CN111131312A - Data transmission verification method and system - Google Patents

Data transmission verification method and system Download PDF

Info

Publication number
CN111131312A
CN111131312A CN201911416934.2A CN201911416934A CN111131312A CN 111131312 A CN111131312 A CN 111131312A CN 201911416934 A CN201911416934 A CN 201911416934A CN 111131312 A CN111131312 A CN 111131312A
Authority
CN
China
Prior art keywords
information
ciphertext
transmitted
service data
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911416934.2A
Other languages
Chinese (zh)
Inventor
陈锦忠
李志达
贺峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Lyric Robot Automation Co Ltd
Original Assignee
Guangdong Lyric Robot Intelligent Automation Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Lyric Robot Intelligent Automation Co Ltd filed Critical Guangdong Lyric Robot Intelligent Automation Co Ltd
Priority to CN201911416934.2A priority Critical patent/CN111131312A/en
Publication of CN111131312A publication Critical patent/CN111131312A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data transmission verification method, which comprises the steps of transmitting user information, service data information and ciphertext information; generating a verification ciphertext from the transmitted service data information; judging that the generated verification ciphertext is consistent with the transmitted ciphertext information, and determining that the transmitted service data is normal; the invention also discloses a data transmission verification system. The invention verifies the consistency of the ciphertext information and the verification ciphertext, ensures that the transmitted service data information is not tampered midway while the user information is confirmed, ensures the integrity of the service data, realizes double protection and further improves the safety of data transmission.

Description

Data transmission verification method and system
Technical Field
The invention relates to the technical field of data transmission, in particular to a data transmission verification method and a data transmission verification system.
Background
In order to ensure the safe transmission of data, the interface safety is usually verified in the data transmission in the prior art, however, this method can only ensure the safety of the data transmission interface, but cannot ensure whether the data is maliciously tampered by others in the transmission process, and cannot ensure the integrity of the data transmission.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data transmission verification method and a data transmission verification system.
The invention discloses a data transmission verification method, which comprises the following steps:
transmitting user information, service data information and ciphertext information;
generating a verification ciphertext from the transmitted service data information;
and if the generated verification ciphertext is consistent with the transmitted ciphertext information, determining that the transmitted service data is normal.
According to an embodiment of the present invention, after determining that the transmitted service data is normal, the method further includes:
and receiving the transmitted service data and processing the service data.
According to an embodiment of the present invention, if the generated verification ciphertext is determined to be inconsistent with the transmitted ciphertext information, it is determined that the transmitted service data is abnormal.
According to an embodiment of the present invention, after determining that the transmitted service data is abnormal, the method further includes:
and forbidding to receive the transmitted service data and giving an abnormal prompt.
According to one embodiment of the invention, the transmitted service data information is generated into the verification ciphertext according to the preset ciphertext generation rule.
According to an embodiment of the present invention, before transmitting the user information, the service data information, and the ciphertext information, the method further includes the following steps:
and generating the business information into ciphertext information according to a preset ciphertext generation rule.
According to an embodiment of the present invention, before generating the ciphertext information from the service information according to the preset ciphertext generation rule, the method further includes the following steps:
and obtaining a preset ciphertext generation rule.
According to an embodiment of the present invention, the presetting of the ciphertext generation rule includes:
capturing service data information to form an abstract;
generating characters according to the abstract;
and forming ciphertext information or verification ciphertext according to the characters.
According to one embodiment of the present invention, user information, service data information, ciphertext information, and uniqueness information are transmitted;
generating a verification ciphertext from the transmitted service data information;
and judging that the generated verification ciphertext is consistent with the transmitted ciphertext information, and judging that the uniqueness information is correct, and determining that the transmitted service data is normal.
The invention discloses a data transmission verification system, which comprises:
a user unit and a service unit; the user unit is connected with the service unit;
the user unit is used for transmitting user information, service data and ciphertext information to the service unit; and the service data information transmitted by the service unit generates a verification ciphertext, and if the verification ciphertext generated by the service unit is consistent with the ciphertext information transmitted by the user unit, the service data transmitted by the user unit is determined to be normal.
The consistency verification is carried out on the ciphertext information and the verification ciphertext, the transmitted business data information is guaranteed not to be tampered midway while the user information is confirmed, the integrity of the business data is guaranteed, the dual protection is realized, and the safety of data transmission is further improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flowchart illustrating a data transmission verification method according to an embodiment
Fig. 2 is a flowchart of presetting a ciphertext generating rule in an embodiment.
Detailed Description
In the following description, for purposes of explanation, numerous implementation details are set forth in order to provide a thorough understanding of the various embodiments of the present invention. It should be understood, however, that these implementation details are not to be interpreted as limiting the invention. That is, in some embodiments of the invention, such implementation details are not necessary. In addition, some conventional structures and components are shown in simplified schematic form in the drawings.
It should be noted that all the directional indications such as up, down, left, right, front and rear … … in the embodiment of the present invention are only used to explain the relative positional relationship, movement, etc. between the components in a specific posture as shown in the drawings, and if the specific posture is changed, the directional indication is changed accordingly.
In addition, the descriptions related to the first, the second, etc. in the present invention are only used for description purposes, do not particularly refer to an order or sequence, and do not limit the present invention, but only distinguish components or operations described in the same technical terms, and are not understood to indicate or imply relative importance or implicitly indicate the number of indicated technical features. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
In order to further understand the contents, features and effects of the present invention, the following embodiments are illustrated and described in detail with reference to the accompanying drawings:
example one
Referring to fig. 1, fig. 1 is a flowchart of a data transmission verification method according to a first embodiment. The data transmission verification method in the embodiment comprises the following steps:
and transmitting the user information, the service data information and the ciphertext information.
And generating a verification ciphertext from the transmitted service data information.
And if the generated verification ciphertext is consistent with the transmitted ciphertext information, determining that the transmitted service data is normal.
The data transmission verification method in the embodiment verifies the consistency of the ciphertext information and the verification ciphertext, ensures that the transmitted business data information is not tampered midway while the user information is confirmed, ensures the integrity of the business data, realizes double protection, and further improves the safety of data transmission.
Preferably, before generating the verification ciphertext from the transmitted service data information, it is required to verify that the transmitted user information has the identity right. The authority of the user is verified, and then the consistency verification of the ciphertext information and the verification ciphertext is carried out, so that double verification protection is realized.
Referring back to fig. 1, further, after determining that the transmitted service data is normal, the method further includes the following steps: and receiving the transmitted service data and processing the service data. And determining that the transmitted service data is abnormal when the generated verification ciphertext is judged to be inconsistent with the transmitted ciphertext information. After determining that the transmitted service data is abnormal, the method further comprises the following steps: and forbidding to receive the transmitted service data and giving an abnormal prompt.
Therefore, only the service data which passes the user information authority and the service data integrity verification is received, transmitted and processed, and the service data which does not pass the verification is forbidden to be received and transmitted, so that the tampered service data is prevented from entering a data interaction link, and the safety of data transmission is ensured.
Referring back to fig. 1, when user information, service data information and ciphertext information are transmitted, the user information, the service data information and the ciphertext information may be formed into a data packet in a "packet" manner and then transmitted together. In this embodiment, the user may upload the data packet to the server through the PC or mobile interface. The user information in this embodiment may be a user name and a user key, and the service data may be an article or an acquisition value list. The ciphertext information is formed by a user according to a certain rule according to the service data information, and has uniqueness, and only one service data information can generate unique ciphertext information. In specific application, a piece of software can be formed on the PC end or the mobile end, the software is internally provided with a rule program for generating a ciphertext, and a section of ciphertext information can be automatically generated after business data information is input. And then, the user packs and uploads the user information, the service data information and the ciphertext information.
Verifying that the transmitted user information has identity authority, and when the method is applied specifically, adopting an authority verification mode in the prior art, for example, according to different authorities given by different user names and keys, the server background verifies whether the user information in the data packet has the preset identity authority, if not, directly rejecting the request of data uploading, and if so, continuing to verify the service data. When the business data is verified, the server firstly forms the transmitted business data information according to a certain rule to generate a verification ciphertext, the verification ciphertext also has uniqueness, when the rule for generating the ciphertext information by the user PC end or the mobile end is consistent with the rule for generating the verification ciphertext by the server, the ciphertext information is consistent with the verification ciphertext, at the moment, the server judges that the generated verification ciphertext is consistent with the transmitted ciphertext information, the transmitted business data is determined to be normal, and otherwise, the transmitted business data is abnormal data.
Referring to fig. 1 again, further, the transmitted service data information is generated into a verification ciphertext according to a preset ciphertext generation rule. Preferably, if the transmitted user information is verified to have the identity authority, the transmitted service data information is generated into a verification ciphertext according to a preset ciphertext generation rule.
Before transmitting the user information, the service data information and the ciphertext information, the method further comprises the following steps: and generating the business information into ciphertext information according to a preset ciphertext generation rule.
Before generating the business information into the ciphertext information according to the preset ciphertext generating rule, the method further comprises the following steps: and obtaining a preset ciphertext generation rule.
The preset ciphertext generation rule in this embodiment is preset by the server, that is, the server sets a preset ciphertext generation rule, for example, a software or an online interface service having a function of generating a ciphertext, and then transmits the preset ciphertext generation rule to different users through another non-data upload interface, for example, different users respectively download the software capable of generating a ciphertext to their own PC or mobile terminals through download ports of the server. Also for example, different users generate the ciphertext directly using an online interface service provided by the server. Therefore, the PC end or the mobile end of the user and the server can generate ciphertext information or verification ciphertext by adopting the same preset ciphertext generation rule.
Before data transmission, a user can obtain a preset ciphertext generation rule from a server in advance, business data information is generated into ciphertext information according to the preset ciphertext generation rule, the ciphertext information and the business data information are uploaded to the server together, the server verifies the identity authority of the user, and after the identity authority passes, the business data information is generated into a verification ciphertext according to the same preset ciphertext generation rule. Because the rules of the user and the server for generating the ciphertext information are consistent, the ciphertext information and the verification ciphertext generated by the user and the server are consistent under the condition that the service data information is not changed, if the ciphertext information and the verification ciphertext are inconsistent, the service data is falsified in the transmission process, potential safety hazards exist, the server needs to forbid the transmission and processing for receiving the service data, and an exception prompt is given.
With reference to fig. 2, fig. 2 is a flowchart illustrating presetting of a ciphertext generating rule according to a first embodiment. Further, in this embodiment, the preset ciphertext generating rule is implemented as follows, which includes the following steps:
and capturing the service data information to form an abstract. It can be understood that the space of the business data information may be relatively long, and therefore, a summary of the business data information needs to be formed first. For example, a certain rule is adopted to capture data from the service data information to form a summary, in practical applications, the captured service data information in a specific order can be adopted, for example, "words" in an article are captured in an odd order, an even order or in every n orders, n is a positive integer, and specifically, according to the actual situation, a relatively long summary can be captured at intervals with a relatively large value of n, and finally a moderately-long summary is formed, for example, a summary of 256 words is formed.
And generating characters according to the abstract. After the abstract is formed, the character is generated by the abstract, each character in the abstract corresponds to one character, the character of the abstract is changed into the character without any meaning, and a character section similar to messy codes is formed, so that a third person cannot obtain any information from the character section generated by the abstract. In this embodiment, "words" and "characters" have an irreversible correspondence, each "word" corresponds to one "character", but each "character" corresponds to an uncertain "word", so that a third person cannot reverse "words" from the "characters", that is, the characters cannot reversely generate an abstract. The character can be formed by using the existing algorithm in specific application, for example, the character segment formed by the hash algorithm.
And forming ciphertext information or verification ciphertext according to the characters. After the character is generated, ciphertext information or verification ciphertext is formed, the existing ciphertext generation mode can be adopted, and details are not repeated here. And the server performs consistency matching on the formed ciphertext information and the verification ciphertext, if the formed ciphertext information and the verification ciphertext are consistent, the two are generated by the same service data information, and are not falsified in the middle process, and if the formed ciphertext information and the verification ciphertext are inconsistent, the server does not generate the ciphertext information and the verification ciphertext information by the same service data, and if the formed ciphertext information and the verification ciphertext are inconsistent, the two are not generated by the same service data, and are falsified in the middle, so that the server has.
Example two
The data transmission verification system in this embodiment includes a user unit and a service unit. The subscriber unit is connected to the service unit. In this embodiment, the subscriber unit may be a PC terminal or a mobile terminal, and the service unit may be a server, which may be connected via a wired interface or a wireless interface to form information transmission.
The user unit is used for transmitting the user information, the service data and the ciphertext information to the service unit. The service unit verifies that the user information transmitted by the user unit has the identity authority, generates verification ciphertext from the transmitted service data information, judges that the verification ciphertext generated by the service unit is consistent with the ciphertext information transmitted by the user unit, and determines that the service data transmitted by the user unit is normal. The service unit generates the transmitted business data information into a verification ciphertext according to a preset ciphertext generation rule, and the ciphertext information transmitted by the user is formed by the business data according to the same preset ciphertext generation rule. And if the business data information is consistent, the preset ciphertext generating rule is consistent, the ciphertext information is consistent with the verification ciphertext, otherwise, the business data information is falsified.
EXAMPLE III
The data transmission verification method in the embodiment comprises the following steps:
and transmitting the user information, the service data information, the ciphertext information and the uniqueness information.
And generating a verification ciphertext from the transmitted service data information.
And judging that the generated verification ciphertext is consistent with the transmitted ciphertext information, and judging that the uniqueness information is correct, and determining that the transmitted service data is normal.
The difference between this embodiment and the first embodiment is that the user information, the service data information, and the ciphertext information are transmitted, and the uniqueness information is also transmitted synchronously. After the identity authority of the user is confirmed, the generated verification ciphertext is judged to be consistent with the transmitted ciphertext information, the uniqueness information is judged to be correct, and then the transmission service data is confirmed to be normal, so that triple protection is realized, and the safety of data transmission is further ensured.
Preferably, the unique information includes time information and random information. The time information is a time stamp in this embodiment. The random information in this embodiment is a random number. The step of judging that the uniqueness information is correct comprises the following substeps:
and judging that the time information is in the effective range. Specifically, the user information, the service data information, the ciphertext information, the time information and the random information are packaged and uploaded to the server together, the server verifies whether the time information is in an effective range, if so, the requirement that the user requests to transmit the data is in the effective range, the next step can be executed, and if not, the next step is not executed. For example, whether the time represented by the time stamp is within a preset time before and after the current time, such as within 2 minutes, 3 minutes or 5 minutes before and after the current time, if so, it indicates that the data transmission request is within the valid time, and if not, it indicates that the data request time has expired, and the server prompts the access user without processing.
Inquiring historical time information and historical random information transmitted last time, and judging whether the time information and the random information are matched with the historical time information and the historical random information; and if the matching is successful, the uniqueness information is verified. Specifically, according to the user information, the server can advance historical time information and historical random information, namely historical time stamps and historical random numbers, of the current interface accessed by the user last time from a database of the server; if the historical time information and the historical random information of the user exist, the user is not a new user and is making a repeat request. And then, the server verifies whether the time information is behind the historical time information or not, whether the random information is different from the historical random information or not, if the time information is behind the historical time information and the random information is different from the historical random information, the matching is qualified, the repeated request is passed, and the uniqueness information is verified to be passed. Otherwise, it does not pass.
Preferably, after the unique information is verified, the method further comprises the following steps: the time information and the random information are stored. Namely, the time stamp and the random number are stored, and new historical time information and historical random information are formed so as to facilitate the uniqueness verification at the next time.
In summary, a user forms cipher text information in advance according to a preset cipher text generation rule obtained from a server, and then uploads the cipher text information together with the user information and the service data information to the server, the server firstly performs user identity authority verification, forms a verification cipher text according to the same preset cipher text generation rule after the verification passes, performs consistency verification of the verification cipher text and the cipher text information, if the consistency verification passes, the service data is not tampered, receives and processes the service data, otherwise, the service data is tampered midway, the receiving and processing are prohibited, and an abnormal prompt is sent out, so that double verification of identity authority and service data integrity is realized, and the safety of data transmission is ensured. In addition, triple protection is realized through the uniqueness information of synchronous transmission, and the safety of data transmission is further ensured.
The above is merely an embodiment of the present invention, and is not intended to limit the present invention. Various modifications and alterations to this invention will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.

Claims (10)

1. A data transmission verification method, comprising:
transmitting user information, service data information and ciphertext information;
generating a verification ciphertext from the transmitted service data information;
and if the generated verification ciphertext is consistent with the transmitted ciphertext information, determining that the transmitted service data is normal.
2. The data transmission verification method of claim 1, wherein after determining that the transmitted service data is normal, further comprising:
and receiving the transmitted service data and processing the service data.
3. The data transmission verification method according to claim 1, wherein it is determined that the transmitted service data is abnormal if it is determined that the generated verification ciphertext is inconsistent with the transmitted ciphertext information.
4. The data transmission verification method according to claim 3, further comprising, after determining that the transmitted traffic data is abnormal:
and forbidding to receive the transmitted service data and giving an abnormal prompt.
5. The data transmission verification method according to claim 1, wherein the verification ciphertext is generated from the transmitted service data information according to a preset ciphertext generation rule.
6. The data transmission verification method of claim 5, wherein before transmitting the user information, the service data information and the ciphertext information, further comprising the steps of:
and generating cipher text information from the service information according to the preset cipher text generation rule.
7. The data transmission verification method according to claim 6, wherein before generating the service information into ciphertext information according to the preset ciphertext generation rule, the method further comprises the following steps:
and obtaining the preset ciphertext generation rule.
8. The data transmission verification method according to any one of claims 5 to 7, wherein the preset ciphertext generation rule comprises:
capturing the service data information to form an abstract;
generating characters according to the abstract;
and forming the ciphertext information or verification ciphertext according to the characters.
9. The data transmission verification method according to claim 1, wherein user information, service data information, cipher text information, and uniqueness information are transmitted;
generating a verification ciphertext from the transmitted service data information;
and judging that the generated verification ciphertext is consistent with the transmitted ciphertext information, and if the uniqueness information is correct, determining that the transmitted service data is normal.
10. A data transmission verification system is characterized by comprising a user unit and a service unit; the user unit is connected with the service unit;
the user unit is used for transmitting user information, service data and ciphertext information to the service unit; and the service unit generates a verification ciphertext from the transmitted service data information, judges that the verification ciphertext generated by the service unit is consistent with the ciphertext information transmitted by the user unit, and determines that the service data transmitted by the user unit is normal.
CN201911416934.2A 2019-12-31 2019-12-31 Data transmission verification method and system Pending CN111131312A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911416934.2A CN111131312A (en) 2019-12-31 2019-12-31 Data transmission verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911416934.2A CN111131312A (en) 2019-12-31 2019-12-31 Data transmission verification method and system

Publications (1)

Publication Number Publication Date
CN111131312A true CN111131312A (en) 2020-05-08

Family

ID=70506912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911416934.2A Pending CN111131312A (en) 2019-12-31 2019-12-31 Data transmission verification method and system

Country Status (1)

Country Link
CN (1) CN111131312A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179086A (en) * 2011-12-21 2013-06-26 中国电信股份有限公司 Method and system for remote storing processing of data
CN110266653A (en) * 2019-05-29 2019-09-20 深圳市梦网科技发展有限公司 A kind of method for authenticating, system and terminal device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179086A (en) * 2011-12-21 2013-06-26 中国电信股份有限公司 Method and system for remote storing processing of data
CN110266653A (en) * 2019-05-29 2019-09-20 深圳市梦网科技发展有限公司 A kind of method for authenticating, system and terminal device

Similar Documents

Publication Publication Date Title
CN110493197B (en) Login processing method and related equipment
EP2852118B1 (en) Method for an enhanced authentication and/or an enhanced identification of a secure element located in a communication device, especially a user equipment
CN100512201C (en) Method for dealing inserted-requested message of business in groups
EP2385661A2 (en) Authentication in a mobile communications network
DE60310439T2 (en) MESSAGE AUTHENTICATION CODE BASED ON ERROR CORRECTION CODE
JP2003521154A (en) How to issue electronic identification information
CN107454558B (en) Method for achieving Bluetooth automatic connection of master device and slave device through shared information
US20050138365A1 (en) Mobile device and method for providing certificate based cryptography
CN101366263A (en) Method and apparatus for establishing a security association
CN111884811B (en) Block chain-based data evidence storing method and data evidence storing platform
CN112367164B (en) Service request processing method and device, computer equipment and storage medium
CN112487408A (en) Safe access method and system for ECU in vehicle and storage medium
CN103581153A (en) Encryption method and device in system of Internet of Things
CN112311769B (en) Method, system, electronic device and medium for security authentication
CN104247485A (en) Network application function authorisation in a generic bootstrapping architecture
CN105141624A (en) Login method, account management server and client system
CN115567271B (en) Authentication method and device, page skip method and device, electronic equipment and medium
CN110618989A (en) Information processing method, information processing device and related product
CN111131312A (en) Data transmission verification method and system
CN106789076B (en) Interaction method and device for server and intelligent equipment
CN112583600B (en) User authentication method, device, electronic equipment and medium
CN114124515A (en) Bidding transmission method, key management method, user verification method and corresponding device
CN112506267A (en) RTC calibration method, vehicle-mounted terminal, user side and storage medium
CN113765674A (en) Cross-platform registration method and device based on block chain
CN113079506A (en) Network security authentication method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200508