CN106453407B - Identity authentication method based on block chain, authentication server and user terminal - Google Patents

Identity authentication method based on block chain, authentication server and user terminal Download PDF

Info

Publication number
CN106453407B
CN106453407B CN201611046691.4A CN201611046691A CN106453407B CN 106453407 B CN106453407 B CN 106453407B CN 201611046691 A CN201611046691 A CN 201611046691A CN 106453407 B CN106453407 B CN 106453407B
Authority
CN
China
Prior art keywords
intelligent contract
user terminal
certification factor
block chain
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611046691.4A
Other languages
Chinese (zh)
Other versions
CN106453407A (en
Inventor
汪德嘉
郭宇
王少凡
柴泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Pay Egis Technology Co ltd
Original Assignee
Jiangsu Pay Egis Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Pay Egis Technology Co ltd filed Critical Jiangsu Pay Egis Technology Co ltd
Priority to CN201611046691.4A priority Critical patent/CN106453407B/en
Publication of CN106453407A publication Critical patent/CN106453407A/en
Application granted granted Critical
Publication of CN106453407B publication Critical patent/CN106453407B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses an identity authentication method based on a block chain, an authentication server and a user terminal, and belongs to the technical field of identity recognition. The method comprises the following steps: acquiring an authentication factor of the user terminal according to an identity authentication request sent by the user terminal; creating an intelligent contract according to the authentication factor, wherein an operation result obtained after preset operation is carried out on the authentication factor is prestored in the intelligent contract; broadcasting the intelligent contract into the blockchain, and sending the intelligent contract blockchain account address to the user terminal; performing identity authentication according to an execution result obtained after the user terminal executes the intelligent contract by using the authentication factor; when the execution result is matched with the operation result, the identity authentication is confirmed to be successful; and when the execution result is not matched with the operation result, the identity authentication is confirmed to be failed. Therefore, the identity authentication method in the embodiment of the application has excellent security.

Description

Identity identifying method, certificate server and user terminal based on block chain
Technical field
The invention relates to identity identification technical fields, more particularly to the identity identifying method based on block chain, recognize Demonstrate,prove server and user terminal.
Background technique
Authentication refers to the process of confirmation operation person's identity in computer and computer network system, so that it is determined that Whether the user has access and access right to certain resource, and then enables the access strategy of computer and networks system It reliably and efficiently executes, prevents attacker from palming off the access authority that legitimate user obtains resource, guarantee the peace of system and data Entirely, and authorization visitor legitimate interests.
As shown in Figure 1, in traditional third party's identity authorization system, it is assumed that application server A needs to confirm the body of user B Part, then it includes to answer in the request that main flow is as follows: 1.1, user B, which sends ID authentication request to third party authentication server C, The information required with server A;1.2, third party authentication server C verifies the request received, by corresponding after verifying It is signed with the information that server A requires, the authentication information after signature is then returned into user B, which includes The signature that the information that application server A is required carries out;1.3, user B sends authentication information, certification letter to application server A The signature carried out in breath comprising the desired information of third party authentication server C application server A;1.4, application server A root According to signature, the identity of user B is verified, and verification result is returned into user B.
But inventor has found in the implementation of the present invention, at least there are following problems in mode in the prior art: Because third party authentication server C logs in the information of application server A by user B is received, if third party authentication server C goes out Existing information leakage, it will material risk is caused to user B and application server A.
Summary of the invention
In view of the above problems, propose the embodiment of the present application in order to provide it is a kind of solve the above problems based on block chain Identity identifying method, certificate server and user terminal.
According to the one aspect of the embodiment of the present application, a kind of identity identifying method based on block chain is provided, comprising: root The certification factor of user terminal is obtained according to the ID authentication request that user terminal is sent;Intelligent contract is created according to the certification factor, It is prestored in intelligent contract and carries out the operation result after default operation to the certification factor;Intelligent contract is broadcast in block chain, And intelligent contract block chain account address is sent to user terminal;Intelligence is executed using the certification factor according to user terminal to close The implementing result about obtained afterwards carries out authentication;Wherein, when implementing result is matched with operation result, confirmation authentication at Function;When implementing result and operation result mismatch, confirmation authentication failure.
According to the other side of the embodiment of the present application, a kind of identity identifying method based on block chain is provided, comprising: To certificate server send comprising user terminal the certification factor ID authentication request, for certificate server according to authenticate because Son creates intelligent contract, prestores in intelligent contract and carries out the operation result after default operation to the certification factor;Using certification because Son executes intelligent contract, so that certificate server carries out authentication according to the implementing result of intelligent contract;Wherein, when executing knot Authentication success when fruit matches with operation result;When implementing result and operation result mismatch, authentication fails.
According to the other side of the embodiment of the present application, a kind of certificate server is provided, comprising: certification factor module, ID authentication request for being sent according to user terminal obtains the certification factor of user terminal;Intelligent contract module is used for root Intelligent contract is created according to the certification factor, is prestored in intelligent contract and carries out the operation result after default operation to the certification factor;Extensively Broadcasting module, for intelligent contract to be broadcast in block chain;Feedback module, for sending intelligent contract block chain account address To user terminal;Authentication module, for executing the execution obtained after intelligent contract using the certification factor according to user terminal As a result authentication is carried out;Wherein, when implementing result is matched with operation result, confirmation authentication success;Work as implementing result When being mismatched with operation result, confirmation authentication failure.
According to the other side of the embodiment of the present application, a kind of user terminal is provided, comprising: request sending module is used In the ID authentication request for sending the certification factor comprising user terminal to certificate server, so that certificate server is according to certification The factor creates intelligent contract, prestores in intelligent contract and carries out the operation result after default operation to the certification factor;Execution module, For executing intelligent contract using the certification factor, recognize so that certificate server carries out identity according to the implementing result of intelligent contract Card;Wherein, the authentication success when implementing result is matched with operation result;The body when implementing result and operation result mismatch Part authentification failure.
In a kind of identity identifying method based on block chain provided by the embodiments of the present application, certificate server and user terminal In, authentication information can be stored in the intelligent contract into block chain.Thus one, on the one hand, block link network can be utilized The characteristic of intelligent contract in network itself guarantees that authentication information can not be tampered;On the other hand, intelligent contract internal processes are utilized The operation for executing authentication verification information, to further improve safety when authentication.It can be seen that the application is implemented Identification authentication mode in example has splendid safety.
Above description is only the general introduction of the embodiment of the present application technical solution, in order to better understand the embodiment of the present application Technological means, and can be implemented in accordance with the contents of the specification, and in order to allow above and other mesh of the embodiment of the present application , feature and advantage can be more clearly understood, the special specific embodiment for lifting the application below.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the interaction schematic diagram of authentication process in the prior art;
Fig. 2 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application one provides;
Fig. 3 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application two provides;
Fig. 4 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application three provides;
Fig. 5 is a kind of structural schematic diagram for certificate server that the embodiment of the present application four provides;
Fig. 6 is a kind of structural schematic diagram for certificate server that the embodiment of the present application five provides;
Fig. 7 is a kind of structural schematic diagram for user terminal that the embodiment of the present application six provides;
Fig. 8 is to authenticate the factor in identity identifying method provided by the embodiments of the present application to obtain flow chart;
Fig. 9 is the process interaction sequence figure of identity identifying method provided by the embodiments of the present application.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Embodiment one
Fig. 2 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application one provides.Such as Fig. 2 institute Show, this method comprises:
Step S210: the certification factor of user terminal is obtained according to the ID authentication request that user terminal is sent.
In the embodiment of the present application, it after the ID authentication request for receiving user terminal transmission, is asked from the authentication Seek the middle certification factor for obtaining user terminal.Wherein, the certification factor for including in the solicited message can be individually, be also possible to It is multiple.The type of the certification factor can be user name type, can be user password type, can be device-fingerprint type, can To be dynamic code type, it is also possible to behavioural habits type, can also be composite type multiple in the above-mentioned type.The application is real It applies example and this is not especially limited, those skilled in the art can flexible setting according to the actual situation.
Step S220: intelligent contract is created according to the certification factor, is prestored in intelligent contract and the certification factor is preset Operation result after operation.
The structure of the intelligence contract is divided into three parts, be respectively intelligent contract block chain account address, data portion and Program part, the program part are the procedure scripts generated according to the content of ID authentication request.The input parameter of the script is The above-mentioned certification factor, output result are that the result of default mathematic(al) manipulation is carried out to the above-mentioned certification factor.Wherein, the mathematic(al) manipulation packet It includes but is not limited to add, subtract, with, exclusive or and hash conversion etc..
Step S230: intelligent contract is broadcast in block chain, and intelligent contract block chain account address is sent to User terminal.
The effect of step S230 is the block chain account address of intelligent contract being supplied to user terminal, so that the intelligence Contract obtains the approval of user terminal on each node in network, facilitates the execution of subsequent step.The specific embodiment of the step Can be by those skilled in the art's flexible setting according to the actual situation, as long as can reach above-mentioned purpose, the present invention is to this It is not especially limited.
Step S240: the implementing result obtained after intelligent contract is executed using the certification factor according to user terminal and carries out identity Certification.
The certification factor got in step S210 is input in intelligent contract in the shell script of program part, will be obtained The implementing result obtained is compared with the operation result prestored.When implementing result is matched with operation result, authentication is confirmed Success;When implementing result and operation result mismatch, confirmation authentication failure.
In conclusion a kind of identity identifying method based on block chain provided by the embodiments of the present application can be by authentication information It stores in the intelligent contract in block chain.Thus one, on the one hand, the intelligent contract itself in block chain network can be utilized Characteristic, guarantee authentication information can not be tampered;On the other hand, authentication verification information is executed using intelligent contract internal processes Operation, to further improve safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application Has splendid safety.
Embodiment two
Fig. 3 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application two provides, the implementation The executing subject of example is preferably certificate server.As shown in figure 3, this method comprises:
Step S310: the certification factor of user terminal is obtained according to the ID authentication request that user terminal is sent.
In the embodiment of the present application, it after the ID authentication request for receiving user terminal transmission, is asked from the authentication Seek the middle certification factor for obtaining user terminal.Wherein, the certification factor for including in the solicited message can be individually, be also possible to It is multiple.The type of the certification factor can be user name type, can be user password type, can be device-fingerprint type, can To be dynamic code type, it is also possible to behavioural habits type, can also be composite type multiple in the above-mentioned type.The application is real It applies example and this is not especially limited, those skilled in the art can flexible setting according to the actual situation.
Wherein, the step of obtaining the certification factor of user terminal according to the ID authentication request that user terminal is sent is specific It is: determines the type of the certification factor according to the type of user terminal mark for including in ID authentication request;It is sent to user terminal Response message comprising authenticating factor pattern;Receive user terminal according to response message return with certification factor pattern match The certification factor.
This step in order to facilitate understanding is further elaborated on the tool of step S310 below with reference to a width process interaction figure Body realizes details.Fig. 8 is to authenticate the factor in identity identifying method provided by the embodiments of the present application to obtain flow chart, as shown in the figure: 8.1, user terminal sends ID authentication request to certificate server;8.2, certificate server according to the type of user terminal and is recognized The parameter for demonstrate,proving server itself, selects required certification factor pattern, which includes but is not limited to user name, uses Family password, device-fingerprint, dynamic code and behavioural habits etc..Later, certification required for certificate server is sent to user terminal Factor pattern requirement;8.3, user terminal is replied needed for certificate server according to the requirement of certificate server to certificate server The certification factor wanted.
Step S320: intelligent contract is created according to the certification factor.
Wherein, it is prestored in intelligent contract and carries out the operation result after default operation to the certification factor.The intelligence contract Structure is divided into three parts, is that intelligent contract block chain account address, data portion and program part, the program part are respectively The procedure script generated according to the content of ID authentication request.The input parameter of the script is the above-mentioned certification factor, exports result For the result for carrying out default mathematic(al) manipulation to the above-mentioned certification factor.Wherein, the mathematic(al) manipulation include but is not limited to add, subtract, with, it is different Or with hash conversion etc..
Step S330: intelligent contract is broadcast in block chain, and intelligent contract block chain account address is sent to User terminal.
Specifically, being broadcast to intelligent contract as the first transaction in block chain, wherein the output of the first transaction includes intelligence The block chain account address of contract, the cryptographic Hash of intelligent contract and the operation result after default operation can be carried out.Such intelligence Energy contract operates in block chain network, is a set of promise defined in digital form, and block chain becomes the participant of contract, bears Duty maintenance saves contract, and executes automatically.Meanwhile after the generation of intelligent contract, by the block chain account address of the intelligence contract It is sent to user terminal, facilitates the execution of subsequent step.The effect of step S330 is by the block chain account of intelligent contract Location is supplied to user terminal, and the specific embodiment of the step can flexibly be set according to the actual situation by those skilled in the art It sets, as long as can reach above-mentioned purpose, the present invention is not especially limited this.
Step S340: the implementing result obtained after intelligent contract is executed using the certification factor according to user terminal and carries out identity Certification;Wherein, when implementing result is matched with operation result, confirmation authentication success;When implementing result and operation result not When matching, confirmation authentication failure.
Wherein, user terminal executes the specific steps of intelligent contract using the certification factor are as follows: user terminal is handed over by second Easily execute intelligent contract, the input of second transaction includes block chain account address of user terminal, second transaction it is defeated It out include block chain account address and the certification factor of intelligent contract.
In the present embodiment, the implementing result obtained after intelligent contract is executed using the certification factor according to user terminal to carry out The step of authentication specifically: obtain after the certification factor that intelligent contract is provided according to user terminal carries out default operation and obtain Implementing result and implementing result matched with operation result after matching result, according to the matching result carry out identity recognize Card.Wherein, when implementing result is matched with operation result, confirmation authentication success;When implementing result and operation result not Timing, confirmation authentication failure.
In conclusion a kind of identity identifying method based on block chain provided by the embodiments of the present application can be by authentication information It stores in the intelligent contract in block chain.Thus one, on the one hand, the intelligent contract itself in block chain network can be utilized Characteristic, guarantee authentication information can not be tampered;On the other hand, authentication verification information is executed using intelligent contract internal processes Operation, to further improve safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application Has splendid safety.
Embodiment three
Fig. 4 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application three provides, the implementation The executing subject of example is preferably user terminal.As shown in figure 4, this method comprises:
Step S410: sending the ID authentication request of the certification factor comprising user terminal to certificate server, to confess It demonstrate,proves server and intelligent contract is created according to the certification factor, prestored in intelligent contract and carry out the fortune after default operation to the certification factor Calculate result.
Wherein, user terminal actively sends the ID authentication request comprising the certification factor to certificate server, which asks It asks including the single or multiple certification factors, which includes but is not limited to user name, user password, device-fingerprint, dynamic Code and behavioural habits etc..
In other embodiments, the ID authentication request of the certification factor comprising user terminal is sent to certificate server Step may also is that according to certificate server send certification factor pattern, to the certificate server send comprising with certification because ID authentication request of the subtype to the matched certification factor.In this step, user terminal is not wrapped to certificate server transmission Containing certification the factor ID authentication request, certificate server after receiving the request, according to type of user terminal and certificate server The type of the certification factor needed for parameter itself determines, the requirement of certification factor pattern, is finally used needed for then sending to user terminal Family terminal replys the required certification factor according to types entail.
Step S420: intelligent contract is executed using the certification factor, so that certificate server is according to the execution knot of intelligent contract Fruit carries out authentication;Wherein, the authentication success when implementing result is matched with operation result;When implementing result and operation knot Authentication fails when fruit mismatches.
Wherein, the step of executing intelligent contract using the certification factor executes intelligent contract specifically by the second transaction, The input of second transaction includes user terminal block chain account address, and the output of second transaction includes the block of intelligent contract Chain account address and the certification factor.
In the present embodiment, the implementing result obtained after intelligent contract is executed using the certification factor according to user terminal to carry out The step of authentication specifically: obtain after the certification factor that intelligent contract is provided according to user terminal carries out default operation and obtain Implementing result and implementing result matched with operation result after matching result, according to the matching result carry out identity recognize Card.Wherein, when implementing result is matched with operation result, confirmation authentication success;When implementing result and operation result not Timing, confirmation authentication failure.
In conclusion a kind of identity identifying method based on block chain provided by the embodiments of the present application can be by authentication information It stores in the intelligent contract in block chain.Thus one, on the one hand, the intelligent contract itself in block chain network can be utilized Characteristic, guarantee authentication information can not be tampered;On the other hand, authentication verification information is executed using intelligent contract internal processes Operation, to further improve safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application Has splendid safety.
To facilitate the understanding of the present invention, the tool of the above method is further elaborated below with reference to the process interaction figure of Fig. 9 Body realizes details: 9.1, user terminal sends ID authentication request to certificate server;9.2, certificate server is according in request Hold the procedure script for generating intelligent contract program part;9.3, certificate server is broadcasted with the transaction form of block chain to block chain The intelligence contract;9.4, the block chain account address of the intelligence contract is sent to user terminal by certificate server;9.5, user Terminal executes the intelligent contract of block chain with the transaction form of block chain;9.6, intelligent contract by the certification in certification request because The procedure script of son input program part obtains implementing result, compared with the mathematic(al) manipulation result in intelligent contract, if two As a result consistent, then pass through verification, each node verification intelligence contract in block chain broadcasts the intelligence after in block chain network Energy contract, is written block chain after reaching common understanding in block chain network, because including that certification takes in the output of above-mentioned intelligence contract The block chain account address of business device, so certificate server can receive authentication result, if result is that certification passes through, identity It authenticates successfully.
Example IV
Fig. 5 is a kind of structural schematic diagram for certificate server that the embodiment of the present application four provides.As shown in figure 5, the certification Server includes: certification factor module 510, intelligent contract module 520, authentication module 530, broadcast module 540 and anti- Present module 550.
Factor module 510 is authenticated, the ID authentication request for sending according to user terminal obtains the certification of user terminal The factor.
In the embodiment of the present application, factor module 510 is authenticated after the ID authentication request for receiving user terminal transmission, The certification factor of user terminal is obtained from the ID authentication request.Wherein, the certification factor for including in the solicited message can be with It is individually, to be also possible to multiple.The type of the certification factor can be user name type, can be user password type, can be Device-fingerprint type can be dynamic code type, be also possible to behavioural habits type, can also be group multiple in the above-mentioned type Close type.The embodiment of the present application is not especially limited this, and those skilled in the art can flexible setting according to the actual situation.
Intelligent contract module 520, for creating intelligent contract according to the certification factor, prestored in intelligent contract to certification because Son carries out the operation result after default operation.
The structure of the intelligence contract is divided into three parts, be respectively intelligent contract block chain account address, data portion and Program part, the program part are the procedure scripts generated according to the content of ID authentication request.The input parameter of the script is The above-mentioned certification factor, output result are that the result of default mathematic(al) manipulation is carried out to the above-mentioned certification factor.Wherein, the mathematic(al) manipulation packet It includes but is not limited to add, subtract, with, exclusive or and hash conversion etc..
Intelligent contract module 520 is also connected with broadcast module 540 and feedback module 550.
Wherein, broadcast module 540, for intelligent contract to be broadcast in block chain.Feedback module 550, being used for will be intelligent Contract block chain account address is sent to user terminal.The effect of broadcast module 540 and feedback module 550 is all intelligence The block chain account address of contract is supplied to user terminal, so that the intelligence contract obtains in network user terminal on each node Approve, facilitates subsequent operation.
Authentication module 530, for executing the execution obtained after intelligent contract using the certification factor according to user terminal As a result authentication is carried out;Wherein, when implementing result is matched with operation result, confirmation authentication success;Work as implementing result When being mismatched with operation result, confirmation authentication failure.
Authentication module 530 is input to intelligent contract intermediate range for the certification factor got in factor module 510 is authenticated In the shell script of preamble section, the implementing result of acquisition is compared with the operation result prestored.When implementing result and operation When as a result matching, confirmation authentication success;When implementing result and operation result mismatch, confirmation authentication failure.
In conclusion a kind of certificate server provided by the embodiments of the present application, can store authentication information to block chain In intelligent contract in.Thus one, on the one hand, can be guaranteed using the characteristic of the intelligent contract in block chain network itself Authentication information can not be tampered;On the other hand, the operation of authentication verification information is executed using intelligent contract internal processes, thus into One step improves safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application have it is splendid Safety.
Embodiment five
Fig. 6 is a kind of structural schematic diagram for certificate server that the embodiment of the present application five provides.As shown in fig. 6, the certification Server includes: certification factor module 610, intelligent contract module 620, authentication module 630, broadcast module 640 and anti- Present module 650.
Factor module 610 is authenticated, the ID authentication request for sending according to user terminal obtains the certification of user terminal The factor.
In the embodiment of the present application, factor module 610 is authenticated after the ID authentication request for receiving user terminal transmission, The certification factor of user terminal is obtained from the ID authentication request.Wherein, the certification factor for including in the solicited message can be with It is individually, to be also possible to multiple.The type of the certification factor can be user name type, can be user password type, can be Device-fingerprint type can be dynamic code type, be also possible to behavioural habits type, can also be group multiple in the above-mentioned type Close type.The embodiment of the present application is not especially limited this, and those skilled in the art can flexible setting according to the actual situation.
Wherein, certification factor module 610 is specifically used for: being identified according to the type of user terminal for including in ID authentication request Determine the type of the certification factor;The response message comprising certification factor pattern is sent to user terminal;Receive user terminal according to The certification factor to match with certification factor pattern that response message returns.
Intelligent contract module 620, for creating intelligent contract according to the certification factor, prestored in intelligent contract to certification because Son carries out the operation result after default operation.
The structure of the intelligence contract is divided into three parts, be respectively intelligent contract block chain account address, data portion and Program part, the program part are the procedure scripts generated according to the content of ID authentication request.The input parameter of the script is The above-mentioned certification factor, output result are that the result of default mathematic(al) manipulation is carried out to the above-mentioned certification factor.Wherein, the mathematic(al) manipulation packet It includes but is not limited to add, subtract, with, exclusive or and hash conversion etc..
Intelligent contract module 620 is connected with broadcast module 640.Broadcast module 640, for intelligent contract to be broadcast to area In block chain.Specifically, broadcast module 640 is broadcast to intelligent contract as the first transaction in block chain, wherein the first transaction Output include the block chain account address of intelligent contract, intelligent contract cryptographic Hash and carry out the operation knot after default operation Fruit.Such intelligence contract operates in block chain network, is a set of promise defined in digital form, and block chain becomes contract Participant, be responsible for maintenance and save contract, and execute automatically.
At the same time, intelligent contract module 620 is also connected with feedback module 650.Feedback module 650, being used for will be intelligent Contract block chain account address is sent to user terminal.After the generation of intelligent contract, feedback module is by the block of the intelligence contract Chain account address is sent to user terminal, facilitates subsequent operation.
Authentication module 630, for executing the execution obtained after intelligent contract using the certification factor according to user terminal As a result authentication is carried out;Wherein, when implementing result is matched with operation result, confirmation authentication success;Work as implementing result When being mismatched with operation result, confirmation authentication failure.
In the embodiment of the present application, authentication module 630 specifically includes: acquisition submodule 631, for obtaining intelligent conjunction The implementing result obtained after default operation and implementing result and operation knot are about carried out according to the certification factor that user terminal provides Fruit matched after matching result;Authentication sub module 632, for carrying out authentication according to the matching result.Wherein, when holding When row result is matched with operation result, confirmation authentication success;When implementing result and operation result mismatch, identity is confirmed Authentification failure.
The concrete operating principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, no longer superfluous herein It states.
In conclusion a kind of certificate server provided by the embodiments of the present application, can store authentication information to block chain In intelligent contract in.Thus one, on the one hand, can be guaranteed using the characteristic of the intelligent contract in block chain network itself Authentication information can not be tampered;On the other hand, the operation of authentication verification information is executed using intelligent contract internal processes, thus into One step improves safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application have it is splendid Safety.
Embodiment six
Fig. 7 is a kind of structural schematic diagram for user terminal that the embodiment of the present application six provides.As shown in fig. 7, the user is whole End includes: request sending module 710 and execution module 720.
Request sending module 710, for sending the authentication of the certification factor comprising user terminal to certificate server Request is prestored in intelligent contract and is carried out in advance to the certification factor so that certificate server creates intelligent contract according to the factor is authenticated If the operation result after operation.
Wherein, 710 active of request sending module sends the ID authentication request comprising the certification factor to certificate server, should Certification request includes the single or multiple certification factors, which includes but is not limited to that user name, user password, equipment refer to Line, dynamic code and behavioural habits etc..
In other embodiments, request sending module 710 can also be specifically used for: the certification sent according to certificate server Factor pattern is sent to the certificate server comprising the ID authentication request with certification factor pattern to the matched certification factor. In this step, request sending module 710 sends the ID authentication request for not including the certification factor, certification clothes to certificate server Device be engaged in after receiving the request, the type of the certification factor needed for being determined according to type of user terminal and certificate server itself parameter, Then factor pattern requirement is authenticated needed for sending to request sending module 710, last-minute plea sending module 710 is wanted according to type Seek the certification factor needed for replying.
Execution module 720, for executing intelligent contract using the certification factor, so that certificate server is according to intelligent contract Implementing result carries out authentication;Wherein, the authentication success when implementing result is matched with operation result;When implementing result with Authentication fails when operation result mismatches.
Wherein, execution module 720 is specifically used for: executing intelligent contract by the second transaction, the input of second transaction Including user terminal block chain account address, the output of second transaction includes block chain account address and the certification of intelligent contract The factor.
In the present embodiment, execution module 720 also particularly useful for: obtain the certification that intelligent contract provides according to user terminal The factor carries out the implementing result obtained after default operation and implementing result matched with operation result after matching result, root Authentication is carried out according to the matching result.Wherein, when implementing result is matched with operation result, confirmation authentication success;When When implementing result and operation result mismatch, confirmation authentication failure.
The concrete operating principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, no longer superfluous herein It states.
In conclusion a kind of user terminal provided by the embodiments of the present application, can store authentication information into block chain Intelligent contract in.Thus one, on the one hand, can guarantee to recognize using the characteristic of the intelligent contract in block chain network itself Card information can not be tampered;On the other hand, the operation that authentication verification information is executed using intelligent contract internal processes, thus into one Step improves safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application has splendid peace Quan Xing.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments Including certain features rather than other feature, but the combination of the feature of different embodiment means in the embodiment of the present application Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed It is one of any can in any combination mode come using.
The various component embodiments of the embodiment of the present application can be implemented in hardware, or in one or more processor The software module of upper operation is realized, or is implemented in a combination thereof.It will be understood by those of skill in the art that can practice It is middle realized using microprocessor or digital signal processor (DSP) some in the device according to the embodiment of the present application or The some or all functions of whole components.The embodiment of the present application is also implemented as executing method as described herein Some or all device or device programs (for example, computer program and computer program product).Such realization The program of the embodiment of the present application can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other shape Formula provides.
The embodiment of the present application is carried out it should be noted that above-described embodiment illustrates rather than the embodiment of the present application Limitation, and those skilled in the art can be designed alternative embodiment without departing from the scope of the appended claims. In the claims, any reference symbol between parentheses should not be configured to limitations on claims.Word " packet Containing " do not exclude the presence of element or step not listed in the claims.Word "a" or "an" located in front of the element is not arranged Except there are multiple such elements.The embodiment of the present application can by means of include several different elements hardware and by means of Properly programmed computer is realized.In the unit claims listing several devices, several in these devices can To be to be embodied by the same item of hardware.The use of word first, second, and third does not indicate any sequence. These words can be construed to title.

Claims (16)

1. a kind of identity identifying method based on block chain characterized by comprising
The certification factor of the user terminal is obtained according to the ID authentication request that user terminal is sent;
Intelligent contract is created according to the certification factor, is prestored in the intelligence contract and default fortune is carried out to the certification factor Operation result after calculation;
The intelligent contract is broadcast in block chain, and the intelligent contract block chain account address is sent to the use Family terminal;
The implementing result obtained after the intelligent contract, which is executed, using the certification factor according to the user terminal carries out identity Certification;Wherein, user terminal executes the intelligent contract of block chain with the transaction form of block chain, comes especially by the second transaction The intelligent contract is executed, the input of the second transaction includes the block chain account address of user terminal, the output packet of the second transaction Include block chain account address, the certification factor of intelligent contract;
Wherein, when the implementing result is matched with the operation result, confirmation authentication success;When the implementing result with When the operation result mismatches, confirmation authentication failure.
2. the method according to claim 1, wherein described be broadcast to the step in block chain for the intelligent contract Suddenly it specifically includes:
It is broadcast in block chain using the intelligent contract as the first transaction, the output of first transaction includes: intelligent contract Block chain account address, intelligent contract cryptographic Hash and carry out the operation result after default operation.
3. the method according to claim 1, wherein described utilize the certification factor according to the user terminal The step of implementing result obtained after the intelligent contract carries out authentication is executed to specifically include:
The intelligent contract is obtained to be held according to what the certification factor that user terminal provides obtain after the default operation Row as a result, and the implementing result matched with the operation result after matching result, according to the matching result into Row authentication.
4. the method according to claim 1, wherein the ID authentication request sent according to user terminal obtains The step of taking the certification factor of the user terminal specifically includes:
Certification factor pattern is determined according to the type of user terminal mark for including in the ID authentication request;
The response message comprising the certification factor pattern is sent to the user terminal;
Receive the certification factor to match with the certification factor pattern that the user terminal is returned according to the response message.
5. according to the method described in claim 4, wherein, the certification factor pattern includes at least one of the following: user Name type, user password type, device-fingerprint type, dynamic code type and behavioural habits type.
6. a kind of identity identifying method based on block chain characterized by comprising
The ID authentication request of the certification factor comprising user terminal is sent, to certificate server for the certificate server root Intelligent contract is created according to the certification factor, is prestored in the intelligence contract after carrying out default operation to the certification factor Operation result;
The intelligent contract is executed using the certification factor, so that the certificate server is according to the execution of the intelligent contract As a result authentication is carried out;Wherein, user terminal executes the intelligent contract of block chain with the transaction form of block chain, specific logical The second transaction is crossed to execute the intelligent contract, the input of the second transaction includes the block chain account address of user terminal, and second The output of transaction includes the block chain account address of intelligent contract, the certification factor;Wherein, when the implementing result and the operation Authentication success when as a result matching;When the implementing result and the operation result mismatch, authentication fails.
7. according to the method described in claim 6, it is characterized in that, described execute the intelligence conjunction using the certification factor About, the step of carrying out authentication according to the implementing result of the intelligent contract for the certificate server specifically includes:
The certification factor is supplied to the intelligent contract, so that the intelligent contract is according to certification factor progress Implementing result is obtained after default operation, and the matching result after the implementing result is matched with the operation result provides To the certificate server.
8. according to the method described in claim 6, wherein, it is described sent to certificate server include user terminal the certification factor ID authentication request the step of specifically include:
According to the certification factor pattern that certificate server is sent, Xiang Suoshu certificate server, which is sent, includes and the certification factor type The ID authentication request for the certification factor that type matches.
9. a kind of certificate server characterized by comprising
Authenticate factor module, the ID authentication request for being sent according to user terminal obtain the certification of the user terminal because Son;
Intelligent contract module prestores in the intelligence contract to described for creating intelligent contract according to the certification factor The certification factor carries out the operation result after default operation;
Broadcast module, for the intelligent contract to be broadcast in block chain;
Feedback module, for the intelligent contract block chain account address to be sent to the user terminal;
Authentication module is obtained after the intelligent contract for being executed using the certification factor according to the user terminal Implementing result carries out authentication;Wherein, user terminal executes the intelligent contract of block chain with the transaction form of block chain, tool Body executes the intelligent contract by the second transaction, and the input of the second transaction includes the block chain account address of user terminal, The output of second transaction includes the block chain account address of intelligent contract, the certification factor;Wherein, when the implementing result with it is described When operation result matches, confirmation authentication success;When the implementing result and the operation result mismatch, identity is confirmed Authentification failure.
10. certificate server according to claim 9, wherein the broadcast module is specifically used for:
It is broadcast in block chain using the intelligent contract as the first transaction, the output of first transaction includes: intelligent contract Block chain account address, intelligent contract cryptographic Hash and carry out the operation result after default operation.
11. certificate server according to claim 9, wherein the authentication module is specifically used for:
The intelligent contract is obtained to be held according to what the certification factor that user terminal provides obtain after the default operation Row as a result, and the implementing result matched with the operation result after matching result, according to the matching result into Row authentication.
12. certificate server according to claim 9, wherein the certification factor module is specifically used for:
Certification factor pattern is determined according to the type of user terminal mark for including in the ID authentication request;
The response message comprising the certification factor pattern is sent to the user terminal;
Receive the certification factor to match with the certification factor pattern that the user terminal is returned according to the response message.
13. certificate server according to claim 12, wherein the certification factor pattern includes at least one in following It is a: user name type, user password type, device-fingerprint type, dynamic code type and behavioural habits type.
14. a kind of user terminal characterized by comprising
Request sending module, for sending the ID authentication request of the certification factor comprising user terminal to certificate server, with Intelligent contract is created according to the certification factor for the certificate server, prestored in the intelligence contract to the certification because Son carries out the operation result after default operation;
Execution module, for executing the intelligent contract using the certification factor, so that the certificate server is according to The implementing result of intelligent contract carries out authentication;Wherein, user terminal executes block chain with the transaction form of block chain Intelligent contract executes the intelligent contract especially by the second transaction, and the input of the second transaction includes the block of user terminal Chain account address, the output of the second transaction include the block chain account address of intelligent contract, the certification factor;Wherein, it is held when described Authentication success when row result is matched with the operation result;The body when the implementing result and the operation result mismatch Part authentification failure.
15. user terminal according to claim 14, wherein the execution module is specifically used for:
The certification factor is supplied to the intelligent contract, so that the intelligent contract is according to certification factor progress Implementing result is obtained after default operation, and the matching result after the implementing result is matched with the operation result provides To the certificate server.
16. user terminal according to claim 14, wherein request sending module is specifically used for:
According to the certification factor pattern that certificate server is sent, Xiang Suoshu certificate server, which is sent, includes and the certification factor type The ID authentication request for the certification factor that type matches.
CN201611046691.4A 2016-11-23 2016-11-23 Identity authentication method based on block chain, authentication server and user terminal Active CN106453407B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611046691.4A CN106453407B (en) 2016-11-23 2016-11-23 Identity authentication method based on block chain, authentication server and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611046691.4A CN106453407B (en) 2016-11-23 2016-11-23 Identity authentication method based on block chain, authentication server and user terminal

Publications (2)

Publication Number Publication Date
CN106453407A CN106453407A (en) 2017-02-22
CN106453407B true CN106453407B (en) 2019-10-15

Family

ID=58218107

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611046691.4A Active CN106453407B (en) 2016-11-23 2016-11-23 Identity authentication method based on block chain, authentication server and user terminal

Country Status (1)

Country Link
CN (1) CN106453407B (en)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106920098B (en) * 2017-03-07 2021-02-02 中钞信用卡产业发展有限公司杭州区块链技术研究院 Digital bill transaction monitoring system and method based on block chain and digital currency
US10984483B2 (en) 2017-03-19 2021-04-20 International Business Machines Corporation Cognitive regulatory compliance automation of blockchain transactions
US10515233B2 (en) 2017-03-19 2019-12-24 International Business Machines Corporation Automatic generating analytics from blockchain data
US10452998B2 (en) 2017-03-19 2019-10-22 International Business Machines Corporation Cognitive blockchain automation and management
CN107248074A (en) 2017-03-29 2017-10-13 阿里巴巴集团控股有限公司 A kind of method for processing business and equipment based on block chain
CN108881167B (en) * 2017-05-16 2021-06-22 江峰 Intelligent contract of finite field block chain system
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107172085B (en) * 2017-06-30 2018-06-22 浙江华信区块链科技服务有限公司 Active defense method and node based on block chain intelligence contract
CN107370730B (en) 2017-07-14 2020-06-02 创新先进技术有限公司 Login information processing method and equipment
CN107493162A (en) * 2017-07-25 2017-12-19 中国联合网络通信集团有限公司 The implementation method and device of block chain node
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107465673A (en) * 2017-07-27 2017-12-12 深圳市易成自动驾驶技术有限公司 Identity identifying method, device and the computer-readable recording medium of vehicle
CN107820690B (en) * 2017-08-21 2020-11-10 达闼科技成都有限公司 Information selection method and device, electronic equipment and computer readable storage medium
CN107507091A (en) * 2017-09-07 2017-12-22 复旦大学 Enhanced data Right protection method based on block chain and intelligent contract
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN107682331B (en) * 2017-09-28 2020-05-12 复旦大学 Block chain-based Internet of things identity authentication method
CN109698748B (en) * 2017-10-20 2021-11-02 成都高新信息技术研究院 Block chain authentication method and system based on physical signs
CN110365489B (en) * 2017-11-15 2021-02-05 财付通支付科技有限公司 Business auditing method, device and storage medium
CN108228744B (en) * 2017-12-19 2020-12-11 深圳市轱辘车联数据技术有限公司 Vehicle diagnosis data management method and device
CN111512658B (en) * 2017-12-19 2023-05-02 海拉有限双合股份公司 Method and system for decentralized digital authentication
CN108540335B (en) * 2017-12-20 2021-11-12 深圳市轱辘车联数据技术有限公司 Management method and management device for equipment analysis report
CN107967608A (en) * 2017-12-21 2018-04-27 北京智帮帮科技有限公司 A kind of intelligent contract system based on block chain technology
CN108322558B (en) * 2017-12-28 2021-01-01 北京欧链科技有限公司 Method, device and system for associating address information
CN108235805B (en) * 2017-12-29 2021-07-30 达闼机器人有限公司 Account unifying method and device and storage medium
CN108347444A (en) * 2018-02-26 2018-07-31 深圳智乾区块链科技有限公司 Identity identifying method, device based on block chain and computer readable storage medium
CN108512861A (en) * 2018-04-18 2018-09-07 北京百悟科技有限公司 A kind of authentication method and device, computer readable storage medium of cloud platform
CN108805573B (en) * 2018-04-21 2022-04-15 深圳市元征科技股份有限公司 Information verification method, server and storage medium
CN108777675B (en) * 2018-04-26 2020-04-14 平安科技(深圳)有限公司 Electronic device, block chain-based identity authentication method, and computer storage medium
CN108737418B (en) * 2018-05-22 2020-09-15 飞天诚信科技股份有限公司 Identity authentication method and system based on block chain
CN108924089B (en) * 2018-05-29 2021-11-09 武汉斗鱼网络科技有限公司 Client device identification method and device and client device
CN108769013A (en) * 2018-05-29 2018-11-06 浪潮软件集团有限公司 Identity registration method and device based on Ether house
CN109034832A (en) * 2018-06-13 2018-12-18 湖南搜云网络科技股份有限公司 The information processing method and device of block chain, information processing node and storage medium
CN109088866B (en) * 2018-08-02 2021-02-19 北京百悟科技有限公司 Multi-cloud platform unified identity authentication method and device based on alliance chain
CN109327475B (en) * 2018-11-30 2021-04-09 深圳市元征科技股份有限公司 Multi-layer identity authentication method, device, equipment and storage medium
CN109635575A (en) * 2018-11-30 2019-04-16 无锡井通网络科技有限公司 Intelligent contract signs method and device
CN110032846B (en) * 2018-11-30 2021-11-02 创新先进技术有限公司 Identity data anti-misuse method and device and electronic equipment
CN110033363B (en) * 2018-12-14 2024-01-23 创新先进技术有限公司 Event processing method and device based on block chain and electronic equipment
CN109978551A (en) * 2019-03-29 2019-07-05 北京投肯科技有限公司 A kind of account information confirmation and method for retrieving and device based on block chain
CN110334681B (en) * 2019-07-12 2020-12-01 蚌埠科睿达机械设计有限公司 Finger vein identity recognition method and system based on block chain
CN110599190B (en) * 2019-09-27 2022-10-21 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN111355726B (en) * 2020-02-26 2021-02-02 登录易(深圳)科技有限公司 Identity authorization login method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320262A (en) * 2014-11-05 2015-01-28 中国科学院合肥物质科学研究院 User public key address binding, searching and verifying method and system based on crypto currency open account book technology
CN104392354A (en) * 2014-11-05 2015-03-04 中国科学院合肥物质科学研究院 Association and retrieval method and system used for public key addresses and user accounts of crypto-currency
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105893042A (en) * 2016-03-31 2016-08-24 北京航空航天大学 Intelligent contract implementation method based on block chain
CN105931052A (en) * 2016-04-21 2016-09-07 四川大学 Virtual currency transaction validation method based on block chain multi-factor cross-validation
CN106101242A (en) * 2016-06-24 2016-11-09 深圳前海微众银行股份有限公司 The construction method of block chain cloud service platform and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320262A (en) * 2014-11-05 2015-01-28 中国科学院合肥物质科学研究院 User public key address binding, searching and verifying method and system based on crypto currency open account book technology
CN104392354A (en) * 2014-11-05 2015-03-04 中国科学院合肥物质科学研究院 Association and retrieval method and system used for public key addresses and user accounts of crypto-currency
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105893042A (en) * 2016-03-31 2016-08-24 北京航空航天大学 Intelligent contract implementation method based on block chain
CN105931052A (en) * 2016-04-21 2016-09-07 四川大学 Virtual currency transaction validation method based on block chain multi-factor cross-validation
CN106101242A (en) * 2016-06-24 2016-11-09 深圳前海微众银行股份有限公司 The construction method of block chain cloud service platform and device

Also Published As

Publication number Publication date
CN106453407A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN106453407B (en) Identity authentication method based on block chain, authentication server and user terminal
CN106533696B (en) Identity identifying method, certificate server and user terminal based on block chain
CN107483509B (en) A kind of auth method, server and readable storage medium storing program for executing
CN105897782B (en) A kind of processing method and processing device of the call request for interface
CN104639562B (en) A kind of system of pushing certification and the method for work of equipment
CN104199654B (en) The call method and device of open platform
US9787672B1 (en) Method and system for smartcard emulation
CN106534150B (en) Identity identifying method and system, user terminal, Website server
CN105101183B (en) The method and system that privacy content on mobile terminal is protected
CN106330838B (en) A kind of dynamic signature method and the client and server using this method
CN110493237A (en) Identity management method, device, computer equipment and storage medium
US9398024B2 (en) System and method for reliably authenticating an appliance
CN110381075B (en) Block chain-based equipment identity authentication method and device
CN104506321B (en) A kind of method of seed data in renewal dynamic token
CN109714769A (en) Information binding method, device, equipment and storage medium
Jan et al. An authentication scheme for distributed computing environment
CN111737715A (en) Decentralized electronic contract online signing method and system
CN108600234A (en) A kind of auth method, device and mobile terminal
CN109784024A (en) One kind authenticating FIDO method and system based on the polyfactorial quick online identity of more authenticators
CN107493293A (en) A kind of method of sip terminal access authentication
CN111131318B (en) Decentralized key management and distribution method, system and storage medium
CN108768928A (en) A kind of information acquisition method, terminal and server
CN110505056A (en) A kind of collaboration endorsement method and device for supporting credible display
CN107395566A (en) Authentication method and device
CN114679276B (en) Identity authentication method and device of time-based one-time password algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 3F301, C2 Building, 2.5 Industrial Park, No. 88 Dongchang Road, Suzhou Industrial Park, Jiangsu Province, 215000

Applicant after: JIANGSU PAYEGIS TECHNOLOGY CO., LTD.

Address before: Suzhou City, Jiangsu province 215021 East Road, Suzhou Industrial Park, No. 88 building 2.5 Industrial Park building C2 4F

Applicant before: JIANGSU PAYEGIS TECHNOLOGY CO., LTD.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant