Analysis method and system for suspicious transaction and suspicious account of blockchain cryptocurrency
An analysis method and blockchain technology, applied in the field of blockchain cryptocurrency suspicious transactions and suspicious account analysis, can solve problems such as lack of technology and policies
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] Example 1: A is an account that requires transaction privacy analysis. Through calculation, it is found that there is an intersection between the transaction payers of accounts B and C and account A (set the transaction payer set of account A as SA, the transaction payer set of account B as SB, and the transaction payer set of account C as SC ), namely SA∩SB≠Φ, SA∩SC≠Φ, SB∩SC≠Φ. It means that accounts A, B, and C may belong to the same user.
Embodiment 2
[0072] Example 2: If there is a certain transaction in accounts A, B, and C or there is a certain transaction in two of them, the payee of the transaction is the same, and the difference in transaction time is relatively short, then it is possible to judge the three accounts belong to the same user.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


