CN111371801A - Block chain node scanning method, equipment and storage medium - Google Patents
Block chain node scanning method, equipment and storage medium Download PDFInfo
- Publication number
- CN111371801A CN111371801A CN202010176609.XA CN202010176609A CN111371801A CN 111371801 A CN111371801 A CN 111371801A CN 202010176609 A CN202010176609 A CN 202010176609A CN 111371801 A CN111371801 A CN 111371801A
- Authority
- CN
- China
- Prior art keywords
- node
- list
- verification
- nodes
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a block chain link point scanning method, equipment and a storage medium, wherein the method comprises the following steps: sending a connection request to a node to be connected, and judging whether the connection is successful: if not, adding the node into a local intranet node list; if yes, obtaining verification information of the node, verifying the verification information, and judging whether verification is successful: if yes, adding the node into a local external network node list, acquiring a connection node list of the node, and judging whether a first node which is not requested to be connected by the current node exists in the connection node list: if so, marking the first node as the node to be connected, and returning to send the connection request to the node to be connected. The invention realizes that the active statistics of the number of the block chain nodes can be carried out by any one or more block chain nodes without depending on any specific equipment.
Description
Technical Field
The present application relates to the field of block chain technologies, and in particular, to a block chain link point scanning method, device, and storage medium.
Background
The number of the nodes of the blockchain network can be used as a criterion for judging the size of the blockchain network, and in the conventional statistical scheme of the number of the blockchain nodes, each node is usually actively connected with a specified server, and then the server counts data.
The block chain node number statistical scheme has the defects that on one hand, the statistical mode is very passive, only the node connection can be waited, and the active statistics cannot be carried out; on the other hand, the above solution relies on a specific server, and the configuration of all nodes needs to be updated once the server is modified or an authentication server is added.
Disclosure of Invention
In view of the above-mentioned deficiencies or inadequacies in the prior art, it would be desirable to provide a block link point scan method, apparatus, and storage medium that can proactively count the number of block link nodes without relying on any particular equipment.
In a first aspect, the present invention provides a method for scanning a block chain node, including:
sending a connection request to a node to be connected, and judging whether the connection is successful:
if not, adding the node into a local intranet node list;
if yes, obtaining verification information of the node, verifying the verification information, and judging whether verification is successful:
if yes, adding the node into a local external network node list; and the number of the first and second groups,
acquiring a connection node list of the node, and judging whether a first node which is not requested to be connected by the current node exists in the connection node list:
if so, marking the first node as the node to be connected, and returning to send the connection request to the node to be connected.
In a second aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a block link point scanning method provided in accordance with embodiments of the present invention.
In a third aspect, the present invention also provides a storage medium storing a computer program that causes a computer to execute the block link point scanning method provided according to the embodiments of the present invention.
According to the block chain link point scanning method, the block chain link point scanning device and the block chain link point scanning storage medium, the connection node list is obtained from the successfully connected external network nodes, and the obtained nodes which are not connected in the connection node list are requested to be connected, so that all the nodes in the block chain network are scanned, and therefore the purpose that the scanning can be performed by any one or more block chain link points and the number of the block chain nodes can be actively counted without depending on any specific device is achieved;
the block chain link point scanning method, the block chain link point scanning device and the storage medium provided by some embodiments of the present invention further verify the block hash with random height after the connection is successful, thereby avoiding identifying a device maliciously disguised as a block chain link node as a block chain link point, and ensuring that verification is completed on a new node which is synchronizing block data.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a block link point scanning method according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a preferred embodiment of the method shown in FIG. 1.
FIG. 3 is a flow diagram of a preferred embodiment of the method shown in FIG. 1.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a block link point scanning method according to an embodiment of the present invention.
As shown in fig. 1, in this embodiment, the present invention provides a method for scanning a block chain node, including:
s11: sending a connection request to a node to be connected, and judging whether the connection is successful:
otherwise, step S12 is executed: adding the node into a local intranet node list;
if yes, go to step S13: obtaining verification information of the node, verifying the verification information, and judging whether verification is successful:
if yes, go to step S14: adding the node into a local external network node list; and the number of the first and second groups,
s15: acquiring a connection node list of the node, and judging whether a first node which is not requested to be connected by the current node exists in the connection node list:
if yes, go to step S16: the first node is marked as a node to be connected, and the process returns to step S11.
Specifically, in a blockchain network, each blockchain node needs to be connected with several other blockchain nodes, so each blockchain node locally maintains a connection node list of the current node. In this embodiment, the connection node list specifically includes an active connection node list out _ peer and a passive connection node list inner _ peer; in other embodiments, the blockchain node may configure a connection node list that is not subdivided or subdivided according to different policies according to actual needs.
The above method is exemplarily explained below by taking the scan node of the blockchain node a and counting the number of nodes as an example.
In step S11, node a connects the local node list out _ peerlistAAnd inner _ peerlistAEach node in (1) is marked as a node to be connected, and each node to be connected is respectively connected:
if the node a fails to connect to the node B, step S12 is executed, the node B is added to the intranet node list of the local node a, and the scanning branch based on the node B is ended;
if the node a succeeds in connecting to the node C, the step S13 is executed to obtain the verification information V from the node CCAnd is paired with VCAnd (6) carrying out verification. Specifically, in the present embodiment, the authentication information VCConfigured to be randomly assigned by the node A, and the current block height H of the plurality of random heights not larger than the node CCAnd is closest to HCRandom height of (H)1Block hash of1(ii) a In other embodiments, the method shown in fig. 2 may be adopted according to actual needs, or other methods as will be understood by those skilled in the art may be adopted to configure and verify the verification information.
When the block height returned by the node C is H1Block hash of1Block height of H stored locally with node A1Block hash of2When the verification is different, the verification fails, and the node A considers that the node C is not the node of the current block chain network;
when the block height returned by the node C is H1Block hash of1Block height of H stored locally with node A1Block hash of2If the verification is successful, executing step S14, and adding node C to the local extranet node list of node a; and the number of the first and second groups,
step S15, obtaining the connection node list out _ peer of the node CCAnd inner _ peerlistCAnd determines out _ peerlistCAnd inner _ peerlistCWhether there is a first node that node a has not requested to connect to:
if not, the scanning branch based on the node C is ended;
if yes, step S16 is executed to mark the first node M as a node to be connected, and the method returns to step S11 to request to connect the node M, and the scanning is continued based on the node M.
The process of the node a connecting with more nodes for scanning may refer to the process of the node B or the node C for scanning, which is not described in detail.
When the scanning branch based on each node is finished and new unconnected node information is not obtained, the scanning can be finished, and the number of nodes of the current block chain network is determined according to the local intranet node list and the local extranet node list of the node A.
The above example is exemplarily illustrated by taking the node a as an active scanning example, and in further embodiments, any one or more nodes may be scanned by the above method, respectively, without being limited to any specific device.
In the embodiment, the scanning of all the nodes in the block chain network is completed by acquiring the connection node list from the successfully connected external network nodes and requesting to connect the nodes which are not connected in the acquired connection node list, so that the active statistics of the number of the block chain nodes can be realized by any one or more block chain link points without depending on any specific equipment.
FIG. 2 is a flow diagram of a preferred embodiment of the method shown in FIG. 1. As shown in fig. 2, in a preferred embodiment, step S13 includes:
s131: acquiring the current height of the node, and determining a random height according to the current height;
s133: acquiring a first block hash of the random height of the node;
s135: verifying whether the first chunk hash is the same as a second chunk hash of the random height of the current node: if yes, the verification is successful.
Specifically, taking the scanning of the node C by the node a as an example:
in step S131, node a obtains the current block height H of node CCAccording to HCDetermined not to be greater than HCRandom height of (H)3;
In step S133, node a obtains the block height of node C as H3Block hash of3;
In step S135, the node a verifies the blockhash3Block height from local is H3Block hash of4Whether or not they are the same: if yes, the verification is successful.
The advantage of the verification method shown in fig. 2 over the verification method described in the example of fig. 1 is that it can ensure that the verification is completed for the new node that is synchronizing the block data (in the verification method described in the example of fig. 1, if each random height is greater than the synchronization height of the new node, the verification cannot be completed for the new node).
Preferably, the random height is no greater than the difference between the current height and the furcation safety depth. Specifically, the configuration can avoid misjudgment of other nodes caused by extreme reasons such as that the current node is in a bifurcation. The specific value of the bifurcation security depth can be configured according to a specific consensus mechanism.
The embodiment further verifies the block hash with random height after connection is successful, so that equipment maliciously disguised as block chain nodes is prevented from being identified as block chain node points, and verification of new nodes which are synchronizing block data is guaranteed.
FIG. 3 is a flow diagram of a preferred embodiment of the method shown in FIG. 1. As shown in fig. 3, in a preferred embodiment, the method further includes:
s17: after the authentication fails at step S13, first notification information for notifying that the node is an illegal node is generated and broadcast in the blockchain network.
Specifically, when the node is determined to be an illegal node due to failure of the verification, the notification information m1 for notifying that the node is an illegal node may be directly generated and broadcasted, or the illegal node information of the node may be locally recorded, and after the scanning is finished, all the illegal node information may be collected to generate the notification information m2, and then the notification information m2 may be broadcasted.
After other nodes receive m1 or m2, the interaction with illegal nodes can be avoided in time according to m1 or m 2.
Further preferably, the method further comprises: and verifying the second notification information broadcast by other nodes, and if the verification is successful, not connecting the illegal nodes notified by the second notification information.
Specifically, in order to avoid interference from the notification information forged and broadcast by a lawless person, the notification information may be verified when the notification information broadcast by other nodes is received. The manner of verifying the notification information may be configured to verify a signature (based on a private key built in the scanner) of the notification information, or verify an illegal node notified by the notification information based on the verification manner of step S13, or the like.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 4, as another aspect, the present application also provides an apparatus 400 including one or more Central Processing Units (CPUs) 401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the device 400 are also stored. The CPU401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to an embodiment of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing any of the methods described above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (8)
1. A method for block chain link point scanning, which is applied to a block chain node, the method comprising:
sending a connection request to a node to be connected, and judging whether the connection is successful:
if not, adding the node into a local intranet node list;
if yes, obtaining verification information of the node, verifying the verification information, and judging whether verification is successful:
if yes, adding the node into a local external network node list; and the number of the first and second groups,
acquiring a connection node list of the nodes, and judging whether a first node which is not requested to be connected by the current node exists in the connection node list:
if so, marking the first node as a node to be connected, and returning to the step of sending the connection request to the node to be connected.
2. The method of claim 1, wherein obtaining authentication information of the node and verifying the authentication information, and determining whether the authentication is successful comprises:
acquiring the current height of the node, and determining a random height according to the current height;
obtaining a first chunk hash of the random height of the node, verifying whether the first chunk hash is the same as a second chunk hash of the random height of the current node:
if yes, the verification is successful.
3. The method of claim 2, wherein the random height is not greater than a difference between the current height and a furcation safety depth.
4. The method according to any one of claims 1-3, further comprising:
and after the verification fails, generating first notification information for notifying the node of being an illegal node and broadcasting the first notification information in the blockchain network.
5. The method of claim 4, further comprising:
and verifying the second notification information broadcast by other nodes, and if the verification is successful, not connecting the illegal nodes notified by the second notification information.
6. The method according to any of claims 1-3, wherein the list of connecting nodes comprises a list of active connecting nodes and a list of passive connecting nodes.
7. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-6.
8. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010176609.XA CN111371801B (en) | 2020-03-13 | 2020-03-13 | Block chain node scanning method, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010176609.XA CN111371801B (en) | 2020-03-13 | 2020-03-13 | Block chain node scanning method, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111371801A true CN111371801A (en) | 2020-07-03 |
CN111371801B CN111371801B (en) | 2022-05-24 |
Family
ID=71211882
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010176609.XA Active CN111371801B (en) | 2020-03-13 | 2020-03-13 | Block chain node scanning method, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111371801B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112052250A (en) * | 2020-09-02 | 2020-12-08 | 杭州复杂美科技有限公司 | Performance measurement method, broadcast performance adjustment method, device and storage medium |
WO2024021410A1 (en) * | 2022-07-29 | 2024-02-01 | 蚂蚁区块链科技(上海)有限公司 | Method and apparatus for preventing network attacks |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160212146A1 (en) * | 2008-04-25 | 2016-07-21 | Kelce S. Wilson | PEDDaL Blockchaining for Document Integrity Verification Preparation |
CN108769010A (en) * | 2018-05-29 | 2018-11-06 | 中国联合网络通信集团有限公司 | The method and apparatus that node is invited to registration |
CN108989465A (en) * | 2018-08-30 | 2018-12-11 | 清华大学 | Common recognition method, server, storage medium and distributed system |
US20190188700A1 (en) * | 2017-12-15 | 2019-06-20 | Fmr Llc | Social Data Tracking Datastructures, Apparatuses, Methods and Systems |
CN110071898A (en) * | 2018-01-22 | 2019-07-30 | 厦门本能管家科技有限公司 | A method of removing Spot detection node legitimacy |
CN110365584A (en) * | 2019-08-06 | 2019-10-22 | 北京润科通用技术有限公司 | A kind of network management and device |
CN110730195A (en) * | 2019-12-18 | 2020-01-24 | 腾讯科技(深圳)有限公司 | Data processing method and device and computer readable storage medium |
CN110855492A (en) * | 2019-11-15 | 2020-02-28 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
-
2020
- 2020-03-13 CN CN202010176609.XA patent/CN111371801B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160212146A1 (en) * | 2008-04-25 | 2016-07-21 | Kelce S. Wilson | PEDDaL Blockchaining for Document Integrity Verification Preparation |
US20190188700A1 (en) * | 2017-12-15 | 2019-06-20 | Fmr Llc | Social Data Tracking Datastructures, Apparatuses, Methods and Systems |
CN110071898A (en) * | 2018-01-22 | 2019-07-30 | 厦门本能管家科技有限公司 | A method of removing Spot detection node legitimacy |
CN108769010A (en) * | 2018-05-29 | 2018-11-06 | 中国联合网络通信集团有限公司 | The method and apparatus that node is invited to registration |
CN108989465A (en) * | 2018-08-30 | 2018-12-11 | 清华大学 | Common recognition method, server, storage medium and distributed system |
CN110365584A (en) * | 2019-08-06 | 2019-10-22 | 北京润科通用技术有限公司 | A kind of network management and device |
CN110855492A (en) * | 2019-11-15 | 2020-02-28 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN110730195A (en) * | 2019-12-18 | 2020-01-24 | 腾讯科技(深圳)有限公司 | Data processing method and device and computer readable storage medium |
Non-Patent Citations (1)
Title |
---|
刘童桐: "区块链共识机制研究与分析", 《信息通信技术与政策》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112052250A (en) * | 2020-09-02 | 2020-12-08 | 杭州复杂美科技有限公司 | Performance measurement method, broadcast performance adjustment method, device and storage medium |
WO2024021410A1 (en) * | 2022-07-29 | 2024-02-01 | 蚂蚁区块链科技(上海)有限公司 | Method and apparatus for preventing network attacks |
Also Published As
Publication number | Publication date |
---|---|
CN111371801B (en) | 2022-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111343208B (en) | Block chain-based data detection method and device and computer-readable storage medium | |
EP3855702A1 (en) | Blockchain-based service processing method and system | |
CN111371801B (en) | Block chain node scanning method, equipment and storage medium | |
CN111275438B (en) | Consensus method, device, equipment and storage medium of block chain network | |
CN110995751B (en) | Big data intelligent medical treatment and old age care service method and system based on block chain | |
CN110046901B (en) | Credibility verification method, system, device and equipment of alliance chain | |
CN107197036A (en) | A kind of consistent processing method of information based on block chain and terminal | |
CN107079041A (en) | File credit assessment | |
CN113032489A (en) | Asynchronous consensus method, system, device and medium based on block chain | |
CN112651010A (en) | Method and device for verifying sliding verification code, computer equipment and medium | |
CN114449000B (en) | Internet of vehicles data consensus optimization storage method and storage system | |
CN116132052A (en) | Cross-chain transaction method, device, electronic equipment and storage medium | |
CN113890739B (en) | Cross-blockchain authentication method and device, electronic equipment and medium | |
CN116244725A (en) | File processing method and device based on block chain, equipment and file contribution system | |
CN103327026B (en) | A kind of data-updating method and the system of renewal | |
CN111190754A (en) | Block chain event notification method and block chain system | |
CN112235251B (en) | Block chain management method and device, computer equipment and storage medium | |
CN110445852B (en) | Method, device and storage medium for issuing general certificate | |
JP2023031363A (en) | Information processing device, information processing method, and information processing program | |
CN113344598A (en) | Data verification method, device, medium and electronic equipment | |
CN111935251A (en) | Block chain network management method, network, device, equipment and storage medium | |
CN110740120B (en) | Account information processing method and device | |
CN114710387B (en) | Data transmission processing system | |
CN115712921B (en) | Data management method and device based on blockchain and electronic equipment | |
CN117040929B (en) | Access processing method, device, equipment, medium and program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |