CN111611215B - Block chain-based network credit risk data sharing method and system - Google Patents
Block chain-based network credit risk data sharing method and system Download PDFInfo
- Publication number
- CN111611215B CN111611215B CN202010266337.2A CN202010266337A CN111611215B CN 111611215 B CN111611215 B CN 111611215B CN 202010266337 A CN202010266337 A CN 202010266337A CN 111611215 B CN111611215 B CN 111611215B
- Authority
- CN
- China
- Prior art keywords
- data
- hash value
- reported
- enterprise
- shared
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/176—Support for shared access to files; File sharing support
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24552—Database cache management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
- G06F16/24578—Query processing with adaptation to user needs using ranking
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Computational Linguistics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Power Engineering (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a block chain-based network credit risk data sharing method and a system, wherein the method comprises the following steps: receiving a data packet reported by a network credit risk data enterprise to be shared; the received data packet is sent to an event message queue, the data packet is pushed to a data filter for filtering processing through the event message queue, whether the reported data packet is effective or not is judged, and if the data packet is effective, the reported data packet is written into a block chain and a database; carrying out rewarding and punishment processing of data reporting operation on the network credit risk data enterprises to be shared according to a preset incentive mechanism; the method is provided with the validity of the filtering buffer checking data, and meanwhile, risk data among credit-assisting companies, commercial banks and network credit platforms can be effectively shared based on the blockchain platform and an effective rewards and punishments incentive mechanism, so that comprehensiveness of data dimension and integrity of effective data of the network credit companies in wind control and marketing are guaranteed.
Description
Technical Field
The invention relates to the field of information technology, in particular to a block chain-based network credit risk data sharing method and system.
Background
The data are basic stones supporting the financial wind control of the whole Internet, and the gold company can identify the fraud risk of the client through big data technologies such as user portraits, data mining, deep learning and the like by collecting, arranging and cleaning the client information. In order to reduce the overdue bad account rate of the wind control, the complete user data obviously provides great help, and has guiding significance for the user to adapt to different risk interest rate products in a differentiated mode.
The blockchain technology is used as a distributed ledger wall technology, brings great influence to the financial field, and drives a new round of technology innovation and application innovation. Under the background of blockchain, cloud computing, big data and other technologies, the finance industry breeds and generates various financial products. The complete user data can better serve various financial products, has guiding significance for risk assessment of the user, provides accurate and personalized service for the user, and brings great convenience for life of people.
Currently, the data provided by the provider of user data is incomplete and has fewer dimensions; the data barriers of the gold companies are serious, the data cannot be communicated, and the authenticity of the shared data is not high; the main bodies are mutually not trusted, and an effective sharing incentive mechanism is not available, so that the application of the blockchain technology in the financial field is not facilitated.
Disclosure of Invention
In order to solve the problems of serious data barriers and low shared data authenticity of the existing gold company in the background technology, the invention provides a block chain-based network credit risk data sharing method and system, wherein the block chain-based network credit risk data sharing method comprises the following steps:
receiving a data packet reported by a network credit risk data enterprise to be shared;
the received data packet is sent to an event message queue, the data packet is pushed to a data filter for filtering processing through the event message queue, whether the reported data packet is effective or not is judged, and if the data packet is effective, the reported data packet is written into a block chain and a database;
and carrying out rewarding and punishment processing of data reporting operation on the network credit risk data enterprises to be shared according to a preset incentive mechanism.
Further, before receiving the data packet to be reported by the shared network credit risk data enterprise, the method further includes:
receiving enterprise qualification information submitted by the network credit risk data enterprise to be shared, and verifying the authenticity and the validity of the enterprise qualification information;
and if the enterprise qualification information is true and effective, issuing a platform access certificate for the network credit risk data enterprise to be shared.
Further, issuing a platform access certificate for the network credit risk data enterprise to be shared includes:
generating a platform access certificate according to the enterprise qualification information;
encrypting the platform access certificate, the interface function and the software development kit by adopting a symmetrical encryption mode to generate a ciphertext, wherein the symmetrical encryption key is a hash value of enterprise qualification information;
transmitting the ciphertext to a network credit risk data enterprise to be shared;
and opening an interface to the network to be shared, lending risk data enterprises and authorizing gateway access rights.
Further, the method for judging whether the reported data packet is valid includes:
initializing a cache bit array, and setting each bit to 0;
calculating a hash value of each piece of reported information in a database, mapping the hash value sequentially through k preset hash functions, and marking the corresponding position of the hash value obtained by mapping as 1 in a cache bit array; k is a positive integer greater than 1;
calculating the reported data packet hash value, mapping the hash value through k preset hash functions in sequence, and judging whether the corresponding position of the mapped hash value in a cache bit array is 1 or not;
And if one of the positions corresponding to the hash values obtained by mapping is not 1, judging that the reported data packet is valid, otherwise, judging that the reported data packet is invalid.
Further, the method for judging whether the reported data packet is effective includes judging through primary filtering cache processing and judging through secondary filtering cache processing;
the first-level filtering cache processing comprises the steps of mapping invalid elements serving as reported information in a database to a cache bit array, if the reported data packet is judged to be valid, exiting processing and judging that the reported data packet is invalid, otherwise, executing second-level filtering cache processing; the invalid element comprises expired report information;
the secondary filtering caching process comprises the steps of mapping the remaining effective elements with invalid elements removed to a caching bit array as the stored reporting information in the database, and judging whether the reported data packet is effective or not.
Further, the method further comprises:
receiving a hash value of information to be queried assembled by the network credit risk data enterprise to be shared;
judging whether the query number of the network credit risk data enterprises to be shared in the current day exceeds a preset value, if not, sending the hash value of the information to be queried to an event message queue, and pushing the hash value of the information to be queried to a data filter for query through the event message queue to obtain a query result;
And carrying out punishment and punishment processing of data query operation on the network credit risk data enterprises to be shared according to an incentive mechanism.
Further, the event message queue pushes the hash value of the information to be queried to a data filter for query, so as to obtain a query result, which includes:
initializing a first-level cache bit array and a second-level cache bit array, and setting each bit to 0;
calculating a hash value of each piece of invalid data information, mapping the hash value sequentially through k preset hash functions, and marking the corresponding position of the hash value obtained by mapping in a first-level cache bit array as 1; k is a positive integer greater than 1;
calculating a hash value of each piece of reported information in a database, removing the hash value of each piece of invalid data information, mapping the residual hash value sequentially through k preset hash functions, and marking the corresponding position of the hash value obtained by mapping as 1 in a secondary cache bit array;
mapping the hash value of the information to be queried through k preset hash functions in sequence, and judging whether the corresponding position of the hash value obtained by mapping in a first-level cache bit array is 1 or not;
if the corresponding positions of the hash values obtained by mapping are all 1, returning prompt data to expire;
Otherwise, judging whether the corresponding position of the mapped hash value in the second-level cache bit array is 1, if not, returning a query result; otherwise, returning the query failure.
Further, the method for performing rewards and punishments processing on the network credit risk data enterprise to be shared according to the incentive mechanism comprises the following steps:
the initial points of the network credit risk data enterprises to be shared are the same, and L points are added for each data query operation;
when the number of daily data reporting operations is within a preset value X, increasing Y points every time data reporting operations are completed, and increasing Z points if the reported data are valid; wherein, Z is much greater than Y and L;
when the number of daily data reporting operations is larger than a preset value X, judging that the user behavior is malicious behavior, deducting N points every time M times of data reporting operations are added, and if the reported data are valid, adding Z points every time reporting; the M is far greater than 1;
and if the network credit risk data enterprise to be shared is judged to be in malicious behavior, the integral of the network credit risk data enterprise to be shared is reduced in a 1/2 exponential manner.
The block chain-based network credit risk data sharing system comprises:
A data filter, a database and an excitation mechanism processing unit;
the system receives a data packet reported by a network credit risk data enterprise to be shared;
the system sends the received data packet to an event message queue, pushes the data packet to a data filter for filtering processing through the event message queue, and judges whether the reported data packet is valid or not; if the data packet is valid, writing the reported data packet into a blockchain and a database;
the database is used for storing data information which is judged to be valid;
and the incentive mechanism processing unit performs rewarding and punishing processing of data reporting operation on the network credit risk data enterprises to be shared according to an incentive mechanism.
Further, the system also comprises an enterprise registration auditing unit;
the enterprise registration auditing unit receives enterprise qualification information submitted by the network credit risk data enterprise to be shared and verifies the authenticity and the validity of the enterprise qualification information; and if the enterprise qualification information is true and effective, issuing a platform access certificate for the network credit risk data enterprise to be shared.
Further, the enterprise registration auditing unit further comprises a certificate issuing module;
The certificate issuing module generates a platform access certificate according to the enterprise qualification information;
the certificate issuing module encrypts the platform access certificate, the interface function and the software development kit in a symmetrical encryption mode to generate a ciphertext, and the symmetrical encryption key is a hash value of enterprise qualification information;
the certificate issuing module transmits the ciphertext to a network credit risk data enterprise to be shared;
the system opens an interface to the network credit risk data enterprise to be shared and grants access rights to the gateway.
Further, the data filter initializes a cache bit array, setting each bit to 0;
the data filter calculates a hash value of each piece of reported information in the database, maps the hash value through k preset hash functions in sequence, and marks the corresponding position of the mapped hash value in the cache bit array as 1; k is a positive integer greater than 1;
the data filter calculates the reported data packet hash value, maps the hash value through k preset hash functions in sequence, and judges whether the corresponding position of the mapped hash value in the cache bit array is 1 or not; and if one of the positions corresponding to the hash values obtained by mapping is not 1, judging that the reported data packet is valid, otherwise, judging that the reported data packet is invalid.
Further, the data filter comprises a first-level filtering cache processing module and a second-level filtering cache processing module;
the first-level filtering cache processing module is used for mapping invalid elements as reported information in the database to a cache bit array, if the reported data packet is judged to be valid, the processing is stopped, and the reported data packet is judged to be invalid, otherwise, the second-level filtering cache processing module continues to process the data packet; the invalid element comprises expired report information;
the secondary filtering cache processing module is used for mapping the residual effective elements with invalid elements removed to a cache bit array as the reported information stored in the database, and judging whether the reported data packet is effective or not.
Further, the system receives the hash value of the information to be queried assembled by the network credit risk data enterprise to be shared;
the system judges whether the query number of the network credit risk data enterprises to be shared on the same day exceeds a preset value, if not, the hash value of the information to be queried is sent to an event message queue, and the hash value of the information to be queried is pushed to a data filter for query through the event message queue to obtain a query result;
and the incentive mechanism processing unit performs rewarding and punishing processing of data query operation on the network credit risk data enterprise to be shared according to an incentive mechanism.
Further, the data filter initializes a first level cache bit array and a second level cache bit array, each bit being set to 0;
the data filter calculates a hash value of each piece of invalid data information, maps the hash value through k preset hash functions in sequence, and marks the corresponding position of the mapped hash value in a first-level cache bit array as 1; k is a positive integer greater than 1;
the data filter calculates a hash value of each piece of reported information in the database, removes the hash value of each piece of invalid data information, maps the residual hash value through k preset hash functions in sequence, and marks the corresponding position of the mapped hash value in a secondary cache bit array as 1;
the data filter maps the hash value of the information to be queried through k preset hash functions in sequence, and judges whether the corresponding position of the hash value obtained by mapping in a first-level cache bit array is 1 or not; if the corresponding positions of the hash values obtained by mapping are all 1, returning prompt data to expire; otherwise, judging whether the corresponding position of the mapped hash value in the second-level cache bit array is 1, if not, returning a query result; otherwise, returning the query failure.
Further, the initial points of the network credit risk data enterprises to be shared are the same;
the excitation mechanism processing unit increases L points for each data query operation;
the excitation mechanism processing unit judges that when the number of data reporting operations on the same day is within a preset value X, the Y score is increased every time the data reporting operation is completed, and if the reported data is valid, the Z score is increased; wherein, Z is much greater than Y and L;
the excitation mechanism processing unit judges that the user behavior is malicious when the number of the data reporting operations on the same day is larger than a preset value X, N points are deducted when M times of data reporting operations are added, and Z points are added when the reported data are valid; the M is far greater than 1;
and if the incentive mechanism processing unit judges that the network credit risk data enterprise to be shared is a malicious act, the integral of the network credit risk data enterprise to be shared is reduced exponentially according to 1/2.
The beneficial effects of the invention are as follows: the invention provides a network credit risk data sharing method and system based on a blockchain, wherein the method is used for setting the validity of checking data of a filtering buffer, and meanwhile, the risk data among credit-assisting companies, commercial banks and network credit platforms can be effectively shared based on a blockchain platform and an effective rewards and punishment incentive mechanism, so that the comprehensiveness of data dimension and the integrality of effective data of the network credit companies in the process of wind control and marketing are ensured.
Drawings
Exemplary embodiments of the present invention may be more completely understood in consideration of the following drawings:
FIG. 1 is a flow chart of a blockchain-based network credit risk data sharing method in accordance with embodiments of the present invention;
FIG. 2 is a block chain based network credit risk data sharing system according to an embodiment of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the examples described herein, which are provided to fully and completely disclose the present invention and fully convey the scope of the invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, like elements/components are referred to by like reference numerals.
Unless otherwise indicated, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. In addition, it will be understood that terms defined in commonly used dictionaries should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
FIG. 1 is a flow chart of a blockchain-based network credit risk data sharing method in accordance with embodiments of the present invention; as shown in fig. 1, the method includes:
the network credit risk data enterprises to be shared comprise enterprises and institutions waiting for sharing data, wherein the enterprises comprise commercial banks, credit assisting companies and network credit platforms.
Before the enterprises and institutions configure the local environment to prepare to report data, the enterprises need to pass through enterprise registration and enterprise qualification auditing, and the method comprises the following steps:
accessing an electronic protocol to a to-be-shared network credit risk data enterprise signing platform, wherein the electronic protocol comprises a protocol ID, a protocol name and protocol clauses;
the enterprise of the network credit risk data to be shared can submit enterprise qualification information through webpage registration and the like, wherein the enterprise qualification information comprises enterprise or mechanism qualification copies (business license and the like), legal identity information, unit social security identification numbers, unit names, receiving mailbox account numbers, butt joint person identity information, butt joint person contact ways and the like;
and verifying the authenticity and the validity of the enterprise qualification information by inquiring the business information and the like, and if the enterprise qualification information is true and valid, issuing a platform access certificate for the network credit risk data enterprise to be shared.
The method for issuing the platform access certificate for the network credit risk data enterprise to be shared comprises the following steps:
generating a platform access certificate according to the received enterprise qualification information (enterprise or institution qualification copies (business license and the like), legal identity information, unit social security identification numbers, unit names, receiving mailbox account numbers and the like);
encrypting the platform access certificate, the interface function and the software development kit by adopting an AES symmetric encryption algorithm to generate a ciphertext, wherein the symmetric encryption key is a hash value of enterprise qualification information (such as a unit social security identification number, a unit name, a dockee identity card number, a dockee mobile phone number, an application number and the like);
transmitting the ciphertext to a network credit risk data enterprise to be shared in a mail mode and the like;
an interface is opened to the network credit risk data enterprise to be shared, wherein the interface comprises a query and uploading interface; the gateway access rights are granted to the network-to-be-shared lending risk data enterprises that issue the access certificates.
The data packet content reported by the network credit risk data enterprise to be shared comprises an identity ID, a name, a telephone, an address, a risk data type, the number of data pieces and a unit ID, wherein the risk data type comprises five types of blacklists, gray lists, overdue, proxy and belief losing; the reported data packet is uploaded through an open uploading interface.
the validity of the uploaded data packet needs to be checked, and the valid data packet is written into a block chain and a database; the verification of the validity of the data packet is realized through filter processing, and the method comprises the following steps:
firstly initializing a cache bit array, and setting each bit to 0;
assuming that hash values of each piece of reported information in the database are used as elements of a set S, mapping each element in the set S sequentially through k preset hash functions, wherein each mapping generates one hash value, namely each element obtains k mapped hash values, and the mapped hash values correspond to one point in a cache bit array;
where k is a positive integer greater than 1, for example, k=3 may be set, and the mapped hash value is h 1 (x),h 2 (x),h 3 (x) Wherein x is an element of set S;
marking the corresponding positions of k mapped hash values of each element in the cache bit array as 1 to obtain a cache bit array corresponding to the set S;
Calculating the reported data packet hash value, mapping the hash value through k preset hash functions in sequence, and judging whether the corresponding positions of the k hash values obtained by mapping in a cache bit array are 1 or not;
if one of the k mapping positions is not 1, it may be determined that the data packet does not belong to the set S, i.e., the data packet is valid; and otherwise, judging that the reported data packet is invalid.
In addition, the element in the filter cannot be removed at will, if the position of 1 is reset to 0, the judgment of whether other elements are in the set S is affected, that is, if the data is out of date, the simple resetting of the corresponding position of the invalid element to 0 affects the accuracy of the judgment result, so that the two-stage filtering cache processing is set.
The first-level filtering cache processing takes the invalid elements as elements in the set S, judges whether the data packet is valid according to the filter processing method, if so, indicates that the uploaded data is invalid, exits the processing and judges that the reported data packet is invalid; if the data packet is judged to be invalid, performing secondary filtering caching;
and the secondary filtering cache processing takes the remaining effective elements with invalid elements removed as elements in the set S, judges whether the data packet is effective according to the filter processing method, and if so, the reported data packet is effective.
130, performing rewarding and punishing processing of data reporting operation on the network credit risk data enterprise to be shared according to a preset incentive mechanism;
in order to encourage users to report data to realize data sharing, an incentive mechanism is arranged to perform punishment and punishment on user behaviors. And evaluating the reward and punishment behavior in a scoring mode for each access enterprise, and taking the user points as the measurement scale of the usable data, wherein the points are also the standard of the shared data range usable by the network credit risk data enterprise to be shared.
The initial points of the network credit risk data enterprises to be shared are the same, for example, 1000 points are set;
when uploading data, firstly judging whether the number of data reporting operations on the same day is within a preset value X (for example, X is 500), if the number is within the preset value X, increasing Y (for example, Y is 1) for each data reporting operation, and if the reported data is valid, increasing Z (for example, Z is 100);
otherwise, judging the user behavior as malicious behavior, and deducting N points (for example, N is 100) when M data reporting operations are added (for example, M is 50); if the reported data is valid, the Z score is increased still for each report;
and if the network credit risk data enterprise to be shared is judged to be a malicious act, the integral of the network credit risk data enterprise to be shared is reduced in a 1/2 exponential order, and the malicious act adopts a daily terminal calculation mode.
In addition, the method includes a data query method in addition to reporting data, the method including:
receiving hash values of information to be queried assembled by the network credit risk data enterprise to be shared, for example, assembling a query telephone and an identity ID as information to be queried, and calculating the hash values of the information to be queried, wherein key=hash (telephone, identity ID);
judging whether the number of the query items of the network credit risk data enterprises to be shared on the same day exceeds a preset threshold value, and if the number of the query items of the network credit risk data enterprises to be shared on the same day reaches the upper limit of the query on the same day, failing to continue the query;
if the hash value key of the information to be queried does not exceed the preset threshold value, uploading the hash value key of the information to be queried to an event message queue through an open query interface, and pushing the hash value of the information to be queried to a data filter for query through the event message queue to obtain a query result;
and carrying out punishment and punishment processing of data query operation on the network credit risk data enterprise to be shared according to an incentive mechanism, namely adding L points (for example, L is 10) for each data query operation, and clearing query counts deducted by the network credit risk data enterprise to be shared every day.
The method is implemented by a data filter query for a data query, and comprises the following steps:
initializing a first-level cache bit array and a second-level cache bit array, and setting each bit to 0;
Assuming that hash values of each piece of invalid data information in a database are used as elements in a set gamma, mapping each element in the set gamma through k preset hash functions in sequence, wherein each mapping generates one hash value, namely each element obtains k mapped hash values, and the mapped hash values correspond to one point in a first-level cache bit array; marking the corresponding positions of k mapped hash values of each element in the first-level cache bit array as 1;
taking the hash value of each piece of reported data information in the database as an element in a set S, removing the element in the set gamma, mapping each remaining element in the set S through k preset hash functions in sequence, and marking the corresponding position of the hash value obtained by mapping in a secondary cache bit array as 1;
mapping the hash value key of the information to be queried through k preset hash functions in sequence, and judging whether the corresponding position of the hash value obtained by mapping in a first-level cache bit array is 1 or not;
if the corresponding position of the hash value obtained by mapping is 1, the data is invalid information, and prompt data is returned to be expired;
otherwise, continuing to judge whether the corresponding position of the mapped hash value in the second-level cache bit array is 1, and if one of the corresponding positions of the mapped hash value is not 1, returning a desensitized query result; otherwise, returning the query failure.
FIG. 2 is a block chain based network credit risk data sharing system according to one embodiment of the present invention; as shown in fig. 2, the system operates on a blockchain platform, including:
a data filter 210, a database 220, an incentive mechanism processing unit 230, and an enterprise registration auditing unit 240;
the enterprise registration auditing unit 240 receives enterprise qualification information submitted by the network credit risk data enterprise to be shared, and verifies the authenticity and validity of the enterprise qualification information; and if the enterprise qualification information is true and effective, issuing a platform access certificate for the network credit risk data enterprise to be shared.
Wherein, the enterprise registration audit unit 240 further includes a certificate issuing module;
the certificate issuing module generates a platform access certificate according to enterprise qualification information, encrypts the platform access certificate, an interface function and a software development kit by utilizing an AES encryption algorithm to generate a ciphertext, wherein the symmetric encryption key is a hash value of the enterprise qualification information, and finally transmits the ciphertext to an enterprise of network credit risk data to be shared;
the system opens an interface to a network credit risk data enterprise to be shared of an access certificate of the issuing platform and grants access rights to the gateway.
After the enterprise registration and audit passes, query and upload operations can be initiated, and the incentive mechanism processing unit 230 performs data reporting operations and punishment operations of the data query operations on the network credit risk data enterprise to be shared according to an incentive mechanism.
When uploading data, the system receives a data packet reported by a network credit risk data enterprise to be shared;
the system sends the received data packet to an event message queue, pushes the data packet to a data filter 210 for filtering processing through the event message queue, and judges whether the reported data packet is valid or not; if the data packet is valid, writing the reported data packet into a blockchain and database 220; the database 220 is used for storing data information which is judged to be valid;
the data filter 210 may be configured to determine validity of the uploaded data packet, where the data filter 210 initializes an array of cache bits, each bit being set to 0;
the data filter 210 calculates a hash value for each reported information in the database, maps the hash value sequentially through k preset hash functions, and marks the corresponding position of the mapped hash value in the cache bit array as 1; k is a positive integer greater than 1;
The data filter 210 calculates the reported hash value of the data packet, maps the hash value through k preset hash functions in sequence, and judges whether the corresponding position of the mapped hash value in the cache bit array is 1 or not; if one of the positions corresponding to the hash values obtained by mapping is not 1, judging that the reported data packet is valid, otherwise, judging that the reported data packet is invalid;
in addition, considering that elements in the filter cannot be removed at will, the primary filtering cache processing module 2101 and the secondary filtering cache processing module are arranged to solve the problem that resetting the corresponding position of the invalid element to 0 affects the accuracy of the determination result;
the first-level filtering cache processing module 2101 is configured to map an invalid element as reported information in the database to a cache bit array, if it is determined that a reported data packet is valid, exit processing and determine that the reported data packet is invalid, otherwise, continue processing by the second-level filtering cache processing module; the invalid element comprises expired report information;
the secondary filtering cache processing module 2102 is configured to map remaining valid elements with invalid elements removed as reported information stored in the database to a cache bit array, and determine whether the reported data packet is valid.
When inquiring data, the system receives the hash value of the information to be inquired assembled by the network credit risk data enterprise to be shared, judges whether the number of inquires of the network credit risk data enterprise to be shared exceeds a preset value in the current day, if not, sends the hash value of the information to be inquired to an event message queue, and pushes the hash value of the information to be inquired to a data filter 210 for inquiring through the event message queue to obtain an inquiring result;
the data filter 210 is used for querying data, the data filter 210 initializes the first-level cache bit array and the second-level cache bit array, and sets each bit to 0;
then, the data filter calculates a hash value of each piece of invalid data information, maps the hash value through k preset hash functions in sequence, and marks the corresponding position of the hash value obtained by mapping as 1 in a first-level cache bit array; k is a positive integer greater than 1;
then, the data filter calculates a hash value of each piece of reported information in the database, removes the hash value of each piece of invalid data information, maps the residual hash value through k preset hash functions in sequence, and marks the corresponding position of the mapped hash value in a secondary cache bit array as 1;
Finally, the data filter maps the hash value of the information to be queried through k preset hash functions in sequence, and judges whether the corresponding position of the hash value obtained by mapping in a first-level cache bit array is 1 or not; if the corresponding positions of the hash values obtained by mapping are all 1, returning prompt data to expire; otherwise, judging whether the corresponding position of the mapped hash value in the second-level cache bit array is 1, if not, returning a query result; otherwise, returning the query failure.
In order to encourage users to report data to realize data sharing, an incentive mechanism is arranged to perform punishment and punishment on user behaviors. The initial points of the network credit risk data enterprises to be shared are the same, and the incentive mechanism processing unit 230 increases L points for each data query operation;
the excitation mechanism processing unit 230 determines that when the number of data reporting operations on the same day is within a preset value X, increasing a Y score every time data reporting operations are completed, and increasing a Z score if the reported data are valid; wherein, Z is much greater than Y and L;
the excitation mechanism processing unit 230 determines that the user behavior is malicious when the number of data reporting operations on the same day is greater than a preset value X, deducts N points every time when M data reporting operations are added, and increases Z points every time when the reported data are valid; the M is far greater than 1;
If the incentive mechanism processing unit 230 determines that the network credit risk data enterprise to be shared is a malicious act, the points of the network credit risk data enterprise to be shared are reduced exponentially according to 1/2.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the disclosure may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Those skilled in the art will appreciate that the modules in the apparatus of the embodiments may be adaptively changed and disposed in one or more apparatuses different from the embodiments. The modules or units or components of the embodiments may be combined into one module or unit or component and, furthermore, they may be divided into a plurality of sub-modules or sub-units or sub-components. Any combination of all features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be used in combination, except insofar as at least some of such features and/or processes or units are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise. Reference to step numbers in this specification is used solely to distinguish between steps and is not intended to limit the time or logical relationship between steps, including the various possible conditions unless the context clearly indicates otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the disclosure and form different embodiments. For example, any of the embodiments claimed in the claims may be used in any combination.
Various component embodiments of the present disclosure may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. The present disclosure may also be implemented as an apparatus or system program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present disclosure may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the disclosure, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The disclosure may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware.
The foregoing is merely a specific embodiment of the disclosure, and it should be noted that it will be apparent to those skilled in the art that several improvements, modifications, and variations can be made without departing from the spirit of the disclosure, and these improvements, modifications, and variations are to be considered within the scope of the present application.
Claims (10)
1. A blockchain-based network lending risk data sharing method, the method comprising:
receiving a data packet reported by a network credit risk data enterprise to be shared;
the received data packet is sent to an event message queue, the data packet is pushed to a data filter for filtering processing through the event message queue, whether the reported data packet is effective or not is judged, and if the data packet is effective, the reported data packet is written into a block chain and a database;
carrying out rewarding and punishment processing of data reporting operation on the network credit risk data enterprises to be shared according to a preset incentive mechanism;
the method for judging whether the reported data packet is valid or not comprises the following steps:
initializing a cache bit array, and setting each bit to 0;
calculating a hash value of each piece of reported information in a database, mapping the hash value sequentially through k preset hash functions, and marking the corresponding position of the hash value obtained by mapping as 1 in a cache bit array; k is a positive integer greater than 1;
Calculating the reported data packet hash value, mapping the hash value through k preset hash functions in sequence, and judging whether the corresponding position of the mapped hash value in a cache bit array is 1 or not;
if one of the corresponding positions of the hash values obtained by mapping is not 1, judging an element hit set S, namely a data packet hit set S, judging that the reported data packet is valid, otherwise, judging that the reported data packet is invalid;
the method for judging whether the reported data packet is effective comprises the steps of judging through primary filtering cache processing and judging through secondary filtering cache processing;
the first-level filtering cache processing comprises the steps of mapping invalid elements serving as reported information in a database to a cache bit array, if the reported data packet is judged to be valid, exiting processing and judging that the reported data packet is valid, otherwise, executing the second-level filtering cache processing; the invalid element comprises expired report information;
the secondary filtering caching process comprises the steps of mapping the remaining effective elements with invalid elements removed as the reported information stored in the database to a caching bit array, and judging whether the reported data packet is effective or not;
the method for finishing the reward and punishment processing of the network credit risk data enterprises to be shared according to the incentive mechanism comprises the following steps:
The initial points of the network credit risk data enterprises to be shared are the same, and L points are added for each data query operation;
when the number of daily data reporting operations is within a preset value X, increasing Y points every time data reporting operations are completed, and increasing Z points if the reported data are valid; wherein Z is greater than Y and L;
when the number of daily data reporting operations is larger than a preset value X, judging that the user behavior is malicious behavior, deducting N points every time M times of data reporting operations are added, and if the reported data are valid, adding Z points every time reporting; the M is greater than 1;
and if the network credit risk data enterprise to be shared is judged to be in malicious behavior, the integral of the network credit risk data enterprise to be shared is reduced in a 1/2 exponential manner.
2. The method of claim 1, wherein prior to receiving the data packet to be reported by the shared network credit risk data enterprise, the method further comprises: receiving enterprise qualification information submitted by the network credit risk data enterprise to be shared, and verifying the authenticity and the validity of the enterprise qualification information;
and if the enterprise qualification information is true and effective, issuing a platform access certificate for the network credit risk data enterprise to be shared.
3. The method of claim 2, wherein issuing a platform access certificate for the network credit risk data enterprise to be shared comprises:
generating a platform access certificate according to the enterprise qualification information;
encrypting the platform access certificate, the interface function and the software development kit by adopting a symmetrical encryption mode to generate a ciphertext, wherein a symmetrical encryption key is a hash value of enterprise qualification information;
transmitting the ciphertext to a network credit risk data enterprise to be shared;
and opening an interface to the network to be shared, lending risk data enterprises and authorizing gateway access rights.
4. The method according to claim 1, wherein the method further comprises:
receiving a hash value of information to be queried assembled by the network credit risk data enterprise to be shared;
judging whether the query number of the network credit risk data enterprises to be shared in the current day exceeds a preset value, if not, sending the hash value of the information to be queried to an event message queue, and pushing the hash value of the information to be queried to a data filter for query through the event message queue to obtain a query result;
and carrying out punishment and punishment processing of data query operation on the network credit risk data enterprises to be shared according to an incentive mechanism.
5. The method of claim 4, wherein the pushing the hash value of the information to be queried to the data filter for query by the event message queue to obtain a query result comprises:
initializing a first-level cache bit array and a second-level cache bit array, and setting each bit to 0;
calculating a hash value of each piece of invalid data information, mapping the hash value sequentially through k preset hash functions, and marking the corresponding position of the hash value obtained by mapping in a first-level cache bit array as 1; k is a positive integer greater than 1;
calculating a hash value of each piece of reported information in a database, removing the hash value of each piece of invalid data information, mapping the residual hash value sequentially through k preset hash functions, and marking the corresponding position of the hash value obtained by mapping as 1 in a secondary cache bit array;
mapping the hash value of the information to be queried through k preset hash functions in sequence, and judging whether the corresponding position of the hash value obtained by mapping in a first-level cache bit array is 1 or not;
if the corresponding positions of the hash values obtained by mapping are all 1, returning prompt data to expire;
otherwise, judging whether the corresponding position of the mapped hash value in the second-level cache bit array is 1, if not, returning a query result; otherwise, returning the query failure.
6. A blockchain-based network credit risk data sharing system, the system comprising:
a data filter, a database and an excitation mechanism processing unit;
the system receives a data packet reported by a network credit risk data enterprise to be shared;
the system sends the received data packet to an event message queue, pushes the data packet to a data filter for filtering processing through the event message queue, and judges whether the reported data packet is valid or not; if the data packet is valid, writing the reported data packet into a blockchain and a database;
the database is used for storing data information which is judged to be valid;
the incentive mechanism processing unit performs rewarding and punishing processing of data reporting operation on the network credit risk data enterprises to be shared according to an incentive mechanism;
the data filter initializes a cache bit array, setting each bit to 0;
the data filter calculates a hash value of each piece of reported information in the database, maps the hash value through k preset hash functions in sequence, and marks the corresponding position of the mapped hash value in the cache bit array as 1; k is a positive integer greater than 1;
The data filter calculates the reported data packet hash value, maps the hash value through k preset hash functions in sequence, and judges whether the corresponding position of the mapped hash value in the cache bit array is 1 or not; if one of the corresponding positions of the hash values obtained by mapping is not 1, judging an element hit set S, namely a data packet hit set S, judging that the reported data packet is valid, otherwise, judging that the reported data packet is invalid;
the data filter comprises a first-level filtering cache processing module and a second-level filtering cache processing module;
the first-level filtering cache processing module is used for mapping invalid elements as reported information in the database to a cache bit array, if the reported data packet is judged to be effective, the processing is stopped, and the reported data packet is judged to be effective, otherwise, the second-level filtering cache processing module continues to process the data packet; the invalid element comprises expired report information;
the secondary filtering cache processing module is used for mapping the residual effective elements with invalid elements removed as the reported information stored in the database to a cache bit array and judging whether the reported data packet is effective or not;
the initial points of the network credit risk data enterprises to be shared are the same;
The excitation mechanism processing unit increases L points for each data query operation;
the excitation mechanism processing unit judges that when the number of data reporting operations on the same day is within a preset value X, the Y score is increased every time the data reporting operation is completed, and if the reported data is valid, the Z score is increased; wherein Z is greater than Y and L;
the excitation mechanism processing unit judges that the user behavior is malicious when the number of the data reporting operations on the same day is larger than a preset value X, N points are deducted when M times of data reporting operations are added, and Z points are added when the reported data are valid; the M is greater than 1;
and if the incentive mechanism processing unit judges that the network credit risk data enterprise to be shared is a malicious act, the integral of the network credit risk data enterprise to be shared is reduced exponentially according to 1/2.
7. The system according to claim 6, wherein:
the system also comprises an enterprise registration auditing unit;
the enterprise registration auditing unit receives enterprise qualification information submitted by the network credit risk data enterprise to be shared and verifies the authenticity and the validity of the enterprise qualification information; and if the enterprise qualification information is true and effective, issuing a platform access certificate for the network credit risk data enterprise to be shared.
8. The system according to claim 7, wherein:
the enterprise registration auditing unit also comprises a certificate issuing module;
the certificate issuing module generates a platform access certificate according to the enterprise qualification information;
the certificate issuing module encrypts the platform access certificate, the interface function and the software development kit in a symmetrical encryption mode to generate a ciphertext, and the symmetrical encryption key is a hash value of enterprise qualification information;
the certificate issuing module transmits the ciphertext to a network credit risk data enterprise to be shared;
the system opens an interface to the network credit risk data enterprise to be shared and grants access rights to the gateway.
9. The system according to claim 6, wherein:
the system receives the hash value of the information to be queried assembled by the network credit risk data enterprise to be shared;
the system judges whether the query number of the network credit risk data enterprises to be shared on the same day exceeds a preset value, if not, the hash value of the information to be queried is sent to an event message queue, and the hash value of the information to be queried is pushed to a data filter for query through the event message queue to obtain a query result;
and the incentive mechanism processing unit performs rewarding and punishing processing of data query operation on the network credit risk data enterprise to be shared according to an incentive mechanism.
10. The system according to claim 9, wherein:
the data filter initializes a first-level cache bit array and a second-level cache bit array, and sets each bit to 0;
the data filter calculates a hash value of each piece of invalid data information, maps the hash value through k preset hash functions in sequence, and marks the corresponding position of the mapped hash value in a first-level cache bit array as 1; k is a positive integer greater than 1;
the data filter calculates a hash value of each piece of reported information in the database, removes the hash value of each piece of invalid data information, maps the residual hash value sequentially through k preset hash functions, and marks the corresponding position of the mapped hash value in a secondary cache bit array as 1;
the data filter maps the hash value of the information to be queried through k preset hash functions in sequence, and judges whether the corresponding position of the hash value obtained by mapping in a first-level cache bit array is 1 or not; if the corresponding positions of the hash values obtained by mapping are all 1, returning prompt data to expire; otherwise, judging whether the corresponding position of the mapped hash value in the second-level cache bit array is 1, if not, returning a query result; otherwise, returning the query failure.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010266337.2A CN111611215B (en) | 2020-04-07 | 2020-04-07 | Block chain-based network credit risk data sharing method and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010266337.2A CN111611215B (en) | 2020-04-07 | 2020-04-07 | Block chain-based network credit risk data sharing method and system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111611215A CN111611215A (en) | 2020-09-01 |
| CN111611215B true CN111611215B (en) | 2023-07-11 |
Family
ID=72199359
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010266337.2A Active CN111611215B (en) | 2020-04-07 | 2020-04-07 | Block chain-based network credit risk data sharing method and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111611215B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113886499B (en) * | 2021-10-19 | 2022-09-30 | 赛维森(广州)医疗科技服务有限公司 | Pathology data sharing method and system based on block chain and computing equipment |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104794158A (en) * | 2015-02-09 | 2015-07-22 | 国家计算机网络与信息安全管理中心 | Domain name data repeated detection and fast index method in boundscript window |
| CN107247773A (en) * | 2017-06-07 | 2017-10-13 | 北京邮电大学 | A kind of method that inquiry is traded in distributed data base based on block chain |
| CN107844575A (en) * | 2017-11-06 | 2018-03-27 | 国家计算机网络与信息安全管理中心 | A kind of personal data shared system and method for internet financial platform |
| CN109088871A (en) * | 2018-08-14 | 2018-12-25 | 深圳市人民政府金融发展服务办公室 | Datagram delivery method and system based on block chain technology |
| CN109741162A (en) * | 2018-09-03 | 2019-05-10 | 上海奥若拉信息科技集团有限公司 | The storage of personal collage-credit data, processing, sharing method and system based on block chain |
| CN109828721A (en) * | 2019-01-23 | 2019-05-31 | 平安科技(深圳)有限公司 | Data-erasure method, device, computer equipment and storage medium |
| CN109948098A (en) * | 2019-02-21 | 2019-06-28 | 网宿科技股份有限公司 | Data filtering method, cache information recording method and device |
| CN110213042A (en) * | 2019-05-09 | 2019-09-06 | 电子科技大学 | A kind of cloud data duplicate removal method based on no certification agency re-encryption |
| CN110717197A (en) * | 2019-10-14 | 2020-01-21 | 重庆邮电大学 | A method for sharing credit information data based on blockchain |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10277481B2 (en) * | 2015-09-23 | 2019-04-30 | Futurewei Technologies, Inc. | Stateless forwarding in information centric networks with bloom filters |
| US11263177B2 (en) * | 2016-08-02 | 2022-03-01 | Child Rescue Coalition, Inc. | Identification of portions of data |
| CN108512876B (en) * | 2017-02-27 | 2020-11-10 | 腾讯科技(深圳)有限公司 | Data pushing method and device |
-
2020
- 2020-04-07 CN CN202010266337.2A patent/CN111611215B/en active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104794158A (en) * | 2015-02-09 | 2015-07-22 | 国家计算机网络与信息安全管理中心 | Domain name data repeated detection and fast index method in boundscript window |
| CN107247773A (en) * | 2017-06-07 | 2017-10-13 | 北京邮电大学 | A kind of method that inquiry is traded in distributed data base based on block chain |
| CN107844575A (en) * | 2017-11-06 | 2018-03-27 | 国家计算机网络与信息安全管理中心 | A kind of personal data shared system and method for internet financial platform |
| CN109088871A (en) * | 2018-08-14 | 2018-12-25 | 深圳市人民政府金融发展服务办公室 | Datagram delivery method and system based on block chain technology |
| CN109741162A (en) * | 2018-09-03 | 2019-05-10 | 上海奥若拉信息科技集团有限公司 | The storage of personal collage-credit data, processing, sharing method and system based on block chain |
| CN109828721A (en) * | 2019-01-23 | 2019-05-31 | 平安科技(深圳)有限公司 | Data-erasure method, device, computer equipment and storage medium |
| CN109948098A (en) * | 2019-02-21 | 2019-06-28 | 网宿科技股份有限公司 | Data filtering method, cache information recording method and device |
| CN110213042A (en) * | 2019-05-09 | 2019-09-06 | 电子科技大学 | A kind of cloud data duplicate removal method based on no certification agency re-encryption |
| CN110717197A (en) * | 2019-10-14 | 2020-01-21 | 重庆邮电大学 | A method for sharing credit information data based on blockchain |
Non-Patent Citations (3)
| Title |
|---|
| P2P网贷平台公司治理机制研究;赵成国等;《江苏科技信息》(第17期);全文 * |
| 一种面向深度数据包检测的索引拆分Bloom过滤器;黄昆;《信息科学》;全文 * |
| 面向NDN中名字查找的哈希布鲁姆过滤器;李玮等;《电子科技大学学报》(第05期);全文 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111611215A (en) | 2020-09-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11308497B2 (en) | Detecting fraud using machine-learning | |
| US20190222567A1 (en) | Identity Proofing and Portability on Blockchain | |
| US20180082368A1 (en) | System and method for detecting fraudulent account access and transfers | |
| US8311907B2 (en) | System and method for detecting fraudulent transactions | |
| CA2615683C (en) | Identification and risk evaluation | |
| US20230070833A1 (en) | Detecting fraud using machine-learning | |
| EP3987740B1 (en) | Systems and methods for authenticating an electronic transaction | |
| Mudiri | Fraud in mobile financial services | |
| CN105844526A (en) | Networked transaction risk identification method and networked transaction risk identification device based on computer system | |
| WO2010123623A2 (en) | System and method for developing a risk profile for an internet resource | |
| Dhok et al. | Credit card fraud detection using hidden Markov model | |
| Holt et al. | Data thieves in action: Examining the international market for stolen personal information | |
| US20240152997A1 (en) | Using email history to estimate creditworthiness for applicants having insufficient credit history | |
| Stabek et al. | The seven scam types: Mapping the terrain of cybercrime | |
| CN107798536A (en) | Credit line treating method and apparatus | |
| CN111611215B (en) | Block chain-based network credit risk data sharing method and system | |
| Tsuchiya et al. | Identifying risky vendors in cryptocurrency p2p marketplaces | |
| US20250156791A1 (en) | Service-Based Network Data Request Choreography for Program Qualification Analysis | |
| Ordekian et al. | A sinister fattening: Dissecting the tales of pig butchering and other cryptocurrency scams | |
| CN112702410B (en) | Evaluation system, method and related equipment based on blockchain network | |
| Chen et al. | Online deception investigation: Content analysis and cross-cultural comparison | |
| CN118941288A (en) | Virtual account transaction verification and recording system based on blockchain | |
| WO2024049903A2 (en) | Decentralized risk assessment framework using distributed ledger technology | |
| CN113362156A (en) | Financial fraud detection and identification system based on Internet of things | |
| CN112017066A (en) | Information processing method, device, server and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |