Global Commercial Business
GCB Docs
GCB Docs
  • GCB Ecosystem
    • GCB Exchange
  • Documentation
    • GCB CryptoCurrency Exchange
      • Introduction
      • Deposit Fiat/Crypto
      • Trade Crypto
      • Trader experience UI
      • Reward (Coming Soon)
      • KYC
      • Platform fee
      • Customer Support
      • Report an Issue
    • Business Guide
      • Listing
      • Ambassador
      • GCB Broker
      • Referrals
      • Agent
    • User Guide
      • Boarding
      • Reset Password
      • How To KYC
      • How to set 2FA
      • Copy Trade
      • How To Leverage Trade
  • GCB Token
    • GCB Contract
    • Token Allocation
    • Vesting Period
    • Vault Burning Mechanism
  • White Paper V2.0
    • Abstract
    • Introduction
    • GCB Exchange
    • GCB Token & Allocation
    • GCB Investment & Services
    • Technical Architecture
    • Security Protocols
    • Regulatory Strategies
    • Equations for Key Processes
    • Roadmap
    • Team
    • Mission & Vision
    • Disclaimer
  • LitePaper & Visual Concept
    • GCB LightPaper
  • Roadmap
  • Marketing Kit
  • Services & Product
    • GCB Token
    • BTC Investment Boxes
      • BTC Bitcoin Wallet
    • GTaxi (Coming soon)
    • GCB Social Wallet
    • Gulf Energy Drink
    • GCB+
    • GCB Academy
  • Team & Advisory
  • Our Partners
  • Stay Connected
  • Appendix
  • توثيق
    • دليل الأعمال
      • الإدراج
      • برنامج السفراء
      • الوسطاء
      • الإحالات
      • الوكلاء
    • دليل المستخدم
      • التسجيل
      • إعادة تعيين كلمة المرور
      • كيفية إتمام عملية "اعرف عميلك" (KYC)كيفية إتمام عملية "اعرف عميلك" (KYC)
      • كيفية إعداد المصادقة الثنائية 2FA :
      • نسخ التداول
Powered by GitBook
On this page
  • KYC (Know Your Customer) Risk Scoring:
  • Authentication: Multi-Factor Authentication (MFA):
  • Encryption: Symmetric Encryption:
  • Transaction Processing Time (TP):
  • Hash Function for Block Generation:
  • Throughput of the System (Transactions Per Second - TPS):
Edit on GitHub
  1. White Paper V2.0

Equations for Key Processes

Here are key equations that explain the underlying processes of KYC, authentication, encryption, risk management, and transaction throughput.

KYC (Know Your Customer) Risk Scoring:

The risk score RKYCR_{\text{KYC}}RKYC​ is a weighted sum of risk factors:

RKYC=w1⋅Rlocation+w2⋅Rtransaction_history+w3⋅Raccount_activity+…R_{\text{KYC}} = w_1 \cdot R_{\text{location}} + w_2 \cdot R_{\text{transaction\_history}} + w_3 \cdot R_{\text{account\_activity}} + \dotsRKYC​=w1​⋅Rlocation​+w2​⋅Rtransaction_history​+w3​⋅Raccount_activity​+…

Where:

  • w1,w2,w3w_1, w_2, w_3 w1​,w2​,w3​ are the weights for each factor.

  • Rlocation,Rtransaction_history,Raccount_activityR_{\text{location}}, R_{\text{transaction\_history}}, R_{\text{account\_activity}}Rlocation​,Rtransaction_history​,Raccount_activity​ re the risk scores for each category.

Authentication: Multi-Factor Authentication (MFA):

The probability PauthP_{\text{auth}}Pauth​ of successful authentication:

Pauth=Ppassword×PMFA_token×PbiometricP_{\text{auth}} = P_{\text{password}} \times P_{\text{MFA\_token}} \times P_{\text{biometric}}Pauth​=Ppassword​×PMFA_token​×Pbiometric​

Where:

  • PpasswordP_{\text{password}}Ppassword​ is the probability of correct password entry.

  • PMFA_tokenP_{\text{MFA\_token}}PMFA_token​ is the probability of valid MFA token entry.

  • Pbiometric P_{\text{biometric}}Pbiometric​ is the probability of successful biometric verification.

Encryption: Symmetric Encryption:

Encryption and decryption processes:

C=E(K,P)C = E(K, P)C=E(K,P)
P=D(K,C)P = D(K, C)P=D(K,C)

Where:

  • E is the encryption algorithm, D is the decryption algorithm.

  • K is the symmetric key, P is the plaintext, and C is the ciphertext.

Transaction Processing Time (TP):

The time Tprocessing T_{\text{processing}}Tprocessing​ to process a transaction:

Tprocessing=Tvalidation+TconfirmationT_{\text{processing}} = T_{\text{validation}} + T_{\text{confirmation}}Tprocessing​=Tvalidation​+Tconfirmation​

Where:

  • Tvalidation T_{\text{validation}}Tvalidation​ is the time to validate the transaction.

  • Tconfirmation T_{\text{confirmation}}Tconfirmation​ is the time for block confirmation.

Risk Management in Trading:

The expected value E of a trade:

E=Pgain⋅Vgain−Ploss⋅VlossE = P_{\text{gain}} \cdot V_{\text{gain}} - P_{\text{loss}} \cdot V_{\text{loss}}E=Pgain​⋅Vgain​−Ploss​⋅Vloss​

Where:

  • PgainP_{\text{gain}}Pgain​ is the probability of gain, Vgain V_{\text{gain}}Vgain​ is the value of the gain.

  • PlossP_{\text{loss}}Ploss​ is the probability of loss, Vloss V_{\text{loss}}Vloss​ is the value of the loss.

Hash Function for Block Generation:

The hash of a block HblockH_{\text{block}}Hblock​ :

Hblock=H(Dblock+N)H_{\text{block}} = H(D_{\text{block}} + N)Hblock​=H(Dblock​+N)

Where:

  • H is the hash function (e.g., SHA-256),

  • Dblock D_{\text{block}}Dblock​ is the block data,

  • N is the nonce value.

Throughput of the System (Transactions Per Second - TPS):

System throughput TPS :

TPS=NtransactionsTtime TPS = \frac{N_{\text{transactions}}}{T_{\text{time}}} TPS=Ttime​Ntransactions​​

Where:

  • N_{\text{transactions}} \ is the number of transactions,

  • T_{\text{time}} \ is the time taken to process them.

This document represents a comprehensive guide on how GCB implements its technical architecture, security protocols, and regulatory strategies, including critical equations to explain the system’s key processes.

PreviousRegulatory StrategiesNextRoadmap

Last updated 7 months ago