CN109040133A - The method, apparatus and storage medium of intelligent contract are installed in block chain network - Google Patents
The method, apparatus and storage medium of intelligent contract are installed in block chain network Download PDFInfo
- Publication number
- CN109040133A CN109040133A CN201811128489.5A CN201811128489A CN109040133A CN 109040133 A CN109040133 A CN 109040133A CN 201811128489 A CN201811128489 A CN 201811128489A CN 109040133 A CN109040133 A CN 109040133A
- Authority
- CN
- China
- Prior art keywords
- intelligent contract
- source code
- key
- block chain
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment provides the methods for installing intelligent contract in block chain network, comprising: the intelligent contract source code and key that encryption is received at block chain node obtain information;Information is obtained based on the key and sends cipher key acquisition request, wherein includes the signature of block chain node in the cipher key acquisition request, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;Receive the key;The intelligent contract source code of the encryption is decrypted, using the key by operation decryption collector to obtain the intelligent contract source code after decryption;Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;The executable installation file of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption;And the intelligent contract is installed by running the executable installation file.
Description
Technical field
The embodiment of the present invention is related to block chain technology, relates more particularly to a kind of for pacifying in block chain network
Fill method, the device for executing the above method and a kind of corresponding computer readable storage medium of intelligent contract.
Background technique
Block chain (Blockchain) has obtained extensive discussion and research as the emerging technology risen in recent years.Area
Block chain is with the intelligent peer-to-peer network of distributed data base identification, propagation and information-recording, also referred to as value internet.Block
Chain technology includes being guaranteed transmission and access safety etc. with block structure storing data using cryptography, it is consistent can be realized data
Property storage, tamper-resistant, the technical system for going to center.
Intelligent contract is a kind of computer protocol for being intended to propagate, verify or execute in a manner of information-based contract, can
Show as the computer program accurately run on block chain.User terminal can be traded by using intelligent contract, be shared
Data, establish trust and by the characteristic of block chain technology ensure the storages of data, reading, execute whole process it is transparent it is traceable,
It can not distort.
Currently, in most cases the source code of intelligent contract is transferred directly to each to need to install the intelligence contract
Block chain node, there is no the technical solutions that source code provided by a kind of supplier to intelligent contract is protected.
Summary of the invention
The technical issues of in the presence of the prior art, the first aspect of the embodiment of the present invention provide one kind and are used for
The method of intelligent contract is installed in block chain network, which comprises
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes block in the cipher key acquisition request
The signature of chain node, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code of the encryption is decrypted, using the key by operation decryption collector to obtain solution
Intelligent contract source code after close;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption
File;And
The intelligent contract is installed by running the executable installation file.
In addition, the second aspect of the embodiment of the present invention provides one kind for installing intelligent contract in block chain network
Device, described device includes:
Processor;And
Memory makes the processor execute following operation when described instruction executes for storing instruction:
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes block in the cipher key acquisition request
The signature of chain node, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code of the encryption is decrypted, using the key by operation decryption collector to obtain solution
Intelligent contract source code after close;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption
File;And
The intelligent contract is installed by running the executable installation file.
In addition, the third aspect of the embodiment of the present invention additionally provides a kind of computer readable storage medium, has and deposit
The computer-readable program instructions of storage on it, the computer-readable program instructions are for executing first party according to the present invention
Method described in face for installing intelligent contract in block chain network.
Pass through method, the use provided by embodiment according to the present invention for the intelligent contract of installation in block chain network
In the device and corresponding computer readable storage medium for installing intelligent contract in block chain network by intelligent contract source generation
Code is only stored in memory associated with the decryption collector, so that the local storage of the block chain node
In do not preserve the intelligence contract source code, and then will not be deposited due to the local of other block chain this block of node visit chain link points
Reservoir and obtain intelligent contract source code, thus, it is possible to effectively guarantee the safety of the source code of the intelligent contract on block chain,
Guarantee that source code is not obtained by unauthorized party, so that the privacy of the source code of the intelligent contract on block chain is protected
Shield.Other advantages of the invention will be explained further below.
Detailed description of the invention
It refers to the following detailed description in conjunction with the accompanying drawings, the feature, advantage and other aspects of various embodiments of the present invention will become
Must be more obvious, show several embodiments of the invention by way of example rather than limitation herein, in the accompanying drawings:
Fig. 1 shows the architecture diagram of authorized service centers' system 100 of embodiment according to the present invention;;
Fig. 2 shows the schematic diagrames for the process 200 of embodiment according to the present invention operated to intelligent contract;
Fig. 3 shows the method 300 for the intelligent contract of installation in block chain network of embodiment according to the present invention
Schematic flow diagram;
Fig. 4 shows according to an embodiment of the invention for installing the device of intelligent contract in block chain network
400 schematic block diagram;And
Fig. 5 shows the dress for the intelligent contract of installation in block chain network according to another embodiment of the invention
Set 500 schematic block diagram.
Specific embodiment
Below with reference to each exemplary embodiment of attached drawing detailed description of the present invention.Although examples described below side
Method, device include the software and/or firmware executed on hardware in other components, it should be noted that these examples are only
It is merely illustrative, and is not to be taken as restrictive.For example, it is contemplated that within hardware exclusively, in software exclusively or
Any or all hardware, software and fastener components can be implemented in any combination of hardware and software.Therefore, although below
Illustrative method and apparatus are described, but those skilled in the art should be easily understood that, provided example is not used to
Limit the mode for realizing these method and apparatus.
In addition, flowcharts and block diagrams in the drawings show method and system according to various embodiments of the present invention can
The architecture, function and operation being able to achieve.It should be noted that function marked in the box can also be according to different from attached drawing
The sequence marked occurs.For example, two boxes succeedingly indicated can actually be basically executed in parallel or they have
When can also execute in a reverse order, this depend on related function.It should also be noted that flow chart and/or
Function as defined in execution or behaviour can be used in the combination of each box in block diagram and the box in flowchart and or block diagram
The dedicated hardware based system made is realized, or the combination of specialized hardware and computer instruction can be used to realize.
Before specific embodiment according to the present invention is discussed in detail, first to some terms used in the present invention into
Row explanation.
In the present invention, refer to can be to received encryption in block chain node for term " decryption collector "
Intelligent contract source code is decrypted and is compiled into the module of executable installation file, either hardware module, it can also
To be software module.From the point of view of specific, the form of expression can be a container, can run correlative code wherein;It can also be with
It is a process, to realize above-mentioned function;It is also possible to an intelligent contract.
In the present invention, term " supplier of intelligent contract " is with the people for permitting other people to use the right of intelligent contract
Or unit, for example, it can be the author of intelligent contract.
In the present invention, term " the installation destination of intelligent contract " refers to by specifying for the mount request of intelligent contract
, the block chain node that the intelligence contract will be mounted to, for example, the destination of intelligent contract can be specified by mount request
Block chain network in some block chain address of node.
In the present invention, term " authorized service centers " refers to intelligent contract publishing platform.For example, the offer of intelligent contract
Person can issue in authorized service centers, permit using intelligent contract, and user can browse in authorized service centers, look into
It sees, download intelligent contract.
In the present invention, term " key acquisition information " is to refer to carry out by source code of its acquisition to intelligent contract
The information of the key of encryption, such as can be the storage address information of key, the method information or code book for generating key
In corresponding key location information etc..
Before specific solution is unfolded, applicant of the present invention introduces the application that the present invention is based on first
The technical issues of scene and the present invention are based on.
It, will if a block chain node needs to install some intelligent contract among existing block chain network
The source code that the intelligence contract can be for example directly acquired from the authorized service centers for communicating connection, is then compiled and pacifies
Dress, before compiling, block chain node can at least be deposited the local that intelligent contract source code is stored temporarily in this block chain link point
Among reservoir, other block chain nodes just can obtain the intelligence by accessing the local storage of this block chain link point as a result,
Energy contract source code, so that the source code of intelligent contract is possible to be compromised, i.e., it is possible that being obtained by unauthorized parties,
That is not protected in the prior art for intelligent contract source code.
Generally, the embodiment provides a kind of method for installing intelligent contract in block chain network,
In the method, intelligent contract source code is transmitted in the way of unencryption not in a manner of untreated first, in addition,
Intelligent contract source code is not only transmitted in a manner of encryption, and the intelligent contract source code after decryption is also not stored in block chain
It is instead to be stored in the intelligent contract source code after decryption and decryption collector among the local storage of node
In associated memory, so that the intelligence contract source code is not preserved in the local storage of the block chain node, into
Intelligent contract source code is obtained without the local storage due to other block chain this block of node visit chain link points;Again
Person, due to the presence of protective separation mechanism memory-based, so that the user for even possessing the block chain node can not also look into
The intelligence contract source code is seen, to ensure that the safety of the intelligence contract source code.
In addition, in the scheme of the embodiment of the present invention, pass through authorized service centers' (such as block chain, that is, service platform
(Blockchain as a Service:BaaS)) for block chain node encrypted intelligent contract source code is provided, and in area
The intelligence can be installed to close by operations such as parsing, the compilings of intelligent contract source code for the encryption on block chain node
About.
Furthermore in the scheme of the embodiment of the present invention, mount request of the authorized service centers based on user, to block chain
Node provides the intelligent contract source code and key associated with the encrypted intelligent contract source code of encrypted protection
Obtain information.Using the scheme of the embodiment of the present invention, information can be obtained to intelligent contract and its key and carry out unique terrestrial reference
Know, and is encrypted by the source code to intelligent contract to protect intelligent contract source code, therefore block chain link can be controlled
Perhaps user for example can be only to the block chain node of authorization or user's open-source generation to the access of intelligent contract source code for point
Code obtains permission.In some embodiments of the invention, it is also proposed that block chain, that is, service platform based on cloud is directed to alliance
The authorization that chain provides intelligent contract source code obtains scheme.Therefore, the solution of the present invention constructs block chain intelligence contract ecology
Platform protects control of the supplier of intelligent contract for intelligent contract source code significantly.
In the following, carrying out each embodiment that the present invention will be described in detail in conjunction with attached drawing.
Referring now to Fig. 1, it illustrates authorized service centers' system architecture diagrams of embodiment according to the present invention.Shown in Fig. 1
Authorized service centers' system 100 be used for for intelligence contract the service of authorization is provided.As shown in Figure 1, authorized service centers
System 100 includes authorized service centers 120.In some embodiments, authorized service centers 120 can be implemented as area based on cloud
Block chain, that is, service platform.Authorized service centers' system 100 further includes the multiple block chain networks connecting with authorized service centers 120
140,150,160.Each of block chain network 140,150,160 all includes multiple block chain nodes.For example, block link network
Network 140 includes block chain node 1401,1402,1403.Block chain network 150 includes block chain node 1501,1502,1503.
Block chain network 160 includes block chain node 1601,1602,1603.
In cloud application environment, each block chain node can correspond to virtual machine instance, and phase is run in virtual machine instance
The node application program answered.It should be appreciated that although block chain network 140,150,160 is illustrated as respective independence, each block
Chain network also may include common block chain node.For example, some block chain node not only may belong to block chain network 140 but also
It may belong to block chain network 150.In Fig. 1, the quantity of block chain network quantity and block chain node be it is schematical, can
To be any amount.
With continued reference to Fig. 1, the supplier 110 of intelligent contract provides installable intelligent contract to authorized service centers 120.
The supplier 110 of intelligent contract has the right for permitting other people to obtain its intelligent contract source code.In some embodiments, intelligence
The supplier 110 of contract is the author of intelligent contract.In some embodiments, the supplier 110 of intelligent contract can be from intelligence
The author of contract secures permission, and other people obtain the right of its intelligent contract source code, so that the supplier 110 of intelligent contract has
Other people are permitted to use the right of its intelligent contract source code.User 130 is specific block chain link by authorized service centers 120
Some intelligent contract of point installation.Then, authorized service centers 120 are according to the demand of user 130 by the intelligent contract source generation of encryption
Code and key associated therewith obtain information and are provided to block chain node for installing the intelligence contract.
In some embodiments, the supplier 110 of the communication in system architecture 100 and intelligent contract, user 130 with
Communication between authorized service centers 120 can be based on any wired and or wireless network, including but not limited to internet, wide
Domain net, Metropolitan Area Network (MAN), local area network, Virtual Private Network (VPN), wireless network etc..
In some embodiments, each block chain node 1401- in user 130 and block chain network 140-160
1403,1501-1503,1601-1603 can be electronic equipment, such as fixed equipment (such as server or desktop computer),
Or mobile device (such as smart phone, tablet computer, portable computer etc.).
Then, referring to fig. 2, it illustrates the mistakes of embodiment according to the present invention operated to intelligent contract source code
The schematic diagram of journey 200.User 130, authorized service centers 120 and block chain node 1401 is shown in FIG. 2.It should be appreciated that
Each object or functional module are shown only for promoting description, some of them object or functional module can reside in same
In a physical entity or certain objects or functional module can reside in virtual environment based on cloud.For example, authorization service
Center 120 and block chain node 1401 can be in virtual environments based on cloud.Therefore, discrete object or mould shown in Fig. 2
Block is only illustrative, and the present invention is in this regard with no restrictions.
The foregoing describe the query process entirely completed, will connect below attached drawing 2 come description block chain node installation and
Control specific steps when intelligent contract.
As shown in Fig. 2, authorized service centers 120 are optionally able to from the supplier 110 of intelligent contract, reception (202) can
The intelligent contract of installation, next, the authorized service centers 120 are optionally able to the essential information of the intelligent contract of publication (204),
User 130 for example, by browsing these essential informations or can obtain these essential informations by other channels, then determine
One intelligent contract is installed to some or certain block chain link points, at this point, user 130 can send out to authorized service centers 120
Send (306) mount request, the installation destination in the mount request for example comprising the intelligent contract, such as it is specified by some
Intelligent contract is mounted on block chain node 1401, and authorized service centers 120 are after receiving such mount request, it will
The source code of intelligent contract is encrypted, the intelligent contract source code that (208) generate encryption is then generated;Correspondingly,
Authorized service centers 120 can also generate (210) key associated with the intelligent contract source code of encryption and obtain information, wherein
Key obtains information and is used to decrypt the intelligent contract source code of the encryption for obtaining key, key.Generating this two
After divided data, the intelligent contract source code of the encryption and the key can be obtained information and provided by authorized service centers 120
To the installation destination, such as block chain node 1401.By being used for provided by embodiment according to the present invention in block
The method that intelligent contract is provided in chain network can effectively guarantee the transmission safety of the source code of the intelligent contract on block chain,
Guarantee that source code is not obtained by unauthorized party, so that the privacy of the source code of the intelligent contract on block chain is protected
Shield.
Here, the intelligent contract source code and key of encryption, which obtain information, both can be sent to installation in a data packet
The block chain node of destination, merely with this data packet when installation.At this point, the data packet is not or not to add all over
Close, which is surrounded by specific format, and encryption is wanted to see that content therein, such as source code portion therein must be
Encryption, and rest part can be and not encrypt.Such as key obtains information.The data packet can also be comprising being not added for another example
Close the following contents: intelligent contract unique identification, the cryptographic Hash (HASH value) of the intelligence contract source code, the intelligence contract source generation
One or more signatures of code, other related datas of the intelligence contract etc., wherein the cryptographic Hash of the intelligence contract source code
(HASH value) for verifying for whether the source code of intelligent contract is modified, intelligent contract unique identification is for indicating this
Title or number of intelligent contract etc., and one or more signatures of intelligent contract source code for show the intelligence contract by
Which tissue license.
Those skilled in the art is it will also be understood that can also obtain information for the intelligent contract source code and key of encryption
It independently opens, i.e., is sent to the block chain node of installation destination respectively as independent data packet.
Next, block chain node (such as block chain node 1401) is being received by such as i.e. service platform of block chain
After the intelligent contract source code and key encrypted provided by authorized service centers 120 obtains information, block chain node 1401
(402) cipher key acquisition request can will be sent to authorized service centers 120, correspond ground, authorized service centers 120 are connecing
After receiving cipher key acquisition request, it will authentication (214) are carried out to the signature of block chain node 1401, if authentication
Pass through, then corresponding key can for example be encrypted by the Secure Socket Layer of link level (Secure Sockets Layer:SSL)
Mode provides (216) to block chain node 1401, next, block chain node 1401 can receive the key and by making
The intelligent contract source code of (403) described encryption is decrypted with the key to obtain the intelligent contract source code, then connect down
, block chain node 1401 is by the way that the intelligent contract source code after decryption to be stored in the memory of the block chain node and incite somebody to action
In the associated memory of decryption collector that the intelligent contract source code is decrypted and is compiled, and to decryption after
The intelligence contract source code is compiled to obtain the executable installation file of (404) the intelligent contract;And area postrema
Block chain node 1401 installs (405) described intelligent contract by running the executable installation file.So far, by user 130
Specified intelligent contract is installed on the block chain node 1401 specified by user 130, and in the transmission of source code
The state always in encryption, the intelligent contract source code after decryption are only stored in the memory of the block chain node in the process
In in memory associated with the decryption collector that will the intelligent contract source code will be decrypted and be compiled, thus prevent
The user of other block chain nodes and this block chain link point decrypted after intelligent contract source code to preventing source code
It divulges a secret, so that the privacy of the source code of the intelligent contract on block chain is protected.
The offer of the entire intelligent contract of one embodiment according to the present invention is provided from the angle of whole system above
And installation process.Next, the application will be from the angle of the block chain node 1401 of the specific intelligent contract of specific final installation
To illustrate the method 300 for the intelligent contract of installation in block chain network of one embodiment according to the present invention.
Fig. 3 shows the method 300 for the intelligent contract of installation in block chain network of embodiment according to the present invention
Schematic flow diagram.From figure 3, it can be seen that one embodiment according to the present invention for providing intelligence in block chain network
The method 300 of energy contract includes at least following seven steps, firstly, receiving and adding at block chain node in method and step 310
Close intelligent contract source code and key obtain information, such as the intelligent contract source generation of encryption is received from block chain, that is, service platform
Code and key obtain information;After the intelligent contract source code and key for receiving encryption obtain information, in method and step 320
In based on the key obtain information send cipher key acquisition request, wherein in the cipher key acquisition request include block chain node
Signature, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;Then, in method and step 330
In, it receives the key and next, is decrypted by operation decryption collector using the key in method and step 340
The intelligent contract source code of the encryption, to obtain the intelligent contract source code after decryption;Next, in method and step 350
The middle intelligent contract source code by after the decryption is stored in memory associated with the decryption collector, so that
Other block chain nodes cannot access the intelligent contract source code after the decryption.Next, in method and step 360 by pair
Intelligent contract source code after the decryption is compiled the executable installation file for obtaining the intelligent contract and finally exists
The intelligent contract is installed in method and step 3700 by running the executable installation file.Method energy according to the present invention
Safety of the source code of intelligent contract after enough ensure to encrypt and decryption at block chain node, and then ensure that for intelligence
The protection of energy contract source code.
In one embodiment according to the present invention, the decryption collector is realized in the form of intelligent contract.Ability
As long as the technical staff in domain each falls within protection model of the invention it is to be appreciated that other forms can be realized design according to the present invention
Within enclosing.
In one embodiment according to the present invention, the method can also be the following steps are included: i.e. to the encryption
Intelligent contract source code does completeness check;And in the unsanctioned situation of the completeness check, sends and add for described
The source code acquisition request of close intelligent contract source code and the intelligent contract source code for receiving the encryption again.Thus, it is possible to
It is enough to obtain corresponding intelligent contract source code again in the intelligent incomplete situation of contract source code of received encryption,
Improve the success rate for installing intelligent contract.
In one embodiment according to the present invention, the completeness check includes cryptographic Hash verification or GPG (GNU
Privacy Guard:GNU Privacy Guard) signature check.Those skilled in the art is it is to be appreciated that other feasible verification sides
Method is also included within protection scope required by claim according to the present invention.
In one embodiment according to the present invention, the key obtains the storage address information that information is key, generates
The location information of corresponding key in the method information or code book of key.For example, it includes code key institute that code key, which obtains information,
The address information (such as authorized service centers 120 or some block chain, that is, service platform address) of storage;Code key obtains letter
Breath is also possible to a kind of method information, such as Hash value function etc. for generating key;In addition, code key obtains institute in information password sheet
The location information of corresponding key, for example, code book which row which column etc. information.
In one embodiment according to the present invention, receiving the key further comprises: by Secure Socket Layer channel
Receive the key.Thus, it is possible to ensure the safety of code key by the physical attribute of Secure Socket Layer channel.
One embodiment that Fig. 4 shows content according to the present invention is proposed intelligent for running in block chain network
The device 400 of contract.Figure 4, it is seen that the device 400 includes processor 410 and the memory with the coupling of processor 410
420。
Memory 420 is stored with instruction.Instruction makes processor 410 execute following movement when being executed by processor 410:
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes block in the cipher key acquisition request
The signature of chain node, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code of the encryption is decrypted, using the key by operation decryption collector to obtain solution
Intelligent contract source code after close;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption
File;And
The intelligent contract is installed by running the executable installation file.
In one embodiment according to the present invention, the decryption collector is realized in the form of intelligent contract.
In one embodiment according to the present invention, the processor is also made to execute following behaviour when described instruction executes
Make:
Completeness check is done to the intelligent contract source code of the encryption;And
In the unsanctioned situation of the completeness check, the source generation of the intelligent contract source code for the encryption is sent
Code acquisition request and the intelligent contract source code for receiving the encryption again.
In one embodiment according to the present invention, the completeness check includes cryptographic Hash verification or GPG signature check.
In one embodiment according to the present invention, the key obtains the storage address information that information is key, generates
The location information of corresponding key in the method information or code book of key.
In one embodiment according to the present invention, receiving the key further comprises:
The key is received by Secure Socket Layer channel.
In addition, alternatively, the above method can be by computer program product, i.e. computer readable storage medium is real
It is existing.Computer program product may include computer readable storage medium, containing for executing each of the content of present invention
The computer-readable program instructions of aspect.Computer readable storage medium, which can be, can keep and store by instruction execution equipment
The tangible device of the instruction used.Computer readable storage medium for example can be but not limited to storage device electric, magnetic storage is set
Standby, light storage device, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.It is computer-readable
The more specific example (non exhaustive list) of storage medium includes: portable computer diskette, hard disk, random access memory
(RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory
(SRAM), Portable compressed disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding
Equipment, the punch card for being for example stored thereon with instruction or groove internal projection structure and above-mentioned any appropriate combination.Here
Used computer readable storage medium is not interpreted instantaneous signal itself, such as radio wave or other Free propagations
Electromagnetic wave, the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) propagated by waveguide or other transmission mediums or logical
Cross the electric signal of electric wire transmission.
One embodiment that Fig. 5 shows content according to the present invention is proposed intelligent for installing in block chain network
The schematic block diagram of the device 500 of contract.It is used in Fig. 3 in block chain it should be appreciated that device 500 may be implemented as realizing
The function of the method 300 of intelligent contract is installed in network.As can be seen from Figure 5 the device 500 includes central processing unit
(CPU) 501 (such as processor), can according to the computer program instructions being stored in read-only memory (ROM) 502 or
The computer program instructions in random access storage device (RAM) 503 are loaded into from storage unit 508, it is various appropriate to execute
Movement and processing.In RAM 503, it can also store the device 500 and operate required various programs and data.CPU 501,ROM
502 and RAM 503 is connected with each other by bus 504.Input/output (I/O) interface 505 is also connected to bus 504.
Multiple components in device 500 are connected to I/O interface 505, comprising: input unit 506, such as keyboard, mouse etc.;
Output unit 507, such as various types of displays, loudspeaker etc.;Storage unit 508, such as disk, CD etc.;And it is logical
Believe unit 509, such as network interface card, modem, wireless communication transceiver etc..It is all that communication unit 509 allows the device 500 to pass through
As the computer network of internet and/or various telecommunication networks exchange information/data with other equipment.
Various methods described above, such as method 300 for installing intelligent contract in block chain network can be by
Processing unit 501 executes.For example, in some embodiments, the method 300 for installing intelligent contract in block chain network can
Computer software programs are implemented as, machine readable media, such as storage unit 508 are tangibly embodied in.In some realities
It applies in example, some or all of of computer program can be loaded into and/or pacify via ROM 502 and/or communication unit 509
It is attached on device 500.When computer program is loaded into RAM 503 and is executed by processor CPU 501, can execute above
One or more movements or step in the method 300 for installing intelligent contract in block chain network of description.
In general, various example embodiments of the invention can in hardware or special circuit, software, firmware, logic, or
Implement in any combination thereof.Some aspects can be implemented within hardware, and other aspects can be can be by controller, micro process
Implement in the firmware or software that device or other calculating equipment execute.When the various aspects of the embodiment of the present invention are illustrated or described as
When block diagram, flow chart or other certain graphical representations of use, it will be understood that box described herein, device, system, techniques or methods
Can be used as unrestricted example hardware, software, firmware, special circuit or logic, common hardware or controller or other
It calculates and implements in equipment or its certain combination.
Although described above is various example embodiments of the invention can realize in hardware or special circuit, on
Stating can both be implemented in hardware for the data processing equipment of block chain, can also be by way of software come real
It is existing, this is because: in the 1990s, a technological improvement can easily belong to the improvement on hardware to the improvement
(for example, improvement to circuit structures such as diode, transistor, switches) still falls within the improvement on software (such as method
The improvement of process).However, with the sustainable development of technology, the improvement of many method flows of today can nearly all pass through by
Improved method flow is programmed into hardware circuit to realize, in other words, by programming different programs for hardware circuit
To obtaining corresponding hardware circuit, that is, realize the change of hardware circuit, therefore the improvement of such method flow
It can also be considered as directly improving for hardware circuit.Therefore, it cannot be said that the improvement of a method flow cannot use hardware
Entity module is realized.For example, programmable logic device (Programmable Logic Device:PLD) (such as scene can
Program gate array (Field Programmable Gate Array:FPGA)) it is exactly such a integrated circuit, logic function
Device programming can be determined by user.It is voluntarily programmed by designer a digital display circuit " integrated " may be programmed a piece of
On logical device, dedicated IC chip is designed and made without asking chip maker.Moreover, nowadays replacing
IC chip is manually made, this programming is also used " logic compiler (logic compi1er) " software instead mostly and come in fact
Existing, software compiler used is similar when it writes with program development, and the source code before compiling is also handy specific
Programming language write, this is referred to as hardware description language (Hardware Description Language:HDL), and
HDL also not only-kind, but there are many kind, as ABEL (Advanced Boolean Expression Language),
AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University
Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、
Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language) etc., most generally use at present
VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) with
Verilog.Those skilled in the art, which also will be apparent to the skilled artisan that, only to need with above-mentioned several hardware description languages slightly to patrol method flow
It collects and programs and be programmed into integrated circuit, so that it may be readily available the hardware circuit for realizing the logical method process.
For executing the computer-readable program instructions or computer program product of the various aspects of the content of present invention
It can store beyond the clouds, when needing to call, user can be accessed by mobile Internet, fixed network or other networks and is stored in
The computer-readable program instructions of the one side for executing the content of present invention on cloud, thus implementation basis the content of present invention
Various aspects disclosed in technical solution.
The foregoing is merely the embodiment alternative embodiment of the content of present invention, the embodiment being not intended to restrict the invention,
For those skilled in the art, the embodiment of the present invention can have various modifications and variations.It is all in implementation of the invention
Within the spirit and principle of example, made any modification, equivalence replacement, improvement etc. should be included in the embodiment of the present invention
Within protection scope.
Although by reference to several embodiments that specific examples describe the present invention, but it is to be understood that of the invention
Embodiment is not limited to disclosed specific embodiment.The embodiment of the present invention be intended to cover appended claims spirit and
Included various modifications and equivalent arrangements in range.The scope of the claims meets broadest explanation, thus comprising all
Such modification and equivalent structure and function.
Claims (13)
1. a kind of method for installing intelligent contract in block chain network, which comprises
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes the block in the cipher key acquisition request
The signature of chain node, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code for decrypting the encryption using the key by operation decryption collector, after obtaining decryption
Intelligent contract source code;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation file of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption;
And
The intelligent contract is installed by running the executable installation file.
2. according to the method described in claim 1, wherein, the decryption collector is realized in the form of intelligent contract.
3. according to the method described in claim 1, the method also includes:
Completeness check is done to the intelligent contract source code of the encryption;And
In the unsanctioned situation of the completeness check, the source code sent for the intelligent contract source code of the encryption is obtained
Take the intelligent contract source code for requesting and receiving again the encryption.
4. according to the method described in claim 3, wherein, the completeness check includes cryptographic Hash verification or GPG signature check.
5. according to the method described in claim 1, wherein, the key obtains the storage address information that information is key, generates
The location information of corresponding key in the method information or code book of key.
6. according to the method described in claim 1, wherein, receiving the key further comprises:
The key is received by Secure Socket Layer channel.
7. a kind of for installing the device of intelligent contract in block chain network, described device includes:
Processor;And
Memory makes the processor execute following operation when described instruction executes for storing instruction:
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes block chain link in the cipher key acquisition request
The signature of point, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code for decrypting the encryption using the key by operation decryption collector, after obtaining decryption
Intelligent contract source code;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation file of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption;
And
The intelligent contract is installed by running the executable installation file.
8. device according to claim 7, wherein the decryption collector is realized in the form of intelligent contract.
9. device according to claim 7 also makes the processor execute following operation when described instruction executes:
Completeness check is done to the intelligent contract source code of the encryption;And
In the unsanctioned situation of the completeness check, the source code sent for the intelligent contract source code of the encryption is obtained
Take the intelligent contract source code for requesting and receiving again the encryption.
10. device according to claim 9, wherein the completeness check includes cryptographic Hash verification or GPG signature school
It tests.
11. device according to claim 7, wherein the key obtains the storage address information that information is key, generates
The location information of corresponding key in the method information or code book of key.
12. device according to claim 8, wherein receiving the key further comprises:
The key is received by Secure Socket Layer channel.
13. a kind of computer readable storage medium has the computer-readable program instructions being stored thereon, the computer
Readable program instructions are according to any one of claim 1 to 6 for installing intelligence in block chain network for executing
The method of contract.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811128489.5A CN109040133A (en) | 2018-09-27 | 2018-09-27 | The method, apparatus and storage medium of intelligent contract are installed in block chain network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811128489.5A CN109040133A (en) | 2018-09-27 | 2018-09-27 | The method, apparatus and storage medium of intelligent contract are installed in block chain network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109040133A true CN109040133A (en) | 2018-12-18 |
Family
ID=64618307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811128489.5A Pending CN109040133A (en) | 2018-09-27 | 2018-09-27 | The method, apparatus and storage medium of intelligent contract are installed in block chain network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040133A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109615378A (en) * | 2019-01-24 | 2019-04-12 | 上海点融信息科技有限责任公司 | Multi-party computations method, apparatus and readable storage medium storing program for executing based on block chain |
CN110020855A (en) * | 2019-01-31 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Method, the node, storage medium of secret protection are realized in block chain |
CN110190968A (en) * | 2019-06-03 | 2019-08-30 | 魏靖 | Block chain big data security processing system and method |
CN111178887A (en) * | 2019-12-27 | 2020-05-19 | 远光软件股份有限公司 | Distributed photovoltaic power generation and sale system and method based on block chain |
CN111538521A (en) * | 2020-04-24 | 2020-08-14 | 中国工商银行股份有限公司 | Intelligent contract deployment and transaction method and device |
WO2020172880A1 (en) * | 2019-02-28 | 2020-09-03 | 云图有限公司 | Data processing method for blockchain contract and server |
WO2020233637A1 (en) * | 2019-05-20 | 2020-11-26 | 创新先进技术有限公司 | Receipt storage method combining code labelling with user type, and node |
CN112567414A (en) * | 2019-04-04 | 2021-03-26 | 华为技术有限公司 | Method and device for operating intelligent contract |
CN112883436A (en) * | 2021-02-08 | 2021-06-01 | 北京微芯区块链与边缘计算研究院 | Chip device special for intelligent contract, execution method and block chain link point device |
CN112907243A (en) * | 2021-02-09 | 2021-06-04 | 工银科技有限公司 | Block chain transaction auditing method and device |
WO2021114796A1 (en) * | 2019-12-11 | 2021-06-17 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for updating trusted point in multi-layer blockchain structure |
CN113360937A (en) * | 2021-08-10 | 2021-09-07 | 北京中超伟业信息安全技术股份有限公司 | Cloud platform key distribution method and system based on intelligent contracts |
CN113472512A (en) * | 2021-06-10 | 2021-10-01 | 东软集团股份有限公司 | Intelligent contract execution method and device, storage medium and electronic equipment |
EP4121849A4 (en) * | 2020-03-20 | 2024-04-03 | Mastercard International Incorporated | Method and system for auditing smart contracts |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090058184A (en) * | 2007-12-04 | 2009-06-09 | 주식회사 텔레칩스 | Virtual machine based mobile application protecting system, and method for the same |
US20100146293A1 (en) * | 2008-12-09 | 2010-06-10 | Haixia Shi | Apparatus, system, method, and computer program product for executing a program utilizing a processor to generate keys for decrypting content |
CN104318135A (en) * | 2014-10-27 | 2015-01-28 | 中国科学院信息工程研究所 | Java code safety dynamic loading method on basis of trusted execution environment |
CN105122255A (en) * | 2012-12-17 | 2015-12-02 | 微软技术许可有限责任公司 | Management system for point of care testing |
CN107038352A (en) * | 2016-02-03 | 2017-08-11 | 上海思立微电子科技有限公司 | Intranet security access method, device and terminal |
CN107273759A (en) * | 2017-05-08 | 2017-10-20 | 上海点融信息科技有限责任公司 | Method, equipment and computer-readable recording medium for protecting block chain data |
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN107943469A (en) * | 2017-11-17 | 2018-04-20 | 深圳圣马歌科技有限公司 | A kind of dissemination method and device of intelligence contract |
CN108235772A (en) * | 2017-12-29 | 2018-06-29 | 深圳前海达闼云端智能科技有限公司 | Data processing method, device, storage medium and electronic equipment based on block chain |
US20180198630A1 (en) * | 2015-11-26 | 2018-07-12 | International Business Machines Corporation | System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger |
CN108399319A (en) * | 2017-09-30 | 2018-08-14 | 平安科技(深圳)有限公司 | Source code guard method, application server and computer readable storage medium |
-
2018
- 2018-09-27 CN CN201811128489.5A patent/CN109040133A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090058184A (en) * | 2007-12-04 | 2009-06-09 | 주식회사 텔레칩스 | Virtual machine based mobile application protecting system, and method for the same |
US20100146293A1 (en) * | 2008-12-09 | 2010-06-10 | Haixia Shi | Apparatus, system, method, and computer program product for executing a program utilizing a processor to generate keys for decrypting content |
CN105122255A (en) * | 2012-12-17 | 2015-12-02 | 微软技术许可有限责任公司 | Management system for point of care testing |
CN104318135A (en) * | 2014-10-27 | 2015-01-28 | 中国科学院信息工程研究所 | Java code safety dynamic loading method on basis of trusted execution environment |
US20180198630A1 (en) * | 2015-11-26 | 2018-07-12 | International Business Machines Corporation | System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger |
CN107038352A (en) * | 2016-02-03 | 2017-08-11 | 上海思立微电子科技有限公司 | Intranet security access method, device and terminal |
CN107273759A (en) * | 2017-05-08 | 2017-10-20 | 上海点融信息科技有限责任公司 | Method, equipment and computer-readable recording medium for protecting block chain data |
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN108399319A (en) * | 2017-09-30 | 2018-08-14 | 平安科技(深圳)有限公司 | Source code guard method, application server and computer readable storage medium |
CN107943469A (en) * | 2017-11-17 | 2018-04-20 | 深圳圣马歌科技有限公司 | A kind of dissemination method and device of intelligence contract |
CN108235772A (en) * | 2017-12-29 | 2018-06-29 | 深圳前海达闼云端智能科技有限公司 | Data processing method, device, storage medium and electronic equipment based on block chain |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109615378A (en) * | 2019-01-24 | 2019-04-12 | 上海点融信息科技有限责任公司 | Multi-party computations method, apparatus and readable storage medium storing program for executing based on block chain |
CN110020855B (en) * | 2019-01-31 | 2020-05-29 | 阿里巴巴集团控股有限公司 | Method, node and storage medium for realizing privacy protection in block chain |
CN110020855A (en) * | 2019-01-31 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Method, the node, storage medium of secret protection are realized in block chain |
WO2020172880A1 (en) * | 2019-02-28 | 2020-09-03 | 云图有限公司 | Data processing method for blockchain contract and server |
CN112567414A (en) * | 2019-04-04 | 2021-03-26 | 华为技术有限公司 | Method and device for operating intelligent contract |
WO2020233637A1 (en) * | 2019-05-20 | 2020-11-26 | 创新先进技术有限公司 | Receipt storage method combining code labelling with user type, and node |
CN110190968A (en) * | 2019-06-03 | 2019-08-30 | 魏靖 | Block chain big data security processing system and method |
WO2021114796A1 (en) * | 2019-12-11 | 2021-06-17 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for updating trusted point in multi-layer blockchain structure |
CN111178887A (en) * | 2019-12-27 | 2020-05-19 | 远光软件股份有限公司 | Distributed photovoltaic power generation and sale system and method based on block chain |
EP4121849A4 (en) * | 2020-03-20 | 2024-04-03 | Mastercard International Incorporated | Method and system for auditing smart contracts |
US12028440B2 (en) | 2020-03-20 | 2024-07-02 | Mastercard International Incorporated | Method and system for auditing smart contracts |
CN111538521A (en) * | 2020-04-24 | 2020-08-14 | 中国工商银行股份有限公司 | Intelligent contract deployment and transaction method and device |
CN111538521B (en) * | 2020-04-24 | 2024-02-09 | 中国工商银行股份有限公司 | Intelligent contract deployment and transaction method and device |
CN112883436A (en) * | 2021-02-08 | 2021-06-01 | 北京微芯区块链与边缘计算研究院 | Chip device special for intelligent contract, execution method and block chain link point device |
CN112907243A (en) * | 2021-02-09 | 2021-06-04 | 工银科技有限公司 | Block chain transaction auditing method and device |
CN113472512A (en) * | 2021-06-10 | 2021-10-01 | 东软集团股份有限公司 | Intelligent contract execution method and device, storage medium and electronic equipment |
CN113360937A (en) * | 2021-08-10 | 2021-09-07 | 北京中超伟业信息安全技术股份有限公司 | Cloud platform key distribution method and system based on intelligent contracts |
CN113360937B (en) * | 2021-08-10 | 2021-11-05 | 北京中超伟业信息安全技术股份有限公司 | Cloud platform key distribution method and system based on intelligent contracts |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040133A (en) | The method, apparatus and storage medium of intelligent contract are installed in block chain network | |
CN109255210A (en) | The method, apparatus and storage medium of intelligent contract are provided in block chain network | |
US10917394B2 (en) | Data operations using a proxy encryption key | |
CN109213501A (en) | The method, apparatus and storage medium of intelligent contract are installed in block chain network | |
US10389728B2 (en) | Multi-level security enforcement utilizing data typing | |
EP3175575B1 (en) | Secure content packaging using multiple trusted execution environments | |
KR101641809B1 (en) | Method and system for distributed off-line logon using one-time passwords | |
CN110088742A (en) | Use the logical repositories service of encrypted configuration data | |
US8572372B2 (en) | Method for selectively enabling access to file systems of mobile terminals | |
CN109358859A (en) | The method, apparatus and storage medium of intelligent contract are installed in block chain network | |
CN109741063A (en) | Digital signature method and device based on block chain | |
CN107851167A (en) | Protection calculates the technology of data in a computing environment | |
CN105745660B (en) | For supporting the technology of multiple digital rights management agreements on a client device | |
CN109074466A (en) | Platform for server proves and registration | |
CN111885196B (en) | Method, device and system for accessing equipment data of Internet of things cloud platform | |
CN109067528A (en) | Crypto-operation, method, cryptographic service platform and the equipment for creating working key | |
KR20140090571A (en) | Method and device for privacy-respecting data processing | |
CN107404472A (en) | The migration of Client-initiated encryption key | |
KR101745843B1 (en) | Methods and devices for protecting private data | |
Cilardo et al. | Secure distribution infrastructure for hardware digital contents | |
CN106330934A (en) | Distributed database system authority management method and device | |
CN109076054A (en) | System and method for managing the encryption key of single-sign-on application program | |
CN107920060A (en) | Data access method and device based on account | |
CN104281272A (en) | Password input processing method and device | |
CN109146482A (en) | User's right providing method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181218 |
|
WD01 | Invention patent application deemed withdrawn after publication |