CN116016518A - Anti-fraud blockchain system, account processing method, device and equipment - Google Patents

Anti-fraud blockchain system, account processing method, device and equipment Download PDF

Info

Publication number
CN116016518A
CN116016518A CN202211725260.6A CN202211725260A CN116016518A CN 116016518 A CN116016518 A CN 116016518A CN 202211725260 A CN202211725260 A CN 202211725260A CN 116016518 A CN116016518 A CN 116016518A
Authority
CN
China
Prior art keywords
target user
account
node
account opening
fraud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211725260.6A
Other languages
Chinese (zh)
Other versions
CN116016518B (en
Inventor
刘彦
郭士串
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202211725260.6A priority Critical patent/CN116016518B/en
Publication of CN116016518A publication Critical patent/CN116016518A/en
Application granted granted Critical
Publication of CN116016518B publication Critical patent/CN116016518B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the specification discloses a method, a device and equipment for processing an anti-fraud blockchain system and an account, wherein the method is applied to the anti-fraud blockchain system and comprises the following steps: acquiring an account opening request of a target user, wherein the account opening request comprises identity verification information of the target user; broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for performing risk verification on the opening account of the target user based on the identity verification information respectively; performing risk assessment on account opening of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result; and if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.

Description

Anti-fraud blockchain system, account processing method, device and equipment
Technical Field
The present document relates to the field of computer technologies, and in particular, to a method, an apparatus, and a device for processing an anti-fraud blockchain system and an account.
Background
In the process of treating the telecommunication phishing, enterprises, public safety institutions, banks, operators, financial transaction institutions and the like can develop the countermeasure against the fraudulent black ash product from different angles according to own dominant data and technology, but with the continuous change of the fraudulent practice, the current black ash product can use different fraudulent practice and tools in different fraudulent links, and as the parties have no good data cooperation mechanism, the parties are respectively in war, and the resultant force of effective data and technological capability can not be formed any more. In the process of competing with black ash production, an important link is 'broken card' or 'frozen account'. In the actions of "card breaking" or "freezing account", risk management and control of account opening link is always a technical difficulty, and is mainly expressed in the following steps: the account opening party does not have more other data to comprehensively judge the background information of the account opening requesting party, and excessively relies on manual verification, and in addition, a scientific evaluation mechanism does not exist to judge whether to open the account for the account opening requesting party.
Disclosure of Invention
The embodiment of the specification aims to provide a technical scheme which can combine multiparty dominant data to perform multiparty collaboration on account opening, meet the requirements of account opening auditing, and simultaneously ensure data transmission safety, data privacy among different parties and processing efficiency.
In order to achieve the above technical solution, the embodiments of the present specification are implemented as follows:
an anti-fraud blockchain system provided in the embodiments of the present disclosure includes a network layer subsystem, a base data layer subsystem, a support platform layer subsystem, and an application layer subsystem, wherein: the network layer subsystem is configured to provide an interconnected communication network for different nodes in the anti-fraud blockchain system. The support platform layer subsystem is configured to manage different nodes in the anti-fraud blockchain system. The application layer subsystem is configured to acquire an account opening request of a target user based on a communication network provided by the network layer subsystem, and provide the account opening request to the basic data layer subsystem, wherein the account opening request comprises authentication information of the target user. The basic data layer subsystem is configured to broadcast the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for risk verification on the account opened by the target user based on the identity verification information respectively; acquiring related information required by opening an account of the target user fed back by each node in the anti-fraud blockchain system, performing risk assessment on the opening of the account of the target user based on the acquired related information fed back by each node, obtaining a corresponding assessment result, and providing the assessment result to the application layer subsystem. And the application layer subsystem is configured to execute account opening processing corresponding to the account opening request if the evaluation result indicates that the risk does not exist in opening the account for the target user.
The method for processing the account provided by the embodiment of the specification is applied to an anti-fraud blockchain system, and comprises the following steps: and acquiring an account opening request of a target user, wherein the account opening request comprises the identity verification information of the target user. And broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for risk verification on the account opened by the target user based on the identity verification information respectively. Acquiring relevant information required by risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain system, and carrying out risk assessment on the account opening of the target user based on the acquired relevant information fed back by each node to obtain a corresponding assessment result. And if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.
An account processing device provided in an embodiment of the present disclosure is disposed in an anti-fraud blockchain system, and the device includes: the request module acquires an account opening request of a target user, wherein the account opening request comprises the identity verification information of the target user. And the broadcasting module is used for broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for risk verification on the account opened by the target user based on the identity verification information respectively. The risk assessment module is used for acquiring related information required by risk verification on the account opening of the target user and fed back by each node in the anti-fraud blockchain system, and carrying out risk assessment on the account opening of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result. And the account opening module is used for executing account opening processing corresponding to the account opening request if the evaluation result indicates that the risk does not exist in opening the account for the target user.
The embodiment of the present disclosure provides an account processing device, which is disposed in an anti-fraud blockchain system, and the account processing device includes: a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to: and acquiring an account opening request of a target user, wherein the account opening request comprises the identity verification information of the target user. And broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on the account opened by the target user based on the identity verification information respectively. Acquiring relevant information required by risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain system, and carrying out risk assessment on the account opening of the target user based on the acquired relevant information fed back by each node to obtain a corresponding assessment result. And if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.
The present description also provides a storage medium for storing computer-executable instructions that when executed by a processor implement the following: and acquiring an account opening request of a target user, wherein the account opening request comprises the identity verification information of the target user. And broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on the account opened by the target user based on the identity verification information respectively. Acquiring relevant information required by risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain system, and carrying out risk assessment on the account opening of the target user based on the acquired relevant information fed back by each node to obtain a corresponding assessment result. And if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.
Drawings
In order to more clearly illustrate the embodiments of the present description or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some of the embodiments described in the present description, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a diagram illustrating an embodiment of a method for processing accounts according to the present disclosure;
FIG. 2 is a schematic diagram of an account processing procedure according to the present disclosure;
FIG. 3 is a diagram of another embodiment of a method for processing accounts according to the present disclosure;
FIG. 4 is a schematic illustration of the processing of another account of the present disclosure;
FIG. 5 is a schematic diagram of an anti-fraud blockchain system of the present disclosure;
FIG. 6 is a schematic diagram of another anti-fraud blockchain system of the present disclosure;
FIG. 7 is an embodiment of a processing device for an account according to the present disclosure;
FIG. 8 is an embodiment of a processing device for an account of the present description.
Detailed Description
The embodiment of the specification provides an anti-fraud blockchain system, an account processing method, an account processing device and equipment.
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present disclosure.
Example 1
As shown in fig. 1, the embodiment of the present disclosure provides a method for processing an account, where an execution body of the method may be an anti-fraud blockchain system, and the anti-fraud blockchain system may be used to open an account for a user to perform risk detection, so as to prevent the occurrence of an account with fraud risk, where the anti-fraud blockchain system may include one or more different nodes, where the nodes may be a terminal device or a server, where the terminal device may be a mobile terminal device such as a mobile phone, a tablet computer, or a computer device such as a notebook computer or a desktop computer, or may also be an IoT device (specifically, a smart watch, a vehicle-mounted device, etc.), where the server may be an independent server, or may be a server cluster formed by multiple servers, where the server may be a background server such as a financial service or a network shopping service, or may also be a background server of an application program, or the like.
The anti-fraud blockchain system can comprise a network layer subsystem, a basic data layer subsystem, a supporting platform layer subsystem and an application layer subsystem, wherein the network layer subsystem can ensure that the basic network communication capability is realized in a 1+1 mode, the first part is a communication network of the anti-fraud blockchain system, cloud service resources can be used, the communication network of the anti-fraud blockchain system is deployed on a virtual machine group, the second part is an edge computing terminal, and special entity hardware equipment is deployed at each access node, is in communication connection with a corresponding virtual machine node, and provides local data privacy protection and encryption storage functions.
The basic data layer subsystem can provide capabilities of basic data access, processing, integration, calculation and the like, can check the authenticity, validity and integrity of various business data, can provide local data privacy protection and encryption functions, and further develops various butt joint forms such as a standard API interface, an offline form and the like.
The support platform layer subsystem can support and be used for communication of service data and anti-fraud block chain systems, can be used for making data flow rules, data model definition and upper and lower block link port standards, can also develop and manage anti-fraud application services, can manage edge computing terminals, support service atomic capacity development of service applications, can also carry out system operation support management, comprises functions of integration rules, member management, development and call management of service application services, and can also carry out system operation maintenance management, comprises equipment fault monitoring, safety protection, network abnormality alarm and the like.
The application layer subsystem can realize multiparty data linkage, namely sharing information capacity of opening account data, wind control labels, black ash data and the like of different nodes, establish an inter-member information cross check mechanism, perform data joint modeling based on a privacy computing technology aiming at a complex scene, and realize sharing data broadcasting, visual supervision of application program running conditions and the like.
Based on the anti-fraud blockchain system, the method specifically comprises the following steps:
in step S102, an account opening request of the target user is obtained, where the account opening request includes authentication information of the target user.
The target user may be any user, and in this implementation, the target user may be a user who requests to open an account. The account provisioning request may be a message for requesting to provision an account for a user, where the account may be an account of a website, specifically, an account of a forum, an account of a resource website, or the like, and the account may also be an account of some financial institution, specifically, an account of an electronic bank card of a bank or an account of an entity bank card, where in the scenario, the account provisioning request may also be a card provisioning request (i.e. provision an account corresponding to the entity bank card or provision an account corresponding to the electronic bank card, etc.), or the account may also be a registered account of an application program, specifically, may be an account of a timely communication application, through which the user may communicate with other users, or the like, and in addition, the account may also be other accounts other than the account, specifically, the account may be an account corresponding to a communication card (or a SIM card) for communication between terminals, which the user applies for and registers, or the account may be specifically, and the embodiment of the present description is not limited according to practical situations. The authentication information may be related information for authenticating the identity of the user, for example, the authentication information may be information of a code of a certificate capable of proving the identity of the user or information related to the code, or the like, or may be social security information of the user (such as an account number of a social security card of the user) or information related to the social security information, or may be an account number of a communication card (such as a mobile phone number) used for communication between terminals or information related to the account number of the communication card, or the like, which may be specifically set according to actual situations, and embodiments of the present disclosure are not limited.
In practice, in the process of treating telecommunication phishing, enterprises, public safety institutions, banks, operators, financial transaction institutions and the like can develop and fight against fraud black ash products from different angles according to own dominant data and technologies, but with the continuous change of fraud techniques, the black ash products can now use different fraud techniques and tools in different fraud links, and as the parties have no good data cooperation mechanism, the parties are respectively wary, effective resultant force of data and technological capability can not be formed any more. In the process of competing with black ash production, an important link is 'broken card' or 'frozen account'. In the actions of "card breaking" or "freezing account", risk management and control of account opening link is always a technical difficulty, and is mainly expressed in the following steps: the account opening party does not have more other data to comprehensively judge the background information of the account opening requesting party, and excessively relies on manual verification, and in addition, a scientific evaluation mechanism does not exist to judge whether to open the account for the account opening requesting party. The embodiment of the present specification provides an achievable technical solution, which may specifically include the following matters.
In consideration of characteristics and advantages of a blockchain, an anti-fraud blockchain system is constructed based on a blockchain technology, the anti-fraud blockchain system is quite suitable in technical selection mode, each side organization conducts information transmission and data sharing on the anti-fraud blockchain system, the ecological management capability of a true full link can be formed, based on the ecological management capability, the anti-fraud blockchain system can relate to a corresponding decentralized application DAPP, when a certain user (namely a target user) needs to open a certain account, the DAPP can be started, the DAPP can comprise an account registration and opening mechanism, a target user can trigger account registration and opening mechanism operation in the DAPP or service personnel trigger account registration and opening mechanism operation in the DAPP according to a request of the target user, then corresponding nodes (namely blockchain nodes) in the anti-fraud blockchain system can acquire pages corresponding to the account registration and opening mechanism, the pages can comprise input boxes of identity information required by the target user to open the account, after the input of the identity information required by the target user account is completed, the DAPP can be started, the account registration and opening mechanism can be triggered by the target user, the target user can be used as an identity information processing algorithm, the specific algorithm can be used for acquiring the identity information, and the identity information can be authenticated according to the fact that the identity information is encrypted, and the algorithm can be used for acquiring the identity information. The blockchain node may generate an account opening request of the target user based on the obtained authentication information, and provide the account opening request to an anti-fraud blockchain system, which may obtain the account opening request.
For example, as shown in fig. 2, a target user needs to apply for a bank card in a certain bank, the target user can apply for the bank card to an off-line business part of the bank, at this time, the service person can start a corresponding DAPP and trigger an account registration and opening mechanism in the DAPP to operate, a blockchain node corresponding to the bank can acquire a page corresponding to the account registration and opening mechanism, the service person can assist the target user to input identity information required by the target user to open an account in an input box of the page, after the input is completed, the service person can click an opening button in the page, at this time, the blockchain node can acquire the input identity information and can encrypt the identity information by using an encryption algorithm, and the obtained encrypted information is used as identity verification information of the target user. The blockchain node may generate an account opening request of the target user based on the obtained authentication information, and provide the account opening request to an anti-fraud blockchain system, which may obtain the account opening request.
In step S104, the authentication information is broadcast to a plurality of different nodes in the anti-fraud blockchain, so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on the account opened by the target user based on the authentication information.
The structure of the anti-fraud blockchain can be referred to in the above description, and will not be described in detail herein. The relevant information required for performing risk verification on the account opened by the target user may include various kinds of information, for example, the number of accounts opened by the target user, risk labels fed back by the target user at various nodes, abnormal behavior tracks of the target user, whether fraud exists in the target user before, etc., which may be specifically set according to actual situations, and the embodiment of the present disclosure does not limit the present disclosure.
In implementation, after the account opening request is acquired, the account opening request can be analyzed, the identity verification information contained in the account opening request is extracted, the related information required for performing risk verification on the target user opening account can be acquired from the locally (i.e. current node) stored data based on the identity verification information, then the identity verification information can be respectively broadcast to a plurality of different nodes in the anti-fraud block chain, and each node in the plurality of different nodes can acquire the related information required for performing risk verification on the target user opening account based on the identity verification information.
In step S106, obtaining relevant information required for risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain, and performing risk assessment on the account opening of the target user based on the obtained relevant information fed back by each node, so as to obtain a corresponding assessment result.
In implementation, the relevant information required for performing risk verification on the account opened by the target user can be acquired from each of a plurality of different nodes in the anti-fraud blockchain, a risk assessment algorithm can be preset according to actual conditions, matrix conversion or vectorization processing can be performed on the relevant information required for performing risk verification on the account opened by the target user to obtain a matrix corresponding to the relevant information or a vector corresponding to the relevant information, then, based on the acquired matrix or vector corresponding to the relevant information fed back by each node, a corresponding result can be calculated through the risk assessment algorithm, and thus risk assessment is performed on the account opening request of the target user to obtain a corresponding assessment result. The risk assessment algorithm may include various types of factor analysis algorithms, time sequence models, risk graph algorithms, decision tree algorithms, etc., and specifically may perform corresponding processing according to processing procedures of different algorithms or models, where the factor analysis algorithm may be a statistical technique for extracting common factors from variable groups, where the common factors may be hidden factors inherent between different variables, and the factor analysis process is a process of searching common factors and personality factors and obtaining optimal interpretation, and the factor analysis algorithm may group variables according to a correlation size, so that the correlation between variables in the same group is higher, but the variables in different groups are not related or have lower correlation, and each group of variables represents a basic structure, that is, a common factor. The factor analysis algorithm can be realized through the following processing procedures: determining whether the original variables are suitable for factor analysis: the basic logic of factor analysis is to construct a few factor variables with representative significance from original variables, which requires stronger correlation between the original variables, otherwise, the factor analysis cannot extract the common characteristics between the variables; construction factor variable: there are various methods for determining factor variables in factor analysis, such as principal component analysis based on principal component model and principal axis factor method, maximum likelihood method, least square method, etc. based on factor analysis model; the factor variable is made more interpretable by rotation: in the actual analysis work, the relation between the factors and the original variables is mainly obtained through factor analysis, so that the new factors can be named and interpreted; calculating the score of the factor variable: after the sub-variables are determined, for each data, it is desirable to have their specific data values at different factors, which are the factor scores, which correspond to the scores of the original variables. Other algorithms in the above algorithm may perform corresponding processing according to a processing procedure commonly used by each algorithm, which is not described herein.
It should be noted that, not only the obtained related information may be subjected to matrix conversion or vectorization processing in the above manner to obtain a corresponding processing result, but also the above processing may be implemented in other manners, for example, risk assessment may be performed on account opening of the target user in a qualitative assessment manner, specifically, whether risk exists in account opening of the target user may be judged according to non-quantitative data such as knowledge, experience, policy trend, etc. of an evaluator, and loss caused by a security event is focused on, and probability of occurrence of the security event is ignored. The specific processing procedure of the risk assessment processing by the risk assessment algorithm may be corresponding processing according to processing procedures of different algorithms or models, which are not described herein.
In step S108, if the evaluation result indicates that there is no risk of opening the account for the target user, the account opening process corresponding to the account opening request is executed.
In implementation, if the evaluation result indicates that there is no risk in opening the account for the target user, a corresponding account number may be allocated to the target user according to the account opening request or the target user may select the corresponding account number, and the account number may be associated with the target user, and then an account corresponding to the account number may be opened, thereby completing the opening process of the account. If the evaluation result indicates that the risk exists in opening the account for the target user, the account opening request is not required to be responded, the account opening for the target user is refused to be opened, and the result can be provided for the target user, so that the target user can know the account opening condition.
The embodiment of the specification provides a processing method of an account, which is applied to an anti-fraud blockchain system, and is characterized in that an account opening request comprising the identity verification information of a target user is acquired, and then the identity verification information is respectively broadcast to a plurality of different nodes in the anti-fraud blockchain system, so that each node in the plurality of different nodes is triggered to acquire related information required for carrying out risk verification on an account opened by the target user based on the identity verification information, the acquired related information fed back by each node carries out risk assessment on the account opening of the target user, if the acquired assessment result indicates that the account opened by the target user is not at risk, account opening processing corresponding to the account opening request is executed, thus, the data flow mechanism design and service calculation dimension of an account opening link are completed on the anti-fraud blockchain system constructed based on a blockchain technology, the account opening can be coordinated in multiple directions, the requirements of account opening audit are met, meanwhile, the data privacy and processing efficiency between different parties can be ensured, the data of the nodes are not visible, and in addition, whether the account opening is available is determined, and whether the account opening request is correct or not is accurately performed by using a statistical method.
