Equations for Key Processes

Here are key equations that explain the underlying processes of KYC, authentication, encryption, risk management, and transaction throughput.

KYC (Know Your Customer) Risk Scoring:

The risk score RKYCR_{\text{KYC}} is a weighted sum of risk factors:

RKYC=w1Rlocation+w2Rtransaction_history+w3Raccount_activity+R_{\text{KYC}} = w_1 \cdot R_{\text{location}} + w_2 \cdot R_{\text{transaction\_history}} + w_3 \cdot R_{\text{account\_activity}} + \dots

Where:

  • w1,w2,w3w_1, w_2, w_3 are the weights for each factor.

  • Rlocation,Rtransaction_history,Raccount_activityR_{\text{location}}, R_{\text{transaction\_history}}, R_{\text{account\_activity}} re the risk scores for each category.

Authentication: Multi-Factor Authentication (MFA):

The probability PauthP_{\text{auth}} of successful authentication:

Pauth=Ppassword×PMFA_token×PbiometricP_{\text{auth}} = P_{\text{password}} \times P_{\text{MFA\_token}} \times P_{\text{biometric}}

Where:

  • PpasswordP_{\text{password}} is the probability of correct password entry.

  • PMFA_tokenP_{\text{MFA\_token}} is the probability of valid MFA token entry.

  • Pbiometric P_{\text{biometric}} is the probability of successful biometric verification.

Encryption: Symmetric Encryption:

Encryption and decryption processes:

C=E(K,P)C = E(K, P)
P=D(K,C)P = D(K, C)

Where:

  • E is the encryption algorithm, D is the decryption algorithm.

  • K is the symmetric key, P is the plaintext, and C is the ciphertext.

Transaction Processing Time (TP):

The time Tprocessing T_{\text{processing}} to process a transaction:

Tprocessing=Tvalidation+TconfirmationT_{\text{processing}} = T_{\text{validation}} + T_{\text{confirmation}}

Where:

  • Tvalidation T_{\text{validation}} is the time to validate the transaction.

  • Tconfirmation T_{\text{confirmation}} is the time for block confirmation.

Risk Management in Trading:

The expected value E of a trade:

E=PgainVgainPlossVlossE = P_{\text{gain}} \cdot V_{\text{gain}} - P_{\text{loss}} \cdot V_{\text{loss}}

Where:

  • PgainP_{\text{gain}} is the probability of gain, Vgain V_{\text{gain}} is the value of the gain.

  • PlossP_{\text{loss}} is the probability of loss, Vloss V_{\text{loss}} is the value of the loss.

Hash Function for Block Generation:

The hash of a block HblockH_{\text{block}} :

Hblock=H(Dblock+N)H_{\text{block}} = H(D_{\text{block}} + N)

Where:

  • H is the hash function (e.g., SHA-256),

  • Dblock D_{\text{block}} is the block data,

  • N is the nonce value.

Throughput of the System (Transactions Per Second - TPS):

System throughput TPS :

TPS=NtransactionsTtime TPS = \frac{N_{\text{transactions}}}{T_{\text{time}}}

Where:

  • N_{\text{transactions}} \ is the number of transactions,

  • T_{\text{time}} \ is the time taken to process them.

This document represents a comprehensive guide on how GCB implements its technical architecture, security protocols, and regulatory strategies, including critical equations to explain the system’s key processes.

Last updated