CN106487801A - Information Authentication method and device based on block chain - Google Patents
Information Authentication method and device based on block chain Download PDFInfo
- Publication number
- CN106487801A CN106487801A CN201610971223.1A CN201610971223A CN106487801A CN 106487801 A CN106487801 A CN 106487801A CN 201610971223 A CN201610971223 A CN 201610971223A CN 106487801 A CN106487801 A CN 106487801A
- Authority
- CN
- China
- Prior art keywords
- information
- signature
- checking
- block chain
- invalid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Abstract
The embodiment of the present application discloses a kind of Information Authentication method and device based on block chain, and it belongs to identity identification technical field.The method includes:Corresponding effective signing messages is generated according to information to be verified, effective signing messages is stored in block chain;Corresponding invalid signature information is generated according to information to be verified, by invalid signature information Store in block chain;Receive the checking request message that checking node generates according to effective signing messages of storage in block chain or invalid signature information;Checking request message is verified, according to the result to checking node return information efficient message or information invalid message.As can be seen here, the Information Authentication mode in the embodiment of the present application can take into account safety and the privacy of information.
Description
Technical field
The invention relates to identity identification technical field, more particularly, to the Information Authentication method based on block chain and dress
Put.
Background technology
With the arrival of information age, increasing information needs to be propagated by the Internet.In order to interconnection
The bulk information propagated in net is verified, digital signature technology just arises at the historic moment.Digital signature is also referred to as digital signature, electricity
Sub- stamped signature or electronic signature, it is one of core technology of information security, is mainly used in substituting traditional life in network activity
In handwritten signature and traditional seal.Information Authentication function can preferably be realized using digital signature technology.But, due to number
Word signature is easy to be accurately reproduced over time, therefore, when substituting the written signature of private data with digital signature, the four of signed copy
Meaning propagates the leakage easilying lead to private data, and data safety is threatened.And, digital signature is once quilt malice is pseudo-
Make, then signer can be brought with immeasurable loss.
In order to improve the safety of digital signature further, propose one kind in prior art and record letter using block chain
Breath and its mode of signature.In this kind of mode, after information publisher is digitally signed to information, information and its signature are deposited
Store up in block chain, thus being difficult to distort using block chain, safe advantage lifts the safety of information Store.
But, inventor finds during realizing the present invention, and mode of the prior art at least has following problems:
Come into the open because block chain has, therefore, all network nodes accessing block chain can have access to information and issue
Information and its signature that person issues, therefore, it is impossible to ensure the safety of private data, for example, once being disclosed in block chain
Information and its signature are maliciously forged, then can bring massive losses to information publisher.As can be seen here, needing one kind at present badly can
Take into account the safety of information and the Information Authentication mode of privacy.
Content of the invention
In view of the above problems it is proposed that the embodiment of the present application so as to provide a kind of solve the above problems based on block chain
Information Authentication method and device.
A kind of one side according to the embodiment of the present application, there is provided Information Authentication method based on block chain, including:Root
Generate corresponding effective signing messages according to information to be verified, effective signing messages is stored in block chain;According to letter to be verified
Breath generates corresponding invalid signature information, by invalid signature information Store in block chain;Receive checking node according to block chain
Effective signing messages of middle storage or the checking request message of invalid signature information generation;Checking request message is verified,
According to the result to checking node return information efficient message or information invalid message.
A kind of other side according to the embodiment of the present application, there is provided Information Authentication device based on block chain, including:
Effectively signature blocks, for generating corresponding effective signing messages according to information to be verified, effective signing messages are stored to area
In block chain;Invalid signature module, for generating corresponding invalid signature information according to information to be verified, invalid signature information is deposited
Store up in block chain;Message reception module, for receiving checking node according to effective signing messages of storage in block chain or nothing
The checking request message that effect signing messages generates;Information authentication module, for verifying to checking request message, according to checking
Result is to checking node return information efficient message or information invalid message.
The embodiment of the present application provide a kind of based in the Information Authentication method and device of block chain, can be directed to be tested
Card information generates effective signing messages and invalid signature information respectively, thus effective signing messages and invalid signature information are mixed
Miscellaneous store in block chain.Thus one, on the one hand, the purpose of fascination user can be reached, thus the private of effective protection data
Close property;On the other hand, the information to be verified in the embodiment of the present application is stored by block chain, being capable of effectively utilizes block chain
Be difficult to distort, the distinguishable conscientious puppet of authentication that the information in safe advantage, and, block chain needs through signer,
Thus improving safety during Information Authentication further.As can be seen here, the Information Authentication mode in the embodiment of the present application can
Take into account safety and the privacy of information.
Described above is only the general introduction of the embodiment of the present application technical scheme, in order to better understand the embodiment of the present application
Technological means, and can be practiced according to the content of description, and in order to allow above and other mesh of the embodiment of the present application
, feature and advantage can become apparent, below especially exemplified by the specific embodiment of the application.
Brief description
The picture that one or more embodiments are passed through in corresponding accompanying drawing is illustrative, these exemplary theorys
Bright do not constitute the restriction to embodiment, the element in accompanying drawing with same reference numbers label is expressed as similar element, removes
Non- have special statement, and composition does not limit the figure in accompanying drawing.
Fig. 1 is a kind of flow chart of Information Authentication method based on block chain that the embodiment of the present application one provides;
Fig. 2 is a kind of flow chart of Information Authentication method based on block chain that the embodiment of the present application two provides;
Fig. 3 is a kind of structural representation of Information Authentication device based on block chain that the embodiment of the present application three provides;
Fig. 4 is a kind of structural representation of Information Authentication device based on block chain that the embodiment of the present application four provides.
Specific embodiment
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to be able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Embodiment one
Fig. 1 is a kind of flow chart of Information Authentication method based on block chain that the embodiment of the present application one provides.As Fig. 1 institute
Show, the method includes:
Step S110:Corresponding effective signing messages is generated according to information to be verified, effective signing messages is stored to area
In block chain.
Wherein, can flexibly be set according to the mode that information to be verified generates effective signing messages, for example, art technology
Personnel can flexibly be signed to really information to be verified using various Digital Signature Algorithms, thus generating and really treating
The corresponding effective signing messages of checking information.Specifically, can be signed using undeniable signature algorithm.Due to could not
Recognize signature algorithm and must can verify that the true and false, therefore, it is possible to be obviously improved Information Security by signer participant.
In addition, storing in various manners it is also possible to flexibly adopt when effective signing messages is stored block chain, for example, can
To be responsible for the packing storage of effective signing messages in block chain by the packing node in block chain;Can also be by effective A.L.S.
Breath is broadcast in block chain network, is stored by broadcast mode.
Step S120:Corresponding invalid signature information is generated according to information to be verified, by invalid signature information Store to area
In block chain.
Wherein, can also flexibly be set according to the mode that information to be verified generates invalid signature information, for example, a kind of real
In existing mode, it is possible to use random algorithm generates a random number, and using this random number as invalid signature information.And for example, exist
In another kind of implementation, using various Digital Signature Algorithms, the information to be verified forged can also be signed, thus raw
The information to be verified corresponding invalid signature information becoming and forging.In addition, by invalid signature information Store to block chain when, also may be used
Stored in various manners with flexibly adopting, for example, it is possible to be responsible for depositing invalid signature information package by the packing node in block chain
Store up in block chain;Effective signing messages can also be broadcast in block chain network, be stored by broadcast mode.
In a word, do not limit the concrete generating mode of effective signing messages and invalid signature information in the present embodiment, as long as
It is capable of true and false information doping storage, thus confusing the purpose of attacker.
Step S130:Receive checking node to be generated according to effective signing messages of storage in block chain or invalid signature information
Checking request message.
Wherein, checking node can be the arbitrary network node being linked in block chain, for example, it may be complete node,
Can also be incomplete node, in a word, as long as the network node that can get the storage information in block chain all can be made
For verifying node.
After verifying that node gets the effective signing messages storing in block chain or invalid signature information, signed according to effective
Name information or invalid signature information generate checking request message, and this checking request message can be generated by various modes, as long as
It is capable of the purpose of the checking information true and false.For example, it is possible to by default algorithm to effective signing messages or invalid label
Name information enters row operation, and operation result is included in above-mentioned checking request message.
Step S140:Checking request message is verified, is effectively disappeared to checking node return information according to the result
Breath or information invalid message.
Specifically, specific implementation checking request message verified flexibly can be set by those skilled in the art
Fixed, for example, when comprising by default algorithm, effective signing messages or invalid signature information to be transported in checking request message
During the operation result obtaining after calculation, inverse operation can be carried out to this operation result, corresponding original to determine checking request message
Signing messages, thus verifying that original signature information is effective signing messages or invalid signature information, and then returns corresponding message.
Wherein, directly the result can be comprised in information efficient message or information invalid message, so that checking node energy
Enough directly, rapidly according to information efficient message or information invalid message determine the information true and false;Can also only comprise using about
Determine algorithm generation feedback result so that checking node by after this feedback result is processed according to result confirmation letter
The breath true and false, thus lift the safety of proof procedure further.
As can be seen here, the embodiment of the present application provide a kind of based in the Information Authentication method of block chain, can be directed to
Information to be verified generates effective signing messages and invalid signature information respectively, thus effective signing messages and invalid signature are believed
Breath doping storage is in block chain.Thus one, on the one hand, the purpose of fascination user can be reached, thus effective protection data
Privacy;On the other hand, the information to be verified in the embodiment of the present application is stored by block chain, being capable of effectively utilizes area
Block chain is difficult to distort, the information in safe advantage, and, block chain needs the authentication through signer distinguishable conscientious
Puppet, thus improve safety during Information Authentication further.As can be seen here, the Information Authentication mode energy in the embodiment of the present application
Enough take into account safety and the privacy of information.
Embodiment two
Fig. 2 is a kind of flow chart of Information Authentication method based on block chain that the embodiment of the present application two provides.As Fig. 2 institute
Show, the method includes:
Step S210:Signature node generates corresponding effective signing messages according to information to be verified, by effective signing messages
Store in block chain.
Wherein, signature node is one of block chain network node, usually information publisher.In the present embodiment,
When signature node generates effective signing messages according to information to be verified, checking information is treated by undeniable signature algorithm and carries out
Signature, correspondingly, comprise in effective signing messages the information content of information to be verified, the undeniable signature of information to be verified,
And public signature key.Certainly, in addition to individually adopting undeniable signature algorithm, can also using undeniable signature algorithm and its
The mode that his signature algorithm (such as Proxy Signature) combines is realized, thus better assuring that the safety of signing messages.
When effective signing messages is stored block chain, firstly generate the transaction in block chain, then will effectively sign
Name information writes (for example, it is possible to writing the OP_RETURN part of this transaction) in this transaction, finally broadcasts this transaction
To in block chain, so that each network node in block chain all can get the information comprising in this transaction.
Step S220:Signature node generates corresponding invalid signature information according to information to be verified, by invalid signature information
Store in block chain.
In order to prevent the leakage of real information, in the present embodiment, signature node generates according to information to be verified further
Corresponding invalid signature information, to reach the purpose of fascination attacker.When implementing, can comprise in invalid signature information to treat
The information content of checking information, the pseudo- signature of information to be verified and public signature key.Wherein, comprise in invalid signature information
The information content of information to be verified can be analog information content corresponding with real information content, that is,:Information content itself is simultaneously
Non-genuine is effective, but closely similar with real information content.In addition, the pseudo- signature comprising in invalid signature information can lead to
Cross all kinds of modes to realize, as long as can be different from really signing, for example, it is possible to realize by stochastic signature, that is,:By random
Algorithm generates a random number, and this random number is signed as the puppet of information to be verified.
In addition, by invalid signature information Store to block chain when, firstly generate another transaction in block chain, then will
Invalid signature information writes (for example, it is possible to writing the OP_RETURN part of this transaction) in this transaction, finally hands over this pen
Easily it is broadcast in block chain, so that each network node in block chain all can get the information comprising in this transaction.
Step S230:Checking node obtains effective signing messages of storage or invalid signature information in block chain.
Wherein, checking node can be the arbitrary network node being linked in block chain, for example, it may be complete node,
It can also be incomplete node.Checking node can get effective signature by way of obtaining the transaction record in block chain
Information or invalid signature information.For the ease of description, hereafter effective signing messages and invalid signature information are referred to as to be verified
Signing messages.
Step S240:Checking node generates and sends checking request message according to signing messages to be verified.
Specifically, because whether effectively checking node itself cannot judge the signing messages to be verified getting, therefore, need
To be confirmed by way of interacting with signature node.In the present embodiment, checking request message is generated by following manner:
First, checking node analyze signing messages to be verified information content, obtain wherein comprise the information content of information to be verified,
The signature (this signature had both been probably true signature is also likely to be pseudo- signature) of information to be verified and public signature key.Then, by with
Machine algorithm generates and preserves a random number, using the information content of information to be verified, the signature of information to be verified, public signature key
And random number carries out default calculating as parameter, using result of calculation as checking information data, checking information packet is contained
It is sent to signature node in checking request message.
Step S250:Signature node receives the checking request message that checking node sends, and wraps according in checking request message
The identity information of the checking node containing judges to verify whether node is legitimate node.
Alternatively, in order to prevent the unrelated in a large number malicious behaviors of nodes in block chain from sending checking request message, to expend signature
The system resource of node, and prevent the leakage of signing messages, in the present embodiment, signature node pre-set and store legal
The identity information of node, legitimate node can be to there is business contact or other network nodes of associating with signature node.Accordingly
Ground, in previous step, comprises in the checking request message that checking node sends to verify the identity information of node, at this further
In step, according to identity information, signature node judges whether the network node sending checking request message is legitimate node first,
If judged result is no, execution step S260;If the determination result is YES, then execution step S270.
Step S260:Return authentication failed message to checking node.
Specifically, when verifying node not legitimate node, signature node is refused as this checking node verification, thus to it
Return authentication failed message, the method terminates.
Step S270:Signature node is verified to checking request message, and is returned to checking node according to the result
Information efficient message or information invalid message.
Specifically, signature node obtains the checking information data comprising in above-mentioned checking request message, is believed according to this checking
The breath corresponding the result of data genaration.For example, signature node obtains the data content comprising in checking information data (such as first
The information content of information to be verified mentioned above, the signature of information to be verified, public signature key), then, by this data content with
And the information such as information content, signature and public key carries out being verified result after default calculating as parameter.Correspondingly, return
This result is comprised, so that checking node is according to this result and above-mentioned in information efficient message or information invalid message
The random number preserving in step S240 judges whether information is effective.Accordingly it is also possible to disappear invalid to information efficient message and information
Breath is referred to as the result message.Specifically, checking node can be right using information content, signature and random number as parameter
The result judges the true and false of information to be verified according to result of calculation after carrying out default calculating.Wherein, checking node is judged
When the random number that adopted identical with the random number preserving in step S240, if the random number preserving in step S240 is and information
The corresponding random number of effective information, then the random number that checking node is adopted when being judged is also corresponding with information effective information
Random number;If the random number preserving in step S240 is random number corresponding with information invalid information, checking node is carried out
The random number being adopted during judgement is also random number corresponding with information invalid information.
The tool of the undeniable signature algorithm that in the present embodiment adopt in order to deepen the understanding to the present embodiment, is given below
Body signature and verification mode:
1. generation system parameter
If p is a Big prime, and p=2q+1, wherein q are also prime number, and the discrete logarithm in Zp* is difficult to resolve.
Take the element g that the rank in Zp* is q at random, thus the q rank multiplicative subgroup G (i.e. g is the generation unit of G) of construction Zp*,
{ 1,2 ..., q-1 } randomly chooses as SK,
Make PK=gSKMod p,
By PK and p, g is open together as public key, and SK is as the privacy key of signature user.
2. signature process
Information publisher will sign to message m ∈ G, can use its key SK to calculate s=(m)SKMod p, using s as to m's
Signature issues other side together with m.But this s in fact cannot be confirmed by other people.
3. indentification protocol:
After recipient receives s and m, select random number k 1, k2 ∈ Zp*, and calculate c=sk1PKk2Mod p, gives label c
Name person.
Signer calculates d=c after receiving c(modq)/SKModp, and d is given the recipient of signature.
Recipient calculates t=mk1gk2Can determine that s is a legitimate signature to m when modp, and if only if t=d.
In summary, one aspect of the present invention carrys out storage information using block chain, takes full advantage of the distributed of block chain, no
The characteristic easily distorted, on the other hand by way of undeniable signature and doping wrong data, makes the verifier of signature only have
Just can determine that whether information is true and whether signature is legal, otherwise cannot determine the true and false of information, effectively with signer interaction
Prevent the hidden danger forging a signature.In addition, the mode of doping wrong data makes in the case of not verifying, other users cannot
Know which bar information is correct, thus conceal real information.Therefore, in substantial amounts of information data set, by mixing
The method of miscellaneous wrong data can effectively disturb other people to know effective information, and using the mode of undeniable signature, signer exists
It is selectively other users signature verification, hereby it is ensured that unrelated person cannot know that real information and signature are on block chain
No effective.
Embodiment three
Fig. 3 is a kind of structural representation of Information Authentication device based on block chain that the embodiment of the present application three provides.As
Described in Fig. 3, this device includes:Effectively signature blocks 310, invalid signature module 320, message reception module 330 and information authentication
Module 340.
Effectively signature blocks 310, for generating corresponding effective signing messages according to information to be verified, by effective A.L.S.
Breath storage is in block chain.
Wherein, effective signature blocks 310 can flexibly set according to the mode that information to be verified generates effective signing messages,
For example, those skilled in the art flexibly can treat checking information using various Digital Signature Algorithms and be signed, thus generating
Effective signing messages corresponding with information to be verified.Specifically, can be each using Proxy Signature algorithm, undeniable signature algorithm etc.
Class signature algorithm is realized.
In addition, effective signature blocks 310 store during block chain effective signing messages it is also possible to flexibly adopt various sides
Formula stores, for example, it is possible to be responsible for the packing storage of effective signing messages in block chain by the packing node in block chain;Also may be used
To be broadcast to effective signing messages in block chain network, stored by broadcast mode.
Invalid signature module 320, for generating corresponding invalid signature information according to information to be verified, invalid signature is believed
Breath storage is in block chain.
Wherein, invalid signature module 320 can also flexibly set according to the mode that information to be verified generates invalid signature information
Fixed, for example, in one implementation, invalid signature module 320 can generate a random number using random algorithm, and should
Random number is as invalid signature information.In addition, invalid signature module 320 by invalid signature information Store to block chain when, also may be used
Stored in various manners with flexibly adopting, for example, it is possible to be responsible for depositing invalid signature information package by the packing node in block chain
Store up in block chain;Effective signing messages can also be broadcast in block chain network, be stored by broadcast mode.
Message reception module 330, for receiving effective signing messages or invalid according to storage in block chain for the checking node
The checking request message that signing messages generates.
Wherein, checking node can be the arbitrary network node being linked in block chain, for example, it may be complete node,
Can also be incomplete node, in a word, as long as the network node that can get the storage information in block chain all can be made
For verifying node.
After verifying that node gets the effective signing messages storing in block chain or invalid signature information, signed according to effective
Name information or invalid signature information generate checking request message, and this checking request message can be generated by various modes, as long as
It is capable of the purpose of the checking information true and false.For example, it is possible to by default algorithm to effective signing messages or invalid label
Name information enters row operation, and operation result is included in above-mentioned checking request message.
Information authentication module 340, for verifying to checking request message, returns to checking node according to the result
Information efficient message or information invalid message.
Specifically, specific implementation checking request message verified flexibly can be set by those skilled in the art
Fixed, for example, when comprising by default algorithm, effective signing messages or invalid signature information to be transported in checking request message
During the operation result obtaining after calculation, inverse operation can be carried out to this operation result, corresponding original to determine checking request message
Signing messages, thus verifying that original signature information is effective signing messages or invalid signature information, and then returns corresponding message.
Wherein, directly the result can be comprised in information efficient message or information invalid message, so that checking node energy
Enough directly, rapidly according to information efficient message or information invalid message determine the information true and false;Can also only comprise using about
Determine algorithm generation feedback result so that checking node by after this feedback result is processed according to result confirmation letter
The breath true and false, thus lift the safety of proof procedure further.
The concrete operating principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, no longer superfluous herein
State.
As can be seen here, the embodiment of the present application provide a kind of based in the Information Authentication device of block chain, can be directed to
Information to be verified generates effective signing messages and invalid signature information respectively, thus effective signing messages and invalid signature are believed
Breath doping storage is in block chain.Thus one, on the one hand, the purpose of fascination user can be reached, thus effective protection data
Privacy;On the other hand, the information to be verified in the embodiment of the present application is stored by block chain, being capable of effectively utilizes area
Block chain is difficult to distort, the information in safe advantage, and, block chain needs the authentication through signer distinguishable conscientious
Puppet, thus improve safety during Information Authentication further.As can be seen here, the Information Authentication device energy in the embodiment of the present application
Enough take into account safety and the privacy of information.
Example IV
Fig. 4 is a kind of structural representation of Information Authentication device based on block chain that the embodiment of the present application four provides.As
Shown in Fig. 4, this device includes:Effectively signature blocks 410, invalid signature module 420, message reception module 430 and information authentication
Module 440.Wherein, information authentication module 440 further includes:Judging submodule 441 and checking submodule 442.
Effectively signature blocks 410, for generating corresponding effective signing messages according to information to be verified, by effective A.L.S.
Breath storage is in block chain.
In the present embodiment, when effective signature blocks 410 generate effective signing messages according to information to be verified, by can not
Denial of signature algorithm is treated checking information and is signed, and correspondingly, comprises in the information of information to be verified in effective signing messages
Appearance, the undeniable signature of information to be verified and public signature key.Certainly, in addition to undeniable signature algorithm, can also adopt
Other signature algorithms such as Proxy Signature are realized, thus better assuring that the safety of signing messages.
When effectively effective signing messages is stored block chain by signature blocks 410, firstly generate a friendship in block chain
Easily, then effective signing messages is write (for example, it is possible to writing the OP_RETURN part of this transaction) in this transaction,
Afterwards this transaction is broadcast in block chain, each network node in block chain all can get in this transaction to comprise
Information.
Invalid signature module 420, for generating corresponding invalid signature information according to information to be verified, invalid signature is believed
Breath storage is in block chain.
In order to prevent the leakage of real information, in the present embodiment, invalid signature module 420 generates according to information to be verified
Corresponding invalid signature information, to reach the purpose of fascination attacker.When implementing, can comprise in invalid signature information to treat
The information content of checking information, the pseudo- signature of information to be verified and public signature key.Wherein, comprise in invalid signature information
The information content of information to be verified can be analog information content corresponding with real information content, that is,:Information content itself is simultaneously
Non-genuine is effective, but closely similar with real information content.In addition, the pseudo- signature comprising in invalid signature information can lead to
Cross all kinds of modes to realize, as long as can be different from really signing, for example, it is possible to realize by stochastic signature, that is,:By random
Algorithm generates a random number, and this random number is signed as the puppet of information to be verified.
In addition, invalid signature module 420 by invalid signature information Store to block chain when, firstly generate another in block chain
One transaction, then writes in this transaction invalid signature information (for example, it is possible to write the OP_RETURN portion of this transaction
Point), finally this transaction is broadcast in block chain, so that each network node in block chain all can get this transaction
In the information that comprises.
Message reception module 430, for receiving effective signing messages or invalid according to storage in block chain for the checking node
The checking request message that signing messages generates.
Wherein, checking node can be the arbitrary network node being linked in block chain, for example, it may be complete node,
It can also be incomplete node.Checking node can get effective signature by way of obtaining the transaction record in block chain
Information or invalid signature information.For the ease of description, hereafter effective signing messages and invalid signature information are referred to as to be verified
Signing messages.
Because whether effectively checking node itself cannot judge the signing messages to be verified getting, accordingly, it would be desirable to pass through
The mode being interacted with signature node is confirmed.In the present embodiment, checking request message is generated by following manner:First,
Checking node analyzes the information content of signing messages to be verified, obtains the information content of information to be verified, to be tested wherein comprising
The signature (this signature had both been probably true signature is also likely to be pseudo- signature) of card information and public signature key.Then, calculated by random
Method generates and preserves a random number, using the information content of information to be verified, the signature of information to be verified, public signature key and
Random number carries out default calculating as parameter, using result of calculation as checking information data, checking information data is included in and tests
It is sent to signature node in card request message.
Information authentication module 440, for verifying to checking request message, returns to checking node according to the result
Information efficient message or information invalid message.
Specifically, when verifying the identity information comprising checking node in the checking request message that node sends further,
Information authentication module 440 further includes:
Judging submodule 441, for judging to verify whether node is legitimate node according to the identity information of checking node.Its
In, in order to prevent the unrelated in a large number malicious behaviors of nodes in block chain from sending checking request message, to expend the system money of signature node
Source, and prevent the leakage of signing messages, in the present embodiment, judging submodule 441 pre-sets and stores legitimate node
Identity information, legitimate node can be to there is business contact or other network nodes of associating with signature node.Judging submodule
According to identity information, 441 can judge whether the network node sending checking request message is legitimate node.
Checking submodule 442, for when judged result is to be, verifying to checking request message, and according to checking
Result is to checking node return information efficient message or information invalid message;When judged result for no when, to checking node return
Authentication failed message.
Specifically, when verifying node not legitimate node, checking submodule 442 is refused as this checking node verification, from
And returning authentication failed message to it, the method terminates.
When verifying that node is legitimate node, checking submodule 442 obtains the checking comprising in above-mentioned checking request message
Information data, according to this corresponding the result of checking information data genaration.For example, checking submodule 442 obtains checking first
Data content (the information content of information to be verified, the signature of information to be verified, the label as mentioned above comprising in information data
Name public key), then, the information such as this data content and information content, signature and public key is carried out default calculating as parameter
After be verified result.Correspondingly, comprise this result, for testing in the information efficient message of return or information invalid message
According to the random number preserving in this result and message reception module 430, card node judges whether information is effective.Therefore,
Information efficient message and information invalid message can be referred to as the result message.Specifically, checking node can be by information
Content, signature and random number, as parameter, judge letter to be verified according to result of calculation after the result is carried out with default calculating
The true and false of breath.Wherein, the random number preserving in the random number that checking node is adopted when being judged and message reception module 430
Identical, if the random number preserving in message reception module 430 is random number corresponding with information effective information, checking node enters
The random number that row is adopted when judging is also random number corresponding with information effective information;If preserving in message reception module 430
Random number be random number corresponding with information invalid information, then the random number that checking node is adopted when being judged be also with
The corresponding random number of information invalid information.
The concrete operating principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, no longer superfluous herein
State.
In summary, one aspect of the present invention carrys out storage information using block chain, takes full advantage of the distributed of block chain, no
The characteristic easily distorted, on the other hand by way of undeniable signature and doping wrong data, makes the verifier of signature only have
Just can determine that whether information is true and whether signature is legal, otherwise cannot determine the true and false of information, effectively with signer interaction
Prevent the hidden danger forging a signature.In addition, the mode of doping wrong data makes in the case of not verifying, other users cannot
Know which bar information is correct, thus conceal real information.Therefore, in substantial amounts of information data set, by mixing
The method of miscellaneous wrong data can effectively disturb other people to know effective information, and using the mode of undeniable signature, signer exists
It is selectively other users signature verification, hereby it is ensured that unrelated person cannot know that real information and signature are on block chain
No effective.
Although additionally, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments
Including some features rather than further feature, but the combination of the feature of different embodiment means to be in the embodiment of the present application
Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection
One of arbitrarily can in any combination mode using.
The all parts embodiment of the embodiment of the present application can be realized with hardware, or with one or more processor
The software module of upper operation is realized, or is realized with combinations thereof.It will be understood by those of skill in the art that can be in practice
Middle realized according to some in the device of the embodiment of the present application using microprocessor or digital signal processor (DSP) or
All some or all functions of part.The embodiment of the present application is also implemented as executing method as described herein
Some or all equipment or program of device (for example, computer program and computer program).Such realization
The program of the embodiment of the present application can store on a computer-readable medium, or can have the shape of one or more signal
Formula.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or with any other shape
Formula provides.
It should be noted that above-described embodiment illustrates rather than to the embodiment of the present application carrying out to the embodiment of the present application
Limit, and those skilled in the art can design alternative embodiment without departing from the scope of the appended claims.
In the claims, any reference markss between bracket should not be configured to limitations on claims.Word " bag
Contain " do not exclude the presence of element not listed in the claims or step.Word "a" or "an" before element is not arranged
Remove and there are multiple such elements.The embodiment of the present application can by means of the hardware including some different elements and by means of
Properly programmed computer is realizing.If in the unit claim listing equipment for drying, several in these devices can
To be to be embodied by same hardware branch.The use of word first, second, and third does not indicate that any order.
These words can be construed to title.
The invention discloses:A1, a kind of Information Authentication method based on block chain, wherein, including:
Corresponding effective signing messages is generated according to information to be verified, described effective signing messages is stored block chain
In;
Corresponding invalid signature information is generated according to described information to be verified, by described invalid signature information Store to described
In block chain;
Receive checking node according to testing that effective signing messages of storage in described block chain or invalid signature information generate
Card request message;
Described checking request message is verified, according to the result to described checking node return information efficient message
Or information invalid message.
A2, the method according to A1, wherein, described checking request message includes:The identity letter of described checking node
Breath, then described described checking request message is verified, according to the result to described checking node return information effectively disappear
The step of breath or information invalid message specifically includes:
Judge whether described checking node is legitimate node according to the identity information of described checking node;
When judged result is to be, described checking request message is verified, and according to the result to described checking
Node return information efficient message or information invalid message.
A3, the method according to A2, wherein, when judged result for no when, to described checking node return authentication failed
Message.
A4, according to the arbitrary described method of A1-A3, wherein, described effective signing messages includes:Described information to be verified
Information content, the true signature of described information to be verified and public signature key;
Described invalid signature information includes:The information content of described information to be verified, the pseudo- signature of described information to be verified,
And public signature key.
A5, the method according to A4, wherein, described true signature includes undeniable signature, described pseudo- sign include with
Claim tag name.
A6, the method according to A4 or A5, wherein, comprise checking information data in described checking request message, and institute
State checking information data combining or described invalid signature information and random number by described effective signing messages and random number
Combination determines;
Then the described step that checking request message is verified specifically includes:Obtain in described checking request message and comprise
Checking information data, corresponding the result is generated according to described checking information data and described effective signing messages;
And, comprise described the result in described information efficient message or information invalid message, for described checking section
According to described the result and described random number, point judges whether information is effective.
A7, according to the arbitrary described method of A1-A6, wherein, described described effective signing messages is stored in block chain
Step specifically include:Described effective signing messages is write the first transaction record, and described first transaction record is broadcast to
In described block chain;
The described step by described invalid signature information Store in block chain specifically includes:By described invalid signature information
Write the second transaction record, and described second transaction record is broadcast in described block chain.
The invention also discloses:B8, a kind of Information Authentication device based on block chain, wherein, including:
Effectively signature blocks, for generating corresponding effective signing messages according to information to be verified, by described effective signature
Information Store is in block chain;
Invalid signature module, for corresponding invalid signature information is generated according to described information to be verified, will be described invalid
Signing messages stores in described block chain;
Message reception module, for receiving effective signing messages or invalid according to storage in described block chain for the checking node
The checking request message that signing messages generates;
Information authentication module, for verifying to described checking request message, according to the result to described checking section
Point return information efficient message or information invalid message.
B9, the device according to B8, wherein, described checking request message includes:The identity letter of described checking node
Breath, then described information authentication module specifically includes:
According to the identity information of described checking node, judging submodule, for judging whether described checking node is legal section
Point;
Checking submodule, for when judged result is to be, verifying to described checking request message, and according to checking
Result is to described checking node return information efficient message or information invalid message.
B10, the device according to B9, wherein, when the judged result of described judging submodule is no, described checking
Module returns authentication failed message to described checking node.
B11, according to the arbitrary described device of B8-B10, wherein, described effective signing messages includes:Described information to be verified
Information content, the true signature of described information to be verified and public signature key;
Described invalid signature information includes:The information content of described information to be verified, the pseudo- signature of described information to be verified,
And public signature key.
B12, the device according to B11, wherein, described true signature includes undeniable signature, and described pseudo- signature includes
Stochastic signature.
B13, the device according to B11 or B12, wherein, comprise checking information data in described checking request message, and
Described checking information data is combined or described invalid signature information and random number by described effective signing messages and random number
Combination determine;
Then described information authentication module specifically for:Obtain the checking information data comprising in described checking request message,
Corresponding the result is generated according to described checking information data and described effective signing messages;
And, comprise described the result in described information efficient message or information invalid message, for described checking section
According to described the result and described random number, point judges whether information is effective.
B14, according to the arbitrary described device of B8-B13, wherein, described effective signature blocks specifically for:Will be described effective
Signing messages writes the first transaction record, and described first transaction record is broadcast in described block chain;
Described invalid signature module specifically for:Described invalid signature information is write the second transaction record, and will be described
Second transaction record is broadcast in described block chain.
Claims (10)
1. a kind of Information Authentication method based on block chain is it is characterised in that include:
Corresponding effective signing messages is generated according to information to be verified, described effective signing messages is stored in block chain;
Corresponding invalid signature information is generated according to described information to be verified, by described invalid signature information Store to described block
In chain;
Receiving checking node please according to the checking that effective signing messages of storage in described block chain or invalid signature information generate
Seek message;
Described checking request message is verified, according to the result to described checking node return information efficient message or letter
Breath invalid message.
2. method according to claim 1 is it is characterised in that described checking request message includes:Described checking node
Identity information, then described described checking request message is verified, according to the result to described checking node return letter
The step of breath efficient message or information invalid message specifically includes:
Judge whether described checking node is legitimate node according to the identity information of described checking node;
When judged result is to be, described checking request message is verified, and according to the result to described checking node
Return information efficient message or information invalid message.
3. method according to claim 2 it is characterised in that when judged result for no when, to described checking node return
Authentication failed message.
4. according to the arbitrary described method of claim 1-3 it is characterised in that described effective signing messages includes:Described to be tested
The information content of card information, the true signature of described information to be verified and public signature key;
Described invalid signature information includes:The information content of described information to be verified, the pseudo- signature of described information to be verified and
Public signature key.
5. method according to claim 4 it is characterised in that described true signature includes undeniable signature, sign by described puppet
Name includes stochastic signature.
6. the method according to claim 4 or 5 is it is characterised in that comprise checking information number in described checking request message
According to, and described checking information data by described effective signing messages and random number combine or described invalid signature information with
The combination of machine number determines;
Then the described step that checking request message is verified specifically includes:Obtain testing of comprising in described checking request message
Card information data, generates corresponding the result according to described checking information data and described effective signing messages;
And, comprise described the result in described information efficient message or information invalid message, for described checking node root
Judge whether information is effective according to described the result and described random number.
7. according to the arbitrary described method of claim 1-6 it is characterised in that described store area by described effective signing messages
Step in block chain specifically includes:Described effective signing messages is write the first transaction record, and by described first transaction record
It is broadcast in described block chain;
The described step by described invalid signature information Store in block chain specifically includes:Described invalid signature information is write
Second transaction record, and described second transaction record is broadcast in described block chain.
8. a kind of Information Authentication device based on block chain is it is characterised in that include:
Effectively signature blocks, for generating corresponding effective signing messages according to information to be verified, by described effective signing messages
Store in block chain;
Invalid signature module, for generating corresponding invalid signature information according to described information to be verified, by described invalid signature
Information Store is in described block chain;
Message reception module, for receiving checking node according to effective signing messages of storage or invalid signature in described block chain
The checking request message that information generates;
Information authentication module, for verifying to described checking request message, returns to described checking node according to the result
Write in reply and cease efficient message or information invalid message.
9. device according to claim 8 is it is characterised in that described checking request message includes:Described checking node
Identity information, then described information authentication module specifically include:
According to the identity information of described checking node, judging submodule, for judging whether described checking node is legitimate node;
Checking submodule, for when judged result is to be, verifying to described checking request message, and according to the result
To described checking node return information efficient message or information invalid message.
10. device according to claim 9 it is characterised in that when described judging submodule judged result be no when, institute
State checking submodule and return authentication failed message to described checking node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610971223.1A CN106487801B (en) | 2016-11-03 | 2016-11-03 | Information Authentication method and device based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610971223.1A CN106487801B (en) | 2016-11-03 | 2016-11-03 | Information Authentication method and device based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106487801A true CN106487801A (en) | 2017-03-08 |
CN106487801B CN106487801B (en) | 2019-10-11 |
Family
ID=58271491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610971223.1A Active CN106487801B (en) | 2016-11-03 | 2016-11-03 | Information Authentication method and device based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106487801B (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789095A (en) * | 2017-03-30 | 2017-05-31 | 腾讯科技(深圳)有限公司 | Distributed system and message treatment method |
CN107194008A (en) * | 2017-06-19 | 2017-09-22 | 无锡井通网络科技有限公司 | A kind of distributed system quickly updates verification method |
CN108280358A (en) * | 2018-02-12 | 2018-07-13 | 北京金山安全软件有限公司 | Information reminding method and device and electronic equipment |
CN108734018A (en) * | 2018-05-21 | 2018-11-02 | 北京京东尚科信息技术有限公司 | authentication method, device, system and computer readable storage medium |
CN109194466A (en) * | 2018-10-29 | 2019-01-11 | 南开大学 | A kind of cloud data integrity detection method and system based on block chain |
CN109428722A (en) * | 2017-08-30 | 2019-03-05 | 上海策赢网络科技有限公司 | A kind of content delivery method and device |
WO2019061627A1 (en) * | 2017-09-26 | 2019-04-04 | 武汉斗鱼网络科技有限公司 | Data verification method, and server |
CN109635595A (en) * | 2018-12-29 | 2019-04-16 | 杭州趣链科技有限公司 | A kind of data tamper resistant method based on block chain |
CN109685027A (en) * | 2018-12-28 | 2019-04-26 | 福建工程学院 | A kind of new added road recognition methods and system based on block chain technology |
WO2019100864A1 (en) * | 2017-11-23 | 2019-05-31 | 阿里巴巴集团控股有限公司 | Data processing method and apparatus |
CN110020513A (en) * | 2018-11-07 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Signature recording method, verification method, device and storage medium |
CN110223089A (en) * | 2019-06-14 | 2019-09-10 | 厦门历思科技服务有限公司 | A kind of credit identity authentication approach and system and equipment |
CN110232764A (en) * | 2019-05-16 | 2019-09-13 | 暨南大学 | Anonymous Electronic Voting method and system based on block chain |
CN110622490A (en) * | 2017-03-09 | 2019-12-27 | M·S·古尔布兰德森 | Core network access provider |
CN110971413A (en) * | 2019-06-20 | 2020-04-07 | 腾讯科技(深圳)有限公司 | Random number generation method, random number generation device and storage medium |
CN112243008A (en) * | 2020-10-16 | 2021-01-19 | 中国联合网络通信集团有限公司 | Data management method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105678182A (en) * | 2015-12-29 | 2016-06-15 | 布比(北京)网络技术有限公司 | Method and apparatus for data operation controlling |
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN106022775A (en) * | 2016-05-13 | 2016-10-12 | 邓迪 | File signature method and system based on block chains |
-
2016
- 2016-11-03 CN CN201610971223.1A patent/CN106487801B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105678182A (en) * | 2015-12-29 | 2016-06-15 | 布比(北京)网络技术有限公司 | Method and apparatus for data operation controlling |
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN106022775A (en) * | 2016-05-13 | 2016-10-12 | 邓迪 | File signature method and system based on block chains |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110622490A (en) * | 2017-03-09 | 2019-12-27 | M·S·古尔布兰德森 | Core network access provider |
CN106789095A (en) * | 2017-03-30 | 2017-05-31 | 腾讯科技(深圳)有限公司 | Distributed system and message treatment method |
CN106789095B (en) * | 2017-03-30 | 2020-12-08 | 腾讯科技(深圳)有限公司 | Distributed system and message processing method |
CN107194008B (en) * | 2017-06-19 | 2019-07-16 | 无锡井通网络科技有限公司 | A kind of distributed system quickly updates verification method |
CN107194008A (en) * | 2017-06-19 | 2017-09-22 | 无锡井通网络科技有限公司 | A kind of distributed system quickly updates verification method |
CN109428722A (en) * | 2017-08-30 | 2019-03-05 | 上海策赢网络科技有限公司 | A kind of content delivery method and device |
WO2019061627A1 (en) * | 2017-09-26 | 2019-04-04 | 武汉斗鱼网络科技有限公司 | Data verification method, and server |
US10931684B2 (en) | 2017-11-23 | 2021-02-23 | Advanced New Technologies Co., Ltd. | Data processing method and apparatus |
WO2019100864A1 (en) * | 2017-11-23 | 2019-05-31 | 阿里巴巴集团控股有限公司 | Data processing method and apparatus |
US11108786B2 (en) | 2017-11-23 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Data processing method and apparatus |
CN108280358A (en) * | 2018-02-12 | 2018-07-13 | 北京金山安全软件有限公司 | Information reminding method and device and electronic equipment |
CN108734018A (en) * | 2018-05-21 | 2018-11-02 | 北京京东尚科信息技术有限公司 | authentication method, device, system and computer readable storage medium |
CN109194466A (en) * | 2018-10-29 | 2019-01-11 | 南开大学 | A kind of cloud data integrity detection method and system based on block chain |
CN109194466B (en) * | 2018-10-29 | 2021-07-06 | 南开大学 | Block chain-based cloud data integrity detection method and system |
CN110020513A (en) * | 2018-11-07 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Signature recording method, verification method, device and storage medium |
CN110020513B (en) * | 2018-11-07 | 2023-08-22 | 创新先进技术有限公司 | Signature recording method, signature verification device and storage medium |
CN109685027A (en) * | 2018-12-28 | 2019-04-26 | 福建工程学院 | A kind of new added road recognition methods and system based on block chain technology |
CN109635595A (en) * | 2018-12-29 | 2019-04-16 | 杭州趣链科技有限公司 | A kind of data tamper resistant method based on block chain |
CN110232764A (en) * | 2019-05-16 | 2019-09-13 | 暨南大学 | Anonymous Electronic Voting method and system based on block chain |
CN110232764B (en) * | 2019-05-16 | 2021-09-21 | 暨南大学 | Anonymous electronic voting method and system based on block chain |
CN110223089A (en) * | 2019-06-14 | 2019-09-10 | 厦门历思科技服务有限公司 | A kind of credit identity authentication approach and system and equipment |
CN110971413A (en) * | 2019-06-20 | 2020-04-07 | 腾讯科技(深圳)有限公司 | Random number generation method, random number generation device and storage medium |
CN112243008A (en) * | 2020-10-16 | 2021-01-19 | 中国联合网络通信集团有限公司 | Data management method and device |
CN112243008B (en) * | 2020-10-16 | 2023-06-02 | 中国联合网络通信集团有限公司 | Data management method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106487801B (en) | 2019-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106487801A (en) | Information Authentication method and device based on block chain | |
CN106533696B (en) | Identity identifying method, certificate server and user terminal based on block chain | |
Stallings | Cryptography and network security, 4/E | |
ES2308725T3 (en) | QUESTION-ANSWER SIGNS AND SECURITY PROTOCOLS OF DIFFIE-HELLMAN. | |
William | Cryptography and network security: For VTU | |
Ellison | Ceremony design and analysis | |
CN106453407A (en) | Identity authentication method based on block chain, authentication server and user terminal | |
CN106506146A (en) | Based on the Transaction Information method of calibration of block chain technology, apparatus and system | |
CN106330838B (en) | A kind of dynamic signature method and the client and server using this method | |
CN104199657B (en) | The call method and device of open platform | |
CN106897761A (en) | A kind of two-dimensional code generation method and device | |
CN107508681A (en) | Block chain cryptographic key protection method and device | |
CN105610872B (en) | Internet-of-things terminal encryption method and internet-of-things terminal encryption device | |
Alhaidary et al. | Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol | |
Armour et al. | Substitution attacks against message authentication | |
CN110401540A (en) | A kind of threshold group signatures method that verification can be disclosed based on block chain | |
CN109543458A (en) | A kind of prescription data method of calibration, equipment and server based on block chain | |
Diaz et al. | A formal methodology for integral security design and verification of network protocols | |
Bella | Inductive verification of smart card protocols | |
CN101668009B (en) | Method and system for safely processing routing address | |
CN111277414A (en) | Distributed public key generation method and device based on RSA algorithm and intelligent contract | |
Older et al. | Formal methods for assuring security of protocols | |
CN107026729B (en) | Method and device for transmitting software | |
Rowe et al. | Deception in cyber attacks | |
Tan et al. | Securing password authentication for web-based applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 3F301, C2 Building, Suzhou 2.5 Industrial Park, 88 Dongchang Road, Suzhou Industrial Park, Jiangsu Province Applicant after: JIANGSU PAYEGIS TECHNOLOGY CO., LTD. Address before: A street in Suzhou City, Jiangsu Province Industrial Park No. 388 innovation park off No. 6 Building 5 floor Applicant before: JIANGSU PAYEGIS TECHNOLOGY CO., LTD. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |