CN111401672B - Block chain-based validity verification method, device and system - Google Patents

Block chain-based validity verification method, device and system Download PDF

Info

Publication number
CN111401672B
CN111401672B CN201910001598.9A CN201910001598A CN111401672B CN 111401672 B CN111401672 B CN 111401672B CN 201910001598 A CN201910001598 A CN 201910001598A CN 111401672 B CN111401672 B CN 111401672B
Authority
CN
China
Prior art keywords
identity information
equipment
verification
information matching
equipment identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910001598.9A
Other languages
Chinese (zh)
Other versions
CN111401672A (en
Inventor
王钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN201910001598.9A priority Critical patent/CN111401672B/en
Publication of CN111401672A publication Critical patent/CN111401672A/en
Application granted granted Critical
Publication of CN111401672B publication Critical patent/CN111401672B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a blockchain technology, in particular to a method, equipment and a system for verifying validity based on a blockchain, which are used for improving verification and reducing verification time delay. The method comprises the following steps: each user equipment uploads the equipment identity information of the user equipment to a transaction safety chain when idle, the verification equipment downloads the equipment identity information uploaded by the user equipment from the transaction safety chain to perform validity verification when idle, and uploads the obtained equipment identity information matching identification to the transaction safety chain to share with other verification equipment, and meanwhile downloads the equipment identity information matching identifications uploaded by other verification equipment.

Description

Block chain-based validity verification method, device and system
Technical Field
The present invention relates to blockchain technologies, and in particular, to a method, an apparatus, and a system for verifying validity based on blockchains.
Background
In the prior art, when a user terminal uses a service provided by a service system, the user terminal needs to pass the validity check of the service system to use the requested service.
Referring to fig. 1, in the existing conventional manner, the user equipment provides its own device feature information to the device information server, the device information server generates corresponding device identity information for validity check, and then sends the device validity check information to the risk control system, where the risk control system determines the risk level of the user equipment according to the device identity information. When the service system receives the service use request of the user equipment, the risk level of the user equipment is acquired from the risk control system, so that the validity of the user equipment is checked according to the risk level.
However, in the above conventional manner, the service system needs to query related information such as risk level for validity verification from the risk control system through the network each time, which has low verification efficiency and long time delay, and can seriously reduce user experience.
Different from the traditional mode, the service system can also adopt an off-line verification mode, namely, adopts the technologies such as infrared technology or near field communication technology (Near Field Communication, NFC) and the like to directly acquire relevant equipment identity information from the user equipment to carry out validity verification. However, the offline verification mode is adopted, the safety realization cost is high, the safety level is low, the risk of leakage of user identity information at any time exists, the real-time updating and synchronization of equipment identity information cannot be realized, and the verification can only be performed based on historical information.
In view of this, there is a need to devise a new method of verifying legitimacy to overcome the above-mentioned drawbacks.
Disclosure of Invention
The invention aims to provide a block chain-based validity verification method, device and system, which are used for improving verification efficiency and reducing verification time delay.
The specific technical scheme provided by the embodiment of the invention is as follows:
a blockchain-based validity verification method, comprising:
the verification device downloads the device identity information of the user device conforming to the set condition from the transaction security chain during the non-service occupation period;
the verification device performs validity verification on the obtained device identity information of each user device, generates corresponding device identity information matching identifiers, and stores and uploads the obtained device identity information matching identifiers to the transaction security chain;
during non-business occupation, the verification equipment downloads equipment identity information matching identifiers uploaded by other verification equipment from the transaction safety chain and stores the equipment identity information matching identifiers;
when the verification device receives a service use request sent by a target user device, and when the fact that the device identity information matching identification corresponding to the target user device is stored locally is determined, the target user device is judged to pass through validity verification, and corresponding service is provided by the device identity information matching identification basically.
Optionally, before the verifying device downloads the device identity information of the user device meeting the set condition from the transaction security chain during the non-service occupation period, the verifying device further includes:
and the verification equipment determines that corresponding equipment identity information matching identifiers uploaded by other verification equipment corresponding to the equipment identity information do not exist locally and on the transaction security chain.
Optionally, the verifying device downloads device identity information of the user device meeting the set condition from the transaction security chain during non-service occupation, including:
the verification device downloads device identity information of the user device meeting one or any combination of the following setting conditions from the transaction security chain during non-service occupation:
setting conditions of a time range;
setting a condition of a geographical position range;
and setting conditions for the service range.
Optionally, the verifying device performs validity verification on the obtained device identity information of each user device, generates a corresponding device identity information matching identifier, stores and uploads the obtained device identity information matching identifier to the transaction security chain, and includes:
the verification equipment performs validity verification on the obtained equipment identity information of each user equipment according to a service verification rule acquired from a service system and combining the risk levels of each user equipment acquired from a risk control system, and generates corresponding equipment identity information matching identifiers when the equipment identity information passes the verification, wherein the equipment identity information matching identifiers are used for representing the risk levels and service contents corresponding to the user equipment;
the verification device stores the obtained device identity information matching identification locally and uploads the device identity information matching identification to a transaction security chain during non-business occupation.
Optionally, the method further comprises:
after generating the corresponding equipment identity information matching identifier, the verification equipment deletes the downloaded equipment identity information of the user equipment.
Optionally, the method further comprises:
the verification device periodically re-acquires the device identity information of the user device meeting the set conditions from the transaction safety chain, performs validity verification on each re-acquired user device to acquire corresponding device identity information matching identifiers, and periodically re-acquires the device identity information matching identifiers which are newly uploaded by other verification devices from the transaction safety chain.
A blockchain-based validity verification device, comprising:
the first downloading unit is used for verifying that the equipment downloads the equipment identity information of the user equipment meeting the set conditions from the transaction security chain in the non-service occupation period;
the verification unit is used for verifying the validity of the obtained equipment identity information of each user equipment, generating corresponding equipment identity information matching identifiers, and storing and uploading the obtained equipment identity information matching identifiers to the transaction security chain;
the second downloading unit is used for downloading the equipment identity information matching identifiers uploaded by other verification equipment from the transaction security chain and storing the equipment identity information matching identifiers during the non-business occupation period;
and the processing unit is used for judging that the target user equipment passes the validity check when the equipment identity information matching identification corresponding to the target user equipment is determined to be stored locally when the service use request sent by the target user equipment is received, and based on the equipment identity information matching identification, the corresponding service is provided.
Optionally, before downloading the device identity information of the user device meeting the set condition from the transaction security chain during the non-service occupation period, the first downloading unit is further configured to:
and determining that corresponding equipment identity information matching identifiers uploaded by other verification equipment corresponding to the equipment identity information do not exist locally and on the transaction safety chain.
Optionally, during non-service occupation, when downloading the device identity information of the user device meeting the set condition from the transaction security chain, the first downloading unit is configured to:
during non-traffic occupancy, device identity information for user devices meeting one or any combination of the following set conditions is downloaded from the transaction security chain:
setting conditions of a time range;
setting a condition of a geographical position range;
and setting conditions for the service range.
Optionally, the validity of the obtained equipment identity information of each user equipment is checked, a corresponding equipment identity information matching identifier is generated, the obtained equipment identity information matching identifier is saved and uploaded to the transaction security chain, and the checking unit is used for:
according to a service verification rule acquired from a service system, combining risk levels of all user equipment acquired from a risk control system, carrying out validity verification on equipment identity information of all the acquired user equipment, and generating corresponding equipment identity information matching identifiers when verification is confirmed, wherein the equipment identity information matching identifiers are used for representing the risk levels and service contents corresponding to the user equipment;
and saving the obtained equipment identity information matching identification locally, and uploading the equipment identity information matching identification to a transaction security chain during non-business occupation.
Optionally, the verification unit is further configured to:
and deleting the downloaded equipment identity information of the user equipment after generating the corresponding equipment identity information matching identification.
Optionally, the verification unit is further configured to:
the equipment identity information of the user equipment meeting the set conditions is obtained again from the transaction safety chain at regular intervals, validity verification is carried out on each user equipment obtained again, corresponding equipment identity information matching identifiers are obtained, and the equipment identity information matching identifiers uploaded by other verification equipment at latest are obtained again from the transaction safety chain at regular intervals.
A storage medium storing a program for implementing a blockchain-based validity check, the program when executed by a processor performing the steps of:
during non-business occupation, downloading equipment identity information of the user equipment meeting the set conditions from a transaction security chain;
performing validity check on the obtained equipment identity information of each user equipment, generating corresponding equipment identity information matching identifiers, and storing and uploading the obtained equipment identity information matching identifiers to the transaction security chain;
during non-business occupation, downloading the device identity information matching identifiers uploaded by other verification devices from the transaction security chain and storing the device identity information matching identifiers;
when a service use request sent by target user equipment is received, when equipment identity information matching identification corresponding to the target user equipment is determined to be stored locally, the target user equipment is judged to pass through validity verification, and corresponding service is provided basically by the equipment identity information matching identification.
A communications apparatus comprising one or more processors; and one or more computer-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform any of the methods described above.
A legality verification system based on block chain at least comprises a transaction safety chain and a plurality of verification devices, wherein,
the transaction safety chain is used for storing the equipment identity information uploaded by the user equipment and storing the equipment identity information matching identifiers uploaded by the verification equipment;
and the verification equipment is used for downloading equipment identity information of the user equipment meeting the set conditions from the transaction safety chain during non-service occupation, carrying out validity verification on the obtained equipment identity information of each user equipment, generating corresponding equipment identity information matching identifiers, storing and uploading the obtained equipment identity information matching identifiers to the transaction safety chain, downloading equipment identity information matching identifiers uploaded by other verification equipment from the transaction safety chain and storing the equipment identity information matching identifiers during non-service occupation, judging that the target user equipment passes the validity verification when determining that the equipment identity information matching identifiers corresponding to the target user equipment are locally stored when receiving a service use request sent by the target user equipment, and providing corresponding service by the equipment identity information matching identifiers basically.
In the embodiment of the invention, each user equipment uploads the equipment identity information of the user equipment to the transaction safety chain when idle, the verification equipment downloads the equipment identity information uploaded by the user equipment from the transaction safety chain to perform validity verification when idle, and uploads the obtained equipment identity information matching identification to the transaction safety chain to share with other verification equipment, and meanwhile downloads the equipment identity information matching identifications uploaded by other verification equipment.
Drawings
FIG. 1 is a schematic diagram of the working principle of a transaction system in the prior art;
FIG. 2 is a schematic diagram of the working principle of the transaction system according to the embodiment of the invention;
fig. 3 is a schematic flow chart of a validity check overview of a user equipment based on a blockchain in an embodiment of the present invention;
fig. 4 is a detailed flowchart of a block chain-based validity check for a ue in an embodiment of the present invention;
fig. 5 is a functional schematic diagram of a verification device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 2, in the embodiment of the present invention, at least a plurality of verification devices, a plurality of user devices and a transaction security chain are disposed in the transaction system,
the user equipment, namely the terminal used by the user, is used for requesting to use the type service according to the user indication.
As shown in fig. 2, the ue is typically connected to an equipment information server, where the equipment information server generates corresponding equipment identity information based on equipment characteristic information (e.g. equipment number, equipment identification code, etc.) of the ue, and returns the equipment identity information to the ue, and the ue stores its own equipment identity information in a local blockchain authentication storage module, and uploads its own equipment identity information to the transaction security chain during non-service occupation (i.e. idle time).
The transaction security chain, which may alternatively be implemented in the form of a cluster of distributed servers, may be shared within the transaction system.
The verification device can perform validity verification on the user device when the user device requests to use the service on site, or can download the device identity information uploaded by the user device from the transaction security chain during non-service occupation (i.e. idle) and perform offline validity verification locally.
As shown in fig. 1, the verification device is generally connected to a service system and a risk control system, the service system notifies the verification device of the transaction rule in advance, the risk control system notifies the verification device of the risk level of each user device for validity verification in advance, and the verification device stores the transaction rule, the risk level and the verification rule in a local blockchain authentication verification module.
The verification device can be realized by a gate, a POS machine, a cashing device, a self-service machine and the like, and the verification device can provide judgment basis for validity verification when the user equipment requests to use a certain service on site.
Based on the system architecture, referring to fig. 3, in the embodiment of the present invention, an outline flow of validity check for the ue based on the blockchain is as follows:
step 300: and the verification equipment downloads the equipment identity information of the user equipment meeting the set conditions from the transaction security chain during the non-business occupation period.
In general, before the verification device downloads the equipment identity information of a user device, it needs to determine whether a corresponding equipment identity information matching identifier exists on the local and transaction security chains, if so, it indicates that other verification devices have performed validity verification on the user device, and if so, the verification device only needs to directly download the corresponding equipment identity information matching identifier, otherwise, the verification device downloads the equipment identity information of the user device from the transaction security chains.
Further, the above setting condition used by the verification device may be preset by a manager, and may be a time range setting condition, for example, device identity information uploaded in three days; the condition can also be set in the geographical position range, for example, the equipment identity information uploaded in the Beijing city range; the service range setting conditions may also be, for example, equipment identity information uploaded by a user equipment capable of accessing the 4G network, or the like, or any combination of the above setting conditions, further, the above limiting conditions are only examples of the setting conditions, and may be flexibly configured according to an application environment in practical application, which is not described herein.
Step 310: and the verification equipment performs validity verification on the obtained equipment identity information of each user equipment, generates corresponding equipment identity information matching identifiers, uploads the obtained equipment identity information matching identifiers to be stored and uploads the equipment identity information matching identifiers to the transaction security chain.
Specifically, the verification device may perform validity verification on the obtained device identity information of each user device according to a service verification rule obtained from the service system and in combination with a risk level of each user device obtained from the risk control system, and when the verification is determined to pass, generate a corresponding device identity information matching identifier, and store the obtained device identity information matching identifier locally, where the device identity information matching identifier is used to characterize a risk level and service content corresponding to the user device; and uploading the equipment identity information matching identifier to a transaction security chain by the verification equipment during non-business occupation.
Among other things, so-called traffic check rules, which may be optional, may be used to configure different service classes, such as: different VIP services, different session services, different levels of personalized services, etc.
In the embodiment of the invention, as each verification device can store the business verification rule and the risk level locally, the verification device can realize offline security verification at any time without connecting with the Internet during non-business occupation, and is quick, efficient and safe.
Meanwhile, after verification, optionally, the verification device can delete the equipment identity information of each user equipment locally and only ensure that the equipment identity information matches the identification, so that the verification device can save the function of locally storing the highest-level security information, and only needs to carry out security cost investment on a server cluster supporting a transaction security chain, thereby greatly reducing the security implementation cost and improving the data security and usability.
Step 320: and the verification equipment downloads the equipment identity information matching identification uploaded by other verification equipment from the transaction security chain and stores the equipment identity information matching identification in a non-business occupation period.
Specifically, all information on the transaction security chain is shared among all the verification devices, and any one verification device can download the device identity information of the required user device at any time and download the device identity information matching identifier required by the downloading.
Step 330: when the verification device receives a service use request sent by a target user device, and when the fact that the device identity information matching identification corresponding to the target user device is stored locally is determined, the target user device is judged to pass through validity verification, and corresponding service is provided based on the device identity information matching identification.
Therefore, the peripheral system cannot acquire the specific content of the transaction safety chain with the equipment identity information only stored, and after the verification equipment sends a request for use, the verification equipment performs validity verification by adopting a black box judgment principle, namely, whether the user equipment can have legal service use permission or not is directly determined according to whether the equipment identity information is matched with the identification, so that the transaction safety of the user equipment is greatly protected, and information leakage is avoided.
Further, in the embodiment of the invention, the verification device needs to periodically re-acquire the device identity information of the user device meeting the set condition from the transaction security chain, perform validity verification on each re-acquired user device to acquire a corresponding device identity information matching identifier, and periodically re-acquire the device identity information matching identifiers newly uploaded by other verification devices from the transaction security chain.
Thus, the real-time performance of the locally stored equipment identity information matching identification can be ensured, and the transaction security of the user equipment is ensured.
Based on the above embodiment, referring to fig. 4, a verification device a and a verification device B are taken as examples, and the above embodiment will be described in further detail.
Step 401: the verification device A acquires the risk level of each user device preconfigured by the risk control system.
Step 402: the verification device A acquires service verification rules of each user device pre-configured by the service system.
Step 403: the equipment information server side generates equipment identity information x by adopting equipment related information of the user equipment x, and sends the equipment identity information x to the user equipment x.
Step 404: the user equipment x stores the equipment identity information x in a local blockchain authentication storage module.
Step 405: the user device x uploads the device identity information x to the transaction security chain at idle.
Step 406: the verification device A downloads the device identity information x from the transaction security chain when idle, and stores the device identity information x in a local blockchain authentication and verification module.
Step 407: and the verification equipment A verifies the equipment identity information x based on the acquired business verification rule and risk level, judges the risk level and business content corresponding to the equipment identity information x, and generates a corresponding equipment identity information matching identifier x.
In the embodiment of the invention, the block chain authentication verification module is additionally arranged in the verification equipment, so that the business verification rule and the risk level can be stored in advance, and the verification of the equipment identity information can be finished locally in an off-line mode.
Here, the conventional device check identifier does not have this function, and since the authentication module is provided in the device, the device can perform operations such as current installation and update through the module.
Step 408: the verification device a informs the user device x that the verification has been passed.
Step 409: and uploading the equipment identity information matching identifier x to a transaction security chain by the verification equipment A when the verification equipment A is idle.
Step 410: and the verification equipment B downloads the equipment identity information matching identifier x in idle time and stores the equipment identity information matching identifier x in a local blockchain authentication and verification module.
In the embodiment of the invention, because the block chain authentication verification module is additionally arranged in the verification equipment, the equipment identity information matching identifier x can be stored in advance, so that a rapid verification function can be provided in subsequent business service.
Step 411: and when the verification equipment B receives the service use request sent by the user equipment X, the user equipment X is verified again through the equipment identity information matching identifier X, and when the verification is confirmed to pass, the corresponding service is provided quickly and safely.
Specifically, the verification device a and the verification device B may be far apart, in the system, as long as the verification device a obtains the device identity information of the user device x from the transaction security chain and completes the validity verification, the verification device B generates and uploads the corresponding device identity information matching identifier x, and the verification device B may share the device identity matching identifier x from the transaction security chain at any time, so that when the user device x approaches the verification device B and requests to use a certain service through the verification device B, the verification device B may rapidly complete the validity verification, and rapidly and safely provide a corresponding service.
Therefore, the user equipment x only needs to complete one-time validity check in the system, the whole system can share the check result without repeated check, so that the check efficiency is effectively shortened, the service speed is improved, and the user experience is further improved.
For example, when a user purchases a year ticket or a multi-venue-cast ticket, the service system synchronizes the service check rule configuration of the year ticket or the service check rule configuration of the multi-venue-cast ticket to the check device a in advance, and when the check device a determines that the year ticket or the multi-venue-cast ticket of the user passes the validity check, the check result is issued to the check terminal of the whole network through the transaction security chain, so that the check device B does not need to perform retrieval check again when the user uses the year ticket to pass the check device B next time. Of course, the service check rule may be configured in various ways, and may be a single rule or a combination rule.
Of course, according to the different service verification rules, the verification device may also perform partial validity verification (e.g., secondary card verification) on the user device according to the service usage request of the user device, which is not described herein.
Based on the above embodiments, referring to fig. 5, in the embodiment of the present invention, the verification device includes at least a first downloading unit 50, a verification unit 51, a second downloading unit 52 and a processing unit 53, where,
a first downloading unit 50, configured to verify that the device downloads device identity information of the user device that meets the set condition from the transaction security chain during a period of non-service occupation;
the verification unit 51 is configured to perform validity verification on the obtained equipment identity information of each user equipment, generate a corresponding equipment identity information matching identifier, and store and upload the obtained equipment identity information matching identifier to the transaction security chain;
a second downloading unit 52, configured to download, from the transaction security chain, the device identity information matching identifier uploaded by the other verification device and store the device identity information matching identifier during a non-service occupation period;
and the processing unit 53 is configured to, when receiving a service usage request sent by a target user equipment, determine that the target user equipment passes the validity check when determining that the equipment identity information matching identifier corresponding to the target user equipment is locally stored, and identify a corresponding service based on the equipment identity information matching identifier.
Optionally, before downloading the device identity information of the user device meeting the set condition from the transaction security chain during the non-service occupation period, the first downloading unit 50 is further configured to:
and determining that corresponding equipment identity information matching identifiers uploaded by other verification equipment corresponding to the equipment identity information do not exist locally and on the transaction safety chain.
Optionally, during non-service occupation, when downloading device identity information of the user device meeting the set condition from the transaction security chain, the first downloading unit 50 is configured to:
during non-traffic occupancy, device identity information for user devices meeting one or any combination of the following set conditions is downloaded from the transaction security chain:
setting conditions of a time range;
setting a condition of a geographical position range;
and setting conditions for the service range.
Optionally, the validity of the obtained equipment identity information of each user equipment is checked, a corresponding equipment identity information matching identifier is generated, the obtained equipment identity information matching identifier is saved and uploaded to the transaction security chain, and the checking unit 51 is configured to:
according to a service verification rule acquired from a service system, combining risk levels of all user equipment acquired from a risk control system, carrying out validity verification on equipment identity information of all the acquired user equipment, and generating corresponding equipment identity information matching identifiers when verification is confirmed, wherein the equipment identity information matching identifiers are used for representing the risk levels and service contents corresponding to the user equipment;
and saving the obtained equipment identity information matching identification locally, and uploading the equipment identity information matching identification to a transaction security chain during non-business occupation.
Optionally, the verification unit 51 is further configured to:
and deleting the downloaded equipment identity information of the user equipment after generating the corresponding equipment identity information matching identification.
Optionally, the verification unit 51 is further configured to:
the equipment identity information of the user equipment meeting the set conditions is obtained again from the transaction safety chain at regular intervals, validity verification is carried out on each user equipment obtained again, corresponding equipment identity information matching identifiers are obtained, and the equipment identity information matching identifiers uploaded by other verification equipment at latest are obtained again from the transaction safety chain at regular intervals.
Based on the same inventive concept, an embodiment of the present invention provides a storage medium storing a program for implementing a blockchain-based validity check, the program, when executed by a processor, performing the steps of:
during non-business occupation, downloading equipment identity information of the user equipment meeting the set conditions from a transaction security chain;
performing validity check on the obtained equipment identity information of each user equipment, generating corresponding equipment identity information matching identifiers, and storing and uploading the obtained equipment identity information matching identifiers to the transaction security chain;
during non-business occupation, downloading the device identity information matching identifiers uploaded by other verification devices from the transaction security chain and storing the device identity information matching identifiers;
when a service use request sent by target user equipment is received, when equipment identity information matching identification corresponding to the target user equipment is determined to be stored locally, the target user equipment is judged to pass through validity verification, and corresponding service is provided basically by the equipment identity information matching identification.
Based on the same inventive concept, an embodiment of the present invention provides a communication apparatus including one or more processors; and one or more computer-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the method of any of claims 1-6.
Based on the same inventive concept, the embodiment of the invention provides a validity verification system based on a blockchain, which is characterized by at least comprising a transaction safety chain and a plurality of verification devices, wherein,
the transaction safety chain is used for storing the equipment identity information uploaded by the user equipment and storing the equipment identity information matching identifiers uploaded by the verification equipment;
and the verification equipment is used for downloading equipment identity information of the user equipment meeting the set conditions from the transaction safety chain during non-service occupation, carrying out validity verification on the obtained equipment identity information of each user equipment, generating corresponding equipment identity information matching identifiers, storing and uploading the obtained equipment identity information matching identifiers to the transaction safety chain, downloading equipment identity information matching identifiers uploaded by other verification equipment from the transaction safety chain and storing the equipment identity information matching identifiers during non-service occupation, judging that the target user equipment passes the validity verification when determining that the equipment identity information matching identifiers corresponding to the target user equipment are locally stored when receiving a service use request sent by the target user equipment, and providing corresponding service by the equipment identity information matching identifiers basically.
In summary, in the embodiment of the present invention, each user equipment uploads its own equipment identity information to the transaction security chain when idle, and the verification device downloads the equipment identity information uploaded by the user equipment from the transaction security chain when idle to perform validity verification, and uploads the obtained equipment identity information matching identifier to the transaction security chain to share with other verification devices, and downloads the equipment identity information matching identifiers uploaded by other verification devices, so that the equipment identity information of the user equipment only needs to be subjected to one-time validity verification, and each verification device in the system can obtain the corresponding equipment identity information matching identifier, so that after receiving a service use request sent by the user equipment, the verification device can quickly complete re-verification of the user equipment according to the obtained equipment identity information matching identifier, thereby quickly providing relevant service content and effectively improving user experience.
Further, unlike the batch downloading mode in the traditional mode, in the embodiment of the invention, each verification device acquires the device identity information of the user device in a discrete mode at idle, so that the real-time performance of service transaction can be ensured, service processing is not delayed, and after the device identity information passes verification, the corresponding device identity information verification mark is uploaded to a transaction safety chain, namely, distributed safety storage is realized through a block chain, and leakage risk transaction safety possibly brought by centralized storage is avoided.
Meanwhile, the business system configures business verification rules in advance, the risk control system configures risk levels and verification rules in advance and uploads the risk levels and the verification rules to the verification equipment, the verification equipment can rapidly conduct validity verification on the user equipment in an offline mode after obtaining user identity information, meanwhile sharing of verification results among the verification equipment is achieved through a transaction safety chain, and therefore when the verification equipment receives a business use request of the user equipment in a near field scene, the verification equipment does not need to be connected with the Internet to conduct retrieval verification process, and the obtained verification results are directly matched, and then the current business flow can be directly completed.
On the other hand, in the embodiment of the invention, the safety information of the user equipment is only local and is not disclosed to be opened to an external platform, so that the privacy of the user equipment is ensured, and the trouble of garbage information, advertisement pushing and the like caused by various conventional schemes is avoided.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the embodiments of the present invention without departing from the spirit or scope of the embodiments of the invention. Thus, if such modifications and variations of the embodiments of the present invention fall within the scope of the claims and the equivalents thereof, the present invention is also intended to include such modifications and variations.

Claims (9)

1. A blockchain-based validity verification method, comprising:
after the verification device determines that the corresponding equipment identity information matching identifier uploaded by other verification devices corresponding to the equipment identity information does not exist on the local transaction safety chain, the verification device downloads the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain in a non-service occupation period, wherein the equipment identity information matching identifier is used for representing the risk level and service content corresponding to the user equipment;
the verification equipment performs validity verification on the obtained equipment identity information of each user equipment, generates corresponding equipment identity information matching identifiers when the verification is confirmed to pass, and stores and uploads the obtained equipment identity information matching identifiers to the transaction security chain;
during non-business occupation, the verification equipment downloads equipment identity information matching identifiers uploaded by other verification equipment from the transaction safety chain and stores the equipment identity information matching identifiers;
when the verification device receives a service use request sent by a target user device, and when the fact that the device identity information matching identification corresponding to the target user device is stored locally is determined, the target user device is judged to pass through validity verification, and corresponding service is provided based on the device identity information matching identification.
2. The method of claim 1, wherein the verifying that the device downloads device identity information of the eligible user device from the transaction security chain during non-traffic occupancy, comprises:
the verification device downloads device identity information of the user device meeting one or any combination of the following setting conditions from the transaction security chain during non-service occupation:
setting conditions of a time range;
setting a condition of a geographical position range;
and setting conditions for the service range.
3. The method according to claim 1 or 2, wherein the verifying device performs validity verification on the obtained device identity information of each user device, and when it is determined that the verification is passed, generates a corresponding device identity information matching identifier, and stores and uploads the obtained device identity information matching identifier to the transaction security chain, including:
the verification equipment performs validity verification on the obtained equipment identity information of each user equipment according to the service verification rule acquired from the service system and the risk level of each user equipment acquired from the risk control system, and generates corresponding equipment identity information matching identification when the verification is confirmed to pass;
the verification device stores the obtained device identity information matching identification locally and uploads the device identity information matching identification to a transaction security chain during non-business occupation.
4. The method as recited in claim 3, further comprising:
after generating the corresponding equipment identity information matching identifier, the verification equipment deletes the downloaded equipment identity information of the user equipment.
5. The method of claim 1 or 2, further comprising:
the verification device periodically re-acquires the device identity information of the user device meeting the set conditions from the transaction safety chain, performs validity verification on each re-acquired user device to acquire corresponding device identity information matching identifiers, and periodically re-acquires the device identity information matching identifiers which are newly uploaded by other verification devices from the transaction safety chain.
6. A blockchain-based validity verification device, comprising:
the first downloading unit is used for the verification equipment to determine that the corresponding equipment identity information matching identifier uploaded by other verification equipment corresponding to the equipment identity information does not exist on the local transaction safety chain, and the verification equipment downloads the equipment identity information of the user equipment meeting the set condition from the transaction safety chain in a non-service occupation period, wherein the equipment identity information matching identifier is used for representing the risk level and service content corresponding to the user equipment;
the verification unit is used for carrying out validity verification on the obtained equipment identity information of each user equipment, generating corresponding equipment identity information matching identifiers when the equipment identity information passes the verification, and storing and uploading the obtained equipment identity information matching identifiers to the transaction safety chain;
the second downloading unit is used for downloading the equipment identity information matching identifiers uploaded by other verification equipment from the transaction security chain and storing the equipment identity information matching identifiers during the non-business occupation period;
and the processing unit is used for judging that the target user equipment passes the validity check when the equipment identity information matching identification corresponding to the target user equipment is determined to be stored locally when the service use request sent by the target user equipment is received, and based on the equipment identity information matching identification, the corresponding service is provided.
7. A storage medium storing a program for implementing a blockchain-based validity check, wherein the program, when executed by a processor, performs the steps of:
after determining that corresponding equipment identity information matching identifiers uploaded by other verification equipment corresponding to the equipment identity information are not available on the local transaction safety chain, downloading the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain in a non-service occupation period, wherein the equipment identity information matching identifiers are used for representing risk levels and service contents corresponding to the user equipment;
performing validity check on the obtained equipment identity information of each user equipment, generating corresponding equipment identity information matching identifiers when the equipment identity information passes the check, and storing and uploading the obtained equipment identity information matching identifiers to the transaction safety chain;
during non-business occupation, downloading the device identity information matching identifiers uploaded by other verification devices from the transaction security chain and storing the device identity information matching identifiers;
when a service use request sent by target user equipment is received, when equipment identity information matching identification corresponding to the target user equipment is determined to be stored locally, the target user equipment is judged to pass through validity verification, and corresponding service is provided based on the equipment identity information matching identification.
8. A communications apparatus comprising one or more processors; and one or more computer-readable media having instructions stored thereon that, when executed by the one or more processors, cause the apparatus to perform the method of any of claims 1-5.
9. A legality verification system based on block chain is characterized by comprising at least a transaction safety chain and a plurality of verification devices, wherein,
the transaction security chain is used for storing equipment identity information uploaded by the user equipment and storing equipment identity information matching identifiers uploaded by each verification equipment, wherein the equipment identity information matching identifiers are used for representing risk levels and business contents corresponding to the user equipment;
and the verification equipment is used for determining that the corresponding equipment identity information matching identifiers uploaded by other verification equipment corresponding to the equipment identity information are not present on the transaction safety chain, downloading the equipment identity information of the user equipment meeting the set conditions from the transaction safety chain during non-service occupation, performing validity verification on the obtained equipment identity information of each user equipment, generating corresponding equipment identity information matching identifiers when verification is confirmed, storing the obtained equipment identity information matching identifiers and uploading the corresponding equipment identity information matching identifiers to the transaction safety chain, downloading the equipment identity information matching identifiers uploaded by other verification equipment from the transaction safety chain and storing the equipment identity information matching identifiers during non-service occupation, judging that the target user equipment passes validity verification when determining that the equipment identity information matching identifiers corresponding to the target user equipment are locally stored, and providing corresponding service based on the equipment identity information matching identifiers when the service use request sent by the target user equipment is received.
CN201910001598.9A 2019-01-02 2019-01-02 Block chain-based validity verification method, device and system Active CN111401672B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910001598.9A CN111401672B (en) 2019-01-02 2019-01-02 Block chain-based validity verification method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910001598.9A CN111401672B (en) 2019-01-02 2019-01-02 Block chain-based validity verification method, device and system

Publications (2)

Publication Number Publication Date
CN111401672A CN111401672A (en) 2020-07-10
CN111401672B true CN111401672B (en) 2023-11-28

Family

ID=71428288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910001598.9A Active CN111401672B (en) 2019-01-02 2019-01-02 Block chain-based validity verification method, device and system

Country Status (1)

Country Link
CN (1) CN111401672B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114980119B (en) * 2020-12-02 2024-06-11 支付宝(杭州)信息技术有限公司 Method, device and equipment for connecting equipment

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1197248A (en) * 1996-09-25 1998-10-28 中国工商银行福建省分行 Numeral signature method
CN104322089A (en) * 2012-05-23 2015-01-28 诺基亚公司 A key derivation method and apparatus for local access under control of a cellular network
WO2015158173A1 (en) * 2014-04-18 2015-10-22 天地融科技股份有限公司 Agreement key-based data processing method
CN105654297A (en) * 2015-12-29 2016-06-08 飞天诚信科技股份有限公司 Terminal-to-terminal interaction method and transaction terminal
CN106021964A (en) * 2016-06-30 2016-10-12 安徽易联众信息技术有限公司 Intelligent medical information management system
CN106357627A (en) * 2016-08-30 2017-01-25 李明 Method and system for reading resident identification card information and terminal
GB201701423D0 (en) * 2017-01-29 2017-03-15 Cabrera Fernandez Florencio Blockchain zero checksum trading system
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
WO2018010211A1 (en) * 2016-07-13 2018-01-18 山西特信环宇信息技术有限公司 Currency transaction application platform and method
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN107862527A (en) * 2017-10-27 2018-03-30 深圳市金立通信设备有限公司 A kind of method of payment, terminal and server
CN107886388A (en) * 2017-09-22 2018-04-06 杭州云象网络技术有限公司 The traffic trip credit and safety service platform and its operation method of multicenter are realized based on alliance's chain
CN107977564A (en) * 2016-10-21 2018-05-01 中国移动通信有限公司研究院 A kind of transaction authentication processing method, certificate server, terminal and traction equipment
CN108090761A (en) * 2017-11-10 2018-05-29 杭州云象网络技术有限公司 Block chain token method of payment based on credible two-dimension code
CN108242999A (en) * 2017-10-26 2018-07-03 招商银行股份有限公司 Key escrow method, equipment and computer readable storage medium
CN108270789A (en) * 2018-01-24 2018-07-10 平安科技(深圳)有限公司 Internetbank activating method, equipment, system and computer readable storage medium
CN108337093A (en) * 2017-12-26 2018-07-27 福建联迪商用设备有限公司 POS terminal personal identification method, POS terminal and server
CN108335105A (en) * 2018-01-18 2018-07-27 中国建设银行股份有限公司 Data processing method and relevant device
CN108335026A (en) * 2018-01-24 2018-07-27 平安科技(深圳)有限公司 Bank password information changes implementation method, equipment, system and storage medium
CN108520307A (en) * 2018-03-31 2018-09-11 深圳慧通商务有限公司 Data processing method and relevant apparatus
WO2018161807A1 (en) * 2017-03-06 2018-09-13 华为技术有限公司 User identity verification method and apparatus
WO2018177190A1 (en) * 2017-03-28 2018-10-04 上海瑞麒维网络科技有限公司 Method and device for synchronizing blockchain data
CN108766020A (en) * 2018-06-04 2018-11-06 深圳拍物联科技有限公司 A kind of parking stall sharing method and system based on block chain
CN108805650A (en) * 2018-04-27 2018-11-13 深圳市元征科技股份有限公司 A kind of order matching process and server
CN108833330A (en) * 2018-04-08 2018-11-16 浙江商业职业技术学院 A kind of rural area electronic commerce data authentication approach
CN109040060A (en) * 2018-08-01 2018-12-18 广州杰赛科技股份有限公司 Terminal-Matching and system, computer equipment
CN109067543A (en) * 2018-07-24 2018-12-21 腾讯科技(深圳)有限公司 Digital certificate management method, device, computer equipment and storage medium
CN109087101A (en) * 2018-08-07 2018-12-25 北京三快在线科技有限公司 Transaction method of calibration, device, storage medium and electronic equipment
CN109118765A (en) * 2018-09-04 2019-01-01 京东方科技集团股份有限公司 Break in traffic rules and regulations recording method and device based on block chain

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102377759B (en) * 2010-08-25 2014-10-08 中国移动通信有限公司 Service processing system, user identity identification method and related devices
CN102546580A (en) * 2011-01-04 2012-07-04 中国移动通信有限公司 Method, system and device for updating user password
CN104751032A (en) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 Authentication method and authentication device
US10469492B2 (en) * 2015-10-15 2019-11-05 Id.Me, Inc. Systems and methods for secure online credential authentication
US10115068B2 (en) * 2017-01-24 2018-10-30 Accenture Global Solutions Limited Secure product identification and verification
US20180315145A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Managing school systems on a blockchain

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1197248A (en) * 1996-09-25 1998-10-28 中国工商银行福建省分行 Numeral signature method
CN104322089A (en) * 2012-05-23 2015-01-28 诺基亚公司 A key derivation method and apparatus for local access under control of a cellular network
WO2015158173A1 (en) * 2014-04-18 2015-10-22 天地融科技股份有限公司 Agreement key-based data processing method
CN105654297A (en) * 2015-12-29 2016-06-08 飞天诚信科技股份有限公司 Terminal-to-terminal interaction method and transaction terminal
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
CN106021964A (en) * 2016-06-30 2016-10-12 安徽易联众信息技术有限公司 Intelligent medical information management system
WO2018010211A1 (en) * 2016-07-13 2018-01-18 山西特信环宇信息技术有限公司 Currency transaction application platform and method
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN106357627A (en) * 2016-08-30 2017-01-25 李明 Method and system for reading resident identification card information and terminal
CN107977564A (en) * 2016-10-21 2018-05-01 中国移动通信有限公司研究院 A kind of transaction authentication processing method, certificate server, terminal and traction equipment
GB201701423D0 (en) * 2017-01-29 2017-03-15 Cabrera Fernandez Florencio Blockchain zero checksum trading system
WO2018161807A1 (en) * 2017-03-06 2018-09-13 华为技术有限公司 User identity verification method and apparatus
WO2018177190A1 (en) * 2017-03-28 2018-10-04 上海瑞麒维网络科技有限公司 Method and device for synchronizing blockchain data
CN107886388A (en) * 2017-09-22 2018-04-06 杭州云象网络技术有限公司 The traffic trip credit and safety service platform and its operation method of multicenter are realized based on alliance's chain
CN108242999A (en) * 2017-10-26 2018-07-03 招商银行股份有限公司 Key escrow method, equipment and computer readable storage medium
CN107862527A (en) * 2017-10-27 2018-03-30 深圳市金立通信设备有限公司 A kind of method of payment, terminal and server
CN108090761A (en) * 2017-11-10 2018-05-29 杭州云象网络技术有限公司 Block chain token method of payment based on credible two-dimension code
CN108337093A (en) * 2017-12-26 2018-07-27 福建联迪商用设备有限公司 POS terminal personal identification method, POS terminal and server
CN108335105A (en) * 2018-01-18 2018-07-27 中国建设银行股份有限公司 Data processing method and relevant device
CN108335026A (en) * 2018-01-24 2018-07-27 平安科技(深圳)有限公司 Bank password information changes implementation method, equipment, system and storage medium
CN108270789A (en) * 2018-01-24 2018-07-10 平安科技(深圳)有限公司 Internetbank activating method, equipment, system and computer readable storage medium
CN108520307A (en) * 2018-03-31 2018-09-11 深圳慧通商务有限公司 Data processing method and relevant apparatus
CN108833330A (en) * 2018-04-08 2018-11-16 浙江商业职业技术学院 A kind of rural area electronic commerce data authentication approach
CN108805650A (en) * 2018-04-27 2018-11-13 深圳市元征科技股份有限公司 A kind of order matching process and server
CN108766020A (en) * 2018-06-04 2018-11-06 深圳拍物联科技有限公司 A kind of parking stall sharing method and system based on block chain
CN109067543A (en) * 2018-07-24 2018-12-21 腾讯科技(深圳)有限公司 Digital certificate management method, device, computer equipment and storage medium
CN109040060A (en) * 2018-08-01 2018-12-18 广州杰赛科技股份有限公司 Terminal-Matching and system, computer equipment
CN109087101A (en) * 2018-08-07 2018-12-25 北京三快在线科技有限公司 Transaction method of calibration, device, storage medium and electronic equipment
CN109118765A (en) * 2018-09-04 2019-01-01 京东方科技集团股份有限公司 Break in traffic rules and regulations recording method and device based on block chain

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
一种基于手机APP的用户实名信息快速采集及校验的方法;马永波;;品牌(下半月)(第04期);全文 *
复杂通信环境下多社交网络用户身份识别研究;胡石;章毅;许乐灵;陈心怡;陈芳;;淮海工学院学报(人文社会科学版)(第09期);全文 *
数据交换系统中数据处理技术研究与应用;任开银;孔震;林峰;;电力信息化(第01期);全文 *
李东星.基于区块链的网络实体身份认证技术研究.《中国优秀硕士学位论文全文库》.2018,123-128. *
胡石 ; 章毅 ; 许乐灵 ; 陈心怡 ; 陈芳 ; .复杂通信环境下多社交网络用户身份识别研究.淮海工学院学报(人文社会科学版).(第09期),3-9. *

Also Published As

Publication number Publication date
CN111401672A (en) 2020-07-10

Similar Documents

Publication Publication Date Title
EP3445074B1 (en) Controlling access according to privileges of different user equipment
CN107579966B (en) Control method, device and system for remotely accessing intranet and terminal equipment
CN106161496B (en) The remote assistance method and device of terminal, system
US10694368B2 (en) Dynamic utilization of services by a temporary device
JP2004007690A (en) Method and apparatus for checking authentication of first communication component in communication network
US9769247B2 (en) Application distribution method, terminal, and server
US20090210928A1 (en) Method and a system for managing a user related account information associated with application services distributed over a data network
CN111814131B (en) Method and device for equipment registration and configuration management
CN113612824A (en) Calibration data management method, system, medium, and device
CN111401672B (en) Block chain-based validity verification method, device and system
CN111988262B (en) Authentication method, authentication device, server and storage medium
US11777742B2 (en) Network device authentication
CN113765950B (en) Internet of things equipment, server and software updating method
WO2024002143A1 (en) Root certificate updating method and apparatus
CN109348472B (en) OTA (over the air) upgrading method and system based on single-point pushing
US10542569B2 (en) Community-based communication network services
CN111835504A (en) Identification code generation method and server
CN111159736B (en) Application control method and system of block chain
GB2520938A (en) Mobile device location
CN110048864B (en) Method and apparatus for authenticating an administrator of a device-specific message group
CN107133505B (en) Authority management method, authentication method and system
CN111163466A (en) Method for 5G user terminal to access block chain, user terminal equipment and medium
CN111064675A (en) Access flow control method, device, network equipment and storage medium
CN104735749A (en) Network accessing method, wireless router, and portal platform server
US20220405384A1 (en) Blockchain-based method and system for securing a network of virtual wireless base stations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant