CN117149371A - Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product - Google Patents

Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product Download PDF

Info

Publication number
CN117149371A
CN117149371A CN202310877545.XA CN202310877545A CN117149371A CN 117149371 A CN117149371 A CN 117149371A CN 202310877545 A CN202310877545 A CN 202310877545A CN 117149371 A CN117149371 A CN 117149371A
Authority
CN
China
Prior art keywords
resource
borrowing
borrowed
target
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310877545.XA
Other languages
Chinese (zh)
Inventor
李瑞男
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202310877545.XA priority Critical patent/CN117149371A/en
Publication of CN117149371A publication Critical patent/CN117149371A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present application relates to a resource borrowing method, apparatus, computer device, storage medium and program product. The method comprises the following steps: acquiring a resource borrowing instruction sent by first equipment; generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource; according to the method, the first resource change data and the borrowable resource threshold of the resource borrowing user are determined according to the target intelligent contract, and according to the expected borrowed resource and the borrowable resource threshold, the target borrowed resource of the resource borrowing user is determined from the resource storage pool of the block chain, and by adopting the method, the safety of resource borrowing can be improved.

Description

Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a resource borrowing method, a resource borrowing device, a computer device, a storage medium, and a program product.
Background
With the high-speed development of economy, users can borrow resources to resource borrowing mechanisms such as banks.
In the conventional technology, a resource borrowing mechanism determines resource borrowing information of a user according to a resource credential and credit conditions of the user, transfers resources for the user according to the resource borrowing information of the user, and stores the resource credential of the user at the same time. However, the resource borrowing is performed by the resource borrowing mechanism, and if a security accident occurs in the resource borrowing mechanism, the resource certificate of the user may be damaged, so that the security of the resource borrowing is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a resource borrowing method, apparatus, computer device, storage medium, and program product that can improve the security of resource borrowing.
In a first aspect, the present application provides a resource borrowing method. The method comprises the following steps:
acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource;
determining first resource change data and a borrowable resource threshold of the resource borrowing user according to the target intelligent contract;
and determining the target borrowed resource of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resource and the borrowable resource threshold.
In one embodiment, the resource borrowing instruction further includes a resource borrowing duration; the generating a target intelligent contract in a blockchain based on the resource credential and the desired borrowed resource includes:
generating a first intelligent contract according to the resource credential, the expected borrowed resource and the resource borrowing duration;
generating a second intelligent contract according to the resource credential, the expected borrowed resource, the resource borrowing duration, and the amount of resources in the resource storage pool;
Wherein the target smart contract includes the first smart contract and the second smart contract.
In one embodiment, the determining the first resource variation data and the borrowable resource threshold of the resource borrowing user according to the target smart contract includes:
determining the borrowable resource threshold according to the first intelligent contract;
the first resource variation data is determined according to the second smart contract.
In one embodiment, the determining the target borrowed resource of the resource borrowing user from the resource storage pool of the blockchain according to the desired borrowed resource and the borrowable resource threshold comprises:
if the desired borrowed resource is less than or equal to the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the desired borrowed resource.
In one embodiment, the method further comprises:
if the desired borrowed resource is greater than the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the borrowable resource threshold.
In one embodiment, the method further comprises:
acquiring identity information of the resource borrowing user;
sending a resource credential verification request to a target device corresponding to the resource credential; the resource credential verification request includes the resource credential identification and the identity information;
Receiving a resource credential verification result generated based on the resource credential identifier and the identity information and sent by the target device;
the generating a target intelligent contract in a blockchain based on the resource credential and the desired borrowed resource includes:
and generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource under the condition that the verification result of the resource certificate is that the verification is passed.
In one embodiment, the method further comprises:
receiving a resource transfer requirement sent by second equipment; the resource transfer requirement comprises user information of a resource transfer user and resources to be transferred corresponding to the user information;
and storing the user information and the resources to be transferred into the resource storage pool.
In one embodiment, the method further comprises:
generating a third intelligent contract according to the to-be-transferred resource, the total amount of resources in the resource storage pool and the storage time of the to-be-transferred resource in the resource storage pool;
determining second resource variation data according to the third smart contract; the second resource change data is used for determining the change amount of the resource to be transferred;
the second resource change data is sent to the second device.
In a second aspect, the present application further provides a resource borrowing device. The device comprises:
the first acquisition module is used for acquiring a resource borrowing instruction sent by the first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
the first generation module is used for generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource;
the first determining module is used for determining first resource change data and a borrowable resource threshold value of the resource borrowing user according to the target intelligent contract;
and the second determining module is used for determining the target borrowed resource of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resource and the borrowable resource threshold.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor which when executing the computer program performs the steps of:
acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource;
Determining first resource change data and a borrowable resource threshold of the resource borrowing user according to the target intelligent contract;
and determining the target borrowed resource of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resource and the borrowable resource threshold.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource;
determining first resource change data and a borrowable resource threshold of the resource borrowing user according to the target intelligent contract;
and determining the target borrowed resource of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resource and the borrowable resource threshold.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprising a computer program which, when executed by a processor, performs the steps of:
Acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource;
determining first resource change data and a borrowable resource threshold of the resource borrowing user according to the target intelligent contract;
and determining the target borrowed resource of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resource and the borrowable resource threshold.
According to the resource borrowing method, the device, the computer equipment, the storage medium and the program product, the resource borrowing instruction sent by the first equipment is obtained, then the target intelligent contract in the block chain is generated according to the resource certificate and the expected borrowing resource, the first resource change data and the borrowable resource threshold of the resource borrowing user are determined according to the target intelligent contract, and the target borrowing resource of the resource borrowing user is determined from the resource storage pool of the block chain according to the expected borrowing resource and the borrowable resource threshold. In the conventional technology, a user performs resource borrowing through a resource borrowing mechanism such as a bank, and the resource borrowing mechanism determines resource borrowing information of the user according to a resource certificate and credit conditions of the user and transfers resources for the user according to the resource borrowing information of the user. However, the resource borrowing is performed by the resource borrowing mechanism, and if a security accident occurs in the resource borrowing mechanism, the resource certificate of the user may be damaged, so that the security of the resource borrowing is low. In this embodiment, a borrowable resource threshold and first resource variation data of a resource borrowing user are determined through a target intelligent contract in a blockchain, and a target borrowed resource of the resource borrowing user is determined from a resource storage pool of the blockchain according to an expected borrowed resource and the borrowable resource threshold. Because the blockchain has the characteristics of disclosure and transparency, and the information on the blockchain is not easy to tamper, the safety of resource borrowing is improved.
Drawings
FIG. 1 is an application environment diagram of a resource borrowing method provided by an embodiment of the present application;
fig. 2 is a flow chart of a resource borrowing method according to an embodiment of the present application;
FIG. 3 is a flowchart of a method for determining a target smart contract according to an embodiment of the present application;
fig. 4 is a flowchart of a method for determining first resource variation data and a borrowable resource threshold according to an embodiment of the present application;
FIG. 5 is a second flowchart of a method for determining a target smart contract according to an embodiment of the present application;
FIG. 6 is a schematic flow chart of a resource transfer method according to an embodiment of the present application;
fig. 7 is a schematic flow chart of a second method for determining resource variation data according to an embodiment of the present application;
fig. 8 is a block diagram of a resource borrowing device according to an embodiment of the present application;
fig. 9 is an internal structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Fig. 1 is an application environment diagram of a resource borrowing method provided by an embodiment of the present application, and the resource borrowing method provided by the embodiment of the present application may be applied to the application environment shown in fig. 1. The resource borrowing system 101 communicates with a first device 102, a second device 103 and a target device 104, where the first device 102 is a device of a resource borrowing user, the second device 103 is a device of a resource transferring user, the target device 104 is a device of a resource credential storage mechanism, and the resource borrowing system 101 is located on a blockchain and includes a target smart contract module 1011 and a resource storage pool 1012. The resource borrowing system 101 generates a target intelligent contract in the target intelligent contract module 1011 according to the resource credential and the expected borrowed resource in the resource borrowing instruction by acquiring the resource borrowing instruction sent by the first device 102; determining first resource change data and a borrowable resource threshold of a resource borrowing user according to a target intelligent contract; a target borrowed resource for the resource borrowing user is determined from the resource storage pool 1012 based on the desired borrowed resource and the borrowable resource threshold. The first device 102 and the second device 103 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, and the target device 104 may be a computer device or a server of a resource borrowing mechanism.
In one embodiment, as shown in fig. 2, fig. 2 is a flow chart of a resource borrowing method according to an embodiment of the present application, and the method is applied to the computer device in fig. 1 for illustration, and includes the following steps:
s201, acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and a desired borrowing resource.
In this embodiment, a resource borrowing user may input a resource borrowing requirement to a first device, the first device may generate a resource borrowing instruction according to the resource borrowing requirement, and further send the resource borrowing instruction to a resource borrowing system, the resource borrowing system may obtain the resource borrowing instruction sent by the first device, where the resource borrowing instruction includes a resource credential of the resource borrowing user and an expected borrowing resource, and a resource corresponding to the resource credential may be an entity resource or a virtual resource; the desired borrowed resource may include a resource type and a number of resources of the desired borrowed resource.
S202, generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource.
The target smart contract may be a decentralised financial (Decentralized Finance, deFi) smart contract in a blockchain, among others.
In this embodiment, the target intelligent contract may be generated according to the resource credential, the resource type and the number of resources corresponding to the desired borrowed resource. Or, according to the resource certificate and the expected borrowed resource of the resource borrowing user, modifying parameters related to the resource certificate and the expected borrowed resource certificate in the preset intelligent contract, and taking the preset intelligent contract after the parameters related to the resource certificate and the expected borrowed resource certificate are modified as a target intelligent contract corresponding to the resource borrowing user.
S203, determining first resource change data and a borrowable resource threshold of the resource borrowing user according to the target intelligent contract.
The first resource change data represents the data of the resource change amount generated by the increase of the target borrowed resource of the resource borrowing user along with the time.
By way of example, the target smart contract may be one by which the first change data and the borrowable resource threshold of the resource borrowing user may be automatically generated and output. Or, the first change data and the borrowable resource threshold of the resource borrowing user can be determined according to the output value of the target intelligent contract.
S204, determining target borrowed resources of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resources and the borrowable resource threshold.
In this embodiment, the expected borrowed resource and the borrowable resource threshold may be compared to obtain a comparison result, and a target borrowed resource of the resource borrowing user is determined from the resource storage pool of the blockchain according to the comparison result. Alternatively, an average value of the desired borrowed resource and the borrowable resource threshold may be determined, and resources the same as the number of the average values of the desired borrowed resource and the borrowable resource threshold may be determined from the resource storage pool as the target borrowed resource. Alternatively, the product result obtained by multiplying the desired borrowed resource by the first preset coefficient and the product result obtained by multiplying the borrowable resource threshold by the second preset coefficient may be added to obtain a summation result, and the resources with the same number as the summation result are determined from the resource storage pool of the blockchain and used as the target borrowed resource.
According to the resource borrowing method, the resource borrowing instruction sent by the first device is obtained, the target intelligent contract in the block chain is generated according to the resource certificate and the expected borrowing resource, the first resource change data and the borrowable resource threshold of the resource borrowing user are determined according to the target intelligent contract, and the target borrowed resource of the resource borrowing user is determined from the resource storage pool of the block chain according to the expected borrowing resource and the borrowable resource threshold. In the conventional technology, a user performs resource borrowing through a resource borrowing mechanism such as a bank, and the resource borrowing mechanism determines resource borrowing information of the user according to a resource certificate and credit conditions of the user and transfers resources for the user according to the resource borrowing information of the user. However, the resource borrowing is performed by the resource borrowing mechanism, and if a security accident occurs in the resource borrowing mechanism, the resource certificate of the user may be damaged, so that the security of the resource borrowing is low. In this embodiment, a borrowable resource threshold and first resource variation data of a user are determined through a target intelligent contract in a blockchain, and a target borrowed resource of the resource borrowing user is determined from a resource storage pool of the blockchain according to an expected borrowed resource and the borrowable resource threshold. Because the blockchain has the characteristics of disclosure and transparency, and the information on the blockchain is not easy to tamper, the safety of resource borrowing is improved.
Fig. 3 is a schematic flow chart of a target smart contract determining method according to an embodiment of the present application, where the embodiment relates to a possible implementation of generating a target smart contract in a blockchain according to resource credentials and desired borrowing resources, and based on the above embodiment, as shown in fig. 3, S202 includes the following steps:
s301, generating a first intelligent contract according to the resource certificate, the expected borrowed resource and the resource borrowing duration.
Wherein the target smart contracts include a first smart contract and a second smart contract. The resource borrowing instruction also comprises a resource borrowing duration.
The first intelligent contract corresponding to the resource borrowing user can be determined according to a product result obtained by multiplying a summation result of the resource borrowing user, the expected borrowing resource and the resource borrowing duration by a third preset coefficient, and the first intelligent contract is used for determining the borrowable resource threshold. Or, according to the resource credential, the expected borrowing resource and the resource borrowing duration of the resource borrowing user, modifying parameters corresponding to the resource credential, the expected borrowing resource and the resource borrowing duration in the first preset intelligent contract to obtain the first intelligent contract corresponding to the resource borrowing user.
S302, generating a second intelligent contract according to the resource credential, the expected borrowed resource, the resource borrowing duration and the resource quantity in the resource storage pool.
In this embodiment, the second intelligent contract may be determined according to a product result obtained by multiplying a summation result of the resource credential, the expected borrowed resource, the resource borrowing duration, and the amount of the resource in the resource storage pool by a fourth preset coefficient. Or, according to the resource credential, the expected borrowing resource, the resource borrowing duration and the resource quantity in the resource storage pool at the current time point corresponding to the resource borrowing user, modifying parameters corresponding to the resource credential, the expected borrowing resource, the resource borrowing duration and the resource quantity in the resource storage pool in the second preset intelligent contract to obtain the second intelligent contract corresponding to the resource borrowing user.
In the embodiment of the application, the first intelligent contract is generated according to the resource certificate, the expected borrowed resource and the resource borrowing duration, and the second intelligent contract is generated according to the resource certificate, the expected borrowed resource, the resource borrowing duration and the resource quantity in the resource storage pool, so that the accuracy of the first resource change data and the borrowable resource threshold determined by using the intelligent contract is improved.
Fig. 4 is a flowchart of a method for determining first resource change data and a borrowable resource threshold according to an embodiment of the present application, where the embodiment relates to a possible implementation manner of determining the first resource change data and the borrowable resource threshold of a resource borrowing user according to a target smart contract, and on the basis of the above embodiment, as shown in fig. 4, the step S203 includes the following steps:
s401, determining a borrowable resource threshold according to the first intelligent contract.
S402, determining first resource change data according to a second intelligent contract.
For example, after the first smart contract and the second smart contract are generated, the borrowable resource threshold may be determined directly from the first smart contract, and the first resource variation data may be determined from the second smart contract. Alternatively, the resource borrowing system may receive a generation instruction sent by the first device, determine the borrowable resource threshold via the first smart contract in response to the generation instruction, and determine the first change data via the second smart contract. Alternatively, the output value of the first smart contract may be used as the borrowable resource threshold and the output value of the second smart contract may be used as the first resource variation data. Alternatively, the product obtained by multiplying the output value of the first smart contract by the fifth preset coefficient may be used as the borrowable resource threshold, and the product obtained by multiplying the output value of the second smart contract by the sixth preset coefficient may be used as the first resource change data.
In the embodiment of the application, the borrowable resource threshold is determined according to the first intelligent contract, and the first resource change data is determined according to the second intelligent contract. The accuracy of determining the borrowable resource threshold and the first resource variation data is improved.
In one embodiment, in S204, determining, from the resource storage pool of the blockchain, the target borrowed resource of the resource borrowing user according to the desired borrowed resource and the borrowable resource threshold may be further implemented by:
if the desired borrowed resource is less than or equal to the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the desired borrowed resource.
In this embodiment, before determining the target borrowed resource, the expected borrowed resource and the borrowable resource are compared to obtain a comparison result, and if the comparison result indicates that the expected borrowed resource is less than or equal to the threshold value of the borrowable resource, the target borrowed resource determined from the resource storage pool of the blockchain is the expected borrowed resource. For example, if the value of the desired borrowed resource is 50000, the threshold value of the borrowable resource is 60000, and since 50000 is less than 60000, at this time, a resource with a value of 50000 may be determined from the resource storage pool of the blockchain as the target borrowed resource.
In this embodiment, by comparing the desired borrowed resource with the borrowable resource threshold, if the desired borrowed resource is less than or equal to the borrowable resource threshold, the target borrowed resource determined from the resource storage pool of the blockchain is the desired borrowed resource, thereby improving accuracy of resource borrowing.
In one embodiment, in S204, determining, from the resource storage pool of the blockchain, the target borrowed resource of the resource borrowing user according to the desired borrowed resource and the borrowable resource threshold may be further implemented by:
if the desired borrowed resource is greater than the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the borrowable resource threshold.
For example, if the comparison result indicates that the desired borrowed resource is greater than the borrowable resource threshold, the target borrowed resource determined from the resource storage pool of the blockchain is the borrowable resource threshold. For example, if the value of the desired borrowed resource is 70000, the threshold value of the borrowable resource is 60000, and since 70000 is greater than 60000, at this time, a resource with a value of 60000 may be determined from the resource pool of the blockchain as the target borrowed resource. Or if the expected borrowed resource is greater than the borrowable resource threshold, sending a prompt message that the resource borrowing cannot be performed to the first device, prompting the resource borrowing user to input a new expected borrowed resource again, comparing the new expected borrowed resource with the borrowable resource threshold, and if the new expected borrowed resource is less than or equal to the borrowable resource threshold, determining that the target borrowed resource in the resource storage pool of the blockchain is the expected borrowed resource.
In this embodiment, by comparing the expected borrowed resource with the borrowable resource threshold, if the expected borrowed resource is greater than the borrowable resource threshold, the target borrowed resource determined from the resource storage pool of the blockchain is the borrowable resource threshold, thereby avoiding borrowing resources with more borrowable resource thresholds to the resource borrowing user and improving the reliability of resource borrowing.
Fig. 5 is a second flow chart of a method for determining a target smart contract according to an embodiment of the present application, which relates to another implementation manner of determining a target smart contract, where, based on the foregoing embodiment, as shown in fig. 5, the target smart contract may be determined by:
s501, acquiring identity information of a resource borrowing user.
S502, sending a resource credential verification request to target equipment corresponding to the resource credential; the resource credential validation request includes a resource credential identification and identity information.
S503, receiving a resource credential verification result generated based on the resource credential identification and the identity information and sent by the target device.
S504, generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource, wherein the target intelligent contract comprises the following steps:
and under the condition that the verification result of the resource certificate is that the verification is passed, generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource.
Illustratively, the resource borrowing instruction includes identity information of the resource borrowing user, and the identity information may be an account number and a password of the resource borrowing user in a resource credential mechanism. The identity information of the resource borrowing user can be obtained, and then a resource credential verification request is sent to target equipment corresponding to the resource credential, wherein the resource credential verification request comprises a resource credential identifier and the identity information, and the target equipment is computer equipment of a resource credential storage mechanism.
The storage system of the target equipment stores resource credential identifiers corresponding to the identity information of each user, after the target equipment receives the resource credential verification request, the target equipment determines the resource credential identifier corresponding to the identity information of the resource borrowing user in the storage system according to the identity information in the resource credential verification request, and if the resource credential identifier corresponding to the identity information of the resource borrowing user comprises the resource credential identifier in the resource credential verification request, the resource credential verification result is verification passing; if the resource credential identification corresponding to the identity information of the resource borrowing user does not comprise the resource credential identification in the resource credential verification request, the resource credential verification result is that the verification is not passed. The identity information included in the resource credential verification request is the identity identifier of the user 1, the resource credential identifier is A1, the resource credential identifier corresponding to the identity identifier of the user 1 stored in the target device comprises a source credential identifier A1, a source credential identifier B1 and a source credential identifier C1, and the verification result is verification passing because the resource credential identifier corresponding to the identity identifier of the user 1 comprises the resource credential identifier A1 in the resource credential verification request.
After verification is completed, the target device sends a resource credential verification result to the resource borrowing system, and the resource borrowing system receives the resource credential verification result generated based on the resource credential identification and the identity information and sent by the target device. And under the condition that the verification result of the resource certificate is that the verification is passed, generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource.
In the embodiment of the application, the identity information of the resource borrowing user is obtained; and sending a resource credential verification request to target equipment corresponding to the resource credential, receiving a resource credential verification result generated based on the resource credential identifier and the identity information and sent by the target equipment, and generating a target intelligent contract in a blockchain according to the resource credential and the expected borrowed resource under the condition that the resource credential verification result is verification passing.
In one embodiment, fig. 6 is a flow chart of a resource transfer method provided in the embodiment of the present application, and this embodiment relates to one possible implementation manner of how to perform resource transfer, and on the basis of the foregoing embodiment, as shown in fig. 6, the method includes the following steps:
S601, receiving a resource transfer requirement sent by second equipment; the resource transfer requirement comprises user information of the resource transfer user and resources to be transferred corresponding to the user information.
S602, storing the user information and the resources to be transferred into a resource storage pool.
In this embodiment, the resource transfer user may also transfer the resource through the resource borrowing system, the resource transfer user may input the resource to be transferred to the second device, the second device generates a resource transfer requirement based on the resource to be transferred, and sends the resource transfer requirement to the resource borrowing system, the resource borrowing system receives the resource transfer requirement sent by the second device, and stores the user information of the user to be transferred and the resource to be transferred into a resource storage pool, optionally, the user to be transferred may also select a resource storage pool type, where the resource transfer requirement includes the resource storage pool type selected by the user to be transferred, and the resource borrowing system may store the user information of the user to be transferred and the resource to be transferred into a resource storage pool corresponding to the resource storage pool type in the resource transfer requirement according to the resource storage pool type selected by the user to be transferred. The time for storing the resources to be transferred in the resource storage pool corresponding to different resource storage pool types is different, and the resource change data is also different.
In the embodiment of the application, the resource transfer requirement sent by the second equipment is received; and storing the user information and the resources to be transferred into the resource storage pool, wherein the resource storage pool is positioned in the blockchain, so that the safety of resource transfer of the resource transfer user is improved.
In one embodiment, fig. 7 is a flowchart of a second resource change data determining method according to an embodiment of the present application, where, based on the above embodiment, as shown in fig. 7, the second resource change data may be determined by:
and S701, generating a third intelligent contract according to the resources to be transferred, the total amount of resources in the resource storage pool and the storage time length of the resources to be transferred in the resource storage pool.
S702, determining second resource change data according to a third intelligent contract; the second resource variation data is used for determining the variation of the resource to be transferred.
S703 transmitting second resource change data to the second device.
In this embodiment, the third intelligent contract may be generated according to the to-be-transferred resource, the total amount of resources in the resource storage pool, and the storage duration of the to-be-transferred resource in the resource storage pool. The third intelligent contract may also be determined based on at least one of the to-be-transferred resource, a total amount of resources in the resource storage pool, and a storage time period of the to-be-transferred resource in the resource storage pool. The third intelligent contract is a DeFi contract for determining second resource change data, the second resource change data is used for determining the change quantity of the resources to be transferred, and after the second resource change data is determined, the second resource change data can be sent to the second equipment in the forms of short messages, multimedia messages and the like. Optionally, the resource transfer user may also send a timing sending request of the second change data to the resource borrowing system through the second device, and after the resource borrowing system receives the timing sending request, the resource borrowing system sends the second change data to the second device at regular time according to time information in the timing sending request.
In the embodiment of the application, the third intelligent contract is generated according to the to-be-transferred resource, the total amount of resources in the resource storage pool and the storage time of the to-be-transferred resource in the resource storage pool; determining second resource variation data according to a third intelligent contract; the second resource change data is used for determining the change amount of the resource to be transferred; and sending the second resource change data to the second device. The accuracy of the determined second resource variation data is improved.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a resource borrowing device for realizing the above-mentioned resource borrowing method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of one or more resource borrowing devices provided below may refer to the limitation of the resource borrowing method described above, and will not be repeated here.
In one embodiment, as shown in fig. 8, there is provided a resource borrowing apparatus 800 comprising: a first acquisition module 801, a first generation module 802, a first determination module 803, and a second determination module 804, wherein:
a first obtaining module 801, configured to obtain a resource borrowing instruction sent by a first device; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
a first generation module 802 for generating a target smart contract in the blockchain from the resource credential and the desired borrowed resource;
a first determining module 803, configured to determine first resource variation data and a borrowable resource threshold of a resource borrowing user according to a target intelligent contract;
a second determining module 804 is configured to determine, from the resource storage pool of the blockchain, a target borrowed resource of the resource borrowing user according to the desired borrowed resource and the borrowable resource threshold.
In one embodiment, the first generation module 802 includes:
the first generation unit is used for generating a first intelligent contract according to the resource certificate, the expected borrowed resource and the resource borrowing duration;
the second generation unit is used for generating a second intelligent contract according to the resource certificate, the expected borrowed resource, the resource borrowing duration and the resource quantity in the resource storage pool;
wherein the target smart contracts include a first smart contract and a second smart contract.
In one embodiment, the first determining module 803 includes:
the first determining unit is used for determining a borrowable resource threshold according to the first intelligent contract;
and the second determining unit is used for determining the first resource change data according to the second intelligent contract.
In one embodiment, the second determining module 804 is configured to determine the target borrowed resource from the resource storage pool of the blockchain as the desired borrowed resource if the desired borrowed resource is less than or equal to the borrowable resource threshold.
In one embodiment, the second determining module 804 is configured to determine that the target borrowed resource from the resource storage pool of the blockchain is the borrowable resource threshold if the desired borrowed resource is greater than the borrowable resource threshold.
In one embodiment, the resource borrowing device 800 further includes:
the second acquisition module is used for acquiring the identity information of the resource borrowing user;
the first sending module is used for sending a resource credential verification request to target equipment corresponding to the resource credential; the resource credential verification request includes a resource credential identification and identity information;
the first receiving module is used for receiving a resource credential verification result generated based on the resource credential identification and the identity information and sent by the target equipment;
and the second determining module is used for generating a target intelligent contract in the block chain according to the resource certificate and the expected borrowed resource under the condition that the verification result of the resource certificate is that the verification is passed.
In one embodiment, the resource borrowing device 800 further includes:
the second receiving module is used for receiving the resource transfer requirement sent by the second equipment; the resource transfer requirement comprises user information of a resource transfer user and resources to be transferred corresponding to the user information;
and the storage module is used for storing the user information and the resources to be transferred into a resource storage pool.
In one embodiment, the resource borrowing device 800 further includes:
the second generation module is used for generating a third intelligent contract according to the to-be-transferred resources, the total amount of resources in the resource storage pool and the storage time length of the to-be-transferred resources in the resource storage pool;
A third determining module for determining second resource variation data according to a third smart contract; the second resource change data is used for determining the change amount of the resource to be transferred;
and the second sending module is used for sending second resource change data to the second equipment.
The above-mentioned various modules in the resource borrowing device may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure thereof may be as shown in fig. 9. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a resource borrowing method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by persons skilled in the art that the architecture shown in fig. 9 is merely a block diagram of some of the architecture relevant to the present inventive arrangements and is not limiting as to the computer device to which the present inventive arrangements are applicable, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource;
determining first resource change data and a borrowable resource threshold of a resource borrowing user according to a target intelligent contract;
and determining target borrowed resources of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resources and the borrowable resource threshold.
In one embodiment, the processor when executing the computer program further performs the steps of:
Generating a first intelligent contract according to the resource certificate, the expected borrowed resource and the resource borrowing duration;
generating a second intelligent contract according to the resource credential, the expected borrowed resource, the resource borrowing duration and the resource amount in the resource storage pool;
wherein the target smart contracts include a first smart contract and a second smart contract.
In one embodiment, the processor when executing the computer program further performs the steps of:
determining a borrowable resource threshold according to the first intelligent contract;
the first resource variation data is determined according to the second smart contract.
In one embodiment, the processor when executing the computer program further performs the steps of:
if the desired borrowed resource is less than or equal to the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the desired borrowed resource.
In one embodiment, the processor when executing the computer program further performs the steps of:
if the desired borrowed resource is greater than the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the borrowable resource threshold.
In one embodiment, the processor when executing the computer program further performs the steps of:
Acquiring identity information of a resource borrowing user;
sending a resource credential verification request to a target device corresponding to the resource credential; the resource credential verification request includes a resource credential identification and identity information;
receiving a resource credential verification result generated based on the resource credential identifier and the identity information and sent by the target equipment;
generating a target intelligent contract in the blockchain from the resource credential and the desired borrowed resource, comprising:
and under the condition that the verification result of the resource certificate is that the verification is passed, generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource.
In one embodiment, the processor when executing the computer program further performs the steps of:
receiving a resource transfer requirement sent by second equipment; the resource transfer requirement comprises user information of a resource transfer user and resources to be transferred corresponding to the user information;
and storing the user information and the resources to be transferred into a resource storage pool.
In one embodiment, the processor when executing the computer program further performs the steps of:
generating a third intelligent contract according to the resources to be transferred, the total amount of resources in the resource storage pool and the storage time length of the resources to be transferred in the resource storage pool;
Determining second resource variation data according to a third smart contract; the second resource change data is used for determining the change amount of the resource to be transferred;
and sending the second resource change data to the second device.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource;
determining first resource change data and a borrowable resource threshold of a resource borrowing user according to a target intelligent contract;
and determining target borrowed resources of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resources and the borrowable resource threshold.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a first intelligent contract according to the resource certificate, the expected borrowed resource and the resource borrowing duration;
generating a second intelligent contract according to the resource credential, the expected borrowed resource, the resource borrowing duration and the resource amount in the resource storage pool;
Wherein the target smart contracts include a first smart contract and a second smart contract.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining a borrowable resource threshold according to the first intelligent contract;
the first resource variation data is determined according to the second smart contract.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the desired borrowed resource is less than or equal to the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the desired borrowed resource.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the desired borrowed resource is greater than the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the borrowable resource threshold.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring identity information of a resource borrowing user;
sending a resource credential verification request to a target device corresponding to the resource credential; the resource credential verification request includes a resource credential identification and identity information;
receiving a resource credential verification result generated based on the resource credential identifier and the identity information and sent by the target equipment;
Generating a target intelligent contract in the blockchain from the resource credential and the desired borrowed resource, comprising:
and under the condition that the verification result of the resource certificate is that the verification is passed, generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a resource transfer requirement sent by second equipment; the resource transfer requirement comprises user information of a resource transfer user and resources to be transferred corresponding to the user information;
and storing the user information and the resources to be transferred into a resource storage pool.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a third intelligent contract according to the resources to be transferred, the total amount of resources in the resource storage pool and the storage time length of the resources to be transferred in the resource storage pool;
determining second resource variation data according to a third smart contract; the second resource change data is used for determining the change amount of the resource to be transferred;
and sending the second resource change data to the second device.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
Acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and expected borrowing resources;
generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource;
determining first resource change data and a borrowable resource threshold of a resource borrowing user according to a target intelligent contract;
and determining target borrowed resources of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resources and the borrowable resource threshold.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a first intelligent contract according to the resource certificate, the expected borrowed resource and the resource borrowing duration;
generating a second intelligent contract according to the resource credential, the expected borrowed resource, the resource borrowing duration and the resource amount in the resource storage pool;
wherein the target smart contracts include a first smart contract and a second smart contract.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining a borrowable resource threshold according to the first intelligent contract;
the first resource variation data is determined according to the second smart contract.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the desired borrowed resource is less than or equal to the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the desired borrowed resource.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the desired borrowed resource is greater than the borrowable resource threshold, the target borrowed resource determined from the resource pool of the blockchain is the borrowable resource threshold.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring identity information of a resource borrowing user;
sending a resource credential verification request to a target device corresponding to the resource credential; the resource credential verification request includes a resource credential identification and identity information;
receiving a resource credential verification result generated based on the resource credential identifier and the identity information and sent by the target equipment;
generating a target intelligent contract in the blockchain from the resource credential and the desired borrowed resource, comprising:
and under the condition that the verification result of the resource certificate is that the verification is passed, generating a target intelligent contract in the blockchain according to the resource certificate and the expected borrowed resource.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a resource transfer requirement sent by second equipment; the resource transfer requirement comprises user information of a resource transfer user and resources to be transferred corresponding to the user information;
and storing the user information and the resources to be transferred into a resource storage pool.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a third intelligent contract according to the resources to be transferred, the total amount of resources in the resource storage pool and the storage time length of the resources to be transferred in the resource storage pool;
determining second resource variation data according to a third smart contract; the second resource change data is used for determining the change amount of the resource to be transferred;
and sending the second resource change data to the second device.
The user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (12)

1. A method of resource borrowing, the method comprising:
acquiring a resource borrowing instruction sent by first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and a desired borrowing resource;
generating a target intelligent contract in a blockchain according to the resource certificate and the expected borrowed resource;
determining first resource change data and a borrowable resource threshold of the resource borrowing user according to the target intelligent contract;
And determining the target borrowed resource of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resource and the borrowable resource threshold.
2. The method of claim 1, wherein the resource borrowing instruction further comprises a resource borrowing duration; the generating a target intelligent contract in a blockchain according to the resource credential and the desired borrowed resource includes:
generating a first intelligent contract according to the resource credential, the expected borrowed resource and the resource borrowing duration;
generating a second intelligent contract according to the resource credential, the expected borrowed resource, the resource borrowing duration and the resource amount in the resource storage pool;
wherein the target smart contract includes the first smart contract and the second smart contract.
3. The method of claim 2, wherein the determining the first resource change data and the borrowable resource threshold for the resource borrowing user based on the target smart contract comprises:
determining the borrowable resource threshold according to the first intelligent contract;
and determining the first resource change data according to the second intelligent contract.
4. The method of claim 1, wherein the determining the target borrowed resource for the resource borrowing user from the resource storage pool of the blockchain based on the desired borrowed resource and the borrowable resource threshold comprises:
and if the expected borrowed resource is smaller than or equal to the borrowable resource threshold, determining the target borrowed resource from the resource storage pool of the blockchain as the expected borrowed resource.
5. The method according to claim 4, wherein the method further comprises:
and if the expected borrowed resource is greater than the borrowable resource threshold, determining the target borrowed resource from the resource storage pool of the blockchain as the borrowable resource threshold.
6. The method according to claim 1, wherein the method further comprises:
acquiring identity information of the resource borrowing user;
sending a resource credential verification request to a target device corresponding to the resource credential; the resource credential verification request includes the resource credential identification and the identity information;
receiving a resource credential verification result generated based on the resource credential identifier and the identity information and sent by the target device;
The generating a target intelligent contract in a blockchain according to the resource credential and the desired borrowed resource includes:
and generating a target intelligent contract in a blockchain according to the resource certificate and the expected borrowed resource under the condition that the resource certificate verification result is verification passing.
7. The method according to any one of claims 1-6, further comprising:
receiving a resource transfer requirement sent by second equipment; the resource transfer requirement comprises user information of a resource transfer user and resources to be transferred corresponding to the user information;
and storing the user information and the resources to be transferred into the resource storage pool.
8. The method of claim 7, wherein the method further comprises:
generating a third intelligent contract according to the to-be-transferred resources, the total amount of resources in the resource storage pool and the storage time length of the to-be-transferred resources in the resource storage pool;
determining second resource variation data according to the third smart contract; the second resource change data is used for determining the change amount of the resource to be transferred;
and sending the second resource change data to the second device.
9. A resource borrowing apparatus, the apparatus comprising:
the first acquisition module is used for acquiring a resource borrowing instruction sent by the first equipment; the resource borrowing instruction comprises a resource credential of a resource borrowing user and a desired borrowing resource;
the first generation module is used for generating a target intelligent contract in a blockchain according to the resource certificate and the expected borrowed resource;
the first determining module is used for determining first resource change data and a borrowable resource threshold value of the resource borrowing user according to the target intelligent contract;
and the second determining module is used for determining the target borrowed resource of the resource borrowing user from the resource storage pool of the blockchain according to the expected borrowed resource and the borrowable resource threshold.
10. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 8 when the computer program is executed.
11. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 8.
12. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the method of any one of claims 1 to 8.
CN202310877545.XA 2023-07-17 2023-07-17 Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product Pending CN117149371A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310877545.XA CN117149371A (en) 2023-07-17 2023-07-17 Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310877545.XA CN117149371A (en) 2023-07-17 2023-07-17 Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product

Publications (1)

Publication Number Publication Date
CN117149371A true CN117149371A (en) 2023-12-01

Family

ID=88899523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310877545.XA Pending CN117149371A (en) 2023-07-17 2023-07-17 Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product

Country Status (1)

Country Link
CN (1) CN117149371A (en)

Similar Documents

Publication Publication Date Title
CN114745178A (en) Identity authentication method, identity authentication device, computer equipment, storage medium and program product
CN116800671A (en) Data transmission method, apparatus, computer device, storage medium, and program product
CN114614992B (en) Signature value output and verification method, device, computer equipment and storage medium
CN114244519B (en) Password verification method, password verification device, computer equipment and storage medium
CN117149371A (en) Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product
CN111124932B (en) Scheme verification method, system, device, computer equipment and storage medium
CN117792800B (en) Information verification method and system based on Internet of things security evaluation system
CN117113366A (en) Digital asset management method, apparatus, device, storage medium, and program product
CN110442447B (en) Message queue-based load balancing method and device and computer equipment
CN117151856A (en) Resource borrowing service handling method, device, computer equipment and storage medium
CN117132273A (en) Information transmission method, information transmission device, computer equipment and storage medium
CN117436888A (en) Payment service processing method, device, computer equipment and storage medium
CN116846974A (en) Service request processing method, device, computer equipment and storage medium
CN118195617A (en) Transaction behavior management method, device, computer equipment, storage medium and product
CN117196703A (en) Resource distribution method, device, computer equipment and storage medium
CN117521155A (en) Text integrity verification method, device, system, computer equipment and medium
CN117391702A (en) Account data verification method, account data verification device, computer equipment and storage medium
CN118552294A (en) Resource transfer method, apparatus, computer device, storage medium, and program product
CN117151717A (en) Device password modification method, device, computer device and storage medium
CN118353954A (en) Data pushing method, device, computer equipment and storage medium
CN118313002A (en) Data desensitization method, device, computer equipment and storage medium
CN117082135A (en) Service transmission method, device, computer equipment and storage medium
CN117078263A (en) Resource transfer method, device, computer equipment and storage medium
CN116489089A (en) Flow control method and device and computer equipment
CN117061238A (en) Service request processing method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination