CN110474911A - Trusted end-user recognition methods, device, equipment and computer readable storage medium - Google Patents

Trusted end-user recognition methods, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110474911A
CN110474911A CN201910762819.4A CN201910762819A CN110474911A CN 110474911 A CN110474911 A CN 110474911A CN 201910762819 A CN201910762819 A CN 201910762819A CN 110474911 A CN110474911 A CN 110474911A
Authority
CN
China
Prior art keywords
parameter
target terminal
confidence level
user
logging state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910762819.4A
Other languages
Chinese (zh)
Other versions
CN110474911B (en
Inventor
李�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN201910762819.4A priority Critical patent/CN110474911B/en
Publication of CN110474911A publication Critical patent/CN110474911A/en
Priority to PCT/CN2020/108190 priority patent/WO2021027777A1/en
Application granted granted Critical
Publication of CN110474911B publication Critical patent/CN110474911B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of trusted end-user recognition methods, comprising: obtains the first parameter of target terminal, and the logging state current based on the target terminal, obtains the second parameter of the target terminal;Determine the first confidence level of first parameter and the second confidence level of second parameter;Based on the logging state, the weighted value of first confidence level and the weighted value of second confidence level are determined, and calculate the confidence level of the target terminal;Determine whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.The invention also discloses a kind of trusted end-user identification device, equipment and computer readable storage mediums.The present invention is identified by the logging state of terminal using credibility of the multiple parameters to terminal, single parameter bring resultant error is avoided, so that recognition result is more accurate.

Description

Trusted end-user recognition methods, device, equipment and computer readable storage medium
Technical field
The present invention relates to financial technology (Fintech) technical field more particularly to trusted end-user recognition methods, device, Equipment and computer readable storage medium.
Background technique
In recent years, with financial technology (Fintech), the especially continuous development of internet finance, terminal detection technique It is introduced into the daily service of bank and other financial mechanism.In the daily service process of bank and other financial mechanism, often encounter Fraud guarantees that the safety of business procedure carries out, bank and other financial mechanism can be to when advance for the generation for preventing such event The terminal of row business operation carries out risk monitoring and control, and risk monitoring and control mode tends to reinforce the credibility of terminal mostly.
However, the prior art often only carries out credible identification by the single hardware equipment information of terminal, identification is accurate Spend it is poor, be easy influenced by facility environment, such as with the address mac (Media Access Control, physical address) for, although The address mac generally has uniqueness, but undeniably, it may appear that the case where more terminals are all the identical addresses mac, such as production line Failure, leading to the terminal of factory is all same address mac etc., at this point, can not be obtained end using the mac of terminal as identification parameter The uniqueness at end, therefore, the obtained recognition result of identification parameter using single hardware equipment information as terminal are inaccurate.
Summary of the invention
It is a primary object of the present invention to propose a kind of trusted end-user recognition methods, device, equipment with it is computer-readable Storage medium, it is intended to improve the accuracy of identification of trusted end-user.
To achieve the above object, the present invention provides a kind of trusted end-user recognition methods, the trusted end-user identification side Method includes the following steps:
The first parameter of target terminal, and the logging state current based on the target terminal are obtained, the target is obtained Second parameter of terminal;
Determine the first confidence level of first parameter and the second confidence level of second parameter;
Based on the logging state, the weighted value of first confidence level and the weighted value of second confidence level are determined, And calculate the confidence level of the target terminal;
Determine whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
Preferably, first parameter for obtaining target terminal, and the logging state based on the target terminal, obtain institute The step of stating the second parameter of target terminal include:
The hardware information of target terminal is obtained, and is based on the hardware information, generates the first parameter of the target terminal;
The user information and current logging state of target terminal described in the corresponding server of the target terminal are obtained, And it is based on the user information and the logging state, generate the second parameter.
Preferably, the hardware information for obtaining target terminal, and it is based on the hardware information, generate the target terminal The first parameter the step of include:
The first hardware information of target terminal is obtained, and based on preset dirty data rule, determines the first hardware letter Whether breath is dirty data;
If it is not, being then based on first hardware information and preset algorithm, the first parameter of the target terminal is generated;
If so, obtaining the second hardware information of the target terminal, based on the dirty data rule, described second is determined Whether hardware information is dirty data;
If it is not, being then based on second hardware information and the preset algorithm, the first parameter of the target terminal is generated.
Preferably, first parameter for obtaining target terminal, and the logging state based on the target terminal, obtain institute The step of stating the second parameter of target terminal include:
It detects with the presence or absence of first parameter in the target terminal, and is based on the logging state, detect the mesh It marks and whether there is second parameter in terminal;
If all existing, first parameter and second parameter are obtained.
Preferably, first parameter is obtained the hardware information of the target terminal by the target terminal, and by described Target terminal is generated according to the hardware information and preset algorithm;Second parameter determines that the target is whole by the server Current logging state is held, and obtains the user information of the target terminal by the server, by the server according to institute Logging state, the user information and the preset algorithm is stated to generate and be issued to the target terminal.
Preferably, it whether there is first parameter in the detection target terminal, and be based on the logging state, After the step of detecting in the target terminal with the presence or absence of second parameter, the method also includes:
If first parameter and/or second parameter are not present, read in preset at least two buffer zone Corresponding first cached parameters of the target terminal and the second cached parameters are taken, and first in determining each buffer zone is slow Whether the second cached parameters deposited in parameter and each buffer zone are consistent;
If consistent, first cached parameters and second cached parameters are respectively set to the target terminal First parameter and the second parameter.
Preferably, the second confidence level step of the first confidence level of the determination first parameter and second parameter Include:
The first history parameters and the server for obtaining the target terminal issued based on the target terminal second History parameters;
First parameter is compared with first history parameters, first parameter is determined according to comparison result The first confidence level;
Second parameter is compared with second history parameters, second parameter is determined according to comparison result The second confidence level.
In addition, to achieve the above object, the present invention also provides a kind of trusted end-user identification device, the trusted end-users Identification device includes:
Module is obtained, for obtaining the first parameter of target terminal, and the logging state current based on the target terminal, Obtain the second parameter of the target terminal;
Determining module, for determining the first confidence level of first parameter and the second confidence level of second parameter;
Computing module, for being based on the logging state, the weighted value and described second for determining first confidence level can The weighted value of reliability, and calculate the confidence level of the target terminal;
Identification module, for determining whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal can Letter.
Preferably, the acquisition module is also used to:
The hardware information of target terminal is obtained, and is based on the hardware information, generates the first parameter of the target terminal;
The user information and current logging state of target terminal described in the corresponding server of the target terminal are obtained, And it is based on the user information and the logging state, generate the second parameter.
Preferably, the acquisition module is also used to:
The first hardware information of target terminal is obtained, and based on preset dirty data rule, determines the first hardware letter Whether breath is dirty data;
If it is not, being then based on first hardware information and preset algorithm, the first parameter of the target terminal is generated;
If so, obtaining the second hardware information of the target terminal, based on the dirty data rule, described second is determined Whether hardware information is dirty data;
If it is not, being then based on second hardware information and the preset algorithm, the first parameter of the target terminal is generated.
Preferably, the acquisition module is also used to:
It detects with the presence or absence of first parameter in the target terminal, and is based on the logging state, detect the mesh It marks and whether there is second parameter in terminal;
If all existing, first parameter and second parameter are obtained.
Preferably, first parameter is obtained the hardware information of the target terminal by the target terminal, and by described Target terminal is generated according to the hardware information and preset algorithm;Second parameter determines that the target is whole by the server Current logging state is held, and obtains the user information of the target terminal by the server, by the server according to institute Logging state, the user information and the preset algorithm is stated to generate and be issued to the target terminal.
Preferably, the trusted end-user identification device further includes read module, and the read module is used for:
If if first parameter and/or second parameter are not present, in preset at least two buffer zone Read corresponding first cached parameters of the target terminal and the second cached parameters, and first in determining each buffer zone Whether the second cached parameters in cached parameters and each buffer zone are consistent;
If consistent, first cached parameters and second cached parameters are respectively set to the target terminal First parameter and the second parameter.
Preferably, the determining module is used for:
The first history parameters and the server for obtaining the target terminal issued based on the target terminal second History parameters;
First parameter is compared with first history parameters, first parameter is determined according to comparison result The first confidence level;
Second parameter is compared with second history parameters, second parameter is determined according to comparison result The second confidence level.
In addition, to achieve the above object, the present invention also provides a kind of trusted end-users to identify equipment, the trusted end-user Identification equipment include: memory, processor and be stored in the terminal that can be run on the memory and on the processor can Letter property recognizer, the trusted end-user recognizer realize trusted end-user as described above when being executed by the processor The step of recognition methods.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium It is stored with trusted end-user recognizer on storage medium, is realized such as when the trusted end-user recognizer is executed by processor Above the step of trusted end-user recognition methods.
Trusted end-user recognition methods proposed by the present invention obtains the first parameter of target terminal, and is based on the target The current logging state of terminal obtains the second parameter of the target terminal;Determine first parameter the first confidence level and Second confidence level of second parameter;Based on the logging state, the weighted value and described of first confidence level is determined The weighted value of two confidence levels, and calculate the confidence level of the target terminal;Determine whether the confidence level is lower than preset threshold, if It is no, it is determined that the target terminal is credible.The present invention is by the logging state of terminal, using multiple parameters to the credibility of terminal It is identified, single parameter bring resultant error is avoided, so that recognition result is more accurate.
Detailed description of the invention
Fig. 1 is the device structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of trusted end-user recognition methods first embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, Fig. 1 is the device structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
Equipment of the embodiment of the present invention can be PC machine or server apparatus.
As shown in Figure 1, the equipment may include: processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include that the wired of standard connects Mouth, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
It will be understood by those skilled in the art that device structure shown in Fig. 1 does not constitute the restriction to equipment, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium Believe module, Subscriber Interface Module SIM and trusted end-user recognizer.
Wherein, operating system is to manage and control the program of trusted end-user identification equipment and software resource, supports network The operation of communication module, Subscriber Interface Module SIM, trusted end-user recognizer and other programs or software;Network communication module For managing and controlling network interface 1002;Subscriber Interface Module SIM is for managing and controlling user interface 1003.
In trusted end-user identification equipment shown in Fig. 1, the trusted end-user identification equipment passes through processor 1001 The trusted end-user recognizer stored in memory 1005 is called, and executes following each implementations of trusted end-user recognition methods Operation in example.
Based on above-mentioned hardware configuration, trusted end-user recognition methods embodiment of the present invention is proposed.
It is the flow diagram of trusted end-user recognition methods first embodiment of the present invention, the method referring to Fig. 2, Fig. 2 Include:
Step S10 obtains the first parameter of target terminal, and the logging state current based on the target terminal, obtains Second parameter of the target terminal;
Step S20 determines the first confidence level of first parameter and the second confidence level of second parameter;
Step S30 is based on the logging state, determine first confidence level weighted value and second confidence level Weighted value, and calculate the confidence level of the target terminal;
Step S40, determines whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
The present embodiment trusted end-user recognition methods applies to the terminal of the financing financial institutions such as mechanism or banking system In credibility identification equipment, trusted end-user identification equipment can be terminal or PC equipment, for convenience of description, trusted end-user Identification equipment is described for identifying equipment.Business transaction is carried out by mesh terminal in user, when such as money transfer transactions, identification Equipment needs the terminal to current progress business transaction to identify, to determine the credibility of present terminal, if insincere, then This business transaction is prevented, user's wealth is avoided to lose;If credible, then allow the progress of business transaction, target terminal can be Mobile phone, the mobile terminals such as tablet computer.
The identification equipment of the present embodiment passes through the first parameter of acquisition target terminal and the second parameter and the first parameter The credibility that target terminal is determined with the confidence level of the second parameter improves the precision of trusted end-user identification.
Each step will be described in detail below:
Step S10 obtains the first parameter of target terminal, and the logging state current based on the target terminal, obtains Second parameter of the target terminal;
In the present embodiment, when the credibility to target terminal identifies, identification equipment obtains the of target terminal One parameter, and the second parameter based on the current logging state acquisition target terminal of target terminal, wherein the first parameter is target The identity information of terminal, such as target terminal the address mac indicate target terminal identity information;And the second parameter is then basis The unique value that the logging state of target terminal generates, logging state include logging in and being not logged in, and the first parameter and the second parameter can Identification equipment is reported to together in initiating business request by target terminal, and identification equipment can get first by service request Parameter and the second parameter.
Further, step S10 includes:
Step a, obtains the hardware information of target terminal, and is based on the hardware information, generates the of the target terminal One parameter;
In this step, identification equipment first obtains the hardware information of target terminal, wherein hardware information includes DeviceId One or more of (equipment id), the address mac and sequence number etc. are generated further according to the hardware information and preset algorithm of acquisition First parameter of target terminal, preset algorithm can be hash algorithm, specific such as MD5 algorithm (Message-Digest Algorithm 5, md5-challenge the 5th edition), SHA-1 algorithm (calculate by Secure Hash Algorithm, secure hash Method) etc., i.e. the hardware information of target terminal is specifically generated 32 or 64 by the first parameter=HASH (hardware equipment information) Cryptographic Hash, since the above hash algorithm is the algorithm of existing maturation, therefore do not do excessive introduction herein.
It should be understood that believing to guarantee that the first parameter generated has the effect of unique identification target terminal by hardware During breath generates the first parameter, a random value can be increased.If the hardware information of target terminal A and target terminal B are mac Address, and it (may be to make the address the mac phase of the terminal drawn with production line failure production that the address mac of the two is identical Together) at this point, during generating the first parameter according to the address mac a random value can be increased, to distinguish target terminal A With the first parameter of both target terminal B.
Step b obtains the user information of target terminal described in the corresponding server of the target terminal and stepping on currently Record state, and it is based on the user information and the logging state, generate the second parameter.
In this step, the user information of target terminal and current logging state can be stored in corresponding server, Identify that equipment can get the user information of target terminal in the corresponding server of target terminal and log in shape by communication protocol State, and according to user information and logging state and preset algorithm, generate the second parameter, wherein logging state can pass through service The cookies that device generates learns that preset algorithm for convenience of description, is unified to be illustrated by taking MD5 algorithm as an example herein, the second parameter =HASH (logging state/it is not logged in state userid, random), it is related with user that userid can be social information id etc. And unique user information;Random is the random number that server-side generates.Therefore, the second parameter of target terminal actually has two Kind value, and the second parameter for identifying that equipment obtains specifically is determined by the logging state of target terminal.
Step S20 determines the first confidence level of first parameter and the second confidence level of second parameter.
In the present embodiment, after the first parameter and the second parameter for getting target terminal, the first parameter is calculated separately The first confidence level and the second parameter the second confidence level, so that subsequent the first confidence level of foundation and the second confidence level are to target end End carries out credible identification.
Specifically, step S20 includes:
Step c, the first history parameters and the server for obtaining the target terminal are based on the target terminal and issue The second history parameters;
In this step, identification equipment further obtains after the first parameter and the second parameter for getting target terminal The second history parameters that the corresponding server of the first history parameters and target terminal of target terminal is issued based on target terminal, That is target terminal is in upper primary initiating business request, and has corresponding history parameters to be identified equipment and obtain, and by conduct The judgement parameter of second confidence level of the first confidence level and the second parameter of current first parameter.
First parameter is compared by step d with first history parameters, determines described according to comparison result First confidence level of one parameter;
Second parameter is compared by step e with second history parameters, determines described according to comparison result Second confidence level of two parameters.
In this step, the first parameter is specifically compared by identification equipment with the first history parameters, judges the first parameter It is whether consistent with the first history parameters, if unanimously, it is determined that the first confidence level of the first parameter be it is credible, indicated with numerical value 1;If It is inconsistent, it is determined that the first confidence level of the first parameter be it is insincere, indicated with numerical value 0.Similarly, the second parameter is gone through with second History parameter is compared, and is judged whether the second parameter is consistent with the second history parameters, is equally indicated the second ginseng with numerical value 1 or 0 Number is credible or insincere.
Step S30 is based on the logging state, determine first confidence level weighted value and second confidence level Weighted value, and calculate the confidence level of the target terminal.
In the present embodiment, identification equipment determines the weighted value of the first confidence level and the weighted value of the second confidence level, specifically , it identifies in equipment and is preset with logging state-weighted value mapping table, it can be by the logging state of determining target terminal, thus really Fixed corresponding weighted value, in the specific implementation, when the logging state of target terminal is to be not logged in, the weight of the first confidence level is accounted for Than being 0.5, the weight accounting of the second confidence level is 0.5, at this time the confidence level of target terminal=first confidence level × 0.5+ second Confidence level × 0.5;When the logging state of target terminal is to log in, further judge whether the logging state of target terminal is the It is primary to log in, can specifically determine whether the logging state of current target terminal is to step on for the first time by reading historical log information Record, corresponding historical log information, then can determine the logging state of current target terminal to log in for the first time, in mesh if it does not exist The logging state for marking terminal is when logging in for the first time, and the weight accounting of the first confidence level is 0.5, the weight accounting of the second confidence level It is 0.5, the second confidence level × 0.5 the confidence level of target terminal=first confidence level × 0.5+ at this time;Corresponding history if it exists Log-on message then can determine the logging state of current target terminal for non-first time login, i.e. login times >=2, at this point, first The weight accounting of confidence level is 0.3, and the weight accounting of the second confidence level is 0.7, and confidence level=the first of target terminal can at this time The second confidence level × 0.7 reliability × 0.3+.Resulting first confidence level will be calculated and the second confidence level substitutes into formula, mesh can be obtained The confidence level for marking terminal is one of 0.3,0.5,0.7,1.
It should be noted that the above are preferred embodiment when actual implementation, specific logging state-weighted value mapping table It can be configured according to the actual situation.
Step S40, determines whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
In the present embodiment, after the value for the confidence level for obtaining target terminal, determine whether the confidence level of target terminal is low In preset threshold, which is set as 0.5 in the specific implementation, if not, it is determined that target terminal is credible, in target terminal When initiating business request, allow the progress of corresponding business;If so, determining that target terminal is insincere, industry is initiated in target terminal When business request, the progress of corresponding business is prevented.
The present embodiment obtains the first parameter of target terminal, and the logging state current based on the target terminal, obtains Second parameter of the target terminal;Determine first parameter the first confidence level and second parameter it is second credible Degree;Based on the logging state, the weighted value of first confidence level and the weighted value of second confidence level are determined, and calculate The confidence level of the target terminal;Determine whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal can Letter.The present invention is identified using credibility of the multiple parameters to terminal by the logging state of terminal, avoids single parameter band The resultant error come, so that recognition result is more accurate.
Further, it is based on trusted end-user recognition methods first embodiment of the present invention, proposes trusted end-user of the present invention Recognition methods second embodiment.
The difference of the first embodiment of the second embodiment and trusted end-user recognition methods of trusted end-user recognition methods It is, step a includes:
Step a1 obtains the first hardware information of target terminal, and based on preset dirty data rule, determines described first Whether hardware information is dirty data;
Step a2 generates the first ginseng of the target terminal if it is not, being then based on first hardware information and preset algorithm Number;
Step a3, based on the dirty data rule, is determined if so, obtaining the second hardware information of the target terminal Whether second hardware information is dirty data;
Step a4 generates the of the target terminal if it is not, being then based on second hardware information and the preset algorithm One parameter.
The present embodiment is when obtaining the hardware information of target terminal, it is possible to there is acquisition less than or getting dirty number According to the case where, therefore, dirty data need to be filtered, to get accurate hardware information so that generate the first parameter can It leans on.
It is specific:
Step a1 obtains the first hardware information of target terminal, and based on preset dirty data rule, determines described first Whether hardware information is dirty data;
In the present embodiment, identification equipment obtains the first hardware information of target terminal, and judges that the first hardware information is No is dirty data, and specific judgment basis is that preset dirty data is regular, as long as meeting dirty data rule, all will be regarded as dirty number According to.Specific dirty data rule can be configured according to the actual situation, as data format is not discontinuous to, data, error in data Deng, if the address mac of target terminal can not be directly obtained there are the address mac of part terminal in the actual implementation process, The value that terminal returns at this time is the error values such as FF:FF:FF:FF:FF or 0000000000, this is dirty data.
Step a2 generates the first ginseng of the target terminal if it is not, being then based on first hardware information and preset algorithm Number;
If it is determined that the first hardware information is not dirty data, then target terminal is generated based on the first hardware information and preset algorithm The first parameter, specific generating mode can be referring to above-described embodiment, and details are not described herein.
Step a3, based on the dirty data rule, is determined if so, obtaining the second hardware information of the target terminal Whether second hardware information is dirty data;
If it is determined that the first hardware information is dirty data, then filter out, and reacquire the second hardware information of target terminal, Then verify whether the second hardware information is dirty data again.It should be understood that there are multiple hardware informations in target terminal, such as The address mac, sequence number etc. if the address mac is dirty data, then it is hard to obtain second after determining that the first hardware information is dirty data Part information, such as sequence number, and whether verifying sequence number is dirty data again.
Step a4 generates the of the target terminal if it is not, being then based on second hardware information and the preset algorithm One parameter.
If it is determined that the second hardware information is not dirty data, then target terminal is generated based on the second hardware information and preset algorithm The first parameter;If the second hardware information or dirty data, continue to obtain third hardware information, and verify third hardware information It whether is dirty data.Details are not described herein for the mode of the first parameter of specific judgment mode and generation.
Further, in another embodiment, however, it is determined that the first hardware information is dirty data, then further determines that first is hard The dirty data type of part information, wherein dirty data type includes that shortage of data, error in data, data format be not reciprocity.
If the dirty data type of the first hardware information is shortage of data, the number of characters of missing is further determined that, namely really Fixed first hardware information lacks how many character, if the number of characters of missing is less than default value, mends to the first hardware information Entirely, and with the first hardware information after completion the first parameter is generated.
Specific completion mode are as follows: replace the character of missing with uniform character, such as the first hardware information currently lacks three Character then replaces missing character with uniform character.
It should be noted that guarantee that the first hardware information is reliable, default value 3.
The present embodiment needs to be filtered the hardware information of acquisition when generating the first parameter, so that the hardware of acquisition Information is reliable, the first reliable in parameters of generation, so that subsequent reliable in parameters based in the credibility for judging target terminal, Improve the precision of trusted end-user identification.
Further, it is based on the first, second embodiment of trusted end-user recognition methods of the present invention, proposes that terminal of the present invention can Letter property recognition methods 3rd embodiment.
First, second embodiment of the 3rd embodiment and trusted end-user recognition methods of trusted end-user recognition methods Difference is that step S10 includes:
Step f is detected with the presence or absence of first parameter in the target terminal, and is based on the logging state, detection It whether there is second parameter in the target terminal;
Step g obtains first parameter and second parameter if existing.
The present embodiment first determines whether deposit in target terminal before the first parameter and the second parameter for obtaining target terminal In the first parameter and the second parameter, it is ensured that the first parameter and the second parameter can be got.
It is specific:
Step f is detected with the presence or absence of first parameter in the target terminal, and is based on the logging state, detection It whether there is second parameter in the target terminal;
First parameter of the present embodiment and the second parameter storage on a target terminal, for avoid user by target terminal into The operations such as row deletion, so that the first parameter and the second parameter in target terminal are lost, identification equipment need to first detect target terminal In whether there is the first parameter, and the logging state based on target terminal detects and whether there is the second parameter in target terminal, i.e., Second parameter is related to logging state.
Step g obtains first parameter and second parameter if existing.
If all existing, illustrating that user does not delete the first parameter and the second parameter, the first parameter and the second parameter are not lost, Then obtain the first parameter and the second parameter of target terminal.
Wherein, in the present embodiment, the first parameter is obtained the hardware information of target terminal by target terminal, and by target end End is generated according to hardware information and preset algorithm, and specific generating mode can be found in above-described embodiment, and details are not described herein, and identification is set Standby the first parameter that can be directly obtained generation, goes to generate again without first obtaining hardware information;Second parameter is then by target The corresponding server of terminal generates, specifically, determining the logging state of target terminal by server, then obtains target by server The user information of terminal generates the second parameter according to preset algorithm, logging state and user information by server, and second is joined Number, which is issued in target terminal, to be stored, and specific generating mode also repeats no more herein.
The generation of the first parameter is responsible for by target terminal in the present embodiment, and the generation of the second parameter is born by server Duty, avoiding all parameters all is that target terminal generates, and also avoids the behavior that user modifies parameter by target terminal.And And two parameters are generated by different main body, can accelerate formation speed, enable identification equipment faster get the first parameter and Second parameter.
Further, after step f, the method also includes:
If first parameter and/or second parameter are not present, read in preset at least two buffer zone Corresponding first cached parameters of the target terminal and the second cached parameters are taken, and first in determining each buffer zone is slow Whether the second cached parameters deposited in parameter and each buffer zone are consistent;
If it is determined that the first parameter and/or the second parameter are not present in target terminal, illustrate to lack parameters on target terminal Credibility identified, then corresponding first cached parameters of target terminal and the are read in preset at least two buffer zone Two cached parameters, i.e., in the present embodiment, to prevent user from deleting the first parameter stored in target terminal and/or the second parameter It removing or other reasons causes the first parameter and/or the second parameter to be lost, the present embodiment is preset at least two buffer zones, Parameter is stored in buffer zone, such as is stored in APP cache file, equipment cache file, SD card position, to establish more Layer data cross validation.Specifically, sentencing respectively after getting the first cached parameters and the second cached parameters in each buffer zone Whether the first cached parameters broken in each buffer zone are consistent, and whether the second cached parameters in each buffer zone are consistent.
If consistent, first cached parameters and second cached parameters are respectively set to the target terminal First parameter and the second parameter.
If the first cached parameters in each buffer zone are consistent, and the second cached parameters in each buffer zone are consistent, then First cached parameters and the second cached parameters are respectively set to the first parameter and the second parameter of target terminal.Namely using more The mode of layer data cross validation determines the first parameter and the second parameter of target terminal, and avoiding monofactor causes to count The problem of according to deviation.
It should be understood that illustrating that cached parameters are insincere, it is determined that target terminal is insincere if inconsistent.
The present embodiment obtains the first parameter and the second parameter of target terminal, and passes through the side of multi-layer data cross validation Formula verifies the first parameter and the second parameter, so that the first parameter and the second reliable in parameters, improve trusted end-user knowledge Other precision, and since the first parameter and the second parameter are by target terminal and each self-generating of server, it mentions to a certain extent The high speed of trusted end-user identification.
The present invention also provides a kind of trusted end-user identification devices.Trusted end-user identification device of the present invention includes:
Module is obtained, for obtaining the first parameter of target terminal, and the logging state current based on the target terminal, Obtain the second parameter of the target terminal;
Determining module, for determining the first confidence level of first parameter and the second confidence level of second parameter;
Computing module, for being based on the logging state, the weighted value and described second for determining first confidence level can The weighted value of reliability, and calculate the confidence level of the target terminal;
Identification module, for determining whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal can Letter.
Further, the acquisition module is also used to:
The hardware information of target terminal is obtained, and is based on the hardware information, generates the first parameter of the target terminal;
The user information and current logging state of target terminal described in the corresponding server of the target terminal are obtained, And it is based on the user information and the logging state, generate the second parameter.
Further, the acquisition module is also used to:
The first hardware information of target terminal is obtained, and based on preset dirty data rule, determines the first hardware letter Whether breath is dirty data;
If it is not, being then based on first hardware information and preset algorithm, the first parameter of the target terminal is generated;
If so, obtaining the second hardware information of the target terminal, based on the dirty data rule, described second is determined Whether hardware information is dirty data;
If it is not, being then based on second hardware information and the preset algorithm, the first parameter of the target terminal is generated.
Further, the acquisition module is also used to:
It detects with the presence or absence of first parameter in the target terminal, and is based on the logging state, detect the mesh It marks and whether there is second parameter in terminal;
If all existing, first parameter and second parameter are obtained.
Further, first parameter is obtained the hardware information of the target terminal by the target terminal, and by institute Target terminal is stated to be generated according to the hardware information and preset algorithm;Second parameter determines the target by the server The current logging state of terminal, and obtain by the server user information of the target terminal, by the server according to The logging state, the user information and the preset algorithm generate and are issued to the target terminal.
Further, the trusted end-user identification device further includes read module, and the read module is used for:
If if first parameter and/or second parameter are not present, in preset at least two buffer zone Read corresponding first cached parameters of the target terminal and the second cached parameters, and first in determining each buffer zone Whether the second cached parameters in cached parameters and each buffer zone are consistent;
If consistent, first cached parameters and second cached parameters are respectively set to the target terminal First parameter and the second parameter.
Further, the determining module is used for:
The first history parameters and the server for obtaining the target terminal issued based on the target terminal second History parameters;
First parameter is compared with first history parameters, first parameter is determined according to comparison result The first confidence level;
Second parameter is compared with second history parameters, second parameter is determined according to comparison result The second confidence level.
The present invention also provides a kind of computer readable storage mediums.
Trusted end-user recognizer, the trusted end-user identification are stored on computer readable storage medium of the present invention The step of trusted end-user recognition methods as described above is realized when program is executed by processor.
Wherein, the trusted end-user recognizer run on the processor is performed realized method and can refer to The each embodiment of trusted end-user recognition methods of the present invention, details are not described herein again.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content, is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of trusted end-user recognition methods, which is characterized in that the trusted end-user recognition methods includes the following steps:
The first parameter of target terminal, and the logging state current based on the target terminal are obtained, the target terminal is obtained The second parameter;
Determine the first confidence level of first parameter and the second confidence level of second parameter;
Based on the logging state, the weighted value of first confidence level and the weighted value of second confidence level are determined, and count Calculate the confidence level of the target terminal;
Determine whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
2. trusted end-user recognition methods as described in claim 1, which is characterized in that first ginseng for obtaining target terminal Number, and the logging state based on the target terminal, the step of obtaining the second parameter of the target terminal include:
The hardware information of target terminal is obtained, and is based on the hardware information, generates the first parameter of the target terminal;
Obtain the user information and current logging state of target terminal described in the corresponding server of the target terminal, and base In the user information and the logging state, the second parameter is generated.
3. trusted end-user recognition methods as claimed in claim 2, which is characterized in that the hardware letter for obtaining target terminal Breath, and the step of being based on the hardware information, generating the first parameter of the target terminal includes:
The first hardware information of target terminal is obtained, and based on preset dirty data rule, determines that first hardware information is No is dirty data;
If it is not, being then based on first hardware information and preset algorithm, the first parameter of the target terminal is generated;
If so, obtaining the second hardware information of the target terminal, based on the dirty data rule, second hardware is determined Whether information is dirty data;
If it is not, being then based on second hardware information and the preset algorithm, the first parameter of the target terminal is generated.
4. trusted end-user recognition methods as described in claim 1, which is characterized in that first ginseng for obtaining target terminal Number, and the logging state based on the target terminal, the step of obtaining the second parameter of the target terminal include:
It detects with the presence or absence of first parameter in the target terminal, and is based on the logging state, it is whole to detect the target It whether there is second parameter in end;
If all existing, first parameter and second parameter are obtained.
5. trusted end-user recognition methods as claimed in claim 4, which is characterized in that first parameter is whole by the target End obtains the hardware information of the target terminal, and is generated by the target terminal according to the hardware information and preset algorithm; Second parameter determines the current logging state of the target terminal by the server, and as described in server acquisition The user information of target terminal, it is raw according to the logging state, the user information and the preset algorithm by the server At and be issued to the target terminal.
6. such as the described in any item trusted end-user recognition methods of claim 4, which is characterized in that the detection target is whole It whether there is first parameter in end, and be based on the logging state, detect in the target terminal with the presence or absence of described the After the step of two parameters, the method also includes:
If first parameter and/or second parameter are not present, institute is read in preset at least two buffer zone Corresponding first cached parameters of target terminal and the second cached parameters are stated, and determine the first caching ginseng in each buffer zone Whether the second cached parameters in several and each buffer zone are consistent;
If consistent, first cached parameters and second cached parameters are respectively set to the first of the target terminal Parameter and the second parameter.
7. trusted end-user recognition methods as claimed in any one of claims 1 to 6, which is characterized in that the determination described first Second confidence level step of the first confidence level of parameter and second parameter includes:
The second history that the first history parameters and the server for obtaining the target terminal are issued based on the target terminal Parameter;
First parameter is compared with first history parameters, determines the of first parameter according to comparison result One confidence level;
Second parameter is compared with second history parameters, determines the of second parameter according to comparison result Two confidence levels.
8. a kind of trusted end-user identification device, which is characterized in that the trusted end-user identification device includes:
Module is obtained, for obtaining the first parameter of target terminal, and the logging state current based on the target terminal, is obtained Second parameter of the target terminal;
Determining module, for determining the first confidence level of first parameter and the second confidence level of second parameter;
Computing module, for be based on the logging state, determine first confidence level weighted value and second confidence level Weighted value, and calculate the confidence level of the target terminal;
Identification module, for determining whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
9. a kind of trusted end-user identifies equipment, which is characterized in that the trusted end-user identification equipment includes: memory, place It manages device and is stored in the trusted end-user recognizer that can be run on the memory and on the processor, the terminal can Letter property recognizer realizes the trusted end-user identification as described in any one of claims 1 to 7 when being executed by the processor The step of method.
10. a kind of computer readable storage medium, which is characterized in that being stored with terminal on the computer readable storage medium can Letter property recognizer, is realized when the trusted end-user recognizer is executed by processor such as any one of claims 1 to 7 institute The step of trusted end-user recognition methods stated.
CN201910762819.4A 2019-08-14 2019-08-14 Terminal credibility identification method, device, equipment and computer readable storage medium Active CN110474911B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910762819.4A CN110474911B (en) 2019-08-14 2019-08-14 Terminal credibility identification method, device, equipment and computer readable storage medium
PCT/CN2020/108190 WO2021027777A1 (en) 2019-08-14 2020-08-10 Terminal credibility identification method, apparatus and device, and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910762819.4A CN110474911B (en) 2019-08-14 2019-08-14 Terminal credibility identification method, device, equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110474911A true CN110474911A (en) 2019-11-19
CN110474911B CN110474911B (en) 2023-05-23

Family

ID=68511885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910762819.4A Active CN110474911B (en) 2019-08-14 2019-08-14 Terminal credibility identification method, device, equipment and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN110474911B (en)
WO (1) WO2021027777A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111107064A (en) * 2019-12-04 2020-05-05 北京奇虎科技有限公司 Terminal equipment identification method, device, equipment and readable storage medium
CN111708354A (en) * 2020-07-06 2020-09-25 四川创客知佳科技有限公司 Smart hotel terminal fault detection method based on big data
CN111753329A (en) * 2020-06-05 2020-10-09 江苏任务网络科技有限公司 Automatic early warning method for locking remote login of user
CN111756716A (en) * 2020-06-15 2020-10-09 深信服科技股份有限公司 Flow detection method and device and computer readable storage medium
CN112311760A (en) * 2020-09-17 2021-02-02 广西电网有限责任公司电力科学研究院 Terminal credibility analysis method and device for one-end multi-network environment
WO2021027777A1 (en) * 2019-08-14 2021-02-18 深圳前海微众银行股份有限公司 Terminal credibility identification method, apparatus and device, and computer readable storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040059792A1 (en) * 2001-11-02 2004-03-25 Nokia Corporation Method for processing data, a data processing system and a portable terminal
CN104135494A (en) * 2014-08-22 2014-11-05 北京京东尚科信息技术有限公司 Same-account incredible terminal login method and system based on credible terminal
CN104966002A (en) * 2015-07-03 2015-10-07 北京数字联盟网络科技有限公司 False mobile terminal identification method and apparatus
CN105426734A (en) * 2015-11-12 2016-03-23 山东超越数控电子有限公司 Identity authentication method and device based on trusted computing
CN106453372A (en) * 2016-11-03 2017-02-22 努比亚技术有限公司 Terminal, server and account login method
CN106778023A (en) * 2017-01-03 2017-05-31 武汉大学 A kind of Postural Evaluations of Electric Equipments credible result evaluation method
CN106936761A (en) * 2015-12-29 2017-07-07 株式会社日立制作所 A kind of secure log authentication method and system based on Quick Response Code and hardware information
CN108011936A (en) * 2017-11-28 2018-05-08 百度在线网络技术(北京)有限公司 Method and apparatus for pushed information
US20180302852A1 (en) * 2016-07-29 2018-10-18 Tencent Technology (Shenzhen) Company Limited Wireless local area network connection method, mobile terminal, and storage medium
CN109002733A (en) * 2018-06-20 2018-12-14 阿里巴巴集团控股有限公司 A kind of pair of equipment carries out the method and device of reliability evaluation
US20190034658A1 (en) * 2017-07-28 2019-01-31 Alibaba Group Holding Limited Data secruity enhancement by model training
CN110061987A (en) * 2019-04-19 2019-07-26 武汉大学 A kind of access control method and device of based role and trusted end-user
CN110069360A (en) * 2019-04-22 2019-07-30 重庆长安新能源汽车科技有限公司 A kind of storage, read method and the device of electric machine controller data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8635662B2 (en) * 2008-01-31 2014-01-21 Intuit Inc. Dynamic trust model for authenticating a user
CN104954350B (en) * 2014-03-31 2020-06-23 腾讯科技(深圳)有限公司 Account information protection method and system
CN105635084B (en) * 2014-11-17 2018-12-14 华为技术有限公司 Terminal authentication apparatus and method
CN110474911B (en) * 2019-08-14 2023-05-23 深圳前海微众银行股份有限公司 Terminal credibility identification method, device, equipment and computer readable storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040059792A1 (en) * 2001-11-02 2004-03-25 Nokia Corporation Method for processing data, a data processing system and a portable terminal
CN104135494A (en) * 2014-08-22 2014-11-05 北京京东尚科信息技术有限公司 Same-account incredible terminal login method and system based on credible terminal
CN104966002A (en) * 2015-07-03 2015-10-07 北京数字联盟网络科技有限公司 False mobile terminal identification method and apparatus
CN105426734A (en) * 2015-11-12 2016-03-23 山东超越数控电子有限公司 Identity authentication method and device based on trusted computing
CN106936761A (en) * 2015-12-29 2017-07-07 株式会社日立制作所 A kind of secure log authentication method and system based on Quick Response Code and hardware information
US20180302852A1 (en) * 2016-07-29 2018-10-18 Tencent Technology (Shenzhen) Company Limited Wireless local area network connection method, mobile terminal, and storage medium
CN106453372A (en) * 2016-11-03 2017-02-22 努比亚技术有限公司 Terminal, server and account login method
CN106778023A (en) * 2017-01-03 2017-05-31 武汉大学 A kind of Postural Evaluations of Electric Equipments credible result evaluation method
US20190034658A1 (en) * 2017-07-28 2019-01-31 Alibaba Group Holding Limited Data secruity enhancement by model training
CN108011936A (en) * 2017-11-28 2018-05-08 百度在线网络技术(北京)有限公司 Method and apparatus for pushed information
CN109002733A (en) * 2018-06-20 2018-12-14 阿里巴巴集团控股有限公司 A kind of pair of equipment carries out the method and device of reliability evaluation
CN110061987A (en) * 2019-04-19 2019-07-26 武汉大学 A kind of access control method and device of based role and trusted end-user
CN110069360A (en) * 2019-04-22 2019-07-30 重庆长安新能源汽车科技有限公司 A kind of storage, read method and the device of electric machine controller data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨蕊岚: "基于定序回归的云终端用户行为可信性评估方法的研究" *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021027777A1 (en) * 2019-08-14 2021-02-18 深圳前海微众银行股份有限公司 Terminal credibility identification method, apparatus and device, and computer readable storage medium
CN111107064A (en) * 2019-12-04 2020-05-05 北京奇虎科技有限公司 Terminal equipment identification method, device, equipment and readable storage medium
CN111753329A (en) * 2020-06-05 2020-10-09 江苏任务网络科技有限公司 Automatic early warning method for locking remote login of user
CN111756716A (en) * 2020-06-15 2020-10-09 深信服科技股份有限公司 Flow detection method and device and computer readable storage medium
CN111708354A (en) * 2020-07-06 2020-09-25 四川创客知佳科技有限公司 Smart hotel terminal fault detection method based on big data
CN111708354B (en) * 2020-07-06 2021-11-05 四川创客知佳科技有限公司 Smart hotel terminal fault detection method based on big data
CN112311760A (en) * 2020-09-17 2021-02-02 广西电网有限责任公司电力科学研究院 Terminal credibility analysis method and device for one-end multi-network environment

Also Published As

Publication number Publication date
WO2021027777A1 (en) 2021-02-18
CN110474911B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
CN110474911A (en) Trusted end-user recognition methods, device, equipment and computer readable storage medium
US11637824B2 (en) Multi-factor authentication devices
US10924514B1 (en) Machine learning detection of fraudulent validation of financial institution credentials
CN109492378B (en) Identity verification method based on equipment identification code, server and medium
US9491182B2 (en) Methods and systems for secure internet access and services
US9439070B2 (en) User authentication system
JP2021518705A (en) Runtime self-modification for blockchain ledger
US9230066B1 (en) Assessing risk for third-party data collectors
CN109561085A (en) A kind of auth method based on EIC equipment identification code, server and medium
US20200050759A1 (en) Enhancing security using anomaly detection
US11855976B2 (en) Utilizing behavioral features to authenticate a user entering login credentials
TWI701932B (en) Identity authentication method, server and client equipment
CN109711162A (en) Block chain-based security application method and system
CN108028843A (en) Passive type web application firewalls
CN115086047B (en) Interface authentication method and device, electronic equipment and storage medium
CN114257451B (en) Verification interface replacement method and device, storage medium and computer equipment
CN112765588B (en) Identity recognition method and device, electronic equipment and storage medium
US10009330B1 (en) Method, apparatus and article of manufacture for fast tracking authentication
CN115437798A (en) Data processing method, device, equipment and medium for shared memory
TW202125379A (en) Fraud detection system, fraud detection method, and program
US20240220593A1 (en) User authentication with biometric data in conjunction with autofill assistance
US20240160707A1 (en) Monitoring user interaction with client devices
US20240202293A1 (en) Fraud detection system, fraud detection method, and program
US20230385390A1 (en) System and method for detecting login fraud based on a machine learning model
TWI704796B (en) System for using network identification to sign in service server via telecommunication server and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant