CPC G06Q 20/4016 (2013.01) [G06Q 20/10 (2013.01); G06Q 20/38215 (2013.01); G06Q 20/3825 (2013.01); G06Q 20/3827 (2013.01); G06Q 20/4014 (2013.01)] | 20 Claims |
1. A computer-implemented method, comprising:
receiving, by a trusted execution environment (TEE), a first sharing request from a first institution, wherein the first sharing request comprises a user identifier of a first user and first anti-money laundering (AML) risk information of the first user, and wherein the user identifier of the first user comprises a first digest value obtained through performing a hash calculation on one or more pieces of information of the first user;
receiving, by the TEE, a second sharing request from a second institution, wherein the second sharing request comprises a user identifier of a second user and second AML risk information of the second user, and wherein the user identifier of the second user comprises a second digest value obtained through performing the hash calculation on one or more pieces of information of the second user, the second institution being different from the first institution;
determining, by the TEE, that the first sharing request comprises at least one first risk label and that the second sharing request comprises at least one second risk label, each of the at least one first risk label and the at least one second risk label comprising at least one of a corresponding suspicious transaction report (STR) crime label or a corresponding money-laundering risk level label, the at least one first risk label being labeled by the first institution to the first user based on at least one of basic data of the first user or historical transactions of the first user, the at least one second risk label being labeled by the second institution to the second user based on at least one of basic data of the second user or historical transactions of the second user;
determining, by the TEE, that the first sharing request comprises the first AML risk information and the second sharing request comprises the second AML risk information based on the at least one first risk label and the at least one second risk label, the first AML risk information corresponding to the user identifier of the first user and comprising information associated with the at least one first risk label, the second AML risk information corresponding to the user identifier of the second user and comprising information associated with the at least one second risk label;
in response to determining that the first sharing request comprises the first AML, risk information and the second sharing request comprises the second AML risk information, determining, by the TEE, whether the user identifier of the first user matches the user identifier of the second user based on the first digest value and the second digest value;
in response to that the user identifier of the first user matches the user identifier of the second user, combining, by the TEE in plaintext form, the first AML risk information and the second AML risk information for the user identifier, as a combined first AML risk information and second AML risk information;
sending, by the TEE, a combination result that comprises the combined first AML risk information and second AML risk information to each of the first institution and the second institution by using an oracle mechanism; and
sending, by the TEE, a proof of the combination result to a blockchain network, wherein the proof comprises a verifiable claim comprising a signature of the TEE and a third digest value obtained through performing a hash calculation on the combination result.
|