Example two
As shown in fig. 3, the embodiment of the present disclosure provides a method for processing an account, where an execution body of the method may be an anti-fraud blockchain system, and the anti-fraud blockchain system may be used to open an account for a user to perform risk detection, so as to prevent the occurrence of an account with fraud risk, where the anti-fraud blockchain system may include one or more different nodes, where the nodes may be a terminal device or a server, where the terminal device may be a mobile terminal device such as a mobile phone, a tablet computer, or a computer device such as a notebook computer or a desktop computer, or may also be an IoT device (specifically, a smart watch, a vehicle-mounted device, etc.), where the server may be an independent server, or may be a server cluster formed by multiple servers, where the server may be a background server such as a financial service or a network shopping service, or may also be a background server of an application program, or the like. The method specifically comprises the following steps:
in step S302, an account opening request of the target user is obtained, where the account opening request includes authentication information of the target user.
The authentication information may include a hash value of information of a certificate capable of proving the identity of the target user and/or an information hash value of the communication account. The information of the document capable of proving the identity of the target user may be a numeric string, a character string composed of a numeric number and a specified character, a character string composed of a specified character (excluding a numeric number), or the like, and may be specifically set according to the actual situation, which is not limited in the embodiment of the present specification. The information of the communication account number may be, for example, a mobile phone number, a registered account number of an instant messaging application, or the like, and may be specifically set according to an actual situation, which is not limited in the embodiment of the present disclosure. The hash value may be calculated by a variety of different hash algorithms, for example, the corresponding hash value may be calculated by any one of the hash algorithms SHA-224, SHA-256, SHA-384, SHA-512, MD5, etc.
In implementation, as shown in fig. 4, a target user needs to apply for a bank card in a certain bank, the target user may apply for the bank card to an off-line business part of the bank, at this time, the service person may start a corresponding DAPP and trigger an account registration and provisioning mechanism in the DAPP to operate, a blockchain node corresponding to the bank may acquire a page corresponding to the account registration and provisioning mechanism, the service person may assist the target user in inputting identity information required by the target user to provision the account in an input box of the page, after the input is completed, the service person may click a provisioning key in the page, at this time, the blockchain node may acquire the input identity information, and may use a preset hash algorithm to calculate a hash value corresponding to the identity information, where the obtained hash value is used as identity verification information of the target user. An account opening request of the target user can be generated based on the obtained identity verification information, the account opening request is provided to a corresponding blockchain node in the anti-fraud blockchain system, and the anti-fraud blockchain system can acquire the account opening request.
In step S304, the authentication information is broadcast to a plurality of different nodes in the anti-fraud blockchain system, so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on the account opened by the target user based on the authentication information.
The plurality of different nodes comprise a plurality of nodes among a node corresponding to a financial institution, a node corresponding to an anti-fraud institution, a node corresponding to a tax institution, a node corresponding to a human resource institution, a node corresponding to a social security institution, a node corresponding to a supervision structure and a node corresponding to an account operation institution; the related information required by the target user to open the account includes one or more of the number of the opened accounts, the number of the accounts with risk owned by the target user, the opening time of the accounts owned by the target user, whether the authentication information belongs to the target user (specifically, if the information of the credentials capable of proving the identity of the target user is matched with or associated with the information of the communication account, if the information is not matched with the information of the credentials capable of proving the identity of the target user, the information of the communication account matched with the information of the credentials capable of proving the identity of the target user can be obtained, the acquired information of the credentials capable of proving the identity of the target user matched with the information of the communication account can be obtained, the hash value of the acquired information or the acquired information after encryption processing is returned, and the abnormal information initiates history stock check inside (request initiating node, information feedback node) whether the risk exists for the target user, and whether the authentication information corresponds to the authentication information of other accounts.
In implementation, as shown in fig. 4, the authentication information may be broadcast to a node corresponding to a financial institution, a node corresponding to an anti-fraud blockchain system, a node corresponding to a tax institution, a node corresponding to a human resource institution, a node corresponding to a social security institution, a node corresponding to a supervision structure, and a node corresponding to an account operation institution in the anti-fraud blockchain system, where each node may calculate a hash value of corresponding identity information in each node based on a hash value in an account opening request, and then the hash value in the account opening request may be compared with the hash value obtained by the calculation, so as to find out related information of a target user, select related information required for performing risk verification on an opening account of the target user from the related information of the found target user, and specifically, may obtain, for the node corresponding to the financial institution, the number and opening time of other financial accounts that have been opened (e.g. specific information (e.g. bank card number, etc.) related to the account, may be encrypted or displayed after performing hash processing), and whether there is a risk, the risk exists, and the related information of the target account that has been risk is required for performing risk verification on the target account; aiming at the nodes corresponding to the anti-fraud institutions, information such as actual population abnormal tracks, whether fraud cases are involved or not and the like can be obtained to serve as related information required for risk verification of opening accounts of target users; aiming at the node corresponding to the tax institution, the personal tax related information of the target user can be obtained as related information required for carrying out risk verification on the opening account of the target user; aiming at the nodes corresponding to the human resource institutions, the related information of the organizations of the job supplied by the target users can be obtained to be used as the related information required for carrying out risk verification on the opening accounts of the target users; aiming at the nodes corresponding to the social security mechanism, the related information of the organization of the job supplied by the target user for paying insurance deposit for the target user can be obtained as the related information required for carrying out risk verification on the account opened by the target user; aiming at the nodes corresponding to the supervision structure, the related information of the target user as an enterprise legal person can be obtained as the related information required for risk verification of opening an account of the target user; for the node corresponding to the account operating mechanism, the related information of the account opened by the target user can be obtained as related information and the like required for performing risk verification on the account opened by the target user, and the related information can be specifically set according to actual conditions, which is not limited in the embodiment of the specification.
In step S302, the hash value of the information of the identity document of the target user and/or the hash value of the information of the communication account number are described as the authentication information, and in practical application, the authentication information may also be information that may include information of the encrypted identity document capable of proving the identity of the target user and/or information of the encrypted communication account number, where the encryption process may be implemented by a specified encryption algorithm, where the encryption algorithm may include multiple types, particularly may include a symmetric encryption algorithm or an asymmetric encryption algorithm, and the symmetric encryption algorithm and the asymmetric encryption algorithm may also include multiple types of different algorithms, which may be specifically selected according to practical situations, and the embodiment of the present disclosure is not limited thereto.
Based on the authentication information, broadcasting the authentication information to a plurality of different nodes in the anti-fraud blockchain system, respectively, so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on the opening account of the target user based on the authentication information, respectively, wherein the specific processing may include: the authentication information is broadcast to a plurality of different nodes in the anti-fraud blockchain system respectively, so that each node in the plurality of different nodes is triggered to decrypt the information in the authentication information respectively, decrypted information is obtained, and relevant information required for risk verification of opening an account of a target user is obtained based on the decrypted information.
The above-mentioned process may be specifically referred to the foregoing related content, and will not be described herein.
In step S306, the relevant information required for risk verification of the target user open account fed back by each node in the anti-fraud blockchain system is obtained.
In step S308, the obtained relevant information fed back by each node is quantized to obtain a feature vector corresponding to the relevant information fed back by each node.
In implementation, for the acquired relevant information fed back by each node, analysis and statistics can be performed according to the stage operation data, and the acquired parameters of the relevant information fed back by each node are assigned, so that the acquired relevant information fed back by each node is quantized, and feature vectors corresponding to the relevant information fed back by each node are obtained.
In step S310, based on the feature vector and the corresponding weight vector corresponding to the relevant information fed back by each node, a sub-evaluation result of risk evaluation of the account opening request of the target user by each node is determined.
In implementation, a weight distribution mechanism may be preset according to actual situations, after the feature vector corresponding to the relevant information fed back by each node is obtained in the above manner, a corresponding weight vector may be respectively distributed to the feature vector by using the weight distribution mechanism, then the feature vector corresponding to the relevant information fed back by each node may be multiplied by the corresponding weight vector, and the results obtained by multiplying different feature vectors by the corresponding weight vector may be added, and the final obtained result may be used as a sub-evaluation result of risk evaluation for the account opening request of the target user by each node.
The specific processing manner of the step S310 may be varied, and the following alternative processing manner may be provided, which specifically includes the following processing of step A2 and step A4.
In step A2, based on the approach-to-ideal solution ordering algorithm TOPSIS, the best feature vector and the worst feature vector are selected from the feature vectors corresponding to the related information fed back by each node, so as to obtain the selected best feature vector and worst feature vector corresponding to each node.
The TOPSIS (Technique for Order Preference by Similarity to Ideal Solution, approaching an ideal solution sorting algorithm, or may also be called a good-bad solution distance algorithm) may select a maximum value and a minimum value from a group of data, take the distance between the maximum value and the minimum value as a denominator, and take the distance between each numerical value and the minimum value as a numerator to score the data in the group.
In step A4, based on the selected optimal feature vector and the worst feature vector corresponding to each node and the corresponding weight vector, determining a sub-evaluation result of risk evaluation on account opening of the target user by each node.
In implementation, a weight distribution mechanism may be preset according to an actual situation, after feature vectors corresponding to relevant information fed back by each node are obtained through the above manner, corresponding weight vectors may be respectively distributed to the feature vectors through the weight distribution mechanism, then, a selected optimal feature vector corresponding to each node may be multiplied by the corresponding weight vector, a worst feature vector may be multiplied by the corresponding weight vector, a distance between a vector obtained by multiplying the optimal feature vector by the corresponding weight vector and a vector obtained by multiplying the worst feature vector by the corresponding weight vector is a denominator, a sum of distances between a vector obtained by multiplying a feature vector corresponding to each relevant information and a vector obtained by multiplying the worst feature vector by the corresponding weight vector is a numerator, and the obtained result may be determined as a sub-evaluation result of risk assessment on account opening of the target user by each node.
In step S312, based on the sub-evaluation result of the risk evaluation of the account opening of the target user by each node, an evaluation result of the risk evaluation of the account opening of the target user is determined.
In implementation, the sub-evaluation results of risk evaluation on account opening of the target user by multiple nodes may be counted to obtain the number of different sub-evaluation results, the most number of sub-evaluation results in the same seed evaluation result may be determined as the evaluation result of risk evaluation on account opening of the target user, for example, the number of sub-evaluation results indicating that no risk exists for opening the account of the target user is 80, the total number of obtained sub-evaluation results is 100, the number of sub-evaluation results indicating that no risk exists for opening the account of the target user is 20, and then the risk does not exist for opening the account of the target user may be regarded as the evaluation result of risk evaluation on account opening of the target user. Or, only when all the 100 sub-evaluation results indicate that the account opening of the target user is free of risk, the account opening of the target user is free of risk as an evaluation result for performing risk evaluation on the account opening of the target user, otherwise, the account opening of the target user is free of risk as an evaluation result for performing risk evaluation on the account opening of the target user, or the evaluation result for performing risk evaluation on the account opening of the target user can be determined through other strategies, and the evaluation result can be specifically set according to actual conditions, and the embodiment of the specification is not limited.
It should be noted that, the above-mentioned processing from step S308 to step S312 is to determine, by a set algorithm, an evaluation result of performing risk evaluation on the account opening of the target user, and in practical application, the risk evaluation may also be performed on the account opening of the target user by using a plurality of different modes based on the acquired relevant information fed back by each node, so as to obtain a corresponding evaluation result, and an optional processing mode is provided, and may specifically include the processing in step B4 in step B2.
In step B2, the acquired relevant information fed back by each node is quantized to obtain a feature vector corresponding to the relevant information fed back by each node.
In step B4, feature vectors corresponding to the relevant information fed back by each node are input into a pre-trained risk assessment model, and risk assessment is carried out on account opening of a target user through the risk assessment model, so that a corresponding assessment result is obtained.
The risk assessment model may be constructed through a plurality of different algorithms, for example, a risk assessment model may be constructed through a neural network model, or a risk assessment model may be constructed through the above-mentioned factor analysis algorithm, time sequence model, equal risk graph algorithm, decision tree algorithm, factor analysis algorithm, logic analysis algorithm, history comparison algorithm, delta film method, etc., which may be specifically determined according to actual situations and will not be described herein.
In implementation, a corresponding algorithm may be obtained, a risk assessment model may be constructed based on the algorithm, input data of the risk assessment model may be a feature vector corresponding to relevant information fed back by each node, and the output data may be an assessment result of performing risk assessment on account opening of the target user, then a training sample (i.e., relevant information required for performing risk verification on account opening of the target user and fed back by each node in the anti-fraud blockchain system in a specified historical period) for training the risk assessment model may be obtained, the risk assessment model may be trained by using the training sample, an objective function may be preset in the process of performing model training, and model parameters in the risk assessment model may be optimized based on the objective function, where the risk assessment model may be adjusted for the objective function. And then, training the risk assessment model by using a training sample, and simultaneously optimizing model parameters by using the objective function to finally obtain the trained risk assessment model. And then, the feature vector corresponding to the relevant information fed back by each node can be input into a risk assessment model, and the feature vector corresponding to the relevant information fed back by each node is processed through a corresponding algorithm in the risk assessment model so as to perform risk assessment on account opening of the target user, so that a corresponding assessment result is obtained.
In step S314, if the evaluation result indicates that there is no risk of opening the account for the target user, the account opening process corresponding to the account opening request is executed.
The embodiment of the specification provides a processing method of an account, which is applied to an anti-fraud blockchain system, and is characterized in that an account opening request comprising the identity verification information of a target user is acquired, and then the identity verification information is respectively broadcast to a plurality of different nodes in the anti-fraud blockchain system, so that each node in the plurality of different nodes is triggered to acquire related information required for carrying out risk verification on an account opened by the target user based on the identity verification information, the acquired related information fed back by each node carries out risk assessment on the account opening of the target user, if the acquired assessment result indicates that the account opened by the target user is not at risk, account opening processing corresponding to the account opening request is executed, thus, the data flow mechanism design and service calculation dimension of an account opening link are completed on the anti-fraud blockchain system constructed based on a blockchain technology, the account opening can be coordinated in multiple directions, the requirements of account opening audit are met, meanwhile, the data privacy and processing efficiency between different parties can be ensured, the data of the nodes are not visible, and in addition, whether the account opening is available is determined, and whether the account opening request is correct or not is accurately performed by using a statistical method.
Example III
The above method for processing accounts provided in the embodiments of the present disclosure further provides an anti-fraud blockchain system based on the same concept, as shown in fig. 5.
The anti-fraud blockchain system includes a network layer subsystem 510, a base data layer subsystem 520, a support platform layer subsystem 530, and an application layer subsystem 540, wherein:
the network layer subsystem 510 is configured to provide an interconnection communication network for different nodes in the anti-fraud blockchain system, and in practical application, the network layer subsystem 510 may ensure that a 1+1 manner is adopted for implementing the basic network communication capability, where the first part is the communication network of the anti-fraud blockchain system, and cloud service resources may be used to deploy the communication network of the anti-fraud blockchain system on the virtual machine group.
The basic data layer subsystem 520 can provide capabilities of basic data access, processing, integration, calculation and the like, can check the authenticity, validity and integrity of various business data, can provide local data privacy protection and encryption functions, and further develops various docking forms such as a standard API interface, an offline form and the like.
A support platform layer subsystem 530 is configured to manage different nodes in the anti-fraud blockchain system.
The application layer subsystem 540 can realize multiparty data linkage, namely sharing of information capacity of opening account data, wind control labels, black ash data and the like of different nodes, establish an inter-member information cross verification mechanism, perform data joint modeling based on a privacy computing technology aiming at a complex scene, and realize sharing data broadcasting, visual supervision of application program running conditions and the like.
The foregoing is a composition and different functions that may be implemented by each subsystem, and in this embodiment, the application layer subsystem 540 is configured to obtain an account opening request of the target user based on the communication network provided by the network layer subsystem, and provide the account opening request to the base data layer subsystem 520, where the account opening request includes authentication information of the target user.
The basic data layer subsystem 520 is configured to broadcast the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively, so as to trigger each node in the plurality of different nodes to acquire related information required for risk verification on the account opened by the target user based on the identity verification information respectively; acquiring related information required by opening an account of a target user fed back by each node in the anti-fraud blockchain system, performing risk assessment on the opening of the account of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result, and providing the assessment result to an application layer subsystem;
The application layer subsystem 540 is configured to execute the account opening process corresponding to the account opening request if the evaluation result indicates that there is no risk of opening the account for the target user.
The specific processing procedures of the base data layer subsystem 520 and the application layer subsystem 540 may be referred to in the foregoing description, and will not be repeated herein.
According to the anti-fraud blockchain system, an account opening request comprising identity verification information of a target user is obtained, then the identity verification information is respectively broadcast to a plurality of different nodes in the anti-fraud blockchain system, so that each node in the plurality of different nodes is triggered to obtain relevant information required for carrying out risk verification on an account opening of the target user based on the identity verification information, risk assessment is carried out on the account opening of the target user based on the obtained relevant information fed back by each node, if the obtained assessment result indicates that the account opening of the target user is not at risk, account opening processing corresponding to the account opening request is carried out, and therefore, the data flow mechanism design and the service calculation dimension of an account opening link are completed on the anti-fraud blockchain system built based on a blockchain technology, thereby being capable of carrying out multi-party cooperation on account opening and meeting the requirements of account opening verification, simultaneously being capable of guaranteeing data transmission safety, data privacy and processing efficiency among different parties, being capable of carrying out whether node data are available or not, and determining whether the account opening of the target user is in compliance or not by using a statistical learning mode is accurate.
Example IV
Fig. 6 is a block chain anti-fraud system provided in an embodiment of the present disclosure. The anti-fraud blockchain system includes all the functional units of the anti-fraud blockchain system shown in fig. 5, and is improved on the basis of the functional units, the improvement is as follows:
the network layer subsystem 510 is configured to deploy preset entity devices for different nodes in the anti-fraud blockchain system, communicatively connect the entity devices with corresponding nodes, and provide data privacy protection rules and encryption storage rules.
The data privacy protection rule may include various data privacy protection rules based on a differential privacy algorithm, or data privacy protection rules based on a hash algorithm, and the like, and may be specifically set according to actual situations. The encryption storage rule may include various types, such as an encryption storage rule based on a symmetric encryption algorithm, or an encryption storage rule based on an asymmetric encryption algorithm, and the like, and may be specifically set according to practical situations.
In addition, in practical applications, as shown in fig. 6, the supporting platform layer subsystem 530 may include a trusted data service platform 531, an application service management platform 532, and a federation operation management platform 533, where:
A trusted data services platform 531 configured to support communication of service data with the anti-fraud block chain system and for data flow rules, data model definition and upper and lower block link port standard formulation;
an application service management platform 532 configured to counter the development and management of fraudulent application services and the edge computing terminal management and support the development of service atomic capabilities of business applications;
the federation operations management platform 533 is configured to anti-fraud blockchain system point rules, node management in anti-fraud blockchain systems, development and invocation management of business application services, node failure monitoring, security protection, network anomaly alarm handling.
In addition, in practical application, the application layer subsystem 540 is configured to prevent data sharing between different nodes in the fraudulent blockchain system, and establish an information cross verification rule between the different nodes; the shared data in the nodes are encrypted and then broadcast to other nodes; the behavior of the individual applications is visually monitored.
The encryption processing involved in broadcasting the shared data in the node to other nodes after the encryption processing may be implemented by a symmetric encryption algorithm, or may be implemented by an asymmetric encryption algorithm, or the like, which may be specifically set according to the actual situation, and the embodiment of the present disclosure is not limited to this.
In addition, in practical application, the authentication information includes information of the encrypted credentials capable of proving the identity of the target user and/or information of the encrypted communication account, and the basic data layer subsystem 520 is configured to broadcast the authentication information to a plurality of different nodes in the anti-fraud blockchain system, so as to trigger each node in the plurality of different nodes to decrypt the information in the authentication information, so as to obtain decrypted information, and obtain related information required for risk verification on the opening account of the target user based on the decrypted information.
In addition, in practical application, the basic data layer subsystem 520 is configured to perform quantization processing on the acquired relevant information fed back by each node, so as to obtain a feature vector corresponding to the relevant information fed back by each node; determining a sub-evaluation result of risk evaluation of the account opening request of the target user by each node based on the feature vector and the corresponding weight vector corresponding to the related information fed back by each node; and determining an evaluation result of performing risk evaluation on the account opening of the target user based on the sub-evaluation result of performing risk evaluation on the account opening of the target user by each node.
In addition, in practical application, the basic data layer subsystem 520 is configured to select the best feature vector and the worst feature vector from the feature vectors corresponding to the related information fed back by each node based on the approach to the ideal solution ordering algorithm TOPSIS, so as to obtain the selected best feature vector and the worst feature vector corresponding to each node; based on the selected optimal feature vector and worst feature vector corresponding to each node and the corresponding weight vector, determining a sub-evaluation result of risk evaluation on account opening of the target user by each node.
In addition, in practical application, the basic data layer subsystem 520 is configured to perform quantization processing on the acquired relevant information fed back by each node, so as to obtain a feature vector corresponding to the relevant information fed back by each node; and inputting the feature vector corresponding to the related information fed back by each node into a pre-trained risk assessment model, and carrying out risk assessment on account opening of the target user through the risk assessment model to obtain a corresponding assessment result.
The relevant content of the subsystem referred to above may be referred to the relevant content and will not be described herein.
According to the anti-fraud blockchain system, an account opening request comprising identity verification information of a target user is obtained, then the identity verification information is respectively broadcast to a plurality of different nodes in the anti-fraud blockchain system, so that each node in the plurality of different nodes is triggered to obtain relevant information required for carrying out risk verification on an account opening of the target user based on the identity verification information, risk assessment is carried out on the account opening of the target user based on the obtained relevant information fed back by each node, if the obtained assessment result indicates that the account opening of the target user is not at risk, account opening processing corresponding to the account opening request is carried out, and therefore, the data flow mechanism design and the service calculation dimension of an account opening link are completed on the anti-fraud blockchain system built based on a blockchain technology, thereby being capable of carrying out multi-party cooperation on account opening and meeting the requirements of account opening verification, simultaneously being capable of guaranteeing data transmission safety, data privacy and processing efficiency among different parties, being capable of carrying out whether node data are available or not, and determining whether the account opening of the target user is in compliance or not by using a statistical learning mode is accurate.
Example five
Based on the same concept, the embodiment of the present disclosure further provides an account processing device, which is disposed in the anti-fraud blockchain system, as shown in fig. 7.
The account processing device comprises: a request module 701, a broadcast module 702, a risk assessment module 703, and an account provisioning module 704, wherein:
a request module 701, configured to obtain an account opening request of a target user, where the account opening request includes authentication information of the target user;
the broadcasting module 702 is configured to broadcast the authentication information to a plurality of different nodes in the anti-fraud blockchain system, so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on the account opened by the target user based on the authentication information;
the risk assessment module 703 acquires the relevant information required by the risk verification of the account opening of the target user fed back by each node in the anti-fraud blockchain system, and performs risk assessment on the account opening of the target user based on the acquired relevant information fed back by each node, so as to obtain a corresponding assessment result;
and an account opening module 704, configured to execute an account opening process corresponding to the account opening request if the evaluation result indicates that there is no risk in opening the account for the target user.
In the embodiment of the present disclosure, the plurality of different nodes include a plurality of nodes among a node corresponding to a financial institution, a node corresponding to an anti-fraud institution, a node corresponding to a tax institution, a node corresponding to a human resource institution, a node corresponding to a social security institution, a node corresponding to a supervision structure, and a node corresponding to an account operation institution; the related information required by the target user to open the accounts comprises one or more of the number of the opened accounts, the number of the accounts with risks owned by the target user, the opening time of the accounts owned by the target user, whether the identity verification information belongs to the target user, whether the target user has risks, and whether the identity verification information is consistent with the identity verification information corresponding to other accounts.
In this embodiment of the present disclosure, the authentication information includes information of an encrypted certificate capable of proving an identity of the target user and/or information of an encrypted communication account, and the broadcasting module 702 broadcasts the authentication information to a plurality of different nodes in the anti-fraud blockchain system, so as to trigger each node in the plurality of different nodes to decrypt the information in the authentication information, so as to obtain decrypted information, and obtain relevant information required for performing risk verification on an account opened by the target user based on the decrypted information.
In this embodiment of the present disclosure, the authentication information includes a hash value of information of a certificate capable of proving an identity of the target user and/or an information hash value of a communication account.
In the embodiment of the present disclosure, the risk assessment module 703 includes:
the first quantization unit is used for carrying out quantization processing on the acquired relevant information fed back by each node to obtain a feature vector corresponding to the relevant information fed back by each node;
the sub-result determining unit is used for determining a sub-evaluation result of each node for performing risk evaluation on the account opening request of the target user based on the feature vector corresponding to the related information fed back by each node and the corresponding weight vector;
and the evaluation result determining unit is used for determining an evaluation result for performing risk evaluation on the account opening of the target user based on the sub-evaluation result of performing risk evaluation on the account opening of the target user by each node.
In the embodiment of the present disclosure, the sub-result determining unit selects, based on a TOPSIS approach ideal solution ordering algorithm, an optimal feature vector and a worst feature vector from feature vectors corresponding to related information fed back by each node, so as to obtain the selected optimal feature vector and worst feature vector corresponding to each node; and determining a sub-evaluation result of risk evaluation on account opening of the target user by each node based on the selected optimal feature vector and worst feature vector corresponding to each node and the corresponding weight vector.
In the embodiment of the present disclosure, the risk assessment module 703 includes:
the second quantization unit is used for carrying out quantization processing on the acquired relevant information fed back by each node to obtain a feature vector corresponding to the relevant information fed back by each node;
the risk assessment unit inputs the feature vector corresponding to the relevant information fed back by each node into a pre-trained risk assessment model, and risk assessment is carried out on account opening of the target user through the risk assessment model to obtain a corresponding assessment result.
The embodiment of the specification provides a processing device of an account, which is arranged in an anti-fraud blockchain system, and is characterized in that an account opening request comprising authentication information of a target user is acquired, and then the authentication information is respectively broadcast to a plurality of different nodes in the anti-fraud blockchain system, so that each node in the plurality of different nodes is triggered to acquire related information required for carrying out risk verification on an account opened by the target user based on the authentication information, risk assessment is carried out on the account opening of the target user based on the acquired related information fed back by each node, if the acquired assessment result indicates that the account opened by the target user is not at risk, account opening processing corresponding to the account opening request is carried out, thus, the data flow mechanism design and service calculation dimension of an account opening link are completed on the anti-fraud blockchain system constructed based on a blockchain technology, the account opening can be carried out in a plurality of directions, and the auditing requirement of the opening of the account is met, meanwhile, the data privacy and the processing efficiency between different parties can be ensured, and the data transmission of the nodes are all available, in addition, whether the account opening is not available is judged, and the compliance of the account opening request is accurately is utilized by a target user.
Example six
The above processing device for an account provided in the embodiment of the present disclosure further provides an account processing apparatus based on the same concept, as shown in fig. 8.
The account processing device may be provided in the anti-fraud blockchain system provided in the above embodiments.
The processing devices of the account may vary considerably in configuration or performance and may include one or more processors 801 and memory 802, where the memory 802 may store one or more stored applications or data. Wherein the memory 802 may be transient storage or persistent storage. The application program stored in memory 802 may include one or more modules (not shown in the figures), each of which may include a series of computer-executable instructions in the processing device for the account. Still further, the processor 801 may be configured to communicate with a memory 802 to execute a series of computer executable instructions in the memory 802 on a processing device of an account. The processing device of the account may also include one or more power supplies 803, one or more wired or wireless network interfaces 804, one or more input/output interfaces 805, one or more keyboards 806.
In particular, in this embodiment, the processing device of the account includes a memory, and one or more programs, where the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer executable instructions in the processing device of the account, and configured to be executed by the one or more processors, the one or more programs including computer executable instructions for:
acquiring an account opening request of a target user, wherein the account opening request comprises identity verification information of the target user;
broadcasting the identity verification information to a plurality of different nodes in an anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for carrying out risk verification on an account opened by the target user based on the identity verification information respectively;
acquiring related information required by risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain system, and performing risk assessment on the account opening of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result;
And if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.
In the embodiment of the present disclosure, the plurality of different nodes include a plurality of nodes among a node corresponding to a financial institution, a node corresponding to an anti-fraud institution, a node corresponding to a tax institution, a node corresponding to a human resource institution, a node corresponding to a social security institution, a node corresponding to a supervision structure, and a node corresponding to an account operation institution; the related information required by the target user to open the accounts comprises one or more of the number of the opened accounts, the number of the accounts with risks owned by the target user, the opening time of the accounts owned by the target user, whether the identity verification information belongs to the target user, whether the target user has risks, and whether the identity verification information is consistent with the identity verification information corresponding to other accounts.
In this embodiment of the present disclosure, the authentication information includes information of an encrypted certificate capable of proving an identity of the target user and/or information of an encrypted communication account, and the broadcasting the authentication information to a plurality of different nodes in an anti-fraud blockchain system, so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on opening an account of the target user based on the authentication information, where the method includes:
Broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively, triggering each node in the plurality of different nodes to decrypt the information in the identity verification information respectively, obtaining decrypted information, and obtaining related information required for risk verification on the account opened by the target user based on the decrypted information.
In this embodiment of the present disclosure, the authentication information includes a hash value of information of a certificate capable of proving an identity of the target user and/or an information hash value of a communication account.
In this embodiment of the present disclosure, performing risk assessment on account opening of the target user based on the acquired related information fed back by each node, to obtain a corresponding assessment result, includes:
carrying out quantization processing on the acquired relevant information fed back by each node to obtain a feature vector corresponding to the relevant information fed back by each node;
determining a sub-evaluation result of risk evaluation of the account opening request of the target user by each node based on the feature vector and the corresponding weight vector corresponding to the related information fed back by each node;
and determining an evaluation result of performing risk evaluation on the account opening of the target user based on a sub-evaluation result of performing risk evaluation on the account opening of the target user by each node.
In this embodiment of the present disclosure, the determining, based on the feature vector and the corresponding weight vector corresponding to the relevant information fed back by each node, a sub-evaluation result of risk evaluation on account opening of the target user by each node includes:
based on a TOPSIS (approximate ideal solution sequence) algorithm, selecting an optimal feature vector and a worst feature vector from feature vectors corresponding to the related information fed back by each node, and obtaining the selected optimal feature vector and worst feature vector corresponding to each node;
and determining a sub-evaluation result of risk evaluation on account opening of the target user by each node based on the selected optimal feature vector and worst feature vector corresponding to each node and the corresponding weight vector.
In this embodiment of the present disclosure, performing risk assessment on account opening of the target user based on the acquired related information fed back by each node, to obtain a corresponding assessment result, includes:
carrying out quantization processing on the acquired relevant information fed back by each node to obtain a feature vector corresponding to the relevant information fed back by each node;
and inputting the feature vector corresponding to the relevant information fed back by each node into a pre-trained risk assessment model, and carrying out risk assessment on account opening of the target user through the risk assessment model to obtain a corresponding assessment result.
The embodiment of the specification provides processing equipment of an account, which is arranged in an anti-fraud blockchain system, by acquiring an account opening request comprising authentication information of a target user, and broadcasting the authentication information to a plurality of different nodes in the anti-fraud blockchain system respectively, so as to trigger each node in the plurality of different nodes to acquire related information required for carrying out risk verification on an account opened by the target user based on the authentication information respectively, carrying out risk assessment on the account opening of the target user based on the acquired related information fed back by each node, and if the acquired assessment result indicates that the account opened by the target user has no risk, executing account opening processing corresponding to the account opening request, thereby completing data flow mechanism design and business calculation dimension of account opening links on the anti-fraud blockchain system constructed based on a blockchain technology, and being capable of combining multiparty dominant data to carry out cooperation on account opening, meeting the requirements of checking on account opening, simultaneously being capable of guaranteeing data privacy and processing efficiency between different parties, being capable of carrying out the fact that data of the nodes are all available, and determining whether the account opening is in addition or not valid, and determining whether the account opening request is valid or not accurately by using a target learning mode.
Example seven
Further, based on the method shown in fig. 1 to fig. 4, one or more embodiments of the present disclosure further provide a storage medium, which is used to store computer executable instruction information, and in a specific embodiment, the storage medium may be a U disc, an optical disc, a hard disk, etc., where the computer executable instruction information stored in the storage medium can implement the following flow when executed by a processor:
acquiring an account opening request of a target user, wherein the account opening request comprises identity verification information of the target user;
broadcasting the identity verification information to a plurality of different nodes in an anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for carrying out risk verification on an account opened by the target user based on the identity verification information respectively;
acquiring related information required by risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain system, and performing risk assessment on the account opening of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result;
And if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.
In the embodiment of the present disclosure, the plurality of different nodes include a plurality of nodes among a node corresponding to a financial institution, a node corresponding to an anti-fraud institution, a node corresponding to a tax institution, a node corresponding to a human resource institution, a node corresponding to a social security institution, a node corresponding to a supervision structure, and a node corresponding to an account operation institution; the related information required by the target user to open the accounts comprises one or more of the number of the opened accounts, the number of the accounts with risks owned by the target user, the opening time of the accounts owned by the target user, whether the identity verification information belongs to the target user, whether the target user has risks, and whether the identity verification information is consistent with the identity verification information corresponding to other accounts.
In this embodiment of the present disclosure, the authentication information includes information of an encrypted certificate capable of proving an identity of the target user and/or information of an encrypted communication account, and the broadcasting the authentication information to a plurality of different nodes in an anti-fraud blockchain system, so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on opening an account of the target user based on the authentication information, where the method includes:
Broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively, triggering each node in the plurality of different nodes to decrypt the information in the identity verification information respectively, obtaining decrypted information, and obtaining related information required for risk verification on the account opened by the target user based on the decrypted information.
In this embodiment of the present disclosure, the authentication information includes a hash value of information of a certificate capable of proving an identity of the target user and/or an information hash value of a communication account.
In this embodiment of the present disclosure, performing risk assessment on account opening of the target user based on the acquired related information fed back by each node, to obtain a corresponding assessment result, includes:
carrying out quantization processing on the acquired relevant information fed back by each node to obtain a feature vector corresponding to the relevant information fed back by each node;
determining a sub-evaluation result of risk evaluation of the account opening request of the target user by each node based on the feature vector and the corresponding weight vector corresponding to the related information fed back by each node;
and determining an evaluation result of performing risk evaluation on the account opening of the target user based on a sub-evaluation result of performing risk evaluation on the account opening of the target user by each node.
In this embodiment of the present disclosure, the determining, based on the feature vector and the corresponding weight vector corresponding to the relevant information fed back by each node, a sub-evaluation result of risk evaluation on account opening of the target user by each node includes:
based on a TOPSIS (approximate ideal solution sequence) algorithm, selecting an optimal feature vector and a worst feature vector from feature vectors corresponding to the related information fed back by each node, and obtaining the selected optimal feature vector and worst feature vector corresponding to each node;
and determining a sub-evaluation result of risk evaluation on account opening of the target user by each node based on the selected optimal feature vector and worst feature vector corresponding to each node and the corresponding weight vector.
In this embodiment of the present disclosure, performing risk assessment on account opening of the target user based on the acquired related information fed back by each node, to obtain a corresponding assessment result, includes:
carrying out quantization processing on the acquired relevant information fed back by each node to obtain a feature vector corresponding to the relevant information fed back by each node;
and inputting the feature vector corresponding to the relevant information fed back by each node into a pre-trained risk assessment model, and carrying out risk assessment on account opening of the target user through the risk assessment model to obtain a corresponding assessment result.
The embodiment of the specification provides a storage medium, through obtaining an account opening request including identity verification information of a target user, then broadcasting the identity verification information to a plurality of different nodes in an anti-fraud blockchain system respectively, so as to trigger each node in the plurality of different nodes to obtain relevant information required for carrying out risk verification on an account opening of the target user based on the identity verification information respectively, carrying out risk assessment on the account opening of the target user based on the obtained relevant information fed back by each node, and executing account opening processing corresponding to the account opening request if the obtained assessment result indicates that the account opening of the target user is not at risk, thus completing data flow mechanism design and service calculation dimension of an account opening link on the anti-fraud blockchain system built based on a blockchain technology, thereby being capable of combining multiparty dominant data to carry out multiparty collaboration on account opening, meeting the requirements of account opening, simultaneously being capable of guaranteeing data transmission safety, data privacy and processing efficiency between different participators, being capable of being invisible, and being capable of carrying out node data, and determining whether the account opening of the target user is in compliance or not by utilizing a learning mode.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
In the 90 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., field programmable gate array (Field Programmable Gate Array, FPGA)) is an integrated circuit whose logic function is determined by the programming of the device by a user. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented by using "logic compiler" software, which is similar to the software compiler used in program development and writing, and the original code before the compiling is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but not just one of the hdds, but a plurality of kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), lava, lola, myHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers, and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing one or more embodiments of the present description.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present description are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the specification. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable fraud case serial-to-parallel device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable fraud case serial-to-parallel device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
One or more embodiments of the present specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the present description may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing is merely exemplary of the present disclosure and is not intended to limit the present disclosure. Various modifications and alterations to this specification will become apparent to those skilled in the art. Any modifications, equivalent substitutions, improvements, or the like, which are within the spirit and principles of the present description, are intended to be included within the scope of the claims of the present description.

Claims (14)

1. An anti-fraud blockchain system comprising a network layer subsystem, a base data layer subsystem, a support platform layer subsystem, and an application layer subsystem, wherein:
the network layer subsystem is configured to provide an interconnected communication network for different nodes in the anti-fraud blockchain system;
the support platform layer subsystem is configured to manage different nodes in the anti-fraud blockchain system;
the application layer subsystem is configured to acquire an account opening request of a target user based on a communication network provided by the network layer subsystem, and provide the account opening request to the basic data layer subsystem, wherein the account opening request comprises authentication information of the target user;
the basic data layer subsystem is configured to broadcast the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for risk verification on the account opened by the target user based on the identity verification information respectively; acquiring related information required by opening an account of the target user fed back by each node in the anti-fraud blockchain system, performing risk assessment on the opening of the account of the target user based on the acquired related information fed back by each node, obtaining a corresponding assessment result, and providing the assessment result to the application layer subsystem;
And the application layer subsystem is configured to execute account opening processing corresponding to the account opening request if the evaluation result indicates that the risk does not exist in opening the account for the target user.
2. The system of claim 1, the network layer subsystem configured to deploy preset entity devices for different nodes in the anti-fraud blockchain system, communicatively connect the entity devices with respective nodes, and provide data privacy protection rules and encrypted storage rules.
3. The system of claim 1, the support platform layer subsystem comprising a trusted data services platform, an application services management platform, and a federation operations management platform, wherein:
the trusted data service platform is configured to support communication of service data with the anti-fraud block chain system and is used for data flow rules, data model definition and standard formulation of upper and lower block link ports;
the application service management platform is configured to counteract the development and management of fraud application services, and the edge computing terminal management, and support the development of service atomic capacity of business applications;
the alliance operation management platform is configured to be used for the anti-fraud blockchain system integration rule, node management in the anti-fraud blockchain system, development and call management of business application services, node fault monitoring, safety protection and network abnormity alarm processing.
4. The system of claim 1, the application layer subsystem configured for data sharing between different nodes in the anti-fraud blockchain system and establishing information cross-validation rules between different nodes; the shared data in the nodes are encrypted and then broadcast to other nodes; the behavior of the individual applications is visually monitored.
5. A method of account processing for use in an anti-fraud blockchain system, the method comprising:
acquiring an account opening request of a target user, wherein the account opening request comprises identity verification information of the target user;
broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for performing risk verification on the opening account of the target user based on the identity verification information respectively;
acquiring related information required by risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain system, and performing risk assessment on the account opening of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result;
And if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.
6. The method of claim 5, the plurality of different nodes comprising a plurality of nodes of a financial institution-corresponding node, an anti-fraud institution-corresponding node, a tax institution-corresponding node, a human resource institution-corresponding node, a social security institution-corresponding node, a supervision institution-corresponding node, and an account operating institution-corresponding node; the related information required by the target user to open the accounts comprises one or more of the number of the opened accounts, the number of the accounts with risks owned by the target user, the opening time of the accounts owned by the target user, whether the identity verification information belongs to the target user, whether the target user has risks, and whether the identity verification information is consistent with the identity verification information corresponding to other accounts.
7. The method according to claim 6, wherein the authentication information includes information of an encrypted certificate capable of proving the identity of the target user and/or information of an encrypted communication account, the broadcasting the authentication information to a plurality of different nodes in the anti-fraud blockchain system respectively, so as to trigger each node in the plurality of different nodes to acquire relevant information required for risk verification on the target user open account based on the authentication information respectively, including:
Broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively, so as to trigger each node in the plurality of different nodes to decrypt the information in the identity verification information respectively, obtain decrypted information, and obtain related information required for risk verification on the account opened by the target user based on the decrypted information.
8. The method according to claim 6, wherein the authentication information includes a hash value of information of a certificate capable of proving the identity of the target user and/or a hash value of information of a communication account.
9. The method according to claim 7 or 8, wherein the risk assessment is performed on account opening of the target user based on the acquired relevant information fed back by each node, so as to obtain a corresponding assessment result, including:
carrying out quantization processing on the acquired relevant information fed back by each node to obtain a feature vector corresponding to the relevant information fed back by each node;
determining a sub-evaluation result of risk evaluation of the account opening request of the target user by each node based on the feature vector and the corresponding weight vector corresponding to the related information fed back by each node;
And determining an evaluation result of performing risk evaluation on the account opening of the target user based on a sub-evaluation result of performing risk evaluation on the account opening of the target user by each node.
10. The method of claim 9, wherein the determining, based on the feature vector and the corresponding weight vector corresponding to the relevant information fed back by each node, the sub-evaluation result of risk evaluation by each node on account opening of the target user includes:
based on a TOPSIS (approximate ideal solution sequence) algorithm, selecting an optimal feature vector and a worst feature vector from feature vectors corresponding to the related information fed back by each node, and obtaining the selected optimal feature vector and worst feature vector corresponding to each node;
and determining a sub-evaluation result of risk evaluation on account opening of the target user by each node based on the selected optimal feature vector and worst feature vector corresponding to each node and the corresponding weight vector.
11. The method according to claim 7 or 8, wherein the risk assessment is performed on account opening of the target user based on the acquired relevant information fed back by each node, so as to obtain a corresponding assessment result, including:
Carrying out quantization processing on the acquired relevant information fed back by each node to obtain a feature vector corresponding to the relevant information fed back by each node;
and inputting the feature vector corresponding to the relevant information fed back by each node into a pre-trained risk assessment model, and carrying out risk assessment on account opening of the target user through the risk assessment model to obtain a corresponding assessment result.
12. An apparatus for processing an account, the apparatus disposed in an anti-fraud blockchain system, the apparatus comprising:
the request module is used for acquiring an account opening request of a target user, wherein the account opening request comprises the identity verification information of the target user;
the broadcasting module is used for broadcasting the identity verification information to a plurality of different nodes in the anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for risk verification on the account opened by the target user based on the identity verification information respectively;
the risk assessment module is used for acquiring related information required by risk verification on the account opening of the target user and fed back by each node in the anti-fraud blockchain system, and carrying out risk assessment on the account opening of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result;
And the account opening module is used for executing account opening processing corresponding to the account opening request if the evaluation result indicates that the risk does not exist in opening the account for the target user.
13. An account processing device disposed in an anti-fraud blockchain system, the account processing device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring an account opening request of a target user, wherein the account opening request comprises identity verification information of the target user;
broadcasting the identity verification information to a plurality of different nodes in an anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for carrying out risk verification on an account opened by the target user based on the identity verification information respectively;
acquiring related information required by risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain system, and performing risk assessment on the account opening of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result;
And if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.
14. A storage medium for storing computer executable instructions that when executed by a processor implement the following:
acquiring an account opening request of a target user, wherein the account opening request comprises identity verification information of the target user;
broadcasting the identity verification information to a plurality of different nodes in an anti-fraud blockchain system respectively so as to trigger each node in the plurality of different nodes to acquire related information required for carrying out risk verification on an account opened by the target user based on the identity verification information respectively;
acquiring related information required by risk verification on the account opening of the target user fed back by each node in the anti-fraud blockchain system, and performing risk assessment on the account opening of the target user based on the acquired related information fed back by each node to obtain a corresponding assessment result;
and if the evaluation result indicates that the risk does not exist in opening the account for the target user, executing the account opening process corresponding to the account opening request.
CN202211725260.6A 2022-12-30 2022-12-30 Anti-fraud blockchain system, account processing method, device and equipment Active CN116016518B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211725260.6A CN116016518B (en) 2022-12-30 2022-12-30 Anti-fraud blockchain system, account processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211725260.6A CN116016518B (en) 2022-12-30 2022-12-30 Anti-fraud blockchain system, account processing method, device and equipment

Publications (2)

Publication Number Publication Date
CN116016518A true CN116016518A (en) 2023-04-25
CN116016518B CN116016518B (en) 2024-07-05

Family

ID=86036816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211725260.6A Active CN116016518B (en) 2022-12-30 2022-12-30 Anti-fraud blockchain system, account processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN116016518B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657890A (en) * 2018-09-14 2019-04-19 阿里巴巴集团控股有限公司 A kind of risk for fraud of transferring accounts determines method and device
CN110955729A (en) * 2019-12-02 2020-04-03 中国银行股份有限公司 Block chain based cheating client information sharing method, equipment and system
US20200184435A1 (en) * 2018-12-07 2020-06-11 Bank Of America Corporation Interconnected resource distribution and retention network
US20200202668A1 (en) * 2018-12-20 2020-06-25 Sony Interactive Entertainment LLC Anti-fraud cloud gaming blockchain
CN112101943A (en) * 2020-09-24 2020-12-18 中国建设银行股份有限公司 Method and device for intelligently acquiring customer information based on block chain
CN112560005A (en) * 2020-12-01 2021-03-26 杭州趣链科技有限公司 Identity trusted service system, method, electronic device and computer readable medium
CN112651855A (en) * 2021-01-05 2021-04-13 福建中科星泰数据科技有限公司 Intelligent signing method and system based on alliance block chain
CN112822159A (en) * 2020-12-28 2021-05-18 杭州趣链科技有限公司 Permission control method and device for block chain account, electronic equipment and storage medium
CN113506108A (en) * 2021-06-25 2021-10-15 网易(杭州)网络有限公司 Account management method, device, terminal and storage medium
CN113537829A (en) * 2021-08-10 2021-10-22 重庆大学 Failure mode evaluation method based on reliability entropy and evidence theory
CN113538126A (en) * 2021-07-16 2021-10-22 中国工商银行股份有限公司 Fraud risk prediction method and device based on GCN
US20210342849A1 (en) * 2020-08-31 2021-11-04 Alipay (Hangzhou) Information Technology Co., Ltd. Information sharing methods, apparatuses, and devices
CN113674085A (en) * 2021-08-19 2021-11-19 支付宝(杭州)信息技术有限公司 Account limitation-removing method, device and equipment
US20220005029A1 (en) * 2020-07-03 2022-01-06 Alipay (Hangzhou) Information Technology Co., Ltd. Blockchain-based identity verification method and related hardware
CN114205155A (en) * 2021-12-07 2022-03-18 四川启睿克科技有限公司 Supplier risk assessment system and method based on safe multi-party calculation
CN114501391A (en) * 2020-10-26 2022-05-13 中国移动通信集团设计院有限公司 Micro service business processing system and method
CN114997874A (en) * 2022-05-17 2022-09-02 中国银行股份有限公司 Multi-account transaction processing method and device based on block chain
CN115099925A (en) * 2022-06-07 2022-09-23 蚂蚁区块链科技(上海)有限公司 Risk assessment method, device and equipment based on block chain

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657890A (en) * 2018-09-14 2019-04-19 阿里巴巴集团控股有限公司 A kind of risk for fraud of transferring accounts determines method and device
US20200184435A1 (en) * 2018-12-07 2020-06-11 Bank Of America Corporation Interconnected resource distribution and retention network
US20200202668A1 (en) * 2018-12-20 2020-06-25 Sony Interactive Entertainment LLC Anti-fraud cloud gaming blockchain
CN110955729A (en) * 2019-12-02 2020-04-03 中国银行股份有限公司 Block chain based cheating client information sharing method, equipment and system
US20220005029A1 (en) * 2020-07-03 2022-01-06 Alipay (Hangzhou) Information Technology Co., Ltd. Blockchain-based identity verification method and related hardware
US20210342849A1 (en) * 2020-08-31 2021-11-04 Alipay (Hangzhou) Information Technology Co., Ltd. Information sharing methods, apparatuses, and devices
CN112101943A (en) * 2020-09-24 2020-12-18 中国建设银行股份有限公司 Method and device for intelligently acquiring customer information based on block chain
CN114501391A (en) * 2020-10-26 2022-05-13 中国移动通信集团设计院有限公司 Micro service business processing system and method
CN112560005A (en) * 2020-12-01 2021-03-26 杭州趣链科技有限公司 Identity trusted service system, method, electronic device and computer readable medium
CN112822159A (en) * 2020-12-28 2021-05-18 杭州趣链科技有限公司 Permission control method and device for block chain account, electronic equipment and storage medium
CN112651855A (en) * 2021-01-05 2021-04-13 福建中科星泰数据科技有限公司 Intelligent signing method and system based on alliance block chain
CN113506108A (en) * 2021-06-25 2021-10-15 网易(杭州)网络有限公司 Account management method, device, terminal and storage medium
CN113538126A (en) * 2021-07-16 2021-10-22 中国工商银行股份有限公司 Fraud risk prediction method and device based on GCN
CN113537829A (en) * 2021-08-10 2021-10-22 重庆大学 Failure mode evaluation method based on reliability entropy and evidence theory
CN113674085A (en) * 2021-08-19 2021-11-19 支付宝(杭州)信息技术有限公司 Account limitation-removing method, device and equipment
CN114205155A (en) * 2021-12-07 2022-03-18 四川启睿克科技有限公司 Supplier risk assessment system and method based on safe multi-party calculation
CN114997874A (en) * 2022-05-17 2022-09-02 中国银行股份有限公司 Multi-account transaction processing method and device based on block chain
CN115099925A (en) * 2022-06-07 2022-09-23 蚂蚁区块链科技(上海)有限公司 Risk assessment method, device and equipment based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
董贵山;陈宇翔;张兆雷;白健;郝尧;: "基于区块链的身份管理认证研究", 《计算机科学》, no. 11, 15 November 2018 (2018-11-15) *

Also Published As

Publication number Publication date
CN116016518B (en) 2024-07-05

Similar Documents

Publication Publication Date Title
US11429745B2 (en) Data security hub
CN110457912B (en) Data processing method and device and electronic equipment
CN111247511B (en) System and method for aggregating authentication-determined client data and network data
Li et al. Active authentication for mobile devices utilising behaviour profiling
CN106575327B (en) Analyzing facial recognition data and social network data for user authentication
US11538006B2 (en) Systems, methods, and apparatuses for conducting transactions between bots using distributed ledger technology in a cloud based computing environment
JP2019511030A (en) Computer security by artificial intelligence
CN110458559B (en) Transaction data processing method, device, server and storage medium
US11563727B2 (en) Multi-factor authentication for non-internet applications
CN114491430A (en) Service processing method, device and equipment based on block chain
CN112016136A (en) Data processing method and device based on alliance chain
Park et al. An empirical study on the influential factors affecting continuous usage of mobile cloud service
CN114817984A (en) Data processing method, device, system and equipment
Papaioannou et al. Risk-based user authentication for mobile passenger ID devices for land and sea border control
CN114896603A (en) Service processing method, device and equipment
Upadhyay et al. Auditing metaverse requires multimodal deep learning
US11907347B2 (en) System for secure verification of authentication data using quantum computing and a distributed server network
Masmoudi et al. A new blockchain-based trust management model
Chandrasekran et al. Adoption of future banking using biometric technology in automated teller machine (atm)
CN116016518B (en) Anti-fraud blockchain system, account processing method, device and equipment
Pešterac et al. Loss of privacy in electronic payment systems
CN113011891B (en) Core body processing method and device applied to associated payment
Garg et al. ANN based security in mobile cloud computing
Prajitno et al. Research opportunity of insider threat detection based on machine learning methods
Patel et al. Comparative study of blockchain-based voting solutions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant