CN106453407B - Identity authentication method based on block chain, authentication server and user terminal - Google Patents
Identity authentication method based on block chain, authentication server and user terminal Download PDFInfo
- Publication number
- CN106453407B CN106453407B CN201611046691.4A CN201611046691A CN106453407B CN 106453407 B CN106453407 B CN 106453407B CN 201611046691 A CN201611046691 A CN 201611046691A CN 106453407 B CN106453407 B CN 106453407B
- Authority
- CN
- China
- Prior art keywords
- intelligent contract
- user terminal
- certification factor
- block chain
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000012790 confirmation Methods 0.000 claims description 24
- 230000003542 behavioural effect Effects 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 8
- 230000008569 process Effects 0.000 description 12
- 238000013515 script Methods 0.000 description 12
- 238000012795 verification Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 5
- 235000013399 edible fruits Nutrition 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Power Engineering (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the application discloses an identity authentication method based on a block chain, an authentication server and a user terminal, and belongs to the technical field of identity recognition. The method comprises the following steps: acquiring an authentication factor of the user terminal according to an identity authentication request sent by the user terminal; creating an intelligent contract according to the authentication factor, wherein an operation result obtained after preset operation is carried out on the authentication factor is prestored in the intelligent contract; broadcasting the intelligent contract into the blockchain, and sending the intelligent contract blockchain account address to the user terminal; performing identity authentication according to an execution result obtained after the user terminal executes the intelligent contract by using the authentication factor; when the execution result is matched with the operation result, the identity authentication is confirmed to be successful; and when the execution result is not matched with the operation result, the identity authentication is confirmed to be failed. Therefore, the identity authentication method in the embodiment of the application has excellent security.
Description
Technical field
The invention relates to identity identification technical fields, more particularly to the identity identifying method based on block chain, recognize
Demonstrate,prove server and user terminal.
Background technique
Authentication refers to the process of confirmation operation person's identity in computer and computer network system, so that it is determined that
Whether the user has access and access right to certain resource, and then enables the access strategy of computer and networks system
It reliably and efficiently executes, prevents attacker from palming off the access authority that legitimate user obtains resource, guarantee the peace of system and data
Entirely, and authorization visitor legitimate interests.
As shown in Figure 1, in traditional third party's identity authorization system, it is assumed that application server A needs to confirm the body of user B
Part, then it includes to answer in the request that main flow is as follows: 1.1, user B, which sends ID authentication request to third party authentication server C,
The information required with server A;1.2, third party authentication server C verifies the request received, by corresponding after verifying
It is signed with the information that server A requires, the authentication information after signature is then returned into user B, which includes
The signature that the information that application server A is required carries out;1.3, user B sends authentication information, certification letter to application server A
The signature carried out in breath comprising the desired information of third party authentication server C application server A;1.4, application server A root
According to signature, the identity of user B is verified, and verification result is returned into user B.
But inventor has found in the implementation of the present invention, at least there are following problems in mode in the prior art:
Because third party authentication server C logs in the information of application server A by user B is received, if third party authentication server C goes out
Existing information leakage, it will material risk is caused to user B and application server A.
Summary of the invention
In view of the above problems, propose the embodiment of the present application in order to provide it is a kind of solve the above problems based on block chain
Identity identifying method, certificate server and user terminal.
According to the one aspect of the embodiment of the present application, a kind of identity identifying method based on block chain is provided, comprising: root
The certification factor of user terminal is obtained according to the ID authentication request that user terminal is sent;Intelligent contract is created according to the certification factor,
It is prestored in intelligent contract and carries out the operation result after default operation to the certification factor;Intelligent contract is broadcast in block chain,
And intelligent contract block chain account address is sent to user terminal;Intelligence is executed using the certification factor according to user terminal to close
The implementing result about obtained afterwards carries out authentication;Wherein, when implementing result is matched with operation result, confirmation authentication at
Function;When implementing result and operation result mismatch, confirmation authentication failure.
According to the other side of the embodiment of the present application, a kind of identity identifying method based on block chain is provided, comprising:
To certificate server send comprising user terminal the certification factor ID authentication request, for certificate server according to authenticate because
Son creates intelligent contract, prestores in intelligent contract and carries out the operation result after default operation to the certification factor;Using certification because
Son executes intelligent contract, so that certificate server carries out authentication according to the implementing result of intelligent contract;Wherein, when executing knot
Authentication success when fruit matches with operation result;When implementing result and operation result mismatch, authentication fails.
According to the other side of the embodiment of the present application, a kind of certificate server is provided, comprising: certification factor module,
ID authentication request for being sent according to user terminal obtains the certification factor of user terminal;Intelligent contract module is used for root
Intelligent contract is created according to the certification factor, is prestored in intelligent contract and carries out the operation result after default operation to the certification factor;Extensively
Broadcasting module, for intelligent contract to be broadcast in block chain;Feedback module, for sending intelligent contract block chain account address
To user terminal;Authentication module, for executing the execution obtained after intelligent contract using the certification factor according to user terminal
As a result authentication is carried out;Wherein, when implementing result is matched with operation result, confirmation authentication success;Work as implementing result
When being mismatched with operation result, confirmation authentication failure.
According to the other side of the embodiment of the present application, a kind of user terminal is provided, comprising: request sending module is used
In the ID authentication request for sending the certification factor comprising user terminal to certificate server, so that certificate server is according to certification
The factor creates intelligent contract, prestores in intelligent contract and carries out the operation result after default operation to the certification factor;Execution module,
For executing intelligent contract using the certification factor, recognize so that certificate server carries out identity according to the implementing result of intelligent contract
Card;Wherein, the authentication success when implementing result is matched with operation result;The body when implementing result and operation result mismatch
Part authentification failure.
In a kind of identity identifying method based on block chain provided by the embodiments of the present application, certificate server and user terminal
In, authentication information can be stored in the intelligent contract into block chain.Thus one, on the one hand, block link network can be utilized
The characteristic of intelligent contract in network itself guarantees that authentication information can not be tampered;On the other hand, intelligent contract internal processes are utilized
The operation for executing authentication verification information, to further improve safety when authentication.It can be seen that the application is implemented
Identification authentication mode in example has splendid safety.
Above description is only the general introduction of the embodiment of the present application technical solution, in order to better understand the embodiment of the present application
Technological means, and can be implemented in accordance with the contents of the specification, and in order to allow above and other mesh of the embodiment of the present application
, feature and advantage can be more clearly understood, the special specific embodiment for lifting the application below.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys
The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove
Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the interaction schematic diagram of authentication process in the prior art;
Fig. 2 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application one provides;
Fig. 3 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application two provides;
Fig. 4 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application three provides;
Fig. 5 is a kind of structural schematic diagram for certificate server that the embodiment of the present application four provides;
Fig. 6 is a kind of structural schematic diagram for certificate server that the embodiment of the present application five provides;
Fig. 7 is a kind of structural schematic diagram for user terminal that the embodiment of the present application six provides;
Fig. 8 is to authenticate the factor in identity identifying method provided by the embodiments of the present application to obtain flow chart;
Fig. 9 is the process interaction sequence figure of identity identifying method provided by the embodiments of the present application.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Embodiment one
Fig. 2 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application one provides.Such as Fig. 2 institute
Show, this method comprises:
Step S210: the certification factor of user terminal is obtained according to the ID authentication request that user terminal is sent.
In the embodiment of the present application, it after the ID authentication request for receiving user terminal transmission, is asked from the authentication
Seek the middle certification factor for obtaining user terminal.Wherein, the certification factor for including in the solicited message can be individually, be also possible to
It is multiple.The type of the certification factor can be user name type, can be user password type, can be device-fingerprint type, can
To be dynamic code type, it is also possible to behavioural habits type, can also be composite type multiple in the above-mentioned type.The application is real
It applies example and this is not especially limited, those skilled in the art can flexible setting according to the actual situation.
Step S220: intelligent contract is created according to the certification factor, is prestored in intelligent contract and the certification factor is preset
Operation result after operation.
The structure of the intelligence contract is divided into three parts, be respectively intelligent contract block chain account address, data portion and
Program part, the program part are the procedure scripts generated according to the content of ID authentication request.The input parameter of the script is
The above-mentioned certification factor, output result are that the result of default mathematic(al) manipulation is carried out to the above-mentioned certification factor.Wherein, the mathematic(al) manipulation packet
It includes but is not limited to add, subtract, with, exclusive or and hash conversion etc..
Step S230: intelligent contract is broadcast in block chain, and intelligent contract block chain account address is sent to
User terminal.
The effect of step S230 is the block chain account address of intelligent contract being supplied to user terminal, so that the intelligence
Contract obtains the approval of user terminal on each node in network, facilitates the execution of subsequent step.The specific embodiment of the step
Can be by those skilled in the art's flexible setting according to the actual situation, as long as can reach above-mentioned purpose, the present invention is to this
It is not especially limited.
Step S240: the implementing result obtained after intelligent contract is executed using the certification factor according to user terminal and carries out identity
Certification.
The certification factor got in step S210 is input in intelligent contract in the shell script of program part, will be obtained
The implementing result obtained is compared with the operation result prestored.When implementing result is matched with operation result, authentication is confirmed
Success;When implementing result and operation result mismatch, confirmation authentication failure.
In conclusion a kind of identity identifying method based on block chain provided by the embodiments of the present application can be by authentication information
It stores in the intelligent contract in block chain.Thus one, on the one hand, the intelligent contract itself in block chain network can be utilized
Characteristic, guarantee authentication information can not be tampered;On the other hand, authentication verification information is executed using intelligent contract internal processes
Operation, to further improve safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application
Has splendid safety.
Embodiment two
Fig. 3 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application two provides, the implementation
The executing subject of example is preferably certificate server.As shown in figure 3, this method comprises:
Step S310: the certification factor of user terminal is obtained according to the ID authentication request that user terminal is sent.
In the embodiment of the present application, it after the ID authentication request for receiving user terminal transmission, is asked from the authentication
Seek the middle certification factor for obtaining user terminal.Wherein, the certification factor for including in the solicited message can be individually, be also possible to
It is multiple.The type of the certification factor can be user name type, can be user password type, can be device-fingerprint type, can
To be dynamic code type, it is also possible to behavioural habits type, can also be composite type multiple in the above-mentioned type.The application is real
It applies example and this is not especially limited, those skilled in the art can flexible setting according to the actual situation.
Wherein, the step of obtaining the certification factor of user terminal according to the ID authentication request that user terminal is sent is specific
It is: determines the type of the certification factor according to the type of user terminal mark for including in ID authentication request;It is sent to user terminal
Response message comprising authenticating factor pattern;Receive user terminal according to response message return with certification factor pattern match
The certification factor.
This step in order to facilitate understanding is further elaborated on the tool of step S310 below with reference to a width process interaction figure
Body realizes details.Fig. 8 is to authenticate the factor in identity identifying method provided by the embodiments of the present application to obtain flow chart, as shown in the figure:
8.1, user terminal sends ID authentication request to certificate server;8.2, certificate server according to the type of user terminal and is recognized
The parameter for demonstrate,proving server itself, selects required certification factor pattern, which includes but is not limited to user name, uses
Family password, device-fingerprint, dynamic code and behavioural habits etc..Later, certification required for certificate server is sent to user terminal
Factor pattern requirement;8.3, user terminal is replied needed for certificate server according to the requirement of certificate server to certificate server
The certification factor wanted.
Step S320: intelligent contract is created according to the certification factor.
Wherein, it is prestored in intelligent contract and carries out the operation result after default operation to the certification factor.The intelligence contract
Structure is divided into three parts, is that intelligent contract block chain account address, data portion and program part, the program part are respectively
The procedure script generated according to the content of ID authentication request.The input parameter of the script is the above-mentioned certification factor, exports result
For the result for carrying out default mathematic(al) manipulation to the above-mentioned certification factor.Wherein, the mathematic(al) manipulation include but is not limited to add, subtract, with, it is different
Or with hash conversion etc..
Step S330: intelligent contract is broadcast in block chain, and intelligent contract block chain account address is sent to
User terminal.
Specifically, being broadcast to intelligent contract as the first transaction in block chain, wherein the output of the first transaction includes intelligence
The block chain account address of contract, the cryptographic Hash of intelligent contract and the operation result after default operation can be carried out.Such intelligence
Energy contract operates in block chain network, is a set of promise defined in digital form, and block chain becomes the participant of contract, bears
Duty maintenance saves contract, and executes automatically.Meanwhile after the generation of intelligent contract, by the block chain account address of the intelligence contract
It is sent to user terminal, facilitates the execution of subsequent step.The effect of step S330 is by the block chain account of intelligent contract
Location is supplied to user terminal, and the specific embodiment of the step can flexibly be set according to the actual situation by those skilled in the art
It sets, as long as can reach above-mentioned purpose, the present invention is not especially limited this.
Step S340: the implementing result obtained after intelligent contract is executed using the certification factor according to user terminal and carries out identity
Certification;Wherein, when implementing result is matched with operation result, confirmation authentication success;When implementing result and operation result not
When matching, confirmation authentication failure.
Wherein, user terminal executes the specific steps of intelligent contract using the certification factor are as follows: user terminal is handed over by second
Easily execute intelligent contract, the input of second transaction includes block chain account address of user terminal, second transaction it is defeated
It out include block chain account address and the certification factor of intelligent contract.
In the present embodiment, the implementing result obtained after intelligent contract is executed using the certification factor according to user terminal to carry out
The step of authentication specifically: obtain after the certification factor that intelligent contract is provided according to user terminal carries out default operation and obtain
Implementing result and implementing result matched with operation result after matching result, according to the matching result carry out identity recognize
Card.Wherein, when implementing result is matched with operation result, confirmation authentication success;When implementing result and operation result not
Timing, confirmation authentication failure.
In conclusion a kind of identity identifying method based on block chain provided by the embodiments of the present application can be by authentication information
It stores in the intelligent contract in block chain.Thus one, on the one hand, the intelligent contract itself in block chain network can be utilized
Characteristic, guarantee authentication information can not be tampered;On the other hand, authentication verification information is executed using intelligent contract internal processes
Operation, to further improve safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application
Has splendid safety.
Embodiment three
Fig. 4 is a kind of flow chart for identity identifying method based on block chain that the embodiment of the present application three provides, the implementation
The executing subject of example is preferably user terminal.As shown in figure 4, this method comprises:
Step S410: sending the ID authentication request of the certification factor comprising user terminal to certificate server, to confess
It demonstrate,proves server and intelligent contract is created according to the certification factor, prestored in intelligent contract and carry out the fortune after default operation to the certification factor
Calculate result.
Wherein, user terminal actively sends the ID authentication request comprising the certification factor to certificate server, which asks
It asks including the single or multiple certification factors, which includes but is not limited to user name, user password, device-fingerprint, dynamic
Code and behavioural habits etc..
In other embodiments, the ID authentication request of the certification factor comprising user terminal is sent to certificate server
Step may also is that according to certificate server send certification factor pattern, to the certificate server send comprising with certification because
ID authentication request of the subtype to the matched certification factor.In this step, user terminal is not wrapped to certificate server transmission
Containing certification the factor ID authentication request, certificate server after receiving the request, according to type of user terminal and certificate server
The type of the certification factor needed for parameter itself determines, the requirement of certification factor pattern, is finally used needed for then sending to user terminal
Family terminal replys the required certification factor according to types entail.
Step S420: intelligent contract is executed using the certification factor, so that certificate server is according to the execution knot of intelligent contract
Fruit carries out authentication;Wherein, the authentication success when implementing result is matched with operation result;When implementing result and operation knot
Authentication fails when fruit mismatches.
Wherein, the step of executing intelligent contract using the certification factor executes intelligent contract specifically by the second transaction,
The input of second transaction includes user terminal block chain account address, and the output of second transaction includes the block of intelligent contract
Chain account address and the certification factor.
In the present embodiment, the implementing result obtained after intelligent contract is executed using the certification factor according to user terminal to carry out
The step of authentication specifically: obtain after the certification factor that intelligent contract is provided according to user terminal carries out default operation and obtain
Implementing result and implementing result matched with operation result after matching result, according to the matching result carry out identity recognize
Card.Wherein, when implementing result is matched with operation result, confirmation authentication success;When implementing result and operation result not
Timing, confirmation authentication failure.
In conclusion a kind of identity identifying method based on block chain provided by the embodiments of the present application can be by authentication information
It stores in the intelligent contract in block chain.Thus one, on the one hand, the intelligent contract itself in block chain network can be utilized
Characteristic, guarantee authentication information can not be tampered;On the other hand, authentication verification information is executed using intelligent contract internal processes
Operation, to further improve safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application
Has splendid safety.
To facilitate the understanding of the present invention, the tool of the above method is further elaborated below with reference to the process interaction figure of Fig. 9
Body realizes details: 9.1, user terminal sends ID authentication request to certificate server;9.2, certificate server is according in request
Hold the procedure script for generating intelligent contract program part;9.3, certificate server is broadcasted with the transaction form of block chain to block chain
The intelligence contract;9.4, the block chain account address of the intelligence contract is sent to user terminal by certificate server;9.5, user
Terminal executes the intelligent contract of block chain with the transaction form of block chain;9.6, intelligent contract by the certification in certification request because
The procedure script of son input program part obtains implementing result, compared with the mathematic(al) manipulation result in intelligent contract, if two
As a result consistent, then pass through verification, each node verification intelligence contract in block chain broadcasts the intelligence after in block chain network
Energy contract, is written block chain after reaching common understanding in block chain network, because including that certification takes in the output of above-mentioned intelligence contract
The block chain account address of business device, so certificate server can receive authentication result, if result is that certification passes through, identity
It authenticates successfully.
Example IV
Fig. 5 is a kind of structural schematic diagram for certificate server that the embodiment of the present application four provides.As shown in figure 5, the certification
Server includes: certification factor module 510, intelligent contract module 520, authentication module 530, broadcast module 540 and anti-
Present module 550.
In the embodiment of the present application, factor module 510 is authenticated after the ID authentication request for receiving user terminal transmission,
The certification factor of user terminal is obtained from the ID authentication request.Wherein, the certification factor for including in the solicited message can be with
It is individually, to be also possible to multiple.The type of the certification factor can be user name type, can be user password type, can be
Device-fingerprint type can be dynamic code type, be also possible to behavioural habits type, can also be group multiple in the above-mentioned type
Close type.The embodiment of the present application is not especially limited this, and those skilled in the art can flexible setting according to the actual situation.
The structure of the intelligence contract is divided into three parts, be respectively intelligent contract block chain account address, data portion and
Program part, the program part are the procedure scripts generated according to the content of ID authentication request.The input parameter of the script is
The above-mentioned certification factor, output result are that the result of default mathematic(al) manipulation is carried out to the above-mentioned certification factor.Wherein, the mathematic(al) manipulation packet
It includes but is not limited to add, subtract, with, exclusive or and hash conversion etc..
Wherein, broadcast module 540, for intelligent contract to be broadcast in block chain.Feedback module 550, being used for will be intelligent
Contract block chain account address is sent to user terminal.The effect of broadcast module 540 and feedback module 550 is all intelligence
The block chain account address of contract is supplied to user terminal, so that the intelligence contract obtains in network user terminal on each node
Approve, facilitates subsequent operation.
In conclusion a kind of certificate server provided by the embodiments of the present application, can store authentication information to block chain
In intelligent contract in.Thus one, on the one hand, can be guaranteed using the characteristic of the intelligent contract in block chain network itself
Authentication information can not be tampered;On the other hand, the operation of authentication verification information is executed using intelligent contract internal processes, thus into
One step improves safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application have it is splendid
Safety.
Embodiment five
Fig. 6 is a kind of structural schematic diagram for certificate server that the embodiment of the present application five provides.As shown in fig. 6, the certification
Server includes: certification factor module 610, intelligent contract module 620, authentication module 630, broadcast module 640 and anti-
Present module 650.
In the embodiment of the present application, factor module 610 is authenticated after the ID authentication request for receiving user terminal transmission,
The certification factor of user terminal is obtained from the ID authentication request.Wherein, the certification factor for including in the solicited message can be with
It is individually, to be also possible to multiple.The type of the certification factor can be user name type, can be user password type, can be
Device-fingerprint type can be dynamic code type, be also possible to behavioural habits type, can also be group multiple in the above-mentioned type
Close type.The embodiment of the present application is not especially limited this, and those skilled in the art can flexible setting according to the actual situation.
Wherein, certification factor module 610 is specifically used for: being identified according to the type of user terminal for including in ID authentication request
Determine the type of the certification factor;The response message comprising certification factor pattern is sent to user terminal;Receive user terminal according to
The certification factor to match with certification factor pattern that response message returns.
The structure of the intelligence contract is divided into three parts, be respectively intelligent contract block chain account address, data portion and
Program part, the program part are the procedure scripts generated according to the content of ID authentication request.The input parameter of the script is
The above-mentioned certification factor, output result are that the result of default mathematic(al) manipulation is carried out to the above-mentioned certification factor.Wherein, the mathematic(al) manipulation packet
It includes but is not limited to add, subtract, with, exclusive or and hash conversion etc..
At the same time, intelligent contract module 620 is also connected with feedback module 650.Feedback module 650, being used for will be intelligent
Contract block chain account address is sent to user terminal.After the generation of intelligent contract, feedback module is by the block of the intelligence contract
Chain account address is sent to user terminal, facilitates subsequent operation.
In the embodiment of the present application, authentication module 630 specifically includes: acquisition submodule 631, for obtaining intelligent conjunction
The implementing result obtained after default operation and implementing result and operation knot are about carried out according to the certification factor that user terminal provides
Fruit matched after matching result;Authentication sub module 632, for carrying out authentication according to the matching result.Wherein, when holding
When row result is matched with operation result, confirmation authentication success;When implementing result and operation result mismatch, identity is confirmed
Authentification failure.
The concrete operating principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, no longer superfluous herein
It states.
In conclusion a kind of certificate server provided by the embodiments of the present application, can store authentication information to block chain
In intelligent contract in.Thus one, on the one hand, can be guaranteed using the characteristic of the intelligent contract in block chain network itself
Authentication information can not be tampered;On the other hand, the operation of authentication verification information is executed using intelligent contract internal processes, thus into
One step improves safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application have it is splendid
Safety.
Embodiment six
Fig. 7 is a kind of structural schematic diagram for user terminal that the embodiment of the present application six provides.As shown in fig. 7, the user is whole
End includes: request sending module 710 and execution module 720.
Request sending module 710, for sending the authentication of the certification factor comprising user terminal to certificate server
Request is prestored in intelligent contract and is carried out in advance to the certification factor so that certificate server creates intelligent contract according to the factor is authenticated
If the operation result after operation.
Wherein, 710 active of request sending module sends the ID authentication request comprising the certification factor to certificate server, should
Certification request includes the single or multiple certification factors, which includes but is not limited to that user name, user password, equipment refer to
Line, dynamic code and behavioural habits etc..
In other embodiments, request sending module 710 can also be specifically used for: the certification sent according to certificate server
Factor pattern is sent to the certificate server comprising the ID authentication request with certification factor pattern to the matched certification factor.
In this step, request sending module 710 sends the ID authentication request for not including the certification factor, certification clothes to certificate server
Device be engaged in after receiving the request, the type of the certification factor needed for being determined according to type of user terminal and certificate server itself parameter,
Then factor pattern requirement is authenticated needed for sending to request sending module 710, last-minute plea sending module 710 is wanted according to type
Seek the certification factor needed for replying.
Wherein, execution module 720 is specifically used for: executing intelligent contract by the second transaction, the input of second transaction
Including user terminal block chain account address, the output of second transaction includes block chain account address and the certification of intelligent contract
The factor.
In the present embodiment, execution module 720 also particularly useful for: obtain the certification that intelligent contract provides according to user terminal
The factor carries out the implementing result obtained after default operation and implementing result matched with operation result after matching result, root
Authentication is carried out according to the matching result.Wherein, when implementing result is matched with operation result, confirmation authentication success;When
When implementing result and operation result mismatch, confirmation authentication failure.
The concrete operating principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, no longer superfluous herein
It states.
In conclusion a kind of user terminal provided by the embodiments of the present application, can store authentication information into block chain
Intelligent contract in.Thus one, on the one hand, can guarantee to recognize using the characteristic of the intelligent contract in block chain network itself
Card information can not be tampered;On the other hand, the operation that authentication verification information is executed using intelligent contract internal processes, thus into one
Step improves safety when authentication.It can be seen that the identification authentication mode in the embodiment of the present application has splendid peace
Quan Xing.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments
Including certain features rather than other feature, but the combination of the feature of different embodiment means in the embodiment of the present application
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed
It is one of any can in any combination mode come using.
The various component embodiments of the embodiment of the present application can be implemented in hardware, or in one or more processor
The software module of upper operation is realized, or is implemented in a combination thereof.It will be understood by those of skill in the art that can practice
It is middle realized using microprocessor or digital signal processor (DSP) some in the device according to the embodiment of the present application or
The some or all functions of whole components.The embodiment of the present application is also implemented as executing method as described herein
Some or all device or device programs (for example, computer program and computer program product).Such realization
The program of the embodiment of the present application can store on a computer-readable medium, or can have the shape of one or more signal
Formula.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other shape
Formula provides.
The embodiment of the present application is carried out it should be noted that above-described embodiment illustrates rather than the embodiment of the present application
Limitation, and those skilled in the art can be designed alternative embodiment without departing from the scope of the appended claims.
In the claims, any reference symbol between parentheses should not be configured to limitations on claims.Word " packet
Containing " do not exclude the presence of element or step not listed in the claims.Word "a" or "an" located in front of the element is not arranged
Except there are multiple such elements.The embodiment of the present application can by means of include several different elements hardware and by means of
Properly programmed computer is realized.In the unit claims listing several devices, several in these devices can
To be to be embodied by the same item of hardware.The use of word first, second, and third does not indicate any sequence.
These words can be construed to title.
Claims (16)
1. a kind of identity identifying method based on block chain characterized by comprising
The certification factor of the user terminal is obtained according to the ID authentication request that user terminal is sent;
Intelligent contract is created according to the certification factor, is prestored in the intelligence contract and default fortune is carried out to the certification factor
Operation result after calculation;
The intelligent contract is broadcast in block chain, and the intelligent contract block chain account address is sent to the use
Family terminal;
The implementing result obtained after the intelligent contract, which is executed, using the certification factor according to the user terminal carries out identity
Certification;Wherein, user terminal executes the intelligent contract of block chain with the transaction form of block chain, comes especially by the second transaction
The intelligent contract is executed, the input of the second transaction includes the block chain account address of user terminal, the output packet of the second transaction
Include block chain account address, the certification factor of intelligent contract;
Wherein, when the implementing result is matched with the operation result, confirmation authentication success;When the implementing result with
When the operation result mismatches, confirmation authentication failure.
2. the method according to claim 1, wherein described be broadcast to the step in block chain for the intelligent contract
Suddenly it specifically includes:
It is broadcast in block chain using the intelligent contract as the first transaction, the output of first transaction includes: intelligent contract
Block chain account address, intelligent contract cryptographic Hash and carry out the operation result after default operation.
3. the method according to claim 1, wherein described utilize the certification factor according to the user terminal
The step of implementing result obtained after the intelligent contract carries out authentication is executed to specifically include:
The intelligent contract is obtained to be held according to what the certification factor that user terminal provides obtain after the default operation
Row as a result, and the implementing result matched with the operation result after matching result, according to the matching result into
Row authentication.
4. the method according to claim 1, wherein the ID authentication request sent according to user terminal obtains
The step of taking the certification factor of the user terminal specifically includes:
Certification factor pattern is determined according to the type of user terminal mark for including in the ID authentication request;
The response message comprising the certification factor pattern is sent to the user terminal;
Receive the certification factor to match with the certification factor pattern that the user terminal is returned according to the response message.
5. according to the method described in claim 4, wherein, the certification factor pattern includes at least one of the following: user
Name type, user password type, device-fingerprint type, dynamic code type and behavioural habits type.
6. a kind of identity identifying method based on block chain characterized by comprising
The ID authentication request of the certification factor comprising user terminal is sent, to certificate server for the certificate server root
Intelligent contract is created according to the certification factor, is prestored in the intelligence contract after carrying out default operation to the certification factor
Operation result;
The intelligent contract is executed using the certification factor, so that the certificate server is according to the execution of the intelligent contract
As a result authentication is carried out;Wherein, user terminal executes the intelligent contract of block chain with the transaction form of block chain, specific logical
The second transaction is crossed to execute the intelligent contract, the input of the second transaction includes the block chain account address of user terminal, and second
The output of transaction includes the block chain account address of intelligent contract, the certification factor;Wherein, when the implementing result and the operation
Authentication success when as a result matching;When the implementing result and the operation result mismatch, authentication fails.
7. according to the method described in claim 6, it is characterized in that, described execute the intelligence conjunction using the certification factor
About, the step of carrying out authentication according to the implementing result of the intelligent contract for the certificate server specifically includes:
The certification factor is supplied to the intelligent contract, so that the intelligent contract is according to certification factor progress
Implementing result is obtained after default operation, and the matching result after the implementing result is matched with the operation result provides
To the certificate server.
8. according to the method described in claim 6, wherein, it is described sent to certificate server include user terminal the certification factor
ID authentication request the step of specifically include:
According to the certification factor pattern that certificate server is sent, Xiang Suoshu certificate server, which is sent, includes and the certification factor type
The ID authentication request for the certification factor that type matches.
9. a kind of certificate server characterized by comprising
Authenticate factor module, the ID authentication request for being sent according to user terminal obtain the certification of the user terminal because
Son;
Intelligent contract module prestores in the intelligence contract to described for creating intelligent contract according to the certification factor
The certification factor carries out the operation result after default operation;
Broadcast module, for the intelligent contract to be broadcast in block chain;
Feedback module, for the intelligent contract block chain account address to be sent to the user terminal;
Authentication module is obtained after the intelligent contract for being executed using the certification factor according to the user terminal
Implementing result carries out authentication;Wherein, user terminal executes the intelligent contract of block chain with the transaction form of block chain, tool
Body executes the intelligent contract by the second transaction, and the input of the second transaction includes the block chain account address of user terminal,
The output of second transaction includes the block chain account address of intelligent contract, the certification factor;Wherein, when the implementing result with it is described
When operation result matches, confirmation authentication success;When the implementing result and the operation result mismatch, identity is confirmed
Authentification failure.
10. certificate server according to claim 9, wherein the broadcast module is specifically used for:
It is broadcast in block chain using the intelligent contract as the first transaction, the output of first transaction includes: intelligent contract
Block chain account address, intelligent contract cryptographic Hash and carry out the operation result after default operation.
11. certificate server according to claim 9, wherein the authentication module is specifically used for:
The intelligent contract is obtained to be held according to what the certification factor that user terminal provides obtain after the default operation
Row as a result, and the implementing result matched with the operation result after matching result, according to the matching result into
Row authentication.
12. certificate server according to claim 9, wherein the certification factor module is specifically used for:
Certification factor pattern is determined according to the type of user terminal mark for including in the ID authentication request;
The response message comprising the certification factor pattern is sent to the user terminal;
Receive the certification factor to match with the certification factor pattern that the user terminal is returned according to the response message.
13. certificate server according to claim 12, wherein the certification factor pattern includes at least one in following
It is a: user name type, user password type, device-fingerprint type, dynamic code type and behavioural habits type.
14. a kind of user terminal characterized by comprising
Request sending module, for sending the ID authentication request of the certification factor comprising user terminal to certificate server, with
Intelligent contract is created according to the certification factor for the certificate server, prestored in the intelligence contract to the certification because
Son carries out the operation result after default operation;
Execution module, for executing the intelligent contract using the certification factor, so that the certificate server is according to
The implementing result of intelligent contract carries out authentication;Wherein, user terminal executes block chain with the transaction form of block chain
Intelligent contract executes the intelligent contract especially by the second transaction, and the input of the second transaction includes the block of user terminal
Chain account address, the output of the second transaction include the block chain account address of intelligent contract, the certification factor;Wherein, it is held when described
Authentication success when row result is matched with the operation result;The body when the implementing result and the operation result mismatch
Part authentification failure.
15. user terminal according to claim 14, wherein the execution module is specifically used for:
The certification factor is supplied to the intelligent contract, so that the intelligent contract is according to certification factor progress
Implementing result is obtained after default operation, and the matching result after the implementing result is matched with the operation result provides
To the certificate server.
16. user terminal according to claim 14, wherein request sending module is specifically used for:
According to the certification factor pattern that certificate server is sent, Xiang Suoshu certificate server, which is sent, includes and the certification factor type
The ID authentication request for the certification factor that type matches.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611046691.4A CN106453407B (en) | 2016-11-23 | 2016-11-23 | Identity authentication method based on block chain, authentication server and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611046691.4A CN106453407B (en) | 2016-11-23 | 2016-11-23 | Identity authentication method based on block chain, authentication server and user terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106453407A CN106453407A (en) | 2017-02-22 |
CN106453407B true CN106453407B (en) | 2019-10-15 |
Family
ID=58218107
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611046691.4A Active CN106453407B (en) | 2016-11-23 | 2016-11-23 | Identity authentication method based on block chain, authentication server and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106453407B (en) |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106920098B (en) * | 2017-03-07 | 2021-02-02 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Digital bill transaction monitoring system and method based on block chain and digital currency |
US10984483B2 (en) | 2017-03-19 | 2021-04-20 | International Business Machines Corporation | Cognitive regulatory compliance automation of blockchain transactions |
US10515233B2 (en) | 2017-03-19 | 2019-12-24 | International Business Machines Corporation | Automatic generating analytics from blockchain data |
US10452998B2 (en) | 2017-03-19 | 2019-10-22 | International Business Machines Corporation | Cognitive blockchain automation and management |
CN107248074A (en) | 2017-03-29 | 2017-10-13 | 阿里巴巴集团控股有限公司 | A kind of method for processing business and equipment based on block chain |
CN108881167B (en) * | 2017-05-16 | 2021-06-22 | 江峰 | Intelligent contract of finite field block chain system |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
CN107172085B (en) * | 2017-06-30 | 2018-06-22 | 浙江华信区块链科技服务有限公司 | Active defense method and node based on block chain intelligence contract |
CN107370730B (en) | 2017-07-14 | 2020-06-02 | 创新先进技术有限公司 | Login information processing method and equipment |
CN107493162A (en) * | 2017-07-25 | 2017-12-19 | 中国联合网络通信集团有限公司 | The implementation method and device of block chain node |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107465673A (en) * | 2017-07-27 | 2017-12-12 | 深圳市易成自动驾驶技术有限公司 | Identity identifying method, device and the computer-readable recording medium of vehicle |
CN107820690B (en) * | 2017-08-21 | 2020-11-10 | 达闼科技成都有限公司 | Information selection method and device, electronic equipment and computer readable storage medium |
CN107507091A (en) * | 2017-09-07 | 2017-12-22 | 复旦大学 | Enhanced data Right protection method based on block chain and intelligent contract |
CN107453870A (en) * | 2017-09-12 | 2017-12-08 | 京信通信系统(中国)有限公司 | Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain |
CN107682331B (en) * | 2017-09-28 | 2020-05-12 | 复旦大学 | Block chain-based Internet of things identity authentication method |
CN109698748B (en) * | 2017-10-20 | 2021-11-02 | 成都高新信息技术研究院 | Block chain authentication method and system based on physical signs |
CN110365489B (en) * | 2017-11-15 | 2021-02-05 | 财付通支付科技有限公司 | Business auditing method, device and storage medium |
CN108228744B (en) * | 2017-12-19 | 2020-12-11 | 深圳市轱辘车联数据技术有限公司 | Vehicle diagnosis data management method and device |
CN111512658B (en) * | 2017-12-19 | 2023-05-02 | 海拉有限双合股份公司 | Method and system for decentralized digital authentication |
CN108540335B (en) * | 2017-12-20 | 2021-11-12 | 深圳市轱辘车联数据技术有限公司 | Management method and management device for equipment analysis report |
CN107967608A (en) * | 2017-12-21 | 2018-04-27 | 北京智帮帮科技有限公司 | A kind of intelligent contract system based on block chain technology |
CN108322558B (en) * | 2017-12-28 | 2021-01-01 | 北京欧链科技有限公司 | Method, device and system for associating address information |
CN108235805B (en) * | 2017-12-29 | 2021-07-30 | 达闼机器人有限公司 | Account unifying method and device and storage medium |
CN108347444A (en) * | 2018-02-26 | 2018-07-31 | 深圳智乾区块链科技有限公司 | Identity identifying method, device based on block chain and computer readable storage medium |
CN108512861A (en) * | 2018-04-18 | 2018-09-07 | 北京百悟科技有限公司 | A kind of authentication method and device, computer readable storage medium of cloud platform |
CN108805573B (en) * | 2018-04-21 | 2022-04-15 | 深圳市元征科技股份有限公司 | Information verification method, server and storage medium |
CN108777675B (en) * | 2018-04-26 | 2020-04-14 | 平安科技(深圳)有限公司 | Electronic device, block chain-based identity authentication method, and computer storage medium |
CN108737418B (en) * | 2018-05-22 | 2020-09-15 | 飞天诚信科技股份有限公司 | Identity authentication method and system based on block chain |
CN108924089B (en) * | 2018-05-29 | 2021-11-09 | 武汉斗鱼网络科技有限公司 | Client device identification method and device and client device |
CN108769013A (en) * | 2018-05-29 | 2018-11-06 | 浪潮软件集团有限公司 | Identity registration method and device based on Ether house |
CN109034832A (en) * | 2018-06-13 | 2018-12-18 | 湖南搜云网络科技股份有限公司 | The information processing method and device of block chain, information processing node and storage medium |
CN109088866B (en) * | 2018-08-02 | 2021-02-19 | 北京百悟科技有限公司 | Multi-cloud platform unified identity authentication method and device based on alliance chain |
CN109327475B (en) * | 2018-11-30 | 2021-04-09 | 深圳市元征科技股份有限公司 | Multi-layer identity authentication method, device, equipment and storage medium |
CN109635575A (en) * | 2018-11-30 | 2019-04-16 | 无锡井通网络科技有限公司 | Intelligent contract signs method and device |
CN110032846B (en) * | 2018-11-30 | 2021-11-02 | 创新先进技术有限公司 | Identity data anti-misuse method and device and electronic equipment |
CN110033363B (en) * | 2018-12-14 | 2024-01-23 | 创新先进技术有限公司 | Event processing method and device based on block chain and electronic equipment |
CN109978551A (en) * | 2019-03-29 | 2019-07-05 | 北京投肯科技有限公司 | A kind of account information confirmation and method for retrieving and device based on block chain |
CN110334681B (en) * | 2019-07-12 | 2020-12-01 | 蚌埠科睿达机械设计有限公司 | Finger vein identity recognition method and system based on block chain |
CN110599190B (en) * | 2019-09-27 | 2022-10-21 | 支付宝(杭州)信息技术有限公司 | Identity authentication method and device based on block chain |
CN111355726B (en) * | 2020-02-26 | 2021-02-02 | 登录易(深圳)科技有限公司 | Identity authorization login method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104320262A (en) * | 2014-11-05 | 2015-01-28 | 中国科学院合肥物质科学研究院 | User public key address binding, searching and verifying method and system based on crypto currency open account book technology |
CN104392354A (en) * | 2014-11-05 | 2015-03-04 | 中国科学院合肥物质科学研究院 | Association and retrieval method and system used for public key addresses and user accounts of crypto-currency |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN105893042A (en) * | 2016-03-31 | 2016-08-24 | 北京航空航天大学 | Intelligent contract implementation method based on block chain |
CN105931052A (en) * | 2016-04-21 | 2016-09-07 | 四川大学 | Virtual currency transaction validation method based on block chain multi-factor cross-validation |
CN106101242A (en) * | 2016-06-24 | 2016-11-09 | 深圳前海微众银行股份有限公司 | The construction method of block chain cloud service platform and device |
-
2016
- 2016-11-23 CN CN201611046691.4A patent/CN106453407B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104320262A (en) * | 2014-11-05 | 2015-01-28 | 中国科学院合肥物质科学研究院 | User public key address binding, searching and verifying method and system based on crypto currency open account book technology |
CN104392354A (en) * | 2014-11-05 | 2015-03-04 | 中国科学院合肥物质科学研究院 | Association and retrieval method and system used for public key addresses and user accounts of crypto-currency |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN105893042A (en) * | 2016-03-31 | 2016-08-24 | 北京航空航天大学 | Intelligent contract implementation method based on block chain |
CN105931052A (en) * | 2016-04-21 | 2016-09-07 | 四川大学 | Virtual currency transaction validation method based on block chain multi-factor cross-validation |
CN106101242A (en) * | 2016-06-24 | 2016-11-09 | 深圳前海微众银行股份有限公司 | The construction method of block chain cloud service platform and device |
Also Published As
Publication number | Publication date |
---|---|
CN106453407A (en) | 2017-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106453407B (en) | Identity authentication method based on block chain, authentication server and user terminal | |
CN106533696B (en) | Identity identifying method, certificate server and user terminal based on block chain | |
CN107483509B (en) | A kind of auth method, server and readable storage medium storing program for executing | |
CN105897782B (en) | A kind of processing method and processing device of the call request for interface | |
CN104639562B (en) | A kind of system of pushing certification and the method for work of equipment | |
CN104199654B (en) | The call method and device of open platform | |
US9787672B1 (en) | Method and system for smartcard emulation | |
CN106534150B (en) | Identity identifying method and system, user terminal, Website server | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
CN106330838B (en) | A kind of dynamic signature method and the client and server using this method | |
CN110493237A (en) | Identity management method, device, computer equipment and storage medium | |
US9398024B2 (en) | System and method for reliably authenticating an appliance | |
CN110381075B (en) | Block chain-based equipment identity authentication method and device | |
CN104506321B (en) | A kind of method of seed data in renewal dynamic token | |
CN109714769A (en) | Information binding method, device, equipment and storage medium | |
Jan et al. | An authentication scheme for distributed computing environment | |
CN111737715A (en) | Decentralized electronic contract online signing method and system | |
CN108600234A (en) | A kind of auth method, device and mobile terminal | |
CN109784024A (en) | One kind authenticating FIDO method and system based on the polyfactorial quick online identity of more authenticators | |
CN107493293A (en) | A kind of method of sip terminal access authentication | |
CN111131318B (en) | Decentralized key management and distribution method, system and storage medium | |
CN108768928A (en) | A kind of information acquisition method, terminal and server | |
CN110505056A (en) | A kind of collaboration endorsement method and device for supporting credible display | |
CN107395566A (en) | Authentication method and device | |
CN114679276B (en) | Identity authentication method and device of time-based one-time password algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Room 3F301, C2 Building, 2.5 Industrial Park, No. 88 Dongchang Road, Suzhou Industrial Park, Jiangsu Province, 215000 Applicant after: JIANGSU PAYEGIS TECHNOLOGY CO., LTD. Address before: Suzhou City, Jiangsu province 215021 East Road, Suzhou Industrial Park, No. 88 building 2.5 Industrial Park building C2 4F Applicant before: JIANGSU PAYEGIS TECHNOLOGY CO., LTD. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |