CN110223159A - Credit data query method, apparatus, computer equipment and storage medium - Google Patents
Credit data query method, apparatus, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110223159A CN110223159A CN201910427132.5A CN201910427132A CN110223159A CN 110223159 A CN110223159 A CN 110223159A CN 201910427132 A CN201910427132 A CN 201910427132A CN 110223159 A CN110223159 A CN 110223159A
- Authority
- CN
- China
- Prior art keywords
- user
- credit data
- checked
- credit
- inquiry request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/3331—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Data Mining & Analysis (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
This application involves field of artificial intelligence, are applied to financial industry, more particularly to a kind of credit data query method, apparatus, computer equipment and storage medium.Method in one embodiment includes: the credit customer documentation for obtaining each financial institution that financial institution's node collects;Credit customer documentation is verified, corresponding user's white list is obtained;The received credit data inquiry request of user node is obtained, is matched respectively in every part of user's white list according to the user identifier to be checked carried in credit data inquiry request, obtains the matching result of user identifier to be checked Yu single part of user's white list;Processing is overlapped to the matching result of user identifier to be checked and each single part of user's white list, obtains the corresponding credit data of user identifier to be checked.It by being handled to obtain user's white list to credit customer documentation, then is matched in white list by user to be checked, obtains corresponding credit data, the search efficiency to credit data can be improved.
Description
Technical field
This application involves field of artificial intelligence, more particularly to a kind of credit data query method, apparatus, computer
Equipment and storage medium.
Background technique
With the development of consumptive credit, the technical level for how improving consumptive credit risk management develops as financial institution
Major issue during consumptive credit.Credit refers to that financial institution directly provides with funds support to client, or is having to client
Close the behavior that the credit in economic activity is promised to third party.
And risk control is of great significance for the operation of each mechanism, each mechanism is carrying out the related industry of various risks control
It during business, needs to collect relevant risk data, constructs Risk Control System, serve related service scene.Carrying out wind
During dangerous control business, each mechanism often generates the demand of credit data query.However due to traditional credit data
Inquiry needs to expend a large amount of manpower and material resources, leads to low efficiency.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of credit data query that can be improved working efficiency
Method, apparatus, computer equipment and storage medium.
A kind of credit data query method is applied to block catenary system, and the block catenary system includes financial institution's node
And user node, which comprises
Obtain the credit customer documentation for each financial institution that financial institution's node collects;
The credit customer documentation is verified, corresponding user's white list is obtained;
The received credit data inquiry request of the user node is obtained, is carried according in the credit data inquiry request
User identifier to be checked matched respectively in every part of user's white list, obtain the user identifier to be checked and single part of use
The matching result of family white list;
Processing is overlapped to the matching result of the user identifier to be checked and each single part of user's white list, is obtained described
The corresponding credit data of user identifier to be checked.
In one embodiment, after the acquisition received credit data inquiry request of user node, further includes:
It is corresponding block-identified to obtain the credit data inquiry request, wherein the credit data inquiry request carries
The inquiry request time;
Obtain time shaft according to the inquiry request time, according to the time shaft to it is described it is block-identified be ranked up,
Corresponding user identifier to be checked is obtained according to ranking results.
In one embodiment, before the acquisition received credit data inquiry request of user node, further includes:
The initiation credit data inquiry request user that the user node collects is obtained, to the initiation credit data query
User is requested to carry out authentication;
Obtain the received credit data inquiry request of the user node, comprising:
When authentication passes through, obtains the received credit data inquiry request of the user node and the initiation is awarded
The identity type of letter data inquiry request user;
The matching result to the user identifier to be checked and each single part of user's white list is overlapped processing, obtains
After the corresponding credit data of the user identifier to be checked further include:
The credit data are fed back to the user according to the identity type for initiating credit data inquiry request user
Node.
In one embodiment, after the acquisition received credit data inquiry request of user node, further includes:
Obtain the corresponding user right of user for initiating the credit data inquiry request;
It is described according to the user identifier to be checked carried in the credit data inquiry request in every part of user's white list
It is matched respectively, obtains the matching result of the user identifier to be checked and single part of user's white list, comprising:
It is to be checked according to being carried in the credit data inquiry request when the user right belongs to default access range
It askes user identifier to match respectively in every part of user's white list, obtains the user identifier to be checked and the single part of white name of user
Single matching result.
In one embodiment, the matching result to the user identifier to be checked and each single part of user's white list into
Row superposition processing, after obtaining the corresponding credit data of the user identifier to be checked, comprising:
Random number sequence is generated by random number algorithm;
The credit data are subjected to system conversion, according to the random number sequence from the credit data after system conversion
Corresponding character is extracted, using the character of extraction as primary ciphertext;
The primary ciphertext is merged with the random number sequence, final ciphertext is obtained, passes through the final ciphertext
The credit data are encrypted, encrypted credit data are obtained.
In one embodiment, described to merge the primary ciphertext with the random number sequence, it obtains final close
Text, comprising:
It is separately added into default first connector between the every two character of the primary ciphertext, obtains the first ciphertext sequence
Column;
To the random number sequence carry out system conversion, system conversion after random number sequence every two hand over word it
Between be separately added into default second connector, obtain the second ciphertext sequence;
The first ciphertext sequence and the second ciphertext sequence are connected, final ciphertext is obtained.
In one embodiment, processing is overlapped to the object matching data, obtains the user identifier to be checked
After corresponding credit data, further includes:
When the credit data are greater than default credit threshold value, obtain user to be checked and audited by the credit that credit is audited
As a result.
A kind of credit data query device is applied to block catenary system, and the block catenary system includes financial institution's node
And user node, described device include:
Data obtaining module, for obtaining the credit user's text for each financial institution that financial institution's node collects
Shelves;
White list generation module obtains corresponding user's white list for verifying to the credit customer documentation;
Request processing module, for obtaining the received credit data inquiry request of the user node, according to the credit
The user identifier to be checked carried in data inquiry request matches respectively in every part of user's white list, obtains described to be checked
Ask the matching result of user identifier and single part of user's white list;
Credit data generation module, for the matching result to the user identifier to be checked and each single part of user's white list
It is overlapped processing, obtains the corresponding credit data of the user identifier to be checked.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device performs the steps of when executing the computer program
Obtain the credit customer documentation for each financial institution that financial institution's node collects;
The credit customer documentation is verified, corresponding user's white list is obtained;
The received credit data inquiry request of the user node is obtained, is carried according in the credit data inquiry request
User identifier to be checked matched respectively in every part of user's white list, obtain the user identifier to be checked and single part of use
The matching result of family white list;
Processing is overlapped to the matching result of the user identifier to be checked and each single part of user's white list, is obtained described
The corresponding credit data of user identifier to be checked.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
It is performed the steps of when row
Obtain the credit customer documentation for each financial institution that financial institution's node collects;
The credit customer documentation is verified, corresponding user's white list is obtained;
The received credit data inquiry request of the user node is obtained, is carried according in the credit data inquiry request
User identifier to be checked matched respectively in every part of user's white list, obtain the user identifier to be checked and single part of use
The matching result of family white list;
Processing is overlapped to the matching result of the user identifier to be checked and each single part of user's white list, is obtained described
The corresponding credit data of user identifier to be checked.
Above-mentioned credit data query method, apparatus, computer equipment and storage medium, pass through block chain technology, Ge Gejin
Melt mechanism and upload respective credit customer documentation respectively, is verified based on credit customer documentation, obtain each financial institution pair
The user's white list answered obtains the received credit data inquiry request of user node, carries according in credit data inquiry request
User identifier to be checked matched in every part of user's white list, obtain user identifier to be checked and single part of user's white list
Matching result, the matching result of user identifier to be checked and each single part of user's white list is overlapped processing, obtains to be checked
The corresponding credit data of user identifier are matched in each user's white list by user identifier to be checked, then matching result are folded
Add to obtain the corresponding credit data of user identifier to be checked, the search efficiency to credit data can be effectively improved in this way.
Detailed description of the invention
Fig. 1 is the applied environment figure of credit data query method in one embodiment;
Fig. 2 is the flow diagram of credit data query method in one embodiment;
Fig. 3 is the flow diagram of credit data query method in another embodiment;
Fig. 4 is the flow diagram of credit data encryption step in one embodiment;
Fig. 5 is the flow diagram of fusion treatment step in one embodiment;
Fig. 6 is the structural block diagram of credit data query device in one embodiment;
Fig. 7 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Credit data query method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, golden
Melt mechanism terminal 102 and user terminal 104 to be communicated by network with block catenary system 106 respectively, block catenary system 106
Including financial institution's node 1061, data processing node 1062 and user node 1063.Financial institution staff can pass through
Financial institution terminal uploads financial institution's node of respective credit customer documentation to block catenary system respectively.Data processing node
The credit customer documentation for obtaining each financial institution, verifies credit customer documentation, obtains corresponding user's white list.With
Credit data inquiry request is initiated in user terminal in family, and user identifier to be checked is carried in credit data inquiry request, and user is whole
Credit data inquiry request is sent to the user node of block catenary system by end.Data processing node obtains credit data in real time and looks into
Request is ask, user identifier to be checked is matched respectively in every part of user's white list, obtains user identifier to be checked and list
The matching result of part user's white list is overlapped place to the matching result of user identifier to be checked and each single part of user's white list
Reason, obtains the corresponding credit data of user identifier to be checked.Wherein, financial institution terminal 102 and user terminal 104 can with but
It is not limited to various personal computers, laptop, smart phone and tablet computer, block catenary system 106 can be with independently
The server cluster of server either multiple servers composition realize.Block chain is one kind sequentially in time by data
A kind of block linked data structure for being combined into such a way that sequence is connected, and can not distorting of being guaranteed in a manner of cryptography and not
The distributed account book that can be forged.Block catenary system is a kind of completely new distributed basis framework, using block linked data structure come
Verifying and storing data are known together algorithm using distributed node to generate and more new data, are guaranteed number in the way of cryptography
According to the safety of transmission and access, programmed using the intelligent contract being made of automatized script code and operation data.
In one embodiment, as shown in Fig. 2, providing a kind of credit data query method, it is applied in this way
For block catenary system in Fig. 1, comprising the following steps:
Step 202, the credit customer documentation for each financial institution that financial institution's node collects is obtained.
Credit customer documentation refers to each financial institution according to the user information for meeting business demand of audit conditional filtering
Document.For example A bank audits condition according to loan transaction, using the high-quality enterprise such as enterprise X1, X2, X3 as credit user, by it
It is included in credit customer documentation;B bank is according to banking and insurance business business pushing condition, using the high-quality enterprise such as enterprise Y1, Y2, Y3 as awarding
Credit household is included in credit customer documentation.
Step 204, credit customer documentation is verified, obtains corresponding user's white list.
User's white list refers to is allowed to log into the user information of row business processing for recording by financial institution.To credit
Customer documentation is verified, for example checks whether credit customer documentation meets preset format;Duplicate removal processing is carried out, is removed duplicate
User;It is authenticated according to the key word information in credit customer documentation to Third Party Authentication mechanism;The user of verification will be passed through
Inventory is as user's white list.
Step 206, the received credit data inquiry request of user node is obtained, is carried according in credit data inquiry request
User identifier to be checked matched respectively in every part of user's white list, obtain user identifier to be checked and single part of user be white
The matching result of list.
Credit data inquiry request refers to by terminal user's initiation, carries out credit data query to user to be checked and asks
It asks.For example user Z initiates credit data inquiry request, user to be checked can be user Z itself, be also possible to other users.
For using user Z as user to be checked, carry out searching whether exist respectively in the corresponding user's white list of each financial institution
User Z obtains the matching result of user Z Yu every part of user's white list.For example, existing when in user's white list of certain financial institution
User Z, then otherwise it is 0 that the corresponding data value of object matching data, which is 1,.
Step 208, processing is overlapped to the matching result of user identifier to be checked and each single part of user's white list, obtained
The corresponding credit data of user identifier to be checked.
For using user Z as user to be checked, searched respectively in the corresponding user's white list of each financial institution
With the presence or absence of user Z, the matching result of user Z Yu every part of user's white list are obtained.For example, working as the white name of user of certain financial institution
There are user Z in list, then otherwise it is 0 that the corresponding data value of matching result, which is 1,.By user to be checked and each financial institution
User's white list matches respectively, obtains multiple matching results, matching result is added, and obtains that user to be checked is corresponding to be awarded
Letter data.Than there are user Z in user's white list if any 10 financial institutions, then the corresponding credit data of user Z are 10.
Above-mentioned credit data query method, by block chain technology, each financial institution uploads respective credit user text
Shelves, are verified based on credit customer documentation, obtain the corresponding user's white list of each financial institution, are obtained user node and are received
Credit data inquiry request, according to the user identifier to be checked carried in credit data inquiry request in every part of user's white list
In matched, the matching result of user identifier to be checked Yu single part of user's white list is obtained, to user identifier to be checked and each
The matching result of single part of user's white list is overlapped processing, obtains the corresponding credit data of user identifier to be checked, by
Inquiry user identifier matches in each user's white list, then matching result is superimposed to obtain the corresponding credit of user identifier to be checked
Data can effectively improve the search efficiency to credit data.
In one embodiment, as shown in figure 3, also being wrapped after obtaining the received credit data inquiry request of user node
It includes: step 303, it is corresponding block-identified to obtain credit data inquiry request, wherein credit data inquiry request carries inquiry and asks
Seeking time;Step 304, time shaft is obtained according to the inquiry request time, is ranked up according to time shaft to block-identified, according to row
Sequence result obtains corresponding user identifier to be checked.The inquiry request time refers to the time for issuing credit data inquiry request, than
If terminal user can be multiple, the inquiry request time of terminal user's first is at 9 points in the morning 10 minutes and 30 seconds on December 25th, 2018,
The inquiry request time of terminal user's second is at 9 points in the morning 10 minutes and 35 seconds on December 25th, 2018.It is block-identified to be looked into credit data
Asking request has corresponding relationship, block-identified to can be used for identifying corresponding credit data inquiry request, for example, with Arabic number
Word identifies different credit data inquiry requests.Specifically, according to chronological order, when forming credit data inquiry request
Between axis, be ranked up block-identified on a timeline, obtain ranking results.
For example the inquiry request time of terminal user's first is at 9 points in the morning 10 minutes and 30 seconds on December 25th, 2018, terminal user
The inquiry request time of second is at 9 points in the morning 10 minutes and 35 seconds on December 25th, 2018, is looked into according to the inquiry request time credit data
It askes request to be ranked up, obtains the credit number that ranking results are the credit data inquiry request of terminal user's first, terminal user's second
According to inquiry request.Then further according to the user identifier to be checked in the credit data inquiry request of terminal user's first in the white name of user
Matching treatment is carried out in list, obtains the credit data of terminal user's first request inquiry;It is looked into according to the credit data of terminal user's second
The user identifier to be checked ask in request carries out matching treatment in user's white list, obtains awarding for terminal user's second request inquiry
Letter data.User's white list is that financial institution carries out credit appraisal to user, and wherein credit appraisal meets the user of business demand
Inventory.For example in user's white list of block chain Shang You10Jia bank include certain user, illustrate that the user assert in 10 banks
Meet credit condition, the corresponding credit data of the user are 10.
In one embodiment, before the acquisition received credit data inquiry request of user node, further includes: obtain user
The initiation credit data inquiry request user that node collects carries out authentication to credit data inquiry request user is initiated;It obtains
Take the received credit data inquiry request of user node, comprising: when authentication passes through, obtain the received credit of user node
Data inquiry request and the identity type for initiating credit data inquiry request user;To user identifier to be checked and each single part of use
The matching result of family white list is overlapped processing, after obtaining the corresponding credit data of user identifier to be checked further include: root
Credit data are fed back to user node according to the identity type for initiating credit data inquiry request user.It obtains terminal and initiates credit number
According to the identity type of inquiry request user, obtain to inquire according to the identity type that terminal initiates credit data inquiry request user
Range of information sends credit data inquiry request to data processing node, and data processing node is according to initiation credit data query
The corresponding query information range of the identity type of user is requested to feed back credit data to user node.For credit data query
Safety can verify the identity of terminal user, and be set according to the terminal user of different identity classification different
Query context for example, credit data are divided into two classifications of private data and public data, and sets two categorical datas
Personnel query identity category, for example, ordinary enterprises user can only inquire public data, and enterprise supervision user can inquire secret
Data and public data.
In one embodiment, after the acquisition received credit data inquiry request of user node, further includes: obtain and initiate
The corresponding user right of the user of credit data inquiry request;According to the user to be checked mark carried in credit data inquiry request
Knowledge matches respectively in every part of user's white list, obtains the matching knot of user identifier to be checked Yu single part of user's white list
Fruit, comprising: when user right belongs to default access range, marked according to the user to be checked carried in credit data inquiry request
Knowledge matches respectively in every part of user's white list, obtains the matching knot of user identifier to be checked Yu single part of user's white list
Fruit.The user right that terminal initiates credit data inquiry request user is obtained, determines whether to carry out in user according to user right
Matching treatment is carried out in white list, the user that only user right meets condition initiates credit data inquiry request and just will do it place
Reason can reduce any user in this way and initiate inquiry request bring workload.
In one embodiment, as shown in figure 4, matching result to user identifier to be checked and each single part of user's white list
It is overlapped processing, after obtaining the corresponding credit data of user identifier to be checked, comprising: step 402, pass through random number algorithm
Generate random number sequence;Step 404, by credit data carry out system conversion, according to random number sequence from system conversion after awarding
Corresponding character is extracted in letter data, using the character of extraction as primary ciphertext;Step 406, by primary ciphertext and random number sequence
Column are merged, and are obtained final ciphertext, are encrypted by final ciphertext to credit data, obtain encrypted credit data.
Wherein, random number algorithm specifically can be and obtained by formula a+rand () %n [a, a+n) random integers in range,
Middle a is initial value, and n is the range of integer, and rand () function is a random function for generating random number.By credit data into
10 progress Binary Conversions are obtained 1010 by taking credit data 10 as an example by system of advancing conversion.For example random number sequence is (1,3),
Corresponding character is extracted from the credit data after system conversion according to random number sequence, that is, extracts first and third position, obtains
Character to extraction is 11, using the character of extraction as primary ciphertext.In order to ensure the safety of data, credit data are carried out
Encryption, so that it is guaranteed that only credit data could be decrypted using key.After getting credit data, by credit number
According to being stored on the node of block catenary system after encapsulation, in this way, credit data are transmitted and are deposited by block chain network
Storage.It is just stored after encryption due to the credit data on block catenary system, it is stored in the node of block catenary system
On credit Information Security be protected, one side credit data are not easy to be distorted by third party;On the other hand, unauthorized people
Member is not easy to obtain credit data, is also not easy that encrypted credit data are decrypted, avoids leaking data.
In one embodiment, as shown in figure 5, primary ciphertext is merged with random number sequence, final ciphertext is obtained,
Include: step 502, default first connector is separately added between the every two character of primary ciphertext, obtains the first ciphertext sequence
Column;Step 504, to random number sequence carry out system conversion, system conversion after random number sequence every two hand over word it
Between be separately added into default second connector, obtain the second ciphertext sequence;Step 506, the first ciphertext sequence and the second ciphertext are connected
Sequence obtains final ciphertext.Default first connector may be the same or different with default second connector, connector tool
Body can be "-", "+" etc..By taking credit data 10 as an example, 10 progress Binary Conversions are obtained 1010.Such as random number sequence
For (1,3), corresponding character is extracted from the credit data after system conversion according to random number sequence, that is, extracts first and the
Three, obtaining primary ciphertext is 11.Connector-is added between two characters of primary ciphertext, obtaining the first ciphertext sequence is
1-1.System conversion is carried out to random number sequence, is divided between two hand over words 1 and 11 of the random number sequence after system conversion
Not Jia Ru connector-, obtain the second ciphertext sequence be 1-11.The first ciphertext sequence and the second ciphertext sequence are connected, is obtained final
Ciphertext is 1-11-11.
In one embodiment, place is overlapped to the matching result of user identifier to be checked and each single part of user's white list
Reason, after obtaining the corresponding credit data of user identifier to be checked, further includes: when credit data are greater than default credit threshold value,
Obtain the credit auditing result that user to be checked is audited by credit.For example, user's white list is that bank carries out credit to user
Evaluation, wherein credit appraisal meets user's inventory of business demand.Using other banks to the credit appraisal of user Z as certain bank
User Z is carried out in credit audit condition, such as user's white list of block chain Shang You10Jia bank including user Z, explanation
10 banks assert that user Z meets credit condition, and credit data are 10.And bank's custom rule is to have 8 bank's letters
Ren user, then the user is audited by credit.It therefore can be by inquiring other banks on block chain to the credit of user
Evaluation is audited to complete the bank to the credit of user.
In one embodiment, credit customer documentation is verified, obtains user's white list, comprising: extracted credit and use
Field information corresponding with default first field in the document of family;The similarity between every two field information is obtained, by similarity
Two field informations more than preset threshold carry out duplicate removal processing;Field information after duplicate removal processing is subjected to fusion treatment, is obtained
To user's white list of repetition-free word segment information.For example default first field can be User ID, corresponding field information can be with
It is User ID value, when there are same subscriber ID record, only retains a record in same subscriber ID, it is identical to delete remaining
User ID record, completes duplicate removal process.Data after duplicate removal are merged, the white name of user of repetition-free word segment information is generated
Single, fusion can be merged using spatial manipulation tool, faster more stable compared to the speed that each data are written one by one.Meter
The similarity between two field informations is calculated, for example two field informations can be converted into vector form, obtains two vectors,
Then the cosine similarity of two vectors is calculated again, and cosine similarity is assessed by calculating the included angle cosine value of two vectors
The similarity of the two.Cosine value illustrates that two field informations are more similar closer to 1;Closer to 0, then illustrate two fields
Information is more dissimilar.When the similarity of two field informations is greater than preset threshold, such as when 90%, by similarity greater than 90%
Two field informations regard as Repeating Field information.
In one embodiment, credit customer documentation is verified, obtains user's white list, comprising: extracted credit and use
Field information corresponding with default second field in the document of family;Corresponding field information is sent to discrimination authority server;It connects
The feedback result of discrimination authority server is received, and user's white list is obtained according to feedback result, wherein feedback result is device for identifying counterfeit
The true and false result that structure server is inquired according to corresponding field information.For example default second field can be enterprise's work
Quotient registers field, and corresponding field information can be the industrial and commercial registration information of the enterprise, extracts the enterprise in credit customer documentation
Industrial and commercial registration information is sent to industrial and commercial bureau's query service device, is inquired by industrial and commercial bureau's query service device, and returns to inquiry knot
The user is included in user's white list when confirming true by fruit.
It should be understood that although each step in the flow chart of Fig. 2-5 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-5
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, a kind of credit data query device is provided, block catenary system, block catenary system are applied to
Including financial institution's node and user node, as shown in fig. 6, identification authentication system includes data obtaining module 602, white list
Generation module 604, request processing module 606 and credit data generation module 608.Wherein, data obtaining module, for obtaining gold
Melt the credit customer documentation for each financial institution that agency node collects.White list generation module, for credit customer documentation
It is verified, obtains corresponding user's white list.Request processing module, for obtaining the received credit data query of user node
Request, the progress respectively in every part of user's white list according to the user identifier to be checked carried in credit data inquiry request
Match, obtains the matching result of user identifier to be checked Yu single part of user's white list.Credit data generation module, for to be checked
The matching result of user identifier and each single part of user's white list is overlapped processing, obtains the corresponding credit of user identifier to be checked
Data.
In one embodiment, it is corresponding block-identified to be also used to obtain credit data inquiry request for request processing module,
Wherein, credit data inquiry request carries the inquiry request time;Time shaft is obtained according to the inquiry request time, according to time shaft pair
It is block-identified to be ranked up, corresponding user identifier to be checked is obtained according to ranking results.
In one embodiment, the initiation credit data query that request processing module is also used to obtain that user node collects is asked
User is asked, carries out authentication to credit data inquiry request user is initiated;When authentication passes through, obtains user node and connect
The credit data inquiry request of receipts and the identity type for initiating credit data inquiry request user;Credit data generation module it
After further include feedback module, for feeding back credit data to user according to the identity type for initiating credit data inquiry request user
Node.
In one embodiment, request processing module be also used to obtain initiate credit data inquiry request user it is corresponding
User right;When user right belongs to default access range, according to the user to be checked carried in credit data inquiry request
Mark matches respectively in every part of user's white list, obtains the matching knot of user identifier to be checked Yu single part of user's white list
Fruit.
It in one embodiment, further include encrypting module after credit data generation module, for passing through random number algorithm
Generate random number sequence;Credit data are subjected to system conversion, according to random number sequence from the credit data after system conversion
Corresponding character is extracted, using the character of extraction as primary ciphertext;Primary ciphertext is merged with random number sequence, is obtained most
Whole ciphertext encrypts credit data by final ciphertext, obtains encrypted credit data.
In one embodiment, encrypting module is also used to be separately added into default between the every two character of primary ciphertext
One connector obtains the first ciphertext sequence;System conversion is carried out to random number sequence, the random number sequence after system conversion
It is separately added into default second connector between every two hand over word, obtains the second ciphertext sequence;Connect the first ciphertext sequence and
Two ciphertext sequences, obtain final ciphertext.
It in one embodiment, further include credit auditing module after credit data generation module, for working as credit data
When greater than default credit threshold value, the credit auditing result that user to be checked is audited by credit is obtained.
Specific about credit data query device limits the limit that may refer to above for credit data query method
Fixed, details are not described herein.Modules in above-mentioned credit data query device can fully or partially through software, hardware and its
Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with
It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding
Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 7.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for storing the number such as credit customer documentation, user's white list, credit data inquiry request, credit data
According to.The network interface of the computer equipment is used to communicate with external terminal by network connection.The computer program is processed
To realize a kind of credit data query method when device executes.
It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, which performs the steps of when executing computer program obtains each gold that financial institution's node collects
Melt the credit customer documentation of mechanism;Credit customer documentation is verified, corresponding user's white list is obtained;Obtain user node
Received credit data inquiry request is white in every part of user according to the user identifier to be checked carried in credit data inquiry request
It is matched respectively in list, obtains the matching result of user identifier to be checked Yu single part of user's white list;To user to be checked
Mark and the matching result of each single part of user's white list are overlapped processing, obtain the corresponding credit number of user identifier to be checked
According to.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains credit data query
It requests corresponding block-identified, wherein credit data inquiry request carries the inquiry request time;It is obtained according to the inquiry request time
Time shaft is ranked up according to time shaft to block-identified, obtains corresponding user identifier to be checked according to ranking results.
In one embodiment, acquisition user node is also performed the steps of when processor executes computer program to collect
Initiation credit data inquiry request user, to initiate credit data inquiry request user carry out authentication;Work as authentication
By when, obtain the received credit data inquiry request of user node and initiate the identity class of credit data inquiry request user
Type;Credit data are fed back to user node according to the identity type for initiating credit data inquiry request user.
In one embodiment, acquisition is also performed the steps of when processor executes computer program initiates credit data
The corresponding user right of the user of inquiry request;When user right belongs to default access range, asked according to credit data query
It asks the user identifier to be checked of carrying to match respectively in every part of user's white list, obtains user identifier to be checked and list
The matching result of part user's white list.
In one embodiment, it is also performed the steps of when processor executes computer program raw by random number algorithm
At random number sequence;Credit data are subjected to system conversion, are mentioned from the credit data after system conversion according to random number sequence
Corresponding character is taken, using the character of extraction as primary ciphertext;Primary ciphertext is merged with random number sequence, is obtained final
Ciphertext encrypts credit data by final ciphertext, obtains encrypted credit data.
In one embodiment, it also performs the steps of when processor executes computer program every the two of primary ciphertext
It is separately added into default first connector between a character, obtains the first ciphertext sequence;System conversion is carried out to random number sequence,
It is separately added into default second connector between the every two hand over word of random number sequence after system conversion, obtains the second ciphertext sequence
Column;The first ciphertext sequence and the second ciphertext sequence are connected, final ciphertext is obtained.
In one embodiment, it is also performed the steps of when processor executes computer program when credit data are greater than in advance
If when credit threshold value, obtaining the credit auditing result that user to be checked is audited by credit.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of the credit user for obtaining each financial institution that financial institution's node collects when being executed by processor
Document;Credit customer documentation is verified, corresponding user's white list is obtained;The received credit data of user node are obtained to look into
Request is ask, the progress respectively in every part of user's white list according to the user identifier to be checked carried in credit data inquiry request
Match, obtains the matching result of user identifier to be checked Yu single part of user's white list;To user identifier to be checked and each single part of user
The matching result of white list is overlapped processing, obtains the corresponding credit data of user identifier to be checked.
In one embodiment, acquisition credit data are also performed the steps of when computer program is executed by processor to look into
It is corresponding block-identified to ask request, wherein credit data inquiry request carries the inquiry request time;It is obtained according to the inquiry request time
It to time shaft, is ranked up according to time shaft to block-identified, obtains corresponding user identifier to be checked according to ranking results.
In one embodiment, acquisition user node is also performed the steps of when computer program is executed by processor to return
The initiation credit data inquiry request user of collection carries out authentication to credit data inquiry request user is initiated;When identity is recognized
When card passes through, obtains the received credit data inquiry request of user node and initiate the identity of credit data inquiry request user
Type;Credit data are fed back to user node according to the identity type for initiating credit data inquiry request user.
In one embodiment, acquisition is also performed the steps of when computer program is executed by processor initiates credit number
According to the corresponding user right of the user of inquiry request;When user right belongs to default access range, according to credit data query
The user identifier to be checked carried in request matches respectively in every part of user's white list, obtain user identifier to be checked with
The matching result of single part of user's white list.
In one embodiment, it is also performed the steps of when computer program is executed by processor and passes through random number algorithm
Generate random number sequence;Credit data are subjected to system conversion, according to random number sequence from the credit data after system conversion
Corresponding character is extracted, using the character of extraction as primary ciphertext;Primary ciphertext is merged with random number sequence, is obtained most
Whole ciphertext encrypts credit data by final ciphertext, obtains encrypted credit data.
In one embodiment, it also performs the steps of when computer program is executed by processor in the every of primary ciphertext
It is separately added into default first connector between two characters, obtains the first ciphertext sequence;System conversion is carried out to random number sequence,
It is separately added into default second connector between the every two hand over word of the random number sequence after system conversion, obtains the second ciphertext
Sequence;The first ciphertext sequence and the second ciphertext sequence are connected, final ciphertext is obtained.
In one embodiment, it is also performed the steps of when computer program is executed by processor when credit data are greater than
When default credit threshold value, the credit auditing result that user to be checked is audited by credit is obtained.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of credit data query method, be applied to block catenary system, the block catenary system include financial institution's node with
And user node, which comprises
Obtain the credit customer documentation for each financial institution that financial institution's node collects;
The credit customer documentation is verified, corresponding user's white list is obtained;
Obtain the received credit data inquiry request of the user node, according to carried in the credit data inquiry request to
Inquiry user identifier matches respectively in every part of user's white list, obtains the user identifier to be checked and single part of user is white
The matching result of list;
Processing is overlapped to the matching result of the user identifier to be checked and each single part of user's white list, is obtained described to be checked
Ask the corresponding credit data of user identifier.
2. the method according to claim 1, wherein the acquisition received credit data of user node are looked into
It askes after requesting, further includes:
It is corresponding block-identified to obtain the credit data inquiry request, wherein the credit data inquiry request carries inquiry
Request time;
Obtain time shaft according to the inquiry request time, according to the time shaft to it is described it is block-identified be ranked up, according to
Ranking results obtain corresponding user identifier to be checked.
3. the method according to claim 1, wherein the acquisition received credit data of user node are looked into
It askes before requesting, further includes:
The initiation credit data inquiry request user that the user node collects is obtained, to the initiation credit data inquiry request
User carries out authentication;
Obtain the received credit data inquiry request of the user node, comprising:
When authentication passes through, the received credit data inquiry request of the user node and the initiation credit number are obtained
It is investigated that asking the identity type of user;
The matching result to the user identifier to be checked and each single part of user's white list is overlapped processing, obtains described
After the corresponding credit data of user identifier to be checked, further includes:
The credit data are fed back to the user node according to the identity type for initiating credit data inquiry request user.
4. the method according to claim 1, wherein the acquisition received credit data of user node are looked into
It askes after requesting, further includes:
Obtain the corresponding user right of user for initiating the credit data inquiry request;
It is described to be distinguished in every part of user's white list according to the user identifier to be checked carried in the credit data inquiry request
It is matched, obtains the matching result of the user identifier to be checked and single part of user's white list, comprising:
When the user right belongs to default access range, according to the use to be checked carried in the credit data inquiry request
Family mark matches respectively in every part of user's white list, obtains the user identifier to be checked and single part of user's white list
Matching result.
5. the method according to claim 1, wherein described to the user identifier to be checked and each single part of user
The matching result of white list is overlapped processing, after obtaining the corresponding credit data of the user identifier to be checked, comprising:
Random number sequence is generated by random number algorithm;
The credit data are subjected to system conversion, are extracted from the credit data after system conversion according to the random number sequence
Corresponding character, using the character of extraction as primary ciphertext;
The primary ciphertext is merged with the random number sequence, final ciphertext is obtained, by the final ciphertext to institute
It states credit data to be encrypted, obtains encrypted credit data.
6. according to the method described in claim 5, it is characterized in that, it is described by the primary ciphertext and the random number sequence into
Row fusion, obtains final ciphertext, comprising:
It is separately added into default first connector between the every two character of the primary ciphertext, obtains the first ciphertext sequence;
System conversion is carried out to the random number sequence, is divided between the every two hand over word of the random number sequence after system conversion
The second connector Jia Ru not be preset, the second ciphertext sequence is obtained;
The first ciphertext sequence and the second ciphertext sequence are connected, final ciphertext is obtained.
7. the method according to claim 1, wherein to the user identifier to be checked and the white name of each single part of user
Single matching result is overlapped processing, after obtaining the corresponding credit data of the user identifier to be checked, further includes:
When the credit data are greater than default credit threshold value, the credit audit knot that user to be checked is audited by credit is obtained
Fruit.
8. a kind of credit data query device, be applied to block catenary system, the block catenary system include financial institution's node with
And user node, which is characterized in that described device includes:
Data obtaining module, for obtaining the credit customer documentation for each financial institution that financial institution's node collects;
White list generation module obtains corresponding user's white list for verifying to the credit customer documentation;
Request processing module, for obtaining the received credit data inquiry request of the user node, according to the credit data
The user identifier to be checked carried in inquiry request matches respectively in every part of user's white list, obtains the use to be checked
The matching result of family mark and single part of user's white list;
Credit data generation module is carried out for the matching result to the user identifier to be checked and each single part of user's white list
Superposition processing obtains the corresponding credit data of the user identifier to be checked.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427132.5A CN110223159A (en) | 2019-05-22 | 2019-05-22 | Credit data query method, apparatus, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427132.5A CN110223159A (en) | 2019-05-22 | 2019-05-22 | Credit data query method, apparatus, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110223159A true CN110223159A (en) | 2019-09-10 |
Family
ID=67821694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910427132.5A Pending CN110223159A (en) | 2019-05-22 | 2019-05-22 | Credit data query method, apparatus, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110223159A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111369337A (en) * | 2020-02-21 | 2020-07-03 | 深圳微众信用科技股份有限公司 | Credit wind control system, method, equipment and medium based on block chain |
CN111767557A (en) * | 2020-06-22 | 2020-10-13 | 重庆渝抗医药科技有限公司 | Data encryption working method based on block chain |
CN112100226A (en) * | 2020-09-18 | 2020-12-18 | 腾讯科技(深圳)有限公司 | Data query method and computer-readable storage medium |
CN112182107A (en) * | 2020-09-29 | 2021-01-05 | 中国平安财产保险股份有限公司 | Method and device for acquiring list data, computer equipment and storage medium |
CN112200578A (en) * | 2020-09-23 | 2021-01-08 | 裴俊伟 | Financial service checking method and financial service checking platform based on block chain |
CN113778950A (en) * | 2021-08-24 | 2021-12-10 | 中国联合网络通信集团有限公司 | Credit file obtaining method, index server, query server and medium |
CN113836502A (en) * | 2021-08-02 | 2021-12-24 | 上海盛付通电子支付服务有限公司 | Method, apparatus, medium, and program product for re-identifying user information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070012757A1 (en) * | 2005-07-14 | 2007-01-18 | First Data Corporation | Identity verification switch |
CN106611372A (en) * | 2016-12-27 | 2017-05-03 | 深圳微众税银信息服务有限公司 | Credit investigation data query method and credit investigation data query system |
CN108932297A (en) * | 2018-06-01 | 2018-12-04 | 阿里巴巴集团控股有限公司 | A kind of data query, data sharing method, device and equipment |
CN109255255A (en) * | 2018-10-22 | 2019-01-22 | 北京锐安科技有限公司 | Data processing method, device, equipment and storage medium based on block chain |
-
2019
- 2019-05-22 CN CN201910427132.5A patent/CN110223159A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070012757A1 (en) * | 2005-07-14 | 2007-01-18 | First Data Corporation | Identity verification switch |
CN106611372A (en) * | 2016-12-27 | 2017-05-03 | 深圳微众税银信息服务有限公司 | Credit investigation data query method and credit investigation data query system |
CN108932297A (en) * | 2018-06-01 | 2018-12-04 | 阿里巴巴集团控股有限公司 | A kind of data query, data sharing method, device and equipment |
CN109255255A (en) * | 2018-10-22 | 2019-01-22 | 北京锐安科技有限公司 | Data processing method, device, equipment and storage medium based on block chain |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111369337A (en) * | 2020-02-21 | 2020-07-03 | 深圳微众信用科技股份有限公司 | Credit wind control system, method, equipment and medium based on block chain |
CN111369337B (en) * | 2020-02-21 | 2023-12-01 | 深圳微众信用科技股份有限公司 | Block chain-based trust air control system, method, equipment and medium |
CN111767557A (en) * | 2020-06-22 | 2020-10-13 | 重庆渝抗医药科技有限公司 | Data encryption working method based on block chain |
CN111767557B (en) * | 2020-06-22 | 2021-07-30 | 王仁义 | Data encryption working method based on block chain |
CN112100226A (en) * | 2020-09-18 | 2020-12-18 | 腾讯科技(深圳)有限公司 | Data query method and computer-readable storage medium |
CN112200578A (en) * | 2020-09-23 | 2021-01-08 | 裴俊伟 | Financial service checking method and financial service checking platform based on block chain |
CN112182107A (en) * | 2020-09-29 | 2021-01-05 | 中国平安财产保险股份有限公司 | Method and device for acquiring list data, computer equipment and storage medium |
CN112182107B (en) * | 2020-09-29 | 2023-11-03 | 中国平安财产保险股份有限公司 | List data acquisition method, device, computer equipment and storage medium |
CN113836502A (en) * | 2021-08-02 | 2021-12-24 | 上海盛付通电子支付服务有限公司 | Method, apparatus, medium, and program product for re-identifying user information |
CN113778950A (en) * | 2021-08-24 | 2021-12-10 | 中国联合网络通信集团有限公司 | Credit file obtaining method, index server, query server and medium |
CN113778950B (en) * | 2021-08-24 | 2023-07-04 | 中国联合网络通信集团有限公司 | Method for acquiring trusted file, index server, query server and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110223159A (en) | Credit data query method, apparatus, computer equipment and storage medium | |
US10341123B2 (en) | User identification management system and method | |
Khan et al. | A blockchain ethereum technology-enabled digital content: development of trading and sharing economy data | |
US11876911B2 (en) | Blockchain based alias interaction processing | |
CN110378755B (en) | Electronic invoice generation method and device, computer equipment and storage medium | |
CN110599137A (en) | Electronic bill data processing method and device and computer equipment | |
CN112003858B (en) | Block chain-based platform docking method, electronic device and storage medium | |
CN110365670A (en) | Blacklist sharing method, device, computer equipment and storage medium | |
CN108876133A (en) | Risk assessment processing method, device, server and medium based on business information | |
CN113222606B (en) | Safe transaction execution method based on intelligent contract | |
CN110932859B (en) | User information processing method, device and equipment and readable storage medium | |
CN111127205B (en) | Intelligent contract generation method and device, computer equipment and storage medium | |
CN109359485A (en) | Invoice data shared system and method based on block chain | |
CN111127150B (en) | Intelligent contract demand matching method and device based on block chain and computer equipment | |
CN110489393A (en) | Promise breaking information query method, device, computer equipment and storage medium | |
CN109587154A (en) | Digital identity verification method, device, computer equipment and storage medium | |
US20210217098A1 (en) | Blockchain-based message services for time-sensitive events | |
US20230006819A1 (en) | Systems and methods for homomorphic encryption-based triggering | |
CN110223075B (en) | Identity authentication method and device, computer equipment and storage medium | |
US20210217100A1 (en) | Storage management based on message feedback | |
CN111444416A (en) | Method, system and device for popularizing financial business | |
CN112199694A (en) | Standardized bill processing method and device, electronic device and storage medium | |
KR20210041980A (en) | The block chain private key generation system using smart devices with KYC data and biometric information | |
CN111861476B (en) | Malicious associated transaction monitoring method and device based on blockchain and computer equipment | |
US20230024789A1 (en) | Split Secret Cryptography Based Security in IoT Implemented Payment Transactions or Credentials |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |