Block chain-based financial strategy selection and intelligent transaction method and system
A blockchain and financial technology, applied in the field of network security, can solve problems such as low efficiency of network transactions, and achieve the effect of improving diversity and increasing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] This embodiment provides a blockchain-based financial strategy selection and intelligent transaction method, such as figure 1 shown, including steps:
[0033] S11: Establish a topology map of the blockchain;
[0034] S12: The nodes that form the network topology map through the initiator and the people trusted by the initiator;
[0035] S13: Conduct transactions between nodes through the consensus mechanism;
[0036] S14: Confirm the transaction data of the transaction;
[0037] S15: Encrypt the transaction data to generate encrypted data;
[0038] S16: Input the transaction data within the preset range into the learning algorithm through the intelligent search of the hash value to improve the financial strategy.
[0039] This embodiment adopts "self-organized trusted blockchain" to solve financial strategy selection and improve intelligent transactions, including intelligent search, intelligent judgment, consensus intelligence, self-organized intelligence and enhan...
Embodiment 2
[0061] This embodiment provides a blockchain-based financial strategy selection and intelligent transaction system, such as figure 2 shown, including:
[0062] Build module 21, be used for setting up the topological graph of block chain;
[0063] Ad hoc module 22, used to form the nodes of the network topology map through the initiator and the person trusted by the initiator;
[0064] Consensus module 23, used to conduct transactions between nodes through a consensus mechanism;
[0065] A confirmation module 24, configured to confirm the transaction data of the transaction;
[0066] An encryption module 25, configured to encrypt transaction data to generate encrypted data;
[0067] The improvement module 26 is used for inputting the transaction data within the preset range into the learning algorithm through the intelligent search of the hash value to improve the financial strategy.
[0068] This embodiment adopts "self-organized trusted blockchain" to solve financial str...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

