CN111709803B - Method and system for preventing unauthorized business handling - Google Patents

Method and system for preventing unauthorized business handling Download PDF

Info

Publication number
CN111709803B
CN111709803B CN202010536534.1A CN202010536534A CN111709803B CN 111709803 B CN111709803 B CN 111709803B CN 202010536534 A CN202010536534 A CN 202010536534A CN 111709803 B CN111709803 B CN 111709803B
Authority
CN
China
Prior art keywords
information
override
service
check
acceptance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010536534.1A
Other languages
Chinese (zh)
Other versions
CN111709803A (en
Inventor
赵东伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Si Tech Information Technology Co Ltd
Original Assignee
Beijing Si Tech Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Si Tech Information Technology Co Ltd filed Critical Beijing Si Tech Information Technology Co Ltd
Priority to CN202010536534.1A priority Critical patent/CN111709803B/en
Publication of CN111709803A publication Critical patent/CN111709803A/en
Application granted granted Critical
Publication of CN111709803B publication Critical patent/CN111709803B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • G06Q50/60

Abstract

The invention relates to a method and a system for preventing unauthorized business handling, comprising the steps that a client sends business acceptance information and business acceptance ID corresponding to a processed business order to a server; the server determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and sends the override verification information to the client after storing the override verification information in the override verification table; when a client submits a service order, inquiring an override check table according to override check information to obtain first check information and a service acceptance ID, and sending the first check information and the service acceptance ID to a server; the server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information. The invention provides a method for preventing unauthorized attacks, which can prevent unauthorized attacks without depending on encryption and decryption.

Description

Method and system for preventing unauthorized business handling
Technical Field
The invention relates to the technical field of telecommunication service, in particular to a method and a system for preventing unauthorized business handling.
Background
The CRM system in the telecom industry is a relatively complex IT support system in China, and has the characteristics and needs in the aspect of safety protection.
In the current telecom CRM system, the background of the traditional staff acceptance page and order center is in the enterprise private network of the telecom system, and the technical means such as message encryption and the like are not adopted in the current foreground and background data transmission. Some agent partners are also connected to the private network of the telecommunications enterprise through VPN, and business acceptance pages are also available to the agent's staff. Under the specific background, once a malicious technician intercepts an order creation message of an order center, the purpose of illegally transacting business can be achieved by calling an order creation service of the order center through a malicious program by a technical means of modifying parameters.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method and a system for preventing unauthorized business handling aiming at the defects of the prior art.
The technical scheme for solving the technical problems is as follows:
a method of preventing unauthorized transactions, the method comprising:
the client sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server determines override verification information according to the service acceptance information, the service acceptance ID and an override verification rule base, stores the override verification information into an override verification table, and then sends the override verification information to the client;
when the client submits the service order, inquiring the override check table according to the override check information to obtain first check information and the service acceptance ID, and sending the first check information and the service acceptance ID to a server;
and the server side inquires the override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information.
The beneficial effects of the invention are as follows: the method for preventing the unauthorized handling of the business comprises the steps that a client sends business acceptance information and business acceptance ID corresponding to a processed business order to a server, and the server determines unauthorized verification information according to the business acceptance information, the business acceptance ID and an unauthorized verification rule base, stores the unauthorized verification information into an unauthorized verification table and then sends the unauthorized verification information to the client; when a client submits a service order, inquiring an override check table according to override check information to obtain first check information and a service acceptance ID, and sending the first check information and the service acceptance ID to a server; the server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information. The invention provides a method for preventing unauthorized attacks, which can prevent unauthorized attacks without depending on encryption and decryption.
On the basis of the technical scheme, the invention can be improved as follows.
Further, the server determines override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and specifically includes:
inquiring the override check rule base according to the service acceptance information, and determining an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
The beneficial effects of adopting the further scheme are as follows: and determining the override verification information according to the service acceptance information, so that the override verification information can be flexibly customized, and the override attack prevention capability is improved.
Further, the server determines whether the service order passes the override check according to the comparison result of the first check information and the second check information, and specifically includes:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
Further, before the client sends the service acceptance information and the service acceptance ID to the server, the method further includes:
and the client acquires service acceptance information corresponding to the service order and generates a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
The other technical scheme for solving the technical problems is as follows:
a system for preventing unauthorized business handling comprises a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server side is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client side;
the client is used for inquiring the override check table according to the override check information when submitting the service order, obtaining first check information and the service acceptance ID, and sending the first check information and the service acceptance ID to the server;
the server is used for inquiring the override check table according to the service acceptance ID to obtain second check information, and determining whether the service order passes the override check according to the comparison result of the first check information and the second check information.
The beneficial effects of the invention are as follows: the system for preventing the override handling of the business comprises a client, a server and a client, wherein the client is used for sending business acceptance information and business acceptance ID corresponding to a processed business order to the server, and the server determines override verification information according to the business acceptance information, the business acceptance ID and an override verification rule base, saves the override verification information to an override verification table and then sends the override verification information to the client; when a client submits a service order, inquiring an override check table according to override check information to obtain first check information and a service acceptance ID, and sending the first check information and the service acceptance ID to a server; the server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information. The invention provides a system for preventing unauthorized attacks, which can prevent unauthorized attacks without depending on encryption and decryption.
On the basis of the technical scheme, the invention can be improved as follows.
Further, the server is specifically configured to query the override check rule base according to the service acceptance information, and determine an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server is specifically configured to compare the first verification information with the second verification information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
Further, the client order is further configured to obtain service acceptance information corresponding to the service order, and generate a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
Additional aspects of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following description will briefly explain the embodiments of the present invention or the drawings used in the description of the prior art, and it is obvious that the drawings described below are only some embodiments of the present invention, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for preventing unauthorized business handling according to an embodiment of the invention;
fig. 2 is a schematic diagram of a system for preventing unauthorized business handling according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
As shown in a flow chart of a method for preventing unauthorized business according to an embodiment of the present invention in fig. 1, a method for preventing unauthorized business includes the following steps:
110. and the client sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server.
120. And the server determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, stores the override verification information in the override verification table, and then sends the override verification information to the client.
130. When the client submits a service order, the override check list is queried according to the override check information to obtain first check information and a service acceptance ID, and the first check information and the service acceptance ID are sent to the server.
140. The server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information.
It should be appreciated that the client may be a terminal or other device for personnel in the business hall, and the server may be a server configured with an order center, where the override list may be stored in a database, either as a separate database server or as a database in the order center server.
The method for preventing the override handling of the business provided by the embodiment comprises the steps that a client sends business acceptance information and business acceptance ID corresponding to a processed business order to a server, and the server determines override verification information according to the business acceptance information, the business acceptance ID and an override verification rule base, saves the override verification information to an override verification table and then sends the override verification information to the client; when a client submits a service order, inquiring an override check table according to override check information to obtain first check information and a service acceptance ID, and sending the first check information and the service acceptance ID to a server; the server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information. The invention provides a method for preventing unauthorized attacks, which can prevent unauthorized attacks without depending on encryption and decryption.
Further, the server determines override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and specifically includes:
inquiring the override check rule base according to the service acceptance information, and determining an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server determines whether the service order passes the override check according to the comparison result of the first check information and the second check information, and specifically includes:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
Further, before the client sends the service acceptance information and the service acceptance ID to the server, the method further includes:
and the client acquires service acceptance information corresponding to the service order and generates a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
It should be appreciated that, for example, when a customer needs to transact a service, a worker logs in to a telecommunications CRM acceptance page, inputs a cell phone number to transact the service, obtains service acceptance information, and generates a service acceptance ID based on the service acceptance information, the service acceptance ID being a unique identification of the service order, and communicates the service acceptance information to the order center. The service acceptance information includes basic information of staff and user information for service handling. The order center reads the override verification rule from the database, and records the service acceptance ID and selected part of information in the service acceptance information according to the override verification rule to form override verification information, wherein the selection of the service acceptance information part of information depends on the override verification rule, and the information selected by different rules is different.
When the staff completes filling the information required by the business handling, and submits the order, the override check list is inquired according to the override check information to obtain first check information and business acceptance ID, and the first check information, the business acceptance ID and the business order information are sent to the order center.
The order center analyzes the first check information and the service acceptance ID, then queries the override check list through the service acceptance ID to obtain second check information, compares the first check information with the second check information, if the data are consistent, the override check is passed, an order can be generated to accept the service, and if the data are inconsistent or the data are not queried from the list, the override check is failed, and the order creation is not performed. The override rules table may be stored in an order center or other storage device, and contains fields including "business acceptance ID", "business code", and "rules details". The granularity of the anti-override verification can be controlled through a service code field, and the validation and invalidation rules of the anti-override can be controlled through a switch.
As shown in fig. 2, which is a block diagram of a system for preventing unauthorized business according to an embodiment of the present invention, a system for preventing unauthorized business includes a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server side is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client side;
the client is used for inquiring the override check table according to the override check information when submitting the service order, obtaining first check information and the service acceptance ID, and sending the first check information and the service acceptance ID to the server;
the server is used for inquiring the override check table according to the service acceptance ID to obtain second check information, and determining whether the service order passes the override check according to the comparison result of the first check information and the second check information.
Further, the server is specifically configured to query the override check rule base according to the service acceptance information, and determine an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server is specifically configured to compare the first verification information with the second verification information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
Further, the client order is further configured to obtain service acceptance information corresponding to the service order, and generate a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
The present invention is not limited to the above embodiments, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the present invention, and these modifications and substitutions are intended to be included in the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (8)

1. A method for preventing unauthorized transactions, the method comprising:
the client sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server determines override verification information according to the service acceptance information, the service acceptance ID and an override verification rule base, stores the override verification information into an override verification table, and then sends the override verification information to the client;
when the client submits the service order, the client queries the override check table according to override check information corresponding to the service order to obtain first check information and a service acceptance ID corresponding to the service order, and sends the first check information and the service acceptance ID corresponding to the service order to a server;
the server side inquires the override check table according to the service acceptance ID corresponding to the service order to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information;
the server determines whether the service order passes the override check according to the comparison result of the first check information and the second check information, and specifically comprises the following steps:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
2. The method for preventing unauthorized business according to claim 1, wherein the server determines unauthorized verification information according to the business acceptance information, the business acceptance ID and an unauthorized verification rule base, and specifically comprises:
inquiring the override check rule base according to the service acceptance information, and determining an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
3. The method for preventing unauthorized transactions according to claim 1, wherein before the client sends the service acceptance information and the service acceptance ID to the server, the method further comprises:
and the client acquires service acceptance information corresponding to the service order and generates a service acceptance ID according to the service acceptance information.
4. A method of preventing unauthorized handling of a service according to any of claims 1-3, characterized in that the service acceptance information comprises staff information handling the service order, customer information and information of the service order.
5. A system for preventing unauthorized business handling is characterized by comprising a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server side is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client side;
the client is used for inquiring the override check table according to override check information corresponding to the service order when submitting the service order, obtaining first check information and a service acceptance ID corresponding to the service order, and sending the first check information and the service acceptance ID corresponding to the service order to the server;
the server is used for inquiring the override check table according to the service acceptance ID corresponding to the service order to obtain second check information, and determining whether the service order passes the override check according to the comparison result of the first check information and the second check information;
the server is specifically configured to compare the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
6. The system for preventing unauthorized transactions according to claim 5 wherein:
the server is specifically configured to query the override check rule base according to the service acceptance information, and determine an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
7. The system for preventing unauthorized transactions according to claim 5 wherein,
the client list is also used for acquiring service acceptance information corresponding to the service order and generating a service acceptance ID according to the service acceptance information.
8. The system for preventing unauthorized business according to any one of claims 5-7, wherein the business acceptance information includes information of a worker who handles the business order, customer information, and information of the business order.
CN202010536534.1A 2020-06-12 2020-06-12 Method and system for preventing unauthorized business handling Active CN111709803B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010536534.1A CN111709803B (en) 2020-06-12 2020-06-12 Method and system for preventing unauthorized business handling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010536534.1A CN111709803B (en) 2020-06-12 2020-06-12 Method and system for preventing unauthorized business handling

Publications (2)

Publication Number Publication Date
CN111709803A CN111709803A (en) 2020-09-25
CN111709803B true CN111709803B (en) 2023-09-05

Family

ID=72540251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010536534.1A Active CN111709803B (en) 2020-06-12 2020-06-12 Method and system for preventing unauthorized business handling

Country Status (1)

Country Link
CN (1) CN111709803B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112445824B (en) * 2020-11-11 2024-02-02 北京思特奇信息技术股份有限公司 Abnormal order user information sharing system and method based on block chain

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932332A (en) * 2012-09-28 2013-02-13 用友软件股份有限公司 Data verifying system and data verifying method
CN107360187A (en) * 2017-08-21 2017-11-17 网宿科技股份有限公司 A kind of processing method of network abduction, apparatus and system
CN107395659A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of method and device of service handling and common recognition
CN107426169A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of method for processing business and device based on authority
CN108616360A (en) * 2018-03-22 2018-10-02 阿里巴巴集团控股有限公司 User identity verification, register method and device
CN108650214A (en) * 2018-03-16 2018-10-12 交通银行股份有限公司 The anti-method and device of going beyond one's commission of dynamic page encryption
CN109034816A (en) * 2018-06-08 2018-12-18 平安科技(深圳)有限公司 User information verification method, device, computer equipment and storage medium
CN109600377A (en) * 2018-12-13 2019-04-09 平安科技(深圳)有限公司 Anti- go beyond one's commission method, apparatus, computer equipment and storage medium
CN110111188A (en) * 2019-05-23 2019-08-09 中国联合网络通信集团有限公司 Business handling method and apparatus
CN110381060A (en) * 2019-07-19 2019-10-25 百度(中国)有限公司 Data processing method, device, system and storage medium
CN110597837A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Service data processing method, device, storage medium and computer equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7269737B2 (en) * 2001-09-21 2007-09-11 Pay By Touch Checking Resources, Inc. System and method for biometric authorization for financial transactions
US8402040B2 (en) * 2004-08-20 2013-03-19 Morphotrust Usa, Inc. Method and system to authenticate an object

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932332A (en) * 2012-09-28 2013-02-13 用友软件股份有限公司 Data verifying system and data verifying method
CN107395659A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of method and device of service handling and common recognition
CN107426169A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of method for processing business and device based on authority
CN107360187A (en) * 2017-08-21 2017-11-17 网宿科技股份有限公司 A kind of processing method of network abduction, apparatus and system
CN108650214A (en) * 2018-03-16 2018-10-12 交通银行股份有限公司 The anti-method and device of going beyond one's commission of dynamic page encryption
CN108616360A (en) * 2018-03-22 2018-10-02 阿里巴巴集团控股有限公司 User identity verification, register method and device
CN109034816A (en) * 2018-06-08 2018-12-18 平安科技(深圳)有限公司 User information verification method, device, computer equipment and storage medium
CN109600377A (en) * 2018-12-13 2019-04-09 平安科技(深圳)有限公司 Anti- go beyond one's commission method, apparatus, computer equipment and storage medium
CN110111188A (en) * 2019-05-23 2019-08-09 中国联合网络通信集团有限公司 Business handling method and apparatus
CN110381060A (en) * 2019-07-19 2019-10-25 百度(中国)有限公司 Data processing method, device, system and storage medium
CN110597837A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Service data processing method, device, storage medium and computer equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
实现安全数据库的一种方法――数据库安全通信服务;戴云, 范平志;计算机工程与应用(第22期);全文 *

Also Published As

Publication number Publication date
CN111709803A (en) 2020-09-25

Similar Documents

Publication Publication Date Title
CN109840591B (en) Model training system, method and storage medium
CN104349324B (en) Mobile terminal number intelligent protection system and method
US10117098B1 (en) User authentication verification service
CN109787991A (en) Exempt from close login method, device, equipment and storage medium based on mobile terminal
CN108307333B (en) Method and device for transmitting intermediate number for mobile communication equipment and storage medium
AU2020241597B2 (en) Validating telephone calls by verifying entity identities using blockchains
CN110765484A (en) Credit investigation data processing method and electronic equipment
CN110636505A (en) Method and system for protecting account security
CN107483477B (en) Account management method and account management system
CN111709803B (en) Method and system for preventing unauthorized business handling
US10333939B2 (en) System and method for authentication
CN111681105B (en) Account management method and device
CN112182546A (en) Account number protection method and device, terminal equipment and storage medium
CN108540374B (en) Information processing method, device, equipment and storage medium based on instant messaging
CN112351048B (en) Interface access control method, device, equipment and storage medium
CN112367302B (en) Identity authentication method and system suitable for chrome browser
CN114553573A (en) Identity authentication method and device
CN112004228B (en) Real person authentication method and system
CN108270567B (en) Message source verification method, device and system and message sending method and device
CN104348839B (en) Network communication method, device and system
CN110807181A (en) Method, device and system for logging in and verifying database in enterprise
CN117237108A (en) Transaction abnormity detection method and related device
CN112019537A (en) Method and system for accessing data
CN116846585A (en) Digital identity and account authentication method and device thereof and storage medium
CN113987437A (en) Private data query method based on block chain account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant