CN111401672A - Block chain based validity checking method, equipment and system - Google Patents

Block chain based validity checking method, equipment and system Download PDF

Info

Publication number
CN111401672A
CN111401672A CN201910001598.9A CN201910001598A CN111401672A CN 111401672 A CN111401672 A CN 111401672A CN 201910001598 A CN201910001598 A CN 201910001598A CN 111401672 A CN111401672 A CN 111401672A
Authority
CN
China
Prior art keywords
equipment
identity information
verification
information matching
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910001598.9A
Other languages
Chinese (zh)
Other versions
CN111401672B (en
Inventor
王钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN201910001598.9A priority Critical patent/CN111401672B/en
Publication of CN111401672A publication Critical patent/CN111401672A/en
Application granted granted Critical
Publication of CN111401672B publication Critical patent/CN111401672B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The invention discloses a block chain technology, and particularly relates to a block chain-based validity checking method, equipment and system, which are used for improving checking and reducing checking time delay. The method comprises the following steps: each user equipment uploads self equipment identity information to the transaction safety chain at idle, the verification equipment downloads the equipment identity information uploaded by the user equipment from the transaction safety chain at idle for validity verification, uploads the obtained equipment identity information matching identification to the transaction safety chain, shares the equipment identity information matching identification with other verification equipment, and meanwhile downloads the equipment identity information matching identification uploaded by other verification equipment.

Description

Block chain based validity checking method, equipment and system
Technical Field
The present invention relates to a block chain technology, and in particular, to a block chain-based validity checking method, device, and system.
Background
In the prior art, when a user terminal uses a service provided by a service system, the requested service can be used only through the validity check of the service system.
Referring to fig. 1, in the conventional manner, the user equipment provides its own device feature information to the device information server, the device information server generates corresponding device identity information for validity check, and sends the validity check information of the device to the risk control system, and the risk control system determines the risk level of the user equipment according to the device identity information. When the service system receives a service use request of the user equipment, the risk level of the user equipment is obtained from the risk control system, so that the legality of the user equipment is verified according to the risk level.
However, in the conventional manner, the service system needs to query the risk level and other related information for validity check from the risk control system through the network each time, and the checking efficiency is low and the time delay is long, which may seriously reduce the user experience.
Different from the above conventional manner, the service system may also adopt an offline verification manner, that is, an infrared technology or Near Field Communication (NFC) technology or other technologies are adopted to directly acquire the related device identity information from the user equipment for validity check. However, the offline verification mode is adopted, so that the security implementation cost is high, the security level is low, the user identity information has the risk of leakage at any time, the real-time updating and synchronization of the equipment identity information cannot be realized, and the verification can be performed only based on the historical information.
In view of the above, a new validity checking method needs to be devised to overcome the above-mentioned drawbacks.
Disclosure of Invention
The invention aims to provide a block chain-based validity checking method, equipment and a system, which are used for improving checking efficiency and reducing checking time delay.
The embodiment of the invention provides the following specific technical scheme:
a block chain based validity checking method comprises the following steps:
during the period that the verification equipment is not occupied by the service, equipment identity information of the user equipment which meets the set conditions is downloaded from the transaction safety chain;
the verification equipment performs validity verification on the obtained equipment identity information of each user equipment to generate corresponding equipment identity information matching identification, and stores and uploads the obtained equipment identity information matching identification to the transaction safety chain;
during the period that the verification equipment is not occupied by the service, equipment identity information matching identifiers uploaded by other verification equipment are downloaded from a transaction safety chain and stored;
when the verification equipment receives a service use request sent by target user equipment and determines that equipment identity information matching identification corresponding to the target user equipment is locally stored, the target user equipment is judged to pass validity verification, and corresponding service is provided basically through the equipment identity information matching identification.
Optionally, before downloading, by the verification device, the device identity information of the user equipment meeting the set condition from the transaction security chain during the non-service occupation period, the method further includes:
and the verification equipment determines that no corresponding equipment identity information matching identifier uploaded by other verification equipment corresponding to the equipment identity information exists locally and on the transaction safety chain.
Optionally, the downloading, by the verification device, the device identity information of the user equipment meeting the set condition from the transaction security chain during the non-service occupation period includes:
during the period of non-service occupation, the verification equipment downloads the equipment identity information of the user equipment which meets one or any combination of the following set conditions from the transaction safety chain:
setting conditions of a time range;
setting conditions of geographic position ranges;
and setting conditions for the service scope.
Optionally, the verifying device performs validity verification on the obtained device identity information of each user device, generates a corresponding device identity information matching identifier, stores the obtained device identity information matching identifier, and uploads the stored device identity information matching identifier to the transaction security chain, and the verifying device includes:
the verification equipment performs validity verification on the obtained equipment identity information of each user equipment according to a service verification rule obtained from a service system and in combination with the risk level of each user equipment obtained from a risk control system, and generates a corresponding equipment identity information matching identifier when the verification is confirmed to pass, wherein the equipment identity information matching identifier is used for representing the risk level and the service content corresponding to the user equipment;
the verification equipment stores the obtained equipment identity information matching identification in the local and uploads the identification to the transaction security chain during the non-service occupation period.
Optionally, further comprising:
and after the verification equipment generates the corresponding equipment identity information matching identification, deleting the downloaded equipment identity information of the user equipment.
Optionally, further comprising:
the verification equipment periodically acquires the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain again, performs validity verification on each newly acquired user equipment to acquire corresponding equipment identity information matching identification, and periodically acquires the equipment identity information matching identification newly uploaded by other verification equipment from the transaction safety chain again.
A block chain-based legitimacy verification device, comprising:
the first downloading unit is used for downloading the equipment identity information of the user equipment which meets the set conditions from the transaction safety chain during the period that the verification equipment is not occupied by the service;
the verification unit is used for verifying the legality of the obtained equipment identity information of each piece of user equipment, generating corresponding equipment identity information matching identification, storing the obtained equipment identity information matching identification and uploading the equipment identity information matching identification to the transaction safety chain;
the second downloading unit is used for downloading the equipment identity information matching identification uploaded by other checking equipment from the transaction safety chain and storing the equipment identity information matching identification during the non-service occupation period;
and the processing unit is used for judging that the target user equipment passes the legality check when a service use request sent by the target user equipment is received and the equipment identity information matching identifier corresponding to the target user equipment is locally stored, and matching the service corresponding to the identifier based on the equipment identity information.
Optionally, before downloading the device identity information of the user equipment meeting the set condition from the transaction security chain during the non-service occupation period, the first downloading unit is further configured to:
and determining that no corresponding equipment identity information matching identifier uploaded by other verification equipment corresponding to the equipment identity information exists locally and on the transaction safety chain.
Optionally, during a non-service occupation period, when the device identity information of the user equipment meeting the set condition is downloaded from the transaction security chain, the first downloading unit is configured to:
during non-service occupation, downloading equipment identity information of the user equipment meeting one or any combination of the following set conditions from the transaction safety chain:
setting conditions of a time range;
setting conditions of geographic position ranges;
and setting conditions for the service scope.
Optionally, the obtained device identity information of each user device is subjected to validity check, a corresponding device identity information matching identifier is generated, the obtained device identity information matching identifier is stored and uploaded to the transaction security chain, and the check unit is configured to:
according to a service verification rule obtained from a service system, in combination with the risk level of each user equipment obtained from a risk control system, carrying out validity verification on the obtained equipment identity information of each user equipment, and generating a corresponding equipment identity information matching identifier when the verification is confirmed to pass, wherein the equipment identity information matching identifier is used for representing the risk level and the service content corresponding to the user equipment;
and storing the obtained equipment identity information matching identification locally, and uploading the equipment identity information matching identification to a transaction security chain during a non-service occupation period.
Optionally, the verification unit is further configured to:
and after generating the corresponding equipment identity information matching identification, deleting the downloaded equipment identity information of the user equipment.
Optionally, the verification unit is further configured to:
and periodically acquiring the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain again, performing validity check on each newly acquired user equipment to acquire corresponding equipment identity information matching identification, and periodically acquiring the equipment identity information matching identification newly uploaded by other checking equipment from the transaction safety chain again.
A storage medium storing a program for implementing a block chain based legitimacy check, the program when executed by a processor performing the steps of:
during the non-service occupation period, downloading the equipment identity information of the user equipment which meets the set conditions from the transaction safety chain;
the legality of the obtained equipment identity information of each user equipment is verified, a corresponding equipment identity information matching identifier is generated, and the obtained equipment identity information matching identifier is stored and uploaded to the transaction safety chain;
during the non-service occupation period, downloading the equipment identity information matching identification uploaded by other verification equipment from the transaction safety chain and storing the equipment identity information matching identification;
when a service use request sent by target user equipment is received and when the equipment identity information matching identification corresponding to the target user equipment is locally stored, the target user equipment is judged to pass the validity check, and corresponding service is provided by the equipment identity information matching identification basically.
A communications apparatus comprising one or more processors; and one or more computer-readable media having instructions stored thereon, which when executed by the one or more processors, cause the apparatus to perform any of the methods described above.
A block chain-based validity checking system at least comprises a transaction safety chain and a plurality of checking devices, wherein,
the transaction safety chain is used for storing the equipment identity information uploaded by the user equipment and storing the equipment identity information matching identification uploaded by each checking equipment;
the verification equipment is used for downloading the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain during the non-service occupation period, carrying out legality verification on the obtained equipment identity information of each user equipment to generate a corresponding equipment identity information matching identifier, storing and uploading the obtained equipment identity information matching identifier to the transaction safety chain, downloading the equipment identity information matching identifier uploaded by other verification equipment from the transaction safety chain during the non-service occupation period, storing, judging that the target user equipment passes the legality verification when the equipment identity information matching identifier corresponding to the target user equipment is locally stored when a service use request sent by the target user equipment is received, and providing corresponding service basically through the equipment identity information matching identifier.
In the embodiment of the invention, each user equipment uploads the equipment identity information of the user equipment to the transaction safety chain at idle, the verification equipment downloads the equipment identity information uploaded by the user equipment from the transaction safety chain at idle for legality verification, uploads the obtained equipment identity information matching identifier to the transaction safety chain to be shared with other verification equipment, and downloads the equipment identity information matching identifier uploaded by other verification equipment, so that the equipment identity information of the user equipment only needs to be verified legally once, and each verification equipment in the system can obtain the corresponding equipment identity information matching identifier, therefore, after receiving a service use request sent by the user equipment, the verification equipment can rapidly complete the recheck of the user equipment according to the obtained equipment identity information matching identifier, thereby rapidly providing related service contents, thereby effectively improving the user experience.
Drawings
FIG. 1 is a schematic diagram of a transaction system according to the prior art;
FIG. 2 is a schematic diagram of the operation of a transaction system according to an embodiment of the invention;
fig. 3 is a schematic flowchart illustrating an overview of a process for performing a validity check on a ue based on a block chain according to an embodiment of the present invention;
fig. 4 is a detailed flowchart illustrating a validity check performed on a ue based on a block chain according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a functional structure of a verification device in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 2, in the embodiment of the present invention, at least a plurality of verification devices, a plurality of user devices and a transaction security chain are disposed in the transaction system,
the user equipment, i.e. the terminal used by the user, is used for requesting to use the category service according to the user indication.
As shown in fig. 2, the ue is usually connected to the ue information server, the ue information server generates corresponding device identity information based on device feature information (e.g., a device number, a device identification code, etc.) of the ue, and then returns the device identity information to the ue, and the ue stores the device identity information in a local block chain authentication storage module and uploads the device identity information to the transaction security chain during a non-service-occupied period (i.e., idle time).
Optionally, the transaction security chain may be implemented in a form of a distributed server cluster, and data on the transaction security chain may be shared in the transaction system.
The verification device can perform validity verification on the user equipment when the user equipment requests to use the service on site, and also can download the equipment identity information uploaded by the user equipment from the transaction safety chain during non-service occupation (namely idle time) and perform offline validity verification locally.
As shown in fig. 1, the verification device is generally connected to a business system and a risk control system, the business system will notify the verification device of the transaction rule in advance, the risk control system will notify the verification device of the risk level of each user device for validity verification in advance, and the verification device will store the transaction rule, the risk level and the verification rule in a local block chain authentication and verification module.
The verification device may be implemented by a gate, a POS device, a cash register, a self-service machine, or the like, and is a device capable of providing a criterion for validity verification when the user equipment requests to use a certain service on site.
Based on the system architecture, referring to fig. 3, in the embodiment of the present invention, an outline flow of performing validity check on the ue based on the block chain is as follows:
step 300: and the verification equipment downloads the equipment identity information of the user equipment which meets the set conditions from the transaction safety chain during the non-service occupation period.
In general, before downloading the device identity information of a user device, the verification device needs to first determine whether a corresponding device identity information matching identifier exists on the local and transaction security chains, if so, it indicates that other verification devices have performed validity verification on the user device, and then the verification device only needs to directly download the corresponding device identity information matching identifier, otherwise, the verification device downloads the device identity information of the user device from the transaction security chain.
Further, the setting condition used by the verification device may be preset by a manager, and may be a time range setting condition, for example, device identity information uploaded within three days; conditions can also be set in a geographical position range, for example, equipment identity information uploaded in the Beijing city range; it may also be a service range setting condition, for example, device identity information uploaded by user equipment capable of accessing a 4G network, or the like, or may also be any combination of the above setting conditions, further, the above limiting conditions are only some examples of the setting conditions, and may also be flexibly configured according to an application environment in practical application, which is not described herein again.
Step 310: and the verification equipment performs validity verification on the obtained equipment identity information of each user equipment to generate corresponding equipment identity information matching identification, and uploads the obtained equipment identity information matching identification to be stored and uploaded to the transaction safety chain.
Specifically, the verification device may perform validity verification on the obtained device identity information of each user equipment according to a service verification rule obtained from the service system in combination with the risk level of each user equipment obtained from the risk control system, and when the verification is determined to pass, generate a corresponding device identity information matching identifier and store the obtained device identity information matching identifier locally, where the device identity information matching identifier is used to represent the risk level and the service content corresponding to the user equipment; and during the non-service occupation period, the verification equipment uploads the equipment identity information matching identification to the transaction safety chain.
In this case, the so-called service check rule, optionally, may be used to configure different service classes, such as: different VIP services, different session services, different levels of personalized services, etc.
In the embodiment of the invention, each checking device can store the service checking rules and the risk level locally, so that the checking device can realize offline safety checking at any time without connecting the Internet during non-service occupation, and is rapid, efficient and safe.
Meanwhile, after verification, optional equipment identity information of each user equipment can be deleted locally by the verification equipment, and only the equipment identity information is kept to be matched with the identification, so that the function of locally keeping highest-level safety information by the verification equipment can be omitted, safety cost investment can be only carried out on a server cluster supporting a transaction safety chain, safety implementation cost is greatly reduced, and data safety and usability are improved.
Step 320: and during the period of non-service occupation, the verification equipment downloads the equipment identity information matching identification uploaded by other verification equipment from the transaction safety chain and stores the equipment identity information matching identification.
Specifically, all information on the transaction security chain is shared among the verification devices, and any one of the verification devices can download the required device identity information of the user device at any time and download the required device identity information matching identifier.
Step 330: when the verification equipment receives a service use request sent by target user equipment and determines that equipment identity information matching identification corresponding to the target user equipment is locally stored, the target user equipment is judged to pass validity verification, and corresponding service is provided based on the equipment identity information matching identification.
Therefore, the peripheral system cannot acquire the specific content of the equipment identity information only on the transaction safety chain, and after the verification equipment sends the request for use, the verification equipment adopts the black box judgment principle when performing validity verification, namely whether the user equipment can have legal service use permission or not is determined directly according to the matching identification of the equipment identity information, so that the transaction safety of the user equipment is greatly protected, and information leakage is avoided.
Further, in the embodiment of the present invention, the verification device needs to periodically reacquire the device identity information of the user device that meets the set condition from the transaction security chain, perform validity verification on each reacquired user device, obtain the corresponding device identity information matching identifier, and periodically reacquire the device identity information matching identifier that is newly uploaded by the other verification devices from the transaction security chain.
Therefore, the real-time property of the matching identification of the locally stored equipment identity information can be ensured, and the transaction safety of the user equipment is ensured.
Based on the above embodiment, referring to fig. 4, the following takes a verification device a and a verification device B as an example, and further details are provided for the above embodiment.
Step 401: the verification device A obtains the risk level of each user device pre-configured by the risk control system.
Step 402: the check device A acquires a service check rule of each user device, which is configured in advance by the service system.
Step 403: the equipment information server side generates equipment identity information x by adopting the equipment related information of the user equipment x and sends the equipment identity information x to the user equipment x.
Step 404: the user equipment x stores the equipment identity information x in a local blockchain authentication storage module.
Step 405: the user equipment x uploads the equipment identity information x to the transaction security chain at idle.
Step 406: the verification device A downloads the device identity information x from the transaction security chain at idle and stores the device identity information x in a local block chain authentication verification module.
Step 407: the verification equipment A verifies the equipment identity information x based on the acquired service verification rule and the acquired risk level, judges the risk level and the service content corresponding to the equipment identity information x, and generates a corresponding equipment identity information matching identifier x.
In the embodiment of the invention, as the block chain authentication and verification module is additionally arranged in the verification equipment, the business verification rule and the risk level can be pre-stored, and therefore, the verification of the equipment identity information can be locally completed in the verification equipment in an off-line mode.
Here, the conventional device check identifier does not have this function, and since the device herein has the authentication module, operations such as installation and update can be performed through the module.
Step 408: the verification device a informs the user device x that it has passed the verification.
Step 409: and uploading the equipment identity information matching identifier x to the transaction safety chain by the verification equipment A in idle time.
Step 410: and the verification equipment B downloads the equipment identity information matching identifier x in idle time and stores the equipment identity information matching identifier x in a local block chain authentication verification module.
In the embodiment of the invention, as the block chain authentication and verification module is additionally arranged in the verification equipment, the equipment identity information matching identifier x can be stored in advance, so that a quick verification function can be provided in subsequent service.
Step 411: when receiving a service use request sent by the user equipment x, the verification equipment B verifies the user equipment x again through the equipment identity information matching identifier x, and when the verification is confirmed to be passed, corresponding service is rapidly and safely provided.
Specifically, the verification device a and the verification device B may be far apart from each other, and in the system, as long as the verification device a acquires the device identity information of the user device x from the transaction security chain and completes validity verification, and generates and uploads the corresponding device identity information matching identifier x, the verification device B may share the device identity matching identifier x from the transaction security chain at any time, so that when the user device x approaches the verification device B and requests to use a certain service through the verification device B, the verification device B may quickly complete validity verification, and quickly and safely provide the corresponding service.
Therefore, the user equipment x only needs to complete one-time validity check in the system, the whole system can share the check result without multiple checks, the check efficiency is effectively shortened, the service speed is increased, and the user experience is further improved.
For example, when a user purchases a year ticket or a multi-venue ticket, the service system synchronizes the service verification rule of the year ticket or the service verification rule of the multi-venue ticket to the verification device a in advance, and when the verification device a determines that the year ticket or the multi-venue ticket of the user passes the validity verification, the verification result is issued to the verification terminal of the whole network through the transaction security chain, so that the verification device B does not need to perform retrieval verification when the year ticket passes the verification device B again in the next use of the user. Of course, the service check rule may be configured in multiple types, may be a single rule, may be a combination rule, and so on.
Of course, according to the difference of the service verification rules, the verification device may also perform partial validity verification (e.g., secondary card verification) on the user equipment according to the service use request of the user equipment, which is not described herein again.
Based on the above embodiments, referring to fig. 5, in an embodiment of the present invention, the verification apparatus at least includes a first downloading unit 50, a verification unit 51, a second downloading unit 52 and a processing unit 53, wherein,
a first downloading unit 50, configured to download, from the transaction security chain, device identity information of the user equipment that meets the set condition during a non-service occupation period of the verification device;
the verification unit 51 is configured to perform validity verification on the obtained device identity information of each user device, generate a corresponding device identity information matching identifier, store the obtained device identity information matching identifier, and upload the stored device identity information matching identifier to the transaction security chain;
the second downloading unit 52 is configured to download the device identity information matching identifier uploaded by the other verification devices from the transaction security chain and store the device identity information matching identifier during the non-service occupation period;
the processing unit 53 is configured to, when receiving a service usage request sent by a target user equipment and when determining that an equipment identity information matching identifier corresponding to the target user equipment is locally stored, determine that the target user equipment passes legitimacy verification, and match a service corresponding to the identifier based on the equipment identity information.
Optionally, before downloading the device identity information of the user equipment meeting the set condition from the transaction security chain during the non-service occupation period, the first downloading unit 50 is further configured to:
and determining that no corresponding equipment identity information matching identifier uploaded by other verification equipment corresponding to the equipment identity information exists locally and on the transaction safety chain.
Optionally, when the device identity information of the user equipment meeting the set condition is downloaded from the transaction security chain during the non-service occupation period, the first downloading unit 50 is configured to:
during non-service occupation, downloading equipment identity information of the user equipment meeting one or any combination of the following set conditions from the transaction safety chain:
setting conditions of a time range;
setting conditions of geographic position ranges;
and setting conditions for the service scope.
Optionally, the obtained device identity information of each user device is subjected to validity check, a corresponding device identity information matching identifier is generated, the obtained device identity information matching identifier is stored and uploaded to the transaction security chain, and the checking unit 51 is configured to:
according to a service verification rule obtained from a service system, in combination with the risk level of each user equipment obtained from a risk control system, carrying out validity verification on the obtained equipment identity information of each user equipment, and generating a corresponding equipment identity information matching identifier when the verification is confirmed to pass, wherein the equipment identity information matching identifier is used for representing the risk level and the service content corresponding to the user equipment;
and storing the obtained equipment identity information matching identification locally, and uploading the equipment identity information matching identification to a transaction security chain during a non-service occupation period.
Optionally, the verification unit 51 is further configured to:
and after generating the corresponding equipment identity information matching identification, deleting the downloaded equipment identity information of the user equipment.
Optionally, the verification unit 51 is further configured to:
and periodically acquiring the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain again, performing validity check on each newly acquired user equipment to acquire corresponding equipment identity information matching identification, and periodically acquiring the equipment identity information matching identification newly uploaded by other checking equipment from the transaction safety chain again.
Based on the same inventive concept, an embodiment of the present invention provides a storage medium storing a program for implementing block chain-based validity check, where the program, when executed by a processor, performs the following steps:
during the non-service occupation period, downloading the equipment identity information of the user equipment which meets the set conditions from the transaction safety chain;
the legality of the obtained equipment identity information of each user equipment is verified, a corresponding equipment identity information matching identifier is generated, and the obtained equipment identity information matching identifier is stored and uploaded to the transaction safety chain;
during the non-service occupation period, downloading the equipment identity information matching identification uploaded by other verification equipment from the transaction safety chain and storing the equipment identity information matching identification;
when a service use request sent by target user equipment is received and when the equipment identity information matching identification corresponding to the target user equipment is locally stored, the target user equipment is judged to pass the validity check, and corresponding service is provided by the equipment identity information matching identification basically.
Based on the same inventive concept, the embodiment of the invention provides a communication device, which comprises one or more processors; and one or more computer-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the method of any of claims 1-6.
Based on the same inventive concept, the embodiment of the invention provides a block chain-based validity verification system, which is characterized by at least comprising a transaction security chain and a plurality of verification devices, wherein,
the transaction safety chain is used for storing the equipment identity information uploaded by the user equipment and storing the equipment identity information matching identification uploaded by each checking equipment;
the verification equipment is used for downloading the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain during the non-service occupation period, carrying out legality verification on the obtained equipment identity information of each user equipment to generate a corresponding equipment identity information matching identifier, storing and uploading the obtained equipment identity information matching identifier to the transaction safety chain, downloading the equipment identity information matching identifier uploaded by other verification equipment from the transaction safety chain during the non-service occupation period, storing, judging that the target user equipment passes the legality verification when the equipment identity information matching identifier corresponding to the target user equipment is locally stored when a service use request sent by the target user equipment is received, and providing corresponding service basically through the equipment identity information matching identifier.
To sum up, in the embodiment of the present invention, each user equipment uploads its own device identity information to the transaction security chain at idle, the verification device downloads the device identity information uploaded by the user equipment from the transaction security chain at idle for validity verification, uploads the obtained device identity information matching identifier to the transaction security chain, shares the device identity information matching identifier with other verification devices, and also downloads the device identity information matching identifier uploaded by other verification devices, so that the device identity information of the user equipment only needs to be verified legally once, and each verification device in the system can obtain the corresponding device identity information matching identifier, so that the verification device can complete re-verification of the user equipment according to the obtained device identity information matching identifier after receiving a service use request sent by the user equipment, thereby providing related service content quickly, thereby effectively improving the user experience.
Further, different from a batch downloading mode in a traditional mode, in the embodiment of the invention, each checking device acquires the device identity information of the user device in a discrete mode at idle time, so that the real-time performance of business transaction can be guaranteed, business processing is not delayed, and after the device identity information is checked, a corresponding device identity information check mark is uploaded to a transaction safety chain, namely distributed safety storage is realized through a block chain, and the risk leakage transaction safety possibly brought by centralized storage is avoided.
Meanwhile, a service system configures a service check rule in advance, a risk control system configures a risk level and a check rule in advance and uploads the risk level and the check rule to check equipment, the check equipment can quickly check the legality of the user equipment locally in an off-line mode after acquiring user identity information, and meanwhile, the check result is shared among the check equipment through a transaction safety chain.
On the other hand, in the embodiment of the invention, the safety information of the user equipment only exists locally, and is not opened to an external platform, so that the privacy of the user equipment is ensured, and the troubles of spam information, advertisement push and the like caused by various existing schemes to the user are avoided.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made in the embodiments of the present invention without departing from the spirit or scope of the embodiments of the invention. Thus, if such modifications and variations of the embodiments of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to encompass such modifications and variations.

Claims (10)

1. A block chain based validity checking method is characterized by comprising the following steps:
during the period that the verification equipment is not occupied by the service, equipment identity information of the user equipment which meets the set conditions is downloaded from the transaction safety chain;
the verification equipment performs validity verification on the obtained equipment identity information of each user equipment to generate corresponding equipment identity information matching identification, and stores and uploads the obtained equipment identity information matching identification to the transaction safety chain;
during the period that the verification equipment is not occupied by the service, equipment identity information matching identifiers uploaded by other verification equipment are downloaded from a transaction safety chain and stored;
when the verification equipment receives a service use request sent by target user equipment and determines that equipment identity information matching identification corresponding to the target user equipment is locally stored, the target user equipment is judged to pass validity verification, and corresponding service is provided basically through the equipment identity information matching identification.
2. The method of claim 1, wherein before the verifying the device downloads the device identity information of the user device meeting the set condition from the transaction security chain during the non-service occupation period, further comprising:
and the verification equipment determines that no corresponding equipment identity information matching identifier uploaded by other verification equipment corresponding to the equipment identity information exists locally and on the transaction safety chain.
3. The method of claim 1, wherein the verifying that the device downloads the device identity information of the user device meeting the set condition from the transaction security chain during the non-service occupation period comprises:
during the period of non-service occupation, the verification equipment downloads the equipment identity information of the user equipment which meets one or any combination of the following set conditions from the transaction safety chain:
setting conditions of a time range;
setting conditions of geographic position ranges;
and setting conditions for the service scope.
4. The method of claim 1, 2 or 3, wherein the verifying device performs validity verification on the obtained device identity information of each user device to generate a corresponding device identity information matching identifier, and stores and uploads the obtained device identity information matching identifier to the transaction security chain, and the method comprises:
the verification equipment performs validity verification on the obtained equipment identity information of each user equipment according to a service verification rule obtained from a service system and in combination with the risk level of each user equipment obtained from a risk control system, and generates a corresponding equipment identity information matching identifier when the verification is confirmed to pass, wherein the equipment identity information matching identifier is used for representing the risk level and the service content corresponding to the user equipment;
the verification equipment stores the obtained equipment identity information matching identification in the local and uploads the identification to the transaction security chain during the non-service occupation period.
5. The method of claim 4, further comprising:
and after the verification equipment generates the corresponding equipment identity information matching identification, deleting the downloaded equipment identity information of the user equipment.
6. The method of claim 1, 2, or 3, further comprising:
the verification equipment periodically acquires the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain again, performs validity verification on each newly acquired user equipment to acquire corresponding equipment identity information matching identification, and periodically acquires the equipment identity information matching identification newly uploaded by other verification equipment from the transaction safety chain again.
7. A block chain based validity checking device, comprising:
the first downloading unit is used for downloading the equipment identity information of the user equipment which meets the set conditions from the transaction safety chain during the period that the verification equipment is not occupied by the service;
the verification unit is used for verifying the legality of the obtained equipment identity information of each piece of user equipment, generating corresponding equipment identity information matching identification, storing the obtained equipment identity information matching identification and uploading the equipment identity information matching identification to the transaction safety chain;
the second downloading unit is used for downloading the equipment identity information matching identification uploaded by other checking equipment from the transaction safety chain and storing the equipment identity information matching identification during the non-service occupation period;
and the processing unit is used for judging that the target user equipment passes the legality check when a service use request sent by the target user equipment is received and the equipment identity information matching identifier corresponding to the target user equipment is locally stored, and matching the service corresponding to the identifier based on the equipment identity information.
8. A storage medium storing a program for implementing a block chain based legitimacy check method, wherein the program when executed by a processor performs the steps of:
during the non-service occupation period, downloading the equipment identity information of the user equipment which meets the set conditions from the transaction safety chain;
the legality of the obtained equipment identity information of each user equipment is verified, a corresponding equipment identity information matching identifier is generated, and the obtained equipment identity information matching identifier is stored and uploaded to the transaction safety chain;
during the non-service occupation period, downloading the equipment identity information matching identification uploaded by other verification equipment from the transaction safety chain and storing the equipment identity information matching identification;
when a service use request sent by target user equipment is received and when the equipment identity information matching identification corresponding to the target user equipment is locally stored, the target user equipment is judged to pass the validity check, and corresponding service is provided by the equipment identity information matching identification basically.
9. A communications apparatus comprising one or more processors; and one or more computer-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the method of any of claims 1-6.
10. A block chain-based legitimacy verification system is characterized by at least comprising a transaction security chain and a plurality of verification devices, wherein,
the transaction safety chain is used for storing the equipment identity information uploaded by the user equipment and storing the equipment identity information matching identification uploaded by each checking equipment;
the verification equipment is used for downloading the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain during the non-service occupation period, carrying out legality verification on the obtained equipment identity information of each user equipment to generate a corresponding equipment identity information matching identifier, storing and uploading the obtained equipment identity information matching identifier to the transaction safety chain, downloading the equipment identity information matching identifier uploaded by other verification equipment from the transaction safety chain during the non-service occupation period, storing, judging that the target user equipment passes the legality verification when the equipment identity information matching identifier corresponding to the target user equipment is locally stored when a service use request sent by the target user equipment is received, and providing corresponding service basically through the equipment identity information matching identifier.
CN201910001598.9A 2019-01-02 2019-01-02 Block chain-based validity verification method, device and system Active CN111401672B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910001598.9A CN111401672B (en) 2019-01-02 2019-01-02 Block chain-based validity verification method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910001598.9A CN111401672B (en) 2019-01-02 2019-01-02 Block chain-based validity verification method, device and system

Publications (2)

Publication Number Publication Date
CN111401672A true CN111401672A (en) 2020-07-10
CN111401672B CN111401672B (en) 2023-11-28

Family

ID=71428288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910001598.9A Active CN111401672B (en) 2019-01-02 2019-01-02 Block chain-based validity verification method, device and system

Country Status (1)

Country Link
CN (1) CN111401672B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114980099A (en) * 2020-12-02 2022-08-30 支付宝(杭州)信息技术有限公司 Method, device and equipment for connecting equipment

Citations (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1197248A (en) * 1996-09-25 1998-10-28 中国工商银行福建省分行 Numeral signature method
CN102377759A (en) * 2010-08-25 2012-03-14 中国移动通信有限公司 Service processing system, user identity identification method and related devices
CN102546580A (en) * 2011-01-04 2012-07-04 中国移动通信有限公司 Method, system and device for updating user password
CN104322089A (en) * 2012-05-23 2015-01-28 诺基亚公司 A key derivation method and apparatus for local access under control of a cellular network
US20150237048A1 (en) * 2013-12-31 2015-08-20 Tencent Technology (Shenzhen) Co., Ltd. Identity verification method and device
WO2015158173A1 (en) * 2014-04-18 2015-10-22 天地融科技股份有限公司 Agreement key-based data processing method
CN105654297A (en) * 2015-12-29 2016-06-08 飞天诚信科技股份有限公司 Terminal-to-terminal interaction method and transaction terminal
CN106021964A (en) * 2016-06-30 2016-10-12 安徽易联众信息技术有限公司 Intelligent medical information management system
CN106357627A (en) * 2016-08-30 2017-01-25 李明 Method and system for reading resident identification card information and terminal
GB201701423D0 (en) * 2017-01-29 2017-03-15 Cabrera Fernandez Florencio Blockchain zero checksum trading system
US20170111358A1 (en) * 2015-10-15 2017-04-20 Id.Me, Inc. Systems and methods for secure online credential authentication
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
WO2018010211A1 (en) * 2016-07-13 2018-01-18 山西特信环宇信息技术有限公司 Currency transaction application platform and method
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN107862527A (en) * 2017-10-27 2018-03-30 深圳市金立通信设备有限公司 A kind of method of payment, terminal and server
CN107886388A (en) * 2017-09-22 2018-04-06 杭州云象网络技术有限公司 The traffic trip credit and safety service platform and its operation method of multicenter are realized based on alliance's chain
CN107977564A (en) * 2016-10-21 2018-05-01 中国移动通信有限公司研究院 A kind of transaction authentication processing method, certificate server, terminal and traction equipment
CN108090761A (en) * 2017-11-10 2018-05-29 杭州云象网络技术有限公司 Block chain token method of payment based on credible two-dimension code
CN108242999A (en) * 2017-10-26 2018-07-03 招商银行股份有限公司 Key escrow method, equipment and computer readable storage medium
CN108270789A (en) * 2018-01-24 2018-07-10 平安科技(深圳)有限公司 Internetbank activating method, equipment, system and computer readable storage medium
US20180211213A1 (en) * 2017-01-24 2018-07-26 Accenture Global Solutions Limited Secure product identification and verification
CN108335026A (en) * 2018-01-24 2018-07-27 平安科技(深圳)有限公司 Bank password information changes implementation method, equipment, system and storage medium
CN108335105A (en) * 2018-01-18 2018-07-27 中国建设银行股份有限公司 Data processing method and relevant device
CN108337093A (en) * 2017-12-26 2018-07-27 福建联迪商用设备有限公司 POS terminal personal identification method, POS terminal and server
CN108520307A (en) * 2018-03-31 2018-09-11 深圳慧通商务有限公司 Data processing method and relevant apparatus
WO2018161807A1 (en) * 2017-03-06 2018-09-13 华为技术有限公司 User identity verification method and apparatus
WO2018177190A1 (en) * 2017-03-28 2018-10-04 上海瑞麒维网络科技有限公司 Method and device for synchronizing blockchain data
US20180315145A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Managing school systems on a blockchain
CN108766020A (en) * 2018-06-04 2018-11-06 深圳拍物联科技有限公司 A kind of parking stall sharing method and system based on block chain
CN108805650A (en) * 2018-04-27 2018-11-13 深圳市元征科技股份有限公司 A kind of order matching process and server
CN108833330A (en) * 2018-04-08 2018-11-16 浙江商业职业技术学院 A kind of rural area electronic commerce data authentication approach
CN109040060A (en) * 2018-08-01 2018-12-18 广州杰赛科技股份有限公司 Terminal-Matching and system, computer equipment
CN109067543A (en) * 2018-07-24 2018-12-21 腾讯科技(深圳)有限公司 Digital certificate management method, device, computer equipment and storage medium
CN109087101A (en) * 2018-08-07 2018-12-25 北京三快在线科技有限公司 Transaction method of calibration, device, storage medium and electronic equipment
CN109118765A (en) * 2018-09-04 2019-01-01 京东方科技集团股份有限公司 Break in traffic rules and regulations recording method and device based on block chain

Patent Citations (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1197248A (en) * 1996-09-25 1998-10-28 中国工商银行福建省分行 Numeral signature method
CN102377759A (en) * 2010-08-25 2012-03-14 中国移动通信有限公司 Service processing system, user identity identification method and related devices
CN102546580A (en) * 2011-01-04 2012-07-04 中国移动通信有限公司 Method, system and device for updating user password
CN104322089A (en) * 2012-05-23 2015-01-28 诺基亚公司 A key derivation method and apparatus for local access under control of a cellular network
US20150237048A1 (en) * 2013-12-31 2015-08-20 Tencent Technology (Shenzhen) Co., Ltd. Identity verification method and device
WO2015158173A1 (en) * 2014-04-18 2015-10-22 天地融科技股份有限公司 Agreement key-based data processing method
US20170111358A1 (en) * 2015-10-15 2017-04-20 Id.Me, Inc. Systems and methods for secure online credential authentication
CN105654297A (en) * 2015-12-29 2016-06-08 飞天诚信科技股份有限公司 Terminal-to-terminal interaction method and transaction terminal
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
CN106021964A (en) * 2016-06-30 2016-10-12 安徽易联众信息技术有限公司 Intelligent medical information management system
WO2018010211A1 (en) * 2016-07-13 2018-01-18 山西特信环宇信息技术有限公司 Currency transaction application platform and method
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN106357627A (en) * 2016-08-30 2017-01-25 李明 Method and system for reading resident identification card information and terminal
CN107977564A (en) * 2016-10-21 2018-05-01 中国移动通信有限公司研究院 A kind of transaction authentication processing method, certificate server, terminal and traction equipment
US20180211213A1 (en) * 2017-01-24 2018-07-26 Accenture Global Solutions Limited Secure product identification and verification
GB201701423D0 (en) * 2017-01-29 2017-03-15 Cabrera Fernandez Florencio Blockchain zero checksum trading system
WO2018161807A1 (en) * 2017-03-06 2018-09-13 华为技术有限公司 User identity verification method and apparatus
WO2018177190A1 (en) * 2017-03-28 2018-10-04 上海瑞麒维网络科技有限公司 Method and device for synchronizing blockchain data
US20180315145A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Managing school systems on a blockchain
CN107886388A (en) * 2017-09-22 2018-04-06 杭州云象网络技术有限公司 The traffic trip credit and safety service platform and its operation method of multicenter are realized based on alliance's chain
CN108242999A (en) * 2017-10-26 2018-07-03 招商银行股份有限公司 Key escrow method, equipment and computer readable storage medium
CN107862527A (en) * 2017-10-27 2018-03-30 深圳市金立通信设备有限公司 A kind of method of payment, terminal and server
CN108090761A (en) * 2017-11-10 2018-05-29 杭州云象网络技术有限公司 Block chain token method of payment based on credible two-dimension code
CN108337093A (en) * 2017-12-26 2018-07-27 福建联迪商用设备有限公司 POS terminal personal identification method, POS terminal and server
CN108335105A (en) * 2018-01-18 2018-07-27 中国建设银行股份有限公司 Data processing method and relevant device
CN108335026A (en) * 2018-01-24 2018-07-27 平安科技(深圳)有限公司 Bank password information changes implementation method, equipment, system and storage medium
CN108270789A (en) * 2018-01-24 2018-07-10 平安科技(深圳)有限公司 Internetbank activating method, equipment, system and computer readable storage medium
CN108520307A (en) * 2018-03-31 2018-09-11 深圳慧通商务有限公司 Data processing method and relevant apparatus
CN108833330A (en) * 2018-04-08 2018-11-16 浙江商业职业技术学院 A kind of rural area electronic commerce data authentication approach
CN108805650A (en) * 2018-04-27 2018-11-13 深圳市元征科技股份有限公司 A kind of order matching process and server
CN108766020A (en) * 2018-06-04 2018-11-06 深圳拍物联科技有限公司 A kind of parking stall sharing method and system based on block chain
CN109067543A (en) * 2018-07-24 2018-12-21 腾讯科技(深圳)有限公司 Digital certificate management method, device, computer equipment and storage medium
CN109040060A (en) * 2018-08-01 2018-12-18 广州杰赛科技股份有限公司 Terminal-Matching and system, computer equipment
CN109087101A (en) * 2018-08-07 2018-12-25 北京三快在线科技有限公司 Transaction method of calibration, device, storage medium and electronic equipment
CN109118765A (en) * 2018-09-04 2019-01-01 京东方科技集团股份有限公司 Break in traffic rules and regulations recording method and device based on block chain

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
任开银;孔震;林峰;: "数据交换系统中数据处理技术研究与应用", 电力信息化, no. 01 *
李东星: "基于区块链的网络实体身份认证技术研究", pages 123 - 128 *
胡石;章毅;许乐灵;陈心怡;陈芳;: "复杂通信环境下多社交网络用户身份识别研究" *
胡石;章毅;许乐灵;陈心怡;陈芳;: "复杂通信环境下多社交网络用户身份识别研究", 淮海工学院学报(人文社会科学版), no. 09, pages 3 - 9 *
马永波;: "一种基于手机APP的用户实名信息快速采集及校验的方法", 品牌(下半月), no. 04 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114980099A (en) * 2020-12-02 2022-08-30 支付宝(杭州)信息技术有限公司 Method, device and equipment for connecting equipment
CN114980099B (en) * 2020-12-02 2023-11-17 支付宝(杭州)信息技术有限公司 Method, device and equipment for connecting equipment

Also Published As

Publication number Publication date
CN111401672B (en) 2023-11-28

Similar Documents

Publication Publication Date Title
CN108200050B (en) Single sign-on server, method and computer readable storage medium
US9754091B2 (en) Restricted accounts on a mobile platform
CN107579966B (en) Control method, device and system for remotely accessing intranet and terminal equipment
CN105812479B (en) Request method and device and acquisition method and device for use permission
US20090210928A1 (en) Method and a system for managing a user related account information associated with application services distributed over a data network
WO2016049197A1 (en) Payment verification method, apparatus and system
JP2004007690A (en) Method and apparatus for checking authentication of first communication component in communication network
CN113014568A (en) Account login method, device and server
US9769247B2 (en) Application distribution method, terminal, and server
CN110661779B (en) Block chain network-based electronic certificate management method, system, device and medium
CN112311779B (en) Data access control method and device applied to block chain system
EP3062254A1 (en) License management for device management system
CN104322031A (en) Implementing policies for an enterprise network using policy instructions that are executed through a local policy framework
CN108846671B (en) Online secure transaction method and system based on block chain
US11777742B2 (en) Network device authentication
CN111401672A (en) Block chain based validity checking method, equipment and system
US10542569B2 (en) Community-based communication network services
CN109348472B (en) OTA (over the air) upgrading method and system based on single-point pushing
US9723436B2 (en) Mobile device location
US9237151B2 (en) Secure access system and operating method thereof
KR101842678B1 (en) Payment control apparatus and payment server
CN111835504A (en) Identification code generation method and server
CN112732676B (en) Block chain-based data migration method, device, equipment and storage medium
KR20160074600A (en) System and method for policy control functions management mechanism
JP2023521901A (en) Mobile application forgery/falsification detection method, computer program, computer-readable recording medium and computer device using user identifier and signature collection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant