CN111079169A - Block chain authentication system and block chain authentication method - Google Patents

Block chain authentication system and block chain authentication method Download PDF

Info

Publication number
CN111079169A
CN111079169A CN201811212638.6A CN201811212638A CN111079169A CN 111079169 A CN111079169 A CN 111079169A CN 201811212638 A CN201811212638 A CN 201811212638A CN 111079169 A CN111079169 A CN 111079169A
Authority
CN
China
Prior art keywords
file
file code
code
uplink
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811212638.6A
Other languages
Chinese (zh)
Inventor
李信颖
陈守贤
张莹珠
孙美君
谢周炽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Innovue Ltd
Original Assignee
Innovue Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Innovue Ltd filed Critical Innovue Ltd
Priority to CN201811212638.6A priority Critical patent/CN111079169A/en
Publication of CN111079169A publication Critical patent/CN111079169A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a block chain authentication method, which comprises the following steps: receiving the file code uploaded by the user device and storing the uploading time of the file code; sending the file code to a block chain network for uplink and storing uplink time of the file code; storing the authentication time of the file code when the received authentication of the uplink of the file code sent from the blockchain network is received.

Description

Block chain authentication system and block chain authentication method
Technical Field
The present invention relates to a system and a method, and more particularly, to a block chain authentication system and a block chain authentication method.
Background
The business secret refers to technical information and business information including design, program, product formula, manufacturing method, manufacturing craft, management recipe, customer list or marketing strategy, etc. The information is unknown to the public, can bring economic benefits to the obligee, has practical or potential practicability, and is managed by the obligee by using a secret means.
However, it is an important issue to effectively authenticate the file time and the reading record of the business secret without disclosing the business secret file.
Disclosure of Invention
The invention provides a block chain authentication system and a block chain authentication method, which can be used for solving the problems in the prior art.
Specifically, an embodiment of the present invention provides a block chain authentication system, including: a storage device, a network communication device and a processor; the network communication device receives a file code uploaded from a user device; the processor records an uploading time of the file code to the storage device, the processor sends the file code to a block chain network through the network communication device for uplink, the processor records an uplink time of the file code to the storage device according to the uploading time, and when the network communication device receives the uplink authentication of the file code from the block chain network, the processor records an authentication time of the file code to the storage device according to the uplink time.
In one embodiment of the present invention, the user device converts a file via a predetermined hash function to generate a hash code as the file code.
In an embodiment of the invention, before sending the file code to the blockchain network, the processor sends the file code to a timestamp server through the network communication device, so that the timestamp server returns a timestamp of the file code to the network communication device, and the processor sends the file code bound with the timestamp to the blockchain network through the network communication device for uplink.
In an embodiment of the invention, the number of the ue is plural, the processor combines plural file codes received by the network communication device within a predetermined time to generate a combined file code, and the processor transmits the combined file code to the blockchain network for uplink through the network communication device.
In an embodiment of the present invention, the file code corresponds to a file stored in the user device, and when the user device opens a browsing right of the file to a client device, the user device sends a browsing right opening notification associated with the file code to the network communication device, so that the processor records a time point at which the browsing right of the file corresponding to the file code has been opened to the client device in the storage device.
Furthermore, an embodiment of a block chain authentication method according to the present invention includes: receiving a file code uploaded from a user device and storing uploading time of the file code; sending the file code to a block chain network for uplink and storing uplink time of the file code; and storing an authentication time of the file code when the file code sent from the blockchain network is received and the uplink authentication of the file code is performed.
In one embodiment of the present invention, the user device converts a file via a predetermined hash function to generate a hash code as the file code.
In an embodiment of the present invention, the block chain authentication method further includes: before sending the file code to the block chain network, sending the file code to a timestamp server, and enabling the timestamp server to return a timestamp of the file code; and sending the file code bound with the timestamp to the blockchain network for uplink.
In an embodiment of the present invention, the number of the ue is plural, and the method for block chain authentication further includes: the received file codes are merged in a preset time to generate a merged file code, and the merged file code is sent to the block chain network for uplink.
In an embodiment of the present invention, the file code corresponds to a file stored in the ue, and the method for block chain authentication further includes: when the user device opens a browsing right of the file to a client device, a browsing right opening notice which is sent by the user device and is related to the file code is received, and a time point when the browsing right of the file corresponding to the file code is opened to the client device is stored.
In conclusion, compared with the prior art, the technical scheme provided by the invention has obvious advantages and beneficial effects. By the technical scheme of the invention, the time of the file can be authenticated effectively with public confidence under the condition that the file is not disclosed.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a block chain authentication system according to an embodiment of the present invention;
fig. 2 is a flowchart of a block chain authentication method according to an embodiment of the present invention.
The reference numerals are explained below:
100-blockchain authentication system; 110-a storage device; 120-network communication device
130-a processor; 160-timestamp server; 170-blockchain network
180. 181-user device; 190-a client device;
200-block chain authentication method; S201-S203-step.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. The same reference numbers in the drawings identify the same or similar elements. In other instances, well-known elements and steps have not been described in detail in order to avoid unnecessarily obscuring the present invention.
It should be noted that the description of the present invention and the claims referring to "connected" may generally refer to one component being indirectly coupled to another component through another component or one component being directly linked to another component without the need for other components. In the description and claims of this invention, the terms "a" and "an" may be used broadly to refer to a single or to a plurality of items, unless the article is specifically limited. The use of "about," "about," or "approximately" in the description of the invention is intended to modify any slightly variable quantity without changing the nature of the quantity. Unless otherwise specified in the examples, the range of error for values modified by "about", "about" or "approximately" is generally tolerated within twenty percent, preferably within ten percent, and more preferably within five percent.
Fig. 1 is a schematic structural diagram of a block chain authentication system 100 according to an embodiment of the present invention.
As shown in fig. 1, the block chain authentication system 100 includes a storage device 110, a network communication device 120, and a processor 130. In the architecture, the processor 130 is electrically connected to the storage device 110 and the network communication device 120. For example, the storage device 110 may be a hard disk, a flash memory or other storage media, the network communication device 120 may be a network card and/or other network devices, and the processor 130 may be a central processing unit, a controller or other processing circuits.
First, taking a user device 180 (e.g., a computer) as an example, the user device 180 stores a file (e.g., a business secret file), the user device 180 converts the file into a file code, for example, the user device 180 converts the file into a hash code as the file code after converting the file by a predetermined hash function, the predetermined hash function is a hash function used by the protocols of the user device 180 and the blockchain authentication system 100, the hash function operates the file to obtain a hash code representing the file, and the hash code has a fixed length, so that the data size can be greatly reduced.
Next, the user device 180 uploads the profile code and native information (e.g., the name of the user device 180, the IP address …, etc.) to the blockchain authentication system 100. The network communication device 120 receives the file code uploaded from the user device 180, and at this time, the file code is defined as the uploading time of the file code, the processor 130 records the uploading time of the file code to the storage device 110, and the storage device 110 stores the file code and the local information of the associated user device 180. The processor 130 sends the file code to the blockchain network 170 through the network communication device 120 for uplink, which is defined as the uplink time of the file code, and the processor 130 records the uplink time of the file code to the storage device 110 accordingly. There may be a plurality of computer devices in the blockchain network 170 (e.g., Bittery blockchain network, EtherFang blockchain network …, etc.), which generates a transaction from the file code provided by the user device 180 and sends the transaction to the blockchain network, and after the computer device calculates a new block is generated on the blockchain network, and when enough nodes on the blockchain are approved, the file chaining is completed. The blockchain records all transaction histories in a Distributed Ledger (Distributed Ledger), which makes the blockchain have the advantages of decentralization, non-falsification, traceability …, etc. When the network communication device 120 receives the authentication that the file code has been linked from the blockchain network 170, which is defined as the authentication time of the file code, the processor 130 records the authentication time of the file code to the storage device 110. In this way, the blockchain authentication system 100 can authenticate the file and the authentication time of the file efficiently and confidently through the blockchain network 170 without acquiring the file itself.
In an embodiment of the invention, before sending the file code to the blockchain network, the processor 130 sends the file code to the timestamp server 160 through the network communication device 120, so that the timestamp server 160 returns the timestamp of the file code to the network communication device 120, the processor 130 sends the file code with the timestamp bound thereto to the blockchain network through the network communication device 120 for uplink, which is defined as the uplink time of the file code, and the processor 130 records the uplink time of the file code with the timestamp bound thereto to the storage device 110. When the network communication device 120 receives the authentication of the uplink bound to the time stamp from the blockchain network 170, which is defined as the authentication time of the file code, the processor 130 records the authentication time of the time stamp bound file code to the storage device 110. With this arrangement, the blockchain authentication system 100 can perform double authentication on the file and the time of file authentication with public trust through the third party timestamp server 160 and the blockchain network 170 without disclosing the file.
On the other hand, in fig. 1, there are a plurality of user devices 180 and 181, and both user devices 180 and 181 can upload respective file codes to the blockchain authentication system 100. The processor 130 combines the plurality of file codes received by the network communication device 120 within a predetermined time to generate a combined file code. Alternatively, the processor 130 may send the plurality of file codes within a predetermined time to the timestamp server 160 to obtain the timestamp, and then combine the plurality of timestamp-bound file codes to generate the combined file code. It should be noted that the predetermined time may be set by default by the blockchain authentication system 100 or flexibly adjusted by the system administrator.
Next, the processor 130 sends the merged file code to the blockchain network 170 for uplink transmission through the network communication device 120, which is defined as the uplink time of the merged file code, and the processor 130 records the uplink time of the merged file code to the storage device 110 accordingly. When the network communication device 120 receives the authentication that the merged file code has been linked from the blockchain network 170, which is defined as the authentication time of the merged file code, the processor 130 records the authentication time of the merged file code to the storage device 110. By combining the file codes, the authentication cost is reduced and the data complexity of the file codes is increased, so that the information security is enhanced.
Regarding the manner of merging file codes, for example, the processor 130 merges a plurality of file codes through a Merkletree (Merkletree) to generate a merged file code. A black tree is a tree-like data structure in which each leaf node is tagged with a hash of a block of data (e.g., archive code), and nodes other than the leaf node are tagged with encrypted hashes of their child node tags. The Moker tree is able to efficiently and securely verify the contents of a large data structure.
In an embodiment of the present invention, taking the user device 180 as an example, the file code corresponds to a file stored in the user device 180, and when the user device 180 opens the browsing right of the file to the client device 190, the user device 180 sends a browsing right opening notification associated with the file code to the network communication device 120, so that the processor 130 records a time point when the browsing right of the file corresponding to the file code has been opened to the client device 190 in the storage device 110. Thus, when a user views a file from the user device 180 to a client device 190 (e.g., remotely browsing online via a specific viewing program), the blockchain authentication system 100 can record when the file is read by the specific client device, but the user device 180 does not need to upload the file to the blockchain authentication system 100, thereby enhancing information security.
To further illustrate the operation of the block chain authentication system 100, please refer to fig. 1 and fig. 2, and fig. 2 is a flowchart of a block chain authentication method 200 according to an embodiment of the invention. As shown in fig. 2, the blockchain authentication method 200 includes steps S201 to S203 (it should be understood that the steps mentioned in the embodiment, except for the sequence specifically mentioned, can be performed simultaneously or partially simultaneously according to the actual requirement and the sequence before and after the steps can be adjusted as required).
First, taking the user device 180 as an example, the user device 180 stores a file, and the user device 180 converts the file into a file code. For example, the user device 180 converts the file via a predetermined hash function to generate a hash code as the file code. In step S201, the file code uploaded from the user device 180 is received, and the uploading time of the file code is stored.
In step S202, the file code is sent to the blockchain network 170 for uplink, and the uplink time of the file code is stored. There may be a plurality of computer devices in the blockchain network 170, which generates a transaction from the file code provided by the user device 180 and sends the transaction to the blockchain network, and after the computer device operates, a new block is generated on the blockchain network, and when enough nodes on the blockchain are approved, the file chaining is completed. The blockchain records all transaction histories in a distributed ledger (distributedLedger), which makes the blockchain have the advantages of decentralization, non-falsification, traceability …, etc.
In step S203, when the received file code sent from the blockchain network 170 has been uplink authenticated, the authentication time of the file code is stored.
In the blockchain authentication method 200, before step S202, i.e. before the file code is sent to the blockchain network 170, the file code is sent to the timestamp server 160, so that the timestamp server 160 returns the timestamp of the file code. Next, in step S202, the time stamp-bound file code is sent to the blockchain network 170 for uplink, and the uplink time of the time stamp-bound file code is stored. Then, in step S203, when the authentication of the uplink of the time-stamped bound file code sent from the blockchain network 170 is to be received, the authentication time of the time-stamped bound file code is stored.
On the other hand, in fig. 1, there are a plurality of user devices 180 and 181, and both user devices 180 and 181 can upload their respective file codes. In the block chain authentication method 200, a merged file code is generated by merging a plurality of file codes received within a predetermined time; alternatively, the plurality of file codes within the predetermined time may be sent to the timestamp server 160 to obtain the timestamp, and then the plurality of file codes with the timestamp bound thereto may be merged to generate the merged file code. The merged file code is then sent to the blockchain network 170 for uplink, which is defined as the uplink time of the merged file code and stores the uplink time of the merged file code. When the merged file code sent from the blockchain network 170 has been uplinked authenticated, the authentication time of the merged file code is defined as the authentication time of the merged file code, so that the authentication time of the merged file code is stored. By combining the file codes, the authentication cost is reduced and the data complexity of the file codes is increased, so that the information security is enhanced.
In the block chain authentication method 200, taking the user device 180 as an example, when the user device 180 opens the browsing right of the file to the client device 190, the browsing right opening notification associated with the file code sent from the user device 190 is received, so as to store the time point when the browsing right of the file corresponding to the file code has been opened to the client device 190.
In conclusion, compared with the prior art, the technical scheme provided by the invention has obvious advantages and beneficial effects. Through the technical scheme of the invention, under the condition that the file is not disclosed, the file, the uploading time of the file and the record read by a specific person at a specific time can be authenticated effectively with public confidence.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A blockchain authentication system, comprising:
a storage device;
a network communication device, which receives a file code uploaded from a user device; and
a processor, recording an uploading time of the file code to the storage device, sending the file code to a block chain network through the network communication device for uplink, recording an uplink time of the file code to the storage device according to the uploading time, and recording an authentication time of the file code to the storage device according to the recording when the network communication device receives the authentication that the file code has been uplink from the block chain network.
2. The system of claim 1, wherein the user device generates a hash code as the file code after transforming a file through a predetermined hash function.
3. The blockchain authentication system of claim 1, wherein before sending the file code to the blockchain network, the processor sends the file code to a timestamp server through the network communication device, so that the timestamp server sends a timestamp of the file code back to the network communication device, and the processor sends the file code with the timestamp bound thereto to the blockchain network through the network communication device for uplink.
4. The system of claim 1, wherein the number of the ues is plural, the processor combines plural file codes received by the network communication device within a predetermined time to generate a combined file code, and the processor transmits the combined file code to the blockchain network for uplink through the network communication device.
5. The blockchain authentication system of claim 1, wherein the file code corresponds to a file stored in the client device, and when the client device opens a browsing right of the file to a client device, the client device sends a browsing right opening notification associated with the file code to the network communication device, so that the processor records a time point at which the browsing right of the file corresponding to the file code has been opened to the client device in the storage device.
6. A method of block chain authentication, comprising:
receiving a file code uploaded from a user device and storing uploading time of the file code;
sending the file code to a block chain network for uplink and storing uplink time of the file code; and
when the received file code sent from the block chain network is authenticated to be chain-linked, storing an authentication time of the file code.
7. The blockchain authentication method of claim 6, wherein the user device generates a hash code as the file code after transforming a file through a predetermined hash function.
8. The blockchain authentication method of claim 6, further comprising:
before sending the file code to the block chain network, sending the file code to a timestamp server, and enabling the timestamp server to return a timestamp of the file code; and
and sending the file code bound with the timestamp to the blockchain network for uplink.
9. The method of claim 6, wherein the number of the user devices is plural, the method further comprising:
the received file codes are merged in a preset time to generate a merged file code, and the merged file code is sent to the block chain network for uplink.
10. The blockchain authentication method of claim 6, wherein the file code corresponds to a file stored in the client device, the blockchain authentication method further comprising:
when the user device opens a browsing right of the file to a client device, a browsing right opening notice which is sent by the user device and is related to the file code is received, and a time point when the browsing right of the file corresponding to the file code is opened to the client device is stored.
CN201811212638.6A 2018-10-18 2018-10-18 Block chain authentication system and block chain authentication method Pending CN111079169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811212638.6A CN111079169A (en) 2018-10-18 2018-10-18 Block chain authentication system and block chain authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811212638.6A CN111079169A (en) 2018-10-18 2018-10-18 Block chain authentication system and block chain authentication method

Publications (1)

Publication Number Publication Date
CN111079169A true CN111079169A (en) 2020-04-28

Family

ID=70308290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811212638.6A Pending CN111079169A (en) 2018-10-18 2018-10-18 Block chain authentication system and block chain authentication method

Country Status (1)

Country Link
CN (1) CN111079169A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180025181A1 (en) * 2016-07-21 2018-01-25 Acronis International Gmbh System and method for verifying data integrity using a blockchain network
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN107924389A (en) * 2015-07-02 2018-04-17 纳斯达克公司 The system and method traced to the source the safety of distributed transaction database
CN107944868A (en) * 2017-12-07 2018-04-20 杭州趣链科技有限公司 A kind of electronics deposit system and management method based on block chain intelligence contract
CN108537694A (en) * 2018-04-23 2018-09-14 众安信息技术服务有限公司 Method, apparatus and readable storage medium storing program for executing for protecting copyright on block chain
CN108595607A (en) * 2018-04-20 2018-09-28 百度在线网络技术(北京)有限公司 Processing method, device, equipment, system and the storage medium of register information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107924389A (en) * 2015-07-02 2018-04-17 纳斯达克公司 The system and method traced to the source the safety of distributed transaction database
US20180025181A1 (en) * 2016-07-21 2018-01-25 Acronis International Gmbh System and method for verifying data integrity using a blockchain network
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN107944868A (en) * 2017-12-07 2018-04-20 杭州趣链科技有限公司 A kind of electronics deposit system and management method based on block chain intelligence contract
CN108595607A (en) * 2018-04-20 2018-09-28 百度在线网络技术(北京)有限公司 Processing method, device, equipment, system and the storage medium of register information
CN108537694A (en) * 2018-04-23 2018-09-14 众安信息技术服务有限公司 Method, apparatus and readable storage medium storing program for executing for protecting copyright on block chain

Similar Documents

Publication Publication Date Title
US20210209373A1 (en) Media authentication using distributed ledger
US10361871B2 (en) Electronic signature framework with enhanced security
US11907406B2 (en) Computer-implemented method and system of tamper-evident recording of a plurality of service data items
US20190278920A1 (en) Data verification methods and systems using a hash tree, such as a time-centric merkle hash tree
US20220156706A1 (en) File vault and cloud based document notary service
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
WO2019161774A1 (en) Methods, application server, block chain node and media for logistics tracking and source tracing
US20200313859A1 (en) Cryptologic Blockchain-Based Off-Chain Storage Verification
US20200364373A1 (en) File verification method, file verification system and file verification server
CN102542405A (en) Digital archive storage and identification method and system
CN111935110A (en) Method and device for controlling permission of tenant to access container instance
WO2021098277A1 (en) Blockchain file access method and apparatus, computer device and storage medium
CN109845183A (en) For from client device to the method for cloud storage system storing data block
US11101995B1 (en) Secure video content transmission over a computer network
CN110457629A (en) Permission processing, authority control method and device
CA3231084A1 (en) Methods and systems for fast consensus within distributed ledgers
CN110347678B (en) Financial data storage method, system, device and equipment
CN112070504B (en) Content inspection method and device for blockchain transaction
CN107979595B (en) Private data protection method and gateway system
CN113448926A (en) Block chaining operation and maintenance management system and method
CN111079169A (en) Block chain authentication system and block chain authentication method
Bergers et al. Dwh-dim: a blockchain based decentralized integrity verification model for data warehouses
CN113987574A (en) Block chain private transaction method, device, equipment and readable storage medium
TWI692960B (en) Blockchain authentication system and blockchain authentication method
US20240163118A1 (en) Blockchain-based data processing method, device, and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200428

WD01 Invention patent application deemed withdrawn after publication