, law enforcement agencies can directly share the corresponding biological characteristic information according to the determined fraud personnel information, and can further check and analyze the biological characteristic information according to the alarm information in the block chain network, so as to prevent the missed fishes.
In an embodiment of the present invention, please refer to fig. 7, the blockchain node 1 may include a biometric module 601, a networking module 602, a consensus module 603, and a contract module 604; the biometric identification module 601 is used for providing a communication channel for controlling the block chain nodes of the current participating mechanism to correspond to the biometric acquisition equipment; the networking module 602 is configured to connect networking modules of other block chain nodes, so that block chain link points of each participating mechanism form a block chain network; the consensus module 603 is configured to complete a transaction consensus process with other block link nodes through a predetermined consensus algorithm, and package a transaction into blocks according to a consensus result; the contract module 604 is used to perform processing of all transactions within the block in order. Specifically, in practical operation, the blockchain node 1 may further include a storage module 605 and a reward module 606;
when the block chain node 1 is started, the biometric module 601 establishes a connection with the biometric acquisition device 2, completes initialization work related to management of the biometric acquisition device, and completes related upgrade in cooperation with a biometric identification method.
The networking module 602 is a processing procedure for discovering each other and establishing communication connection after the block link node 1 in the network is started, and can receive external transactions and execute transaction consensus processing for the consensus module 603 after networking is successful.
The consensus module 603 is a logic device for transaction consensus processing, and determines the validity Of a transaction according to a business rule, and after the validity is verified, performs consensus processing on the transaction with other block chain nodes 1 according to an agreed consensus algorithm, where the consensus algorithm may be POW (Proof Of Work), POS (Proof Of stock), DPOS (cleared Proof Of stock), PBFT (Practical byzantedentine fault Tolerance), and the like. Finally, the execution sequence of the transaction is determined according to the consensus result, the transaction is packaged into blocks, and the blocks are delivered to the contract module 604 for execution. The invention uses two consensus rules in fig. 3 and 4, and the invention includes but is not limited to two consensus rules of financial fraud consensus and suspect consensus.
The contract module 604 is responsible for executing the transactions in the block in sequence, and the final transaction execution is processed by the data storage module 605. The built-in intelligent contracts include but are not limited to several types, a contract for initializing a biological characteristic acquisition device, a contract for recording biological information of a financial fraud criminal, a contract for inquiring the biological information of the financial fraud criminal, a contract for comparing the biological information of the financial fraud criminal, a contract for updating the record of the financial fraud criminal, a contract for recording various information of a suspect, a contract for inquiring various information of the suspect, a contract for inquiring the record state of the suspect, a contract (optional) for maintaining the binding relationship between an organization id and a bank account, a contract (optional) for issuing a reward, a contract for updating a biological characteristic identification method and the like.
The storage module 605 is responsible for persistently storing the result of the transaction execution, that is, each blockchain node 1 stores the shared ledger.
The reward module 606 is responsible for interconnecting with the financial institution accounting processing system and triggering the financial institution accounting processing system to complete relevant processing of issuing rewards to the reporter.
Referring to fig. 1B, the present invention further provides a block chain-based fraud prevention method, including: s1001, assembling a block chain network through block chain link points of each participating mechanism; s1002, the propheter nodes connected with the block chain link points in a one-to-one mode obtain networking addresses of the propheter nodes of other participating structures through the block chain network, and the propheter network is established according to the networking addresses; s1003 biological characteristic collecting equipment which is connected with all the predictive speaker nodes in a one-to-one mode collects biological characteristic information of a user, and uploads the biological characteristic information to the corresponding predictive speaker nodes; S1004A the nodes of the predictive teller identify the biological characteristic information to the network of the predictive teller for risk authentication voting, and voting results are generated according to the participation mechanisms voted by the nodes of the predictive teller; or, S1004B receives the voting request, compares the biometric information contained in the voting request with the biometric information stored locally, generates a risk coefficient according to the comparison result and the preset authority, and issues the risk coefficient; s1005, when the voting result or the risk coefficient is higher than the preset threshold, outputs an alarm message. Wherein the participating institutions include law enforcement agencies, financial institutions, transportation agencies, monitoring agencies, and business agencies; the biometric information comprises a combination of one or more of a fingerprint, a voiceprint, an iris, a portrait, a vein.
In an embodiment of the present invention, the processing flow of network initialization of the block chain based fraud prevention method specifically refers to fig. 2, and includes:
step S101: the mechanism block chain nodes and other mechanism block chain link nodes form a block chain network.
Step S102: after the block link point networking is successful, the block link nodes of each mechanism are deployed with several types of intelligent contracts. The general institutions mainly use contracts for initializing biological feature acquisition equipment, contracts for recording various information of suspects, contracts for inquiring the recording state of the suspects, contracts for inquiring the biological information of financial fraud criminals, contracts for comparing the biological information of the financial fraud criminals, contracts (optional) for maintaining the binding relationship between institution id and bank accounts, and the like. The binding relationship between the institution id and the bank account belongs to private data, a data isolation technology can be used, and other institutions do not have decryption keys except that law enforcement agencies, financial institutions and the institution hold the decryption keys of the institution id and the bank account relationship, so that the plaintext of the institution id and the bank account relationship cannot be seen.
Step S103: the nodes of the prediction machine of the organization initialize and register information to the block chain nodes of the organization.
Step S104: the block chain nodes of the mechanism initiate consensus, after the block chain network consensus passes, intelligent contracts are called to record the registration information of the nodes of the language predictive machines, and finally the networking addresses of the nodes of the language predictive machines of other mechanisms in the network are replied to the nodes of the language predictive machines.
Step S105: the prediction machine nodes of the organization establish a prediction machine network according to the networking address and the prediction machine nodes of other organizations.
Step S106: the biological characteristic acquisition equipment of the mechanism is started and initiates a registration request to the speaker node of the mechanism.
Step S107: the node of the prediction machine of the organization starts consensus, records registration information of the biological characteristic acquisition equipment after the network consensus of the prediction machine passes, and returns the result to the biological characteristic acquisition equipment.
In an embodiment of the present invention, the block chain-based anti-fraud method provided by the present invention may further include: when the participating entity is a law enforcement entity, the participating entity further comprises: acquiring biological characteristic information of the authentication risk user through the biological characteristic acquisition equipment; the biological characteristic information of the user with the risk of authentication is identified to the predictive speaker network through the predictive speaker node; and the block chain nodes are used for commonly identifying the biological characteristic information of the authenticated risk user and the signature information of the block chain nodes of the current law enforcement agency to the block chain network. Further, on the basis, when any one of the nodes of the predictive speech machine in the predictive speech machine network outputs the alarm information, the biological characteristic information of the user corresponding to the alarm information can be acquired; acquiring corresponding user identity information according to the biological characteristic information; obtaining associated data of a corresponding user in a preset database according to the user identity information; and when the associated data accords with a preset rule, updating the user identity information into an authentication risk user. In actual practice, the method of application of the above embodiment is as follows:
referring to fig. 3, in the block chain-based fraud prevention method provided by the present invention, when the participating entity is a law enforcement agency, the process flow of collecting and recording the fraudulent information to the block chain is as follows:
step S201: and executing a contract for recording the biological information of the financial fraud criminals by the block chain nodes of the law enforcement agency, and triggering the execution of an off-chain data acquisition process by the nodes of the prediction machine of the mechanism by the contract.
Step S202: and judging whether the contract function has legal registered biological characteristic acquisition equipment or not by the prediction machine node of the law enforcement agency, and triggering the corresponding biological characteristic acquisition equipment to acquire the off-chain data if the contract function has the record.
Step S203: the biological characteristic collecting equipment of the law enforcement agency is responsible for collecting the biological information of the financial fraud criminals and returning the biological information to the prophetic node.
Step S204: the speaker nodes of the law enforcement agencies verify that the data is safe and reliable, and then initiate consensus in the speaker network. And after the consensus is successful, returning the financial fraud information to the local mechanism block chain node.
Step S205: and acquiring data by the blockchain nodes of the law enforcement agency and initiating the blockchain network consensus. The cheating agent consensus message comprises information such as ID of block chain nodes initiating consensus, biological characteristic data of financial cheating agents collected, signatures and the like.
One of the implementations of the financial fraud holder consensus may be: and the block chain nodes of each mechanism verify the legality of the signature in the cheating consensus message, so that the message is confirmed to be not tampered, and if the signature is legally voted and the consensus is successful. And counting consensus voting results of all mechanism block chain nodes, considering that consensus succeeds when the number of mechanism voting agrees in the network exceeds the preset minimum number of agreeing mechanisms, continuously executing an intelligent contract, and recording biological information of related financial fraud offenders on the block chain for other mechanisms to inquire. Otherwise, the consensus fails, the intelligent contract is stopped executing, and an error is reported back.
if (sound (QZF _ Rsp _ set (txid) ═ true) > minimum number of consent agencies)
And (4) successfully identifying, recording the biological information of the cheater, and continuously executing the intelligent contract.
else
And if the consensus fails, the intelligent contract is stopped executing, and an error is reported back.
The data structure of the financial fraudster information store may be in the following format, but is not limited to the following table 1:
TABLE 1
Figure BDA0002395799320000101
Referring to fig. 4, in an embodiment of the invention, a specific process for sharing the biometric information of the financial fraud criminal and the various types of information of the suspect among the participating institutions may include the following steps:
step S301: each mechanism block chain node regularly acquires various information of people coming and going through an intelligent contract, and the contract triggers the mechanism prediction machine node to perform an out-of-chain data acquisition process.
Step S302: the speaker node finds the registered biological characteristic acquisition equipment and triggers the equipment to acquire data.
Step S303: the biological characteristic acquisition equipment is used for acquiring the biological characteristics, time, place and snapshot of any natural person in the coming and going crowd in real time, then signing the acquired information to obtain a signature field and replying the nodes of the prediction machine. The format for collecting the natural person information may be as follows but is not limited to the following format of table 2:
TABLE 2
Figure BDA0002395799320000102
Step S304: and (4) verifying data by the nodes of the prediction machine, and triggering network consensus of the prediction machine after the check and the label verification pass. In the consensus process, the nodes of the prediction machines of other mechanisms in the network are also triggered to collect data of biological features of the same natural person, the collected data are temporarily cached in the nodes of the prediction machines of the mechanisms, and the prediction machines perform consensus voting on the results of the initiating mechanism according to the collected results. And after the consensus is successful, returning the natural person information to the block chain node of the mechanism, otherwise, reporting an error and returning.
Step S305: the block chain nodes compare the biological characteristics of the coming and going people and the financial fraud offenders through intelligent contracts, the biological characteristic data of the financial fraud offenders are obtained by inquiring the bottom layer record of the block chain, and the natural person characteristic data are obtained by real-time acquisition through the previous steps. The intelligent contract performs one-time confirmation on the acquired biological characteristic data, and the one-time confirmation method can be one of the biological identification methods commonly used in the industry, including but not limited to fingerprint identification, face identification, voiceprint identification, iris identification, vein identification and the like. The biometric identification method used for one-time confirmation requires high execution speed and relatively accurate execution results, so that the block link points of the whole network are ensured to have relatively high consensus on suspects and relatively accurate consensus results.
Step S306: and the intelligent contract preliminarily judges whether the suspect is a fraud according to the comparison result, if so, the suspect consensus is initiated, and the suspect consensus message comprises the Identity (ID) of the suspect initiating the consensus, the suspect biological feature data, the signature and the like.
One of the implementations of suspect consensus may be: and (4) checking and signing the suspect consensus messages by each mechanism block chain link point, acquiring and clearing the biological characteristics cached by the mechanism prediction machine nodes in S304 after the checking and signing are passed, judging the matching degree of the biological characteristics cached by the mechanism and the biological characteristics in the suspect consensus messages, and performing consensus voting. And after the voting of all the block chain nodes is finished, counting the consensus voting results, and considering that the consensus succeeds when the voting approval of the mechanisms exceeding the number or the voting approval of law enforcement agencies in the network is approved according to the preset minimum number of the agreement mechanisms. And after the consensus is successful, the suspect information is returned to the intelligent contract, S307 is executed, and the intelligent contract which fails in consensus is executed to directly quit.
Figure BDA0002395799320000111
If the consensus fails, returning to report errors; the intelligent contract terminates execution.
Step S307: the block chain node records various kinds of information of the suspect through an intelligent contract, including but not limited to suspect biological information, address information, time information, snapshot information and mechanism id (for return visit) of uploaded data. In order to protect privacy and safety of reporting agencies, a data isolation technology of a block chain system is used, agency id of uploaded data is encrypted data, the encrypted data can be seen only by law enforcement agencies, data uploading agencies and financial institutions, and plaintext cannot be analyzed when other agencies are encrypted. Suspect biological information, address information, time information and snapshot information are public and can be seen by any mechanism. Taking the example that the uploading mechanism is the block link point vp0, the encryption key _ vp0 is stored locally in vp0, the decryption key is stored in three parties, namely vp0, a financial institution and a law enforcement agency, and the data structure of the suspect information storage may be as follows, but is not limited to the following format of table 3:
TABLE 3
Figure BDA0002395799320000121
The law enforcement agency obtains the information of the cheater only; to this end, the present invention further includes an implementation method for supplementing suspect data by using the blockchain network, and further, a reward report can be given based on report information provided by a reporter, please refer to fig. 5, in actual work, when participating institutions include law enforcement agencies and bank systems in the fraud prevention method based on blockchain provided by the present invention, the specific steps are as follows:
step S401: law enforcement agencies regularly inquire various kinds of information of suspects through intelligent contracts.
Step S402: and (4) the law enforcement agencies intervene to perform secondary confirmation on the incremental suspect records according to the time, the address, the snapshot information and the biological characteristic information, so that the accuracy of the suspect records is further improved. (the secondary confirmation method is different from the primary confirmation method, and uses a combination of biometric comparison algorithms (multi-modal biometric identification) including but not limited to fingerprint identification, face identification, voiceprint identification, iris identification, vein identification and other biometric identification techniques based on the previously recorded biometric information; thus, the secondary confirmation method is much more accurate than the primary confirmation method, and the law enforcement agency performs the secondary confirmation method, which is more authoritative in the identification result.)
Step S403: if the second confirmation is made, the financial fraud is executed S404, otherwise, the execution is executed S406.
Step S404: the law enforcement agency updates the suspect recording state to be caught under the catching and implementing line through an intelligent contract, and the block chain link points of other agencies can inquire the related state of the suspect or receive the push information of state change through related intelligent contracts.
Step S405: if the arresting is finished, the law enforcement agency updates the suspect record state to be arrested through an intelligent contract, and the block chain link points of other agencies can inquire the related state of the suspect or receive the push information of state change through related intelligent contracts.
Step S406: the law enforcement agency updates the suspect record state into misjudgment through an intelligent contract, and the block chain link points of other agencies can inquire the suspect correlation state or receive the push information of state change through a correlation intelligent contract.
Step S407: if the reward requirement is related, the law enforcement agency issues the reward to the mechanism contributing the suspect information, S409 is executed, and if the reward requirement does not exist, the process is finished and the process is directly quitted.
Step S408: the law enforcement agency executes the transaction of issuing the reward through the intelligent contract, the contract firstly inquires the bank accounts corresponding to the law enforcement agency and the mechanism to be rewarded, and then the corresponding bank account processing system (or the union pay) is accessed through the outside of the chain, and a transfer instruction is initiated.
Step S409: the bank account processing system receives transfer instructions, which include law enforcement agency accounts and reviewer accounts. And (4) confirming whether the law enforcement agency account or the visitor account is the legal account and has a normal state, if so, executing S411, and otherwise, returning to report errors.
Step S410: the banking system performs internal accounting processing and returns results.
Step S411: if the execution of the debit and/or credit bank system of the transfer instruction fails, the block chain intelligent contract initiates corresponding debit and/or credit account rollback processing.
Step S412: and (4) determining whether the accounting rollback account is a legal account of the current bank and has a normal state, if so, executing S413, and otherwise, returning to error report.
Step S413: the banking system performs internal accounting processing and returns results.
Referring to fig. 6 again, the block chain-based fraud prevention method provided by the present invention further includes a processing flow for updating the biometric intelligent contract by an engineering and trust organization such as a law enforcement organization, and specifically includes:
step S501: and the block chain link points of the official biological feature recognition mechanism analyze the recognition accuracy rate of the suspect offline according to the data recorded by the suspect on the chain.
Step S502: the intelligent contracts related to the biological characteristics of the coming and going people and financial fraud criminals are compared in a periodic upgrading mode, and the accuracy of the biological characteristic recognition contracts on the block chain system is continuously improved.
Step S503: block link points of other mechanisms execute intelligent contracts that update biometric identification methods.
Step S504: the software of the biometric acquisition device is selectively updated as needed. It should be noted that before confirming the upgrade contract, it is necessary to evaluate whether the hardware of the biometric acquisition device needs to be upgraded, and if it is confirmed that the hardware needs to be upgraded, the hardware is upgraded first.
The invention has the beneficial technical effects that: managing financial fraud information by block chain nodes of the law enforcement agency, using fraud information by block chain nodes of other agencies, and managing and sharing suspect information by the block chain nodes of the law enforcement agency and the other agencies together; therefore, the block chain technology and the biological identification technology are organically combined, the financial fraud problem caused by the fact that financial criminals do not share and communicate information is solved, potential victims are timely reminded to improve vigilance, and the fraud success rate is reduced.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
As shown in fig. 8, the electronic device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the electronic device 600 does not necessarily include all of the components shown in FIG. 8; furthermore, the electronic device 600 may also comprise components not shown in fig. 8, which may be referred to in the prior art.
As shown in fig. 8, the central processor 100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the electronic device 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the electronic device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142, and the application/function storage section 142 is used to store application programs and function programs or a flow for executing the operation of the electronic device 600 by the central processing unit 100.
The memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by the electronic device. The driver storage portion 144 of the memory 140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging application, address book application, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (11)

1. An anti-fraud system based on a block chain is characterized by comprising a plurality of groups of participation mechanisms, wherein each participation mechanism comprises a block chain node, a prediction machine node, an authority module and a biological characteristic acquisition device;
the block chain link points are used for forming a block chain network with the block chain link points of other participating mechanisms; acquiring a networking address of a prediction machine node, and identifying the networking address to a block chain network;
the predicting machine nodes are respectively connected with the block chain nodes and the biological characteristic equipment and are used for acquiring networking addresses of predicting machine nodes of other participating structures through a block chain network and establishing a predicting machine network according to the networking addresses; recognizing the biological characteristic information acquired by the biological characteristic acquisition equipment to the predictive teller network for risk authentication voting, and generating voting results according to the participation mechanisms voted by the predictive teller nodes; when the voting result is higher than a preset threshold value, outputting alarm information; or, receiving a voting request, comparing the biological characteristic information contained in the voting request with the biological characteristic information stored locally, generating a risk coefficient according to the comparison result and a preset authority, and issuing the risk coefficient; when the risk coefficient is higher than a preset threshold value, outputting alarm information;
the biological characteristic acquisition equipment is used for acquiring biological characteristic information of a user and uploading the biological characteristic information to the corresponding predicting machine node;
and the authority module is respectively connected with the preloader node and the biological characteristic acquisition equipment and is used for distributing risk coefficients of the risk users through the preloader node according to the preset authority of the current participating mechanism.
2. The blockchain-based fraud prevention system of claim 1, wherein said participating institutions include law enforcement agencies, financial institutions, transportation agencies, monitoring agencies, and business agencies; the biometric information comprises a combination of one or more of a fingerprint, a voiceprint, an iris, a portrait, a vein.
3. The blockchain-based fraud prevention system of claim 1, wherein when the participating entity is a law enforcement entity, the participating entity further comprises a law enforcement module for obtaining biometric information authenticating the at-risk user via the biometric acquisition device; the biological characteristic information of the user with the risk of authentication is identified to the predictive speaker network through the predictive speaker node; and the block chain nodes are used for commonly identifying the biological characteristic information of the authenticated risk user and the signature information of the block chain nodes of the current law enforcement agency to the block chain network.
4. The system according to claim 3, wherein the law enforcement module further comprises a verification unit, the verification unit is configured to obtain biometric information of a user corresponding to the warning information when any one of the predictive speaker nodes in the predictive speaker network outputs the warning information; acquiring corresponding user identity information according to the biological characteristic information; obtaining associated data of a corresponding user in a preset database according to the user identity information; and when the associated data accords with a preset rule, updating the user identity information into an authentication risk user.
5. The blockchain-based fraud prevention system of claim 1, wherein the blockchain node comprises a biometric module, a networking module, a consensus module, and a contract module;
the biological identification module is used for providing a communication channel for controlling the block chain link points of the current participating mechanism to correspond to the biological characteristic acquisition equipment;
the networking module is used for connecting the networking modules of other block chain nodes, so that the block chain link points of each participating mechanism form a block chain network;
the consensus module is used for finishing transaction consensus processing with other block chain nodes through a preset consensus algorithm and packaging the transaction into blocks according to a consensus result;
the contract module is used for executing and processing all transactions in the block in sequence.
6. A block chain based fraud prevention method, the method comprising:
a block chain network is assembled by block chain link points of each participating mechanism;
the prediction machine nodes which are connected with the block chain link points in a one-to-one mode obtain networking addresses of the prediction machine nodes of other participating structures through the block chain network, and the prediction machine network is established according to the networking addresses;
the method comprises the steps that biological characteristic collecting equipment connected with all the predictive speaker nodes in a one-to-one mode collects biological characteristic information of a user and uploads the biological characteristic information to the corresponding predictive speaker nodes;
the predicting machine nodes recognize the biological characteristic information to the predicting machine network for risk authentication voting, and voting results are generated according to the voting participation mechanisms of the predicting machine nodes; or, receiving a voting request, comparing the biological characteristic information contained in the voting request with the biological characteristic information stored locally, generating a risk coefficient according to the comparison result and a preset authority, and issuing the risk coefficient;
and when the voting result or the risk coefficient is higher than a preset threshold value, outputting alarm information.
7. The blockchain-based fraud prevention method of claim 6, wherein the participating institutions include law enforcement agencies, financial institutions, transportation agencies, monitoring agencies, and business agencies; the biometric information comprises a combination of one or more of a fingerprint, a voiceprint, an iris, a portrait, a vein.
8. The blockchain-based fraud prevention method according to claim 6, wherein when the participating entity is a law enforcement entity, the participating entity further comprises:
acquiring biological characteristic information of the authentication risk user through the biological characteristic acquisition equipment;
the biological characteristic information of the user with the risk of authentication is identified to the predictive speaker network through the predictive speaker node;
and the block chain nodes are used for commonly identifying the biological characteristic information of the authenticated risk user and the signature information of the block chain nodes of the current law enforcement agency to the block chain network.
9. The blockchain-based fraud prevention method according to claim 8, wherein when the participating entity is a law enforcement entity, the participating entity further comprises:
when any one of the nodes of the predictive speech machine in the network of the predictive speech machine outputs alarm information, acquiring biological characteristic information of a user corresponding to the alarm information;
acquiring corresponding user identity information according to the biological characteristic information;
obtaining associated data of a corresponding user in a preset database according to the user identity information;
and when the associated data accords with a preset rule, updating the user identity information into an authentication risk user.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 6 to 9 when executing the computer program.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 6 to 9.
CN202010131100.3A 2020-02-28 2020-02-28 Block chain-based fraud prevention system and method Active CN111353925B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010131100.3A CN111353925B (en) 2020-02-28 2020-02-28 Block chain-based fraud prevention system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010131100.3A CN111353925B (en) 2020-02-28 2020-02-28 Block chain-based fraud prevention system and method

Publications (2)

Publication Number Publication Date
CN111353925A true CN111353925A (en) 2020-06-30
CN111353925B CN111353925B (en) 2023-04-28

Family

ID=71197219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010131100.3A Active CN111353925B (en) 2020-02-28 2020-02-28 Block chain-based fraud prevention system and method

Country Status (1)

Country Link
CN (1) CN111353925B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112015964A (en) * 2020-08-22 2020-12-01 王红建 Business data processing method based on block chain and digital finance and big data platform
CN112215602A (en) * 2020-10-12 2021-01-12 支付宝(杭州)信息技术有限公司 Data query method, device and system and electronic equipment
CN112700333A (en) * 2021-01-11 2021-04-23 东北大学 Electronic archive consensus method based on block chain
CN112800140A (en) * 2021-03-02 2021-05-14 昆明理工大学 High-reliability data acquisition method based on block chain prediction machine
CN112837023A (en) * 2020-12-03 2021-05-25 杭州趣链科技有限公司 Business collaboration platform, method and device of organization and electronic equipment
CN112862505A (en) * 2021-03-03 2021-05-28 中国工商银行股份有限公司 Anti-fraud information sharing method and device based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109872151A (en) * 2017-12-04 2019-06-11 万事达卡国际公司 For carrying out the method and system of risk score to anonymous deal
US20190288846A1 (en) * 2018-03-13 2019-09-19 Paul Zawierka Method and system for verifying a voter through the use of blockchain validation
WO2019195821A1 (en) * 2018-04-06 2019-10-10 Daniel Maurice Lerner Authentication and validation of data storage and transmission using blockchain
CN110400410A (en) * 2019-07-31 2019-11-01 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of electronic voting system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109872151A (en) * 2017-12-04 2019-06-11 万事达卡国际公司 For carrying out the method and system of risk score to anonymous deal
US20190288846A1 (en) * 2018-03-13 2019-09-19 Paul Zawierka Method and system for verifying a voter through the use of blockchain validation
WO2019195821A1 (en) * 2018-04-06 2019-10-10 Daniel Maurice Lerner Authentication and validation of data storage and transmission using blockchain
CN110400410A (en) * 2019-07-31 2019-11-01 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of electronic voting system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
亚伦・赖特 等: "分散式区块链技术与加密安全法的兴起" *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112015964A (en) * 2020-08-22 2020-12-01 王红建 Business data processing method based on block chain and digital finance and big data platform
CN112015964B (en) * 2020-08-22 2021-06-04 上海大象金泰科技有限公司 Business data processing method and system based on block chain and digital finance
CN112215602A (en) * 2020-10-12 2021-01-12 支付宝(杭州)信息技术有限公司 Data query method, device and system and electronic equipment
CN112837023A (en) * 2020-12-03 2021-05-25 杭州趣链科技有限公司 Business collaboration platform, method and device of organization and electronic equipment
CN112700333A (en) * 2021-01-11 2021-04-23 东北大学 Electronic archive consensus method based on block chain
CN112700333B (en) * 2021-01-11 2023-10-03 东北大学 Electronic archive consensus method based on block chain
CN112800140A (en) * 2021-03-02 2021-05-14 昆明理工大学 High-reliability data acquisition method based on block chain prediction machine
CN112800140B (en) * 2021-03-02 2023-11-14 昆明理工大学 High-reliability data acquisition method based on blockchain predictor
CN112862505A (en) * 2021-03-03 2021-05-28 中国工商银行股份有限公司 Anti-fraud information sharing method and device based on block chain

Also Published As

Publication number Publication date
CN111353925B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
US20200402050A1 (en) System and method for secure transactions at a mobile device
CN111353925B (en) Block chain-based fraud prevention system and method
CN112041842A (en) Digital asset hosting system
CN109417549A (en) The method and apparatus of information proof is provided using centralization or distributed ledger
CA3057396A1 (en) Methods and devices for acquiring and recording tracking information on blockchain
CA2662033A1 (en) Transaction authorisation system & method
CN111369730B (en) Voting processing method and device based on block chain
CN108769230A (en) Transaction data storage method, device, server and storage medium
CN112789823A (en) Block chain-based election network system and election method
CN112037068A (en) Resource transfer method, system, device, computer equipment and storage medium
CN111897879B (en) Transaction record sharing method and device based on blockchain network and electronic equipment
CN109242481A (en) Information approach, device and computer equipment are pledged based on block chain query
US11354669B2 (en) Collaborative analytics for fraud detection through a shared public ledger
CN108880832A (en) Block chain real name identification method and system
CN108428135A (en) Auth method
CN109741070B (en) Account management method and device based on network certificate
KR20210117731A (en) The blockchain-based transaction history confirmation system
CN110599332A (en) Block chain-based user intention determination method, device, equipment and storage medium
US20230344828A1 (en) System and method for intelligent authentication via object movement recognition
US20160342996A1 (en) Two-factor authentication method
US20230259928A1 (en) Electronic system and method for enabling payment of a good or service by means of voice commands
WO2016083987A1 (en) Method of and system for obtaining proof of authorisation of a transaction
Boateng et al. A fraud prevention and secure cognitive SIM card registration model
JP2019102979A (en) Method related to transaction based on personal identification using biological information
CN113269649A (en) System and method for tracking digital currency

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant