Unlock instant, AI-driven research and patent intelligence for your innovation.

Analysis method and system for suspicious transaction and suspicious account of blockchain cryptocurrency

An analysis method and blockchain technology, applied in the field of blockchain cryptocurrency suspicious transactions and suspicious account analysis, can solve problems such as lack of technology and policies

Active Publication Date: 2021-02-02
CHINA UNIV OF GEOSCIENCES (WUHAN)
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, at present, my country has implemented the policy of network real-name system, which contradicts the feature of anonymous accounts in the blockchain
How to balance the contradiction between my country's policies and blockchain privacy protection, there is still a lack of relevant technologies and policies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Analysis method and system for suspicious transaction and suspicious account of blockchain cryptocurrency
  • Analysis method and system for suspicious transaction and suspicious account of blockchain cryptocurrency
  • Analysis method and system for suspicious transaction and suspicious account of blockchain cryptocurrency

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] Example 1: A is an account that requires transaction privacy analysis. Through calculation, it is found that there is an intersection between the transaction payers of accounts B and C and account A (set the transaction payer set of account A as SA, the transaction payer set of account B as SB, and the transaction payer set of account C as SC ), namely SA∩SB≠Φ, SA∩SC≠Φ, SB∩SC≠Φ. It means that accounts A, B, and C may belong to the same user.

Embodiment 2

[0072] Example 2: If there is a certain transaction in accounts A, B, and C or there is a certain transaction in two of them, the payee of the transaction is the same, and the difference in transaction time is relatively short, then it is possible to judge the three accounts belong to the same user.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for analyzing suspicious transactions and suspicious account of block chain cipher currency includes: downloading block chain public book data, selecting a potentially illegal account A, getting the account paid by A, looking for all payment accounts for each collection account R [i], and finding all the collection accounts R [j] [1] R [i] to R [j] [k] R [i] of each payment account S [j] R [i], determining whether or not a collection account of an account S [j] R [i] is equal to R [i], if yes, recording S [j] R [i] and establishing a set of possible relational accounts P [1] to P [L], adopting a and b, making P [a], P [b] traverse the possible relational account set, judging whether P [a] and P [b] have the same collection account, judging whether Total is the same / Total is greater than the preset value, and obtaining the final result. At the premise of not changing the anonymity of the block chain pair accounts, the invention analyzes and obtains the accounts whichmay belong to the same user, and has high efficiency and good accuracy.

Description

technical field [0001] The present invention relates to the technical field of block chain, and more specifically, relates to a method and system for analyzing suspicious transaction and suspicious account of block chain cryptocurrency. Background technique [0002] In recent years, the world has set off an upsurge of blockchain research, and many developed countries have begun to accept bitcoin payments. Blockchain has the advantages of decentralization, anonymity, openness, autonomy, and information cannot be tampered with. But at the same time, the development of blockchain in our country still faces some problems. First of all, the current blockchain is in its infancy and development stage, and my country's management mechanism for the blockchain is not perfect enough, and the anonymity of the blockchain may be exploited for money laundering. Money laundering crime has been a research problem in the financial field for many years, and this problem still exists and has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/04
CPCG06Q40/04
Inventor 任伟郭瑾仪
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)