CN111723398A - Method and system for verifying electronic credential for protecting privacy - Google Patents

Method and system for verifying electronic credential for protecting privacy Download PDF

Info

Publication number
CN111723398A
CN111723398A CN202010476102.6A CN202010476102A CN111723398A CN 111723398 A CN111723398 A CN 111723398A CN 202010476102 A CN202010476102 A CN 202010476102A CN 111723398 A CN111723398 A CN 111723398A
Authority
CN
China
Prior art keywords
hash value
electronic
unit
library
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010476102.6A
Other languages
Chinese (zh)
Inventor
侯海波
朱秋荣
杨江兵
王旸
张立润
潘凤岩
王明华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LANXUM NEW TECHNOLOGY CO LTD
Original Assignee
BEIJING LANXUM NEW TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LANXUM NEW TECHNOLOGY CO LTD filed Critical BEIJING LANXUM NEW TECHNOLOGY CO LTD
Priority to CN202010476102.6A priority Critical patent/CN111723398A/en
Publication of CN111723398A publication Critical patent/CN111723398A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/04Billing or invoicing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Computational Linguistics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Storage Device Security (AREA)

Abstract

A method and a system for verifying electronic certificates for protecting privacy comprise the steps of establishing a checking library, wherein the checking library at least comprises a first hash value and an ID of the electronic certificate, the ID of the electronic certificate is associated with the first hash value, and the first hash value is generated based on a key element of the electronic certificate; acquiring the checking library; obtaining ID of an electronic certificate to be checked, comparing the ID with the checking library, and returning first verification information when the ID does not exist; when the ID exists, key elements of the electronic certificate to be inspected are obtained, and a second hash value is generated; and comparing the first hash value with the second hash value, and returning second verification information. In the invention, the establishment of the checking library ensures that the privacy of the user can be protected in the checking process; the establishment of the checking library and the use of the checking library are mutually independent, so that the limitation of the checking service on the information protection of the service provider is eliminated, the checking service provider can be selected more widely, and the user experience is improved.

Description

Method and system for verifying electronic credential for protecting privacy
Technical Field
The present invention relates generally to the field of electronic credential verification, and more particularly, to a method and system for privacy-preserving electronic credential verification.
Background
At present, the use of electronic certificates is more and more common, and the existing electronic certificate verification firstly checks the serial number of the electronic certificate and then checks the information carried by the electronic certificate, i.e. checks the key information. Therefore, in consideration of protecting the privacy of the user, the service party for electronic certificate verification can only be provided by the administrative department with corresponding qualification, so that while a large amount of administrative resources are occupied, the disclosure of user data still cannot be avoided, for example, key information of a real electronic certificate can be obtained by repeatedly checking electronic certificates with the same number. Moreover, since administrative resources are limited, when the resources invested in the authentication service are insufficient, the user may be crowded while enjoying the authentication service, which results in poor user experience. If the pinging service for the e-credential is delivered to a third party authority for provisioning, there is a risk that the third party authority will misuse the e-credential data and reveal the privacy of the user.
How to protect the privacy of the user and improve the verification efficiency is an urgent problem to be solved in the electronic certificate verification service.
Disclosure of Invention
In order to solve the above problem, the present invention provides a method for verifying an electronic credential with privacy protection, including, in a first step S1, establishing a ping library, where the ping library includes at least a first hash value and an ID of the electronic credential, the ID of the electronic credential is associated with the first hash value, and the first hash value is generated based on a key element of the electronic credential; a second step S2, acquiring the inspection library; step S3, obtaining ID of the electronic certificate to be checked, comparing the ID with the checking library, and returning first verification information when the ID does not exist; when the ID exists, key elements of the electronic certificate to be inspected are obtained, and a second hash value is generated; and comparing the first hash value with the second hash value, and returning second verification information.
According to one embodiment of the present invention, a pinging bank is established in a first unit, the pinging bank is retrieved from the first unit by a second unit, and an electronic credential is verified at the second unit, wherein the second unit is independent of the first unit.
According to one embodiment of the present invention, an ID of an electronic credential is obtained in a first unit, a first hash value is generated based on a key element of the electronic credential, the ID and the first hash value are obtained from the first unit by a second unit, a validation library is formed, and the electronic credential is verified at the second unit, wherein the second unit is independent from the first unit.
According to one embodiment of the invention, establishing the checking library comprises extracting key elements of the electronic certificate, and obtaining a first hash value after operation; extracting an ID of the electronic credential to be associated with the first hash value; and repeating the steps until all the electronic certificates are processed.
According to one embodiment of the invention, the key element comprises at least one item of user privacy information.
According to an embodiment of the present invention, the ID of the electronic credential refers to a tag uniquely corresponding to the electronic credential, and is in any form of a number, a barcode, or a two-dimensional code.
According to another aspect of the present invention, there is provided a system for verifying an electronic credential with privacy protection, including an electronic credential management unit 1, a verification unit 2, where the electronic credential management unit 1 is configured to provide an ID of an electronic credential and a first hash value to form a verification library, where the verification library includes at least the first hash value and the ID of the electronic credential, and the ID of the electronic credential is associated with the first hash value, and the first hash value is generated based on a key element of the electronic credential; the verification unit 2 is connected with the electronic document management unit 1 and is used for acquiring the checking library and verifying the authenticity of the electronic document based on the checking library.
According to one embodiment of the present invention, the electronic credential management unit 1 and the authentication unit 2 exist independently of each other.
According to one embodiment of the present invention, the electronic credential management unit 1 includes a first module, a second module, and a third module, where the first module is used to obtain an ID and key information of an electronic credential; the second module is used for calculating the key information to obtain a first hash value; the third module is configured to associate the ID of the e-credential with the first hash value.
In the invention, the establishment of the checking library ensures that the privacy of the user can be protected in the checking process; the first unit and the second unit are arranged independently, so that the limitation of the checking service on the information protection of the service provider is eliminated, the checking service can be selected more widely, and the user experience is improved.
Drawings
FIG. 1 is a schematic diagram of method steps for privacy-preserving electronic credential validation;
fig. 2 is a schematic diagram of a system for privacy-preserving electronic credential validation.
Detailed Description
In the following detailed description of the preferred embodiments of the invention, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration, specific features of the invention, such that the advantages and features of the invention may be more readily understood and appreciated. The following description is an embodiment of the claimed invention, and other embodiments related to the claims not specifically described also fall within the scope of the claims.
Fig. 1 shows a schematic diagram of method steps for privacy-preserving e-credential validation.
As shown in fig. 1, a method for verifying an electronic credential with privacy protection includes, in a first step S1, establishing a ping base, where the ping base includes at least a first hash value and an ID of the electronic credential, the ID of the electronic credential is associated with the first hash value, and the first hash value is generated based on a key element of the electronic credential; a second step S2, acquiring the inspection library; step S3, obtaining ID of the electronic certificate to be checked, comparing the ID with the checking library, and returning first verification information when the ID does not exist; when the ID exists, key elements of the electronic certificate to be inspected are obtained, and a second hash value is generated; and comparing the first hash value with the second hash value, and returning second verification information.
The checking library is a unit containing the ID and the first hash value of the electronic certificate opened really.
The ID of the electronic certificate refers to a label in the form of a number, a bar code, a two-dimensional code and the like which uniquely corresponds to the electronic certificate.
The key information refers to information, money amount, items and the like of the user carried in the electronic certificate.
In the invention, the ID of the electronic certificate is firstly obtained, the key information of the electronic certificate is calculated to form a first hash value, and the ID and the first hash value are associated to be used as a reference object for the electronic certificate to be verified to find out the authenticity.
In the invention, the IDs and the first hash values corresponding to the plurality of electronic vouchers are collected and stored to form an inspection library.
In the verification process, the checking party provides the electronic credential to be checked so as to obtain the ID and the key information of the electronic credential to be checked, and similarly, the key information is also subjected to hash operation to obtain a second hash value, and the ID and the second hash value are compared in the checking library, so that the authenticity of the electronic credential to be checked can be obtained.
In the invention, the checking process can only contact the value after the Hash operation, and can not contact the information of the real user, thereby protecting the privacy of the user. Meanwhile, the comparison of multiple contents in the prior art is changed into the comparison of only the ID and the hash value, so that the reduction of the inspection contents is realized, and the inspection is more rapid and convenient.
According to one embodiment of the present invention, a pinging bank is established in a first unit, the pinging bank is retrieved from the first unit by a second unit, and an electronic credential is verified at the second unit, wherein the second unit is independent of the first unit.
In the present invention, the first unit function is to provide a ping library. There may be a plurality of second units, each of which obtains a copy of the challenge library from the first unit, each of which faces the user for a challenge of the electronic credential to be challenged.
Since the checking library does not include the user information carried by the electronic certificate, only includes the ID of the electronic certificate and the hash value formed according to the key information, the checking service provider cannot contact the privacy information of the user in the checking process.
The arrangement of the invention enables the management department to outsource the inspection work as an independent service, and the personnel or the company which take over the inspection work can well complete the inspection work, but still can keep the safety of the user information.
According to one embodiment of the invention, establishing the checking library comprises extracting key elements of the electronic certificate, and obtaining a first hash value after operation; extracting an ID of the electronic credential to be associated with the first hash value; and repeating the steps until all the electronic certificates are processed.
The creation of the pinging library is formed in a module or unit with electronic certificate management authority, and the part of the structure is not oriented to the user to be inquired. For example, the first unit obtains the ID of the electronic certificate and obtains the corresponding first hash value, and after repeating the steps, the first unit forms a checking library containing a plurality of "ID-first hash values", and then each second unit copies the checking library.
The checking library may also be formed in a module or unit having a checking function, for example, the first unit obtains an ID of the electronic certificate and obtains a corresponding first hash value, and transmits the two to the second unit after associating the two, and after repeating the steps, the second unit forms a checking library including a plurality of "IDs — first hash values".
The present invention preferably forms the pinging library at the first unit and is replicated from the first unit by the second unit.
According to one embodiment of the present invention, the key element includes at least one item of user privacy information.
Fig. 2 shows a system diagram of privacy-preserving electronic credential validation.
As shown in fig. 2, a system for verifying an electronic credential for protecting privacy includes an electronic credential management unit 1 and a verification unit 2, where the electronic credential management unit 1 is configured to provide an ID of an electronic credential and a first hash value to form a verification library, where the verification library includes at least the first hash value and the ID of the electronic credential, and the ID of the electronic credential is associated with the first hash value, and the first hash value is generated based on a key element of the electronic credential; the verification unit 2 is connected with the electronic document management unit 1 and is used for acquiring the checking library and verifying the authenticity of the electronic document based on the checking library.
The electronic certificate management unit 1 obtains the ID and the key information from the original electronic certificate, and performs hash operation on the key information, so that the data in the checking library does not relate to the information of the user, but the authenticity of the electronic certificate can be evaluated accurately.
Due to the need for user information protection, the electronic credential management unit 1 must be managed by an entity or department with user information management authority. Correspondingly, the authentication unit 2, since it does not contact user information, can be managed by any suitable unit or department.
In practice, the electronic credential management unit 1 may be a server of a tax administration department, and correspondingly, the authentication unit 2 may be a third-party service provided by a partner of the tax administration department providing an authentication service.
According to one embodiment of the present invention, the electronic credential management unit 1 and the authentication unit 2 exist independently of each other.
In the present invention, the electronic document management unit 1 and the verification unit 2 may be managed by a management department of the electronic document, or managed by different departments, and preferably, they exist independently.
According to one embodiment of the present invention, the electronic credential management unit 1 includes a first module, a second module, and a third module, where the first module is used to obtain an ID and key information of an electronic credential; the second module is used for calculating the key information to obtain a first hash value; the third module is configured to associate the ID of the e-credential with the first hash value.
In the invention, the establishment of the checking library ensures that the privacy of the user can be protected in the checking process; the first unit and the second unit are arranged independently, so that the limitation of the checking service on the information protection of the service provider is eliminated, the checking service can be selected more widely, and the user experience is improved.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim.

Claims (9)

1. A method of privacy protected electronic credential validation, comprising,
a first step (S1) of establishing a checking library, wherein the checking library at least comprises a first hash value and an ID of an electronic certificate, the ID of the electronic certificate is associated with the first hash value, and the first hash value is generated based on a key element of the electronic certificate;
a second step (S2) of acquiring the inspection library;
the third step (S3) of obtaining the ID of the electronic document to be checked and comparing with the checking library,
when the ID does not exist, returning first verification information;
when the ID exists, key elements of the electronic certificate to be inspected are obtained, and a second hash value is generated; and comparing the first hash value with the second hash value, and returning second verification information.
2. The method of claim 1, wherein,
establishing a checking library in the first unit, obtaining the checking library from the first unit by the second unit, and verifying the electronic certificate in the second unit, wherein the second unit is independent from the first unit.
3. The method of claim 1, wherein,
the method comprises the steps of obtaining an ID of an electronic certificate in a first unit, generating a first hash value based on key elements of the electronic certificate, obtaining the ID and the first hash value from the first unit by a second unit to form a checking library, and verifying the electronic certificate in the second unit, wherein the second unit is independent of the first unit.
4. The method of claim 1, wherein establishing a ping library comprises,
extracting key elements of the electronic certificate, and obtaining a first hash value after operation;
extracting an ID of the electronic credential to be associated with the first hash value;
and repeating the steps until all the electronic certificates are processed.
5. The method of claim 1, wherein the key element comprises at least one item of user privacy information.
6. The method according to claim 1, wherein the ID of the electronic document is a tag uniquely corresponding to the electronic document, and is in the form of any one of a number, a barcode, and a two-dimensional code.
7. A system for verifying electronic certificates for protecting privacy comprises an electronic certificate management unit (1) and a verification unit (2),
the electronic credential management unit (1) is used for providing an ID of an electronic credential and a first hash value to form a checking library, wherein the checking library at least comprises the first hash value and the ID of the electronic credential, the ID of the electronic credential is associated with the first hash value, and the first hash value is generated based on a key element of the electronic credential;
the verification unit (2) is connected with the electronic document management unit (1) and is used for acquiring the checking library and verifying the authenticity of the electronic document based on the checking library.
8. The system according to claim 7, wherein said electronic credential management unit (1) and said authentication unit (2) exist independently of each other.
9. The system according to claim 7, wherein said electronic credential management unit (1) comprises a first module, a second module, a third module,
the first module is used for acquiring the ID and key information of the electronic certificate;
the second module is used for calculating the key information to obtain a first hash value;
the third module is configured to associate the ID of the e-credential with the first hash value.
CN202010476102.6A 2020-05-29 2020-05-29 Method and system for verifying electronic credential for protecting privacy Pending CN111723398A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010476102.6A CN111723398A (en) 2020-05-29 2020-05-29 Method and system for verifying electronic credential for protecting privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010476102.6A CN111723398A (en) 2020-05-29 2020-05-29 Method and system for verifying electronic credential for protecting privacy

Publications (1)

Publication Number Publication Date
CN111723398A true CN111723398A (en) 2020-09-29

Family

ID=72565332

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010476102.6A Pending CN111723398A (en) 2020-05-29 2020-05-29 Method and system for verifying electronic credential for protecting privacy

Country Status (1)

Country Link
CN (1) CN111723398A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007043321A (en) * 2005-08-01 2007-02-15 Hitachi Ltd Authenticity verification method and system of electronic document
CN102419809A (en) * 2011-10-29 2012-04-18 重庆君盾科技有限公司 Safe, efficient and universal method for proving original value of electronic document
US20140181927A1 (en) * 2012-12-21 2014-06-26 Cortex Mcp, Inc. File format and platform for storage and verification of credentials
CN106651321A (en) * 2016-12-29 2017-05-10 百望电子发票数据服务有限公司 Unified electronic credential check method and system thereof
CN106845275A (en) * 2017-02-09 2017-06-13 中国科学院数据与通信保护研究教育中心 The electronic bill management system and method for a kind of secret protection
CN109189962A (en) * 2018-08-17 2019-01-11 福建南威软件有限公司 A kind of license service realization system based on block chain
CN109922029A (en) * 2017-12-13 2019-06-21 航天信息股份有限公司 Electronics authority verification method and device
CN110909383A (en) * 2019-11-15 2020-03-24 深圳市网心科技有限公司 Electronic invoice management method and device, electronic equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007043321A (en) * 2005-08-01 2007-02-15 Hitachi Ltd Authenticity verification method and system of electronic document
CN102419809A (en) * 2011-10-29 2012-04-18 重庆君盾科技有限公司 Safe, efficient and universal method for proving original value of electronic document
US20140181927A1 (en) * 2012-12-21 2014-06-26 Cortex Mcp, Inc. File format and platform for storage and verification of credentials
CN106651321A (en) * 2016-12-29 2017-05-10 百望电子发票数据服务有限公司 Unified electronic credential check method and system thereof
CN106845275A (en) * 2017-02-09 2017-06-13 中国科学院数据与通信保护研究教育中心 The electronic bill management system and method for a kind of secret protection
CN109922029A (en) * 2017-12-13 2019-06-21 航天信息股份有限公司 Electronics authority verification method and device
CN109189962A (en) * 2018-08-17 2019-01-11 福建南威软件有限公司 A kind of license service realization system based on block chain
CN110909383A (en) * 2019-11-15 2020-03-24 深圳市网心科技有限公司 Electronic invoice management method and device, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐伟;赵嵩正;刘洪宇;: "融合多特征算法的电子印鉴系统研究", 计算机工程与应用 *

Similar Documents

Publication Publication Date Title
AU2018101148A4 (en) A system and method for document information authenticity verification
CN107342867B (en) Signature verification method and device
CN107171794A (en) A kind of electronic document based on block chain and intelligent contract signs method
JP2022514784A (en) Methods and systems for preparing and performing object authentication
US20120078798A1 (en) Systems and methods for transmitting financial account information
CN110096903B (en) Asset verification method based on block chain and block chain network system
CN111444273B (en) Data authorization method and device based on block chain
CZ78798A3 (en) System and method of proving authenticity of documents
US8423770B2 (en) Method and system for providing secure codes for marking on items
WO2000045358A1 (en) Method for securing safety of electronic information
CN206212040U (en) A kind of real-name authentication system for express delivery industry
EP3543891B1 (en) A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof
CN105007301A (en) Electronic evidence processing system and method based on social platform
CN108494557A (en) Social security digital certificate management method, computer readable storage medium and terminal device
CN112187471B (en) Data copying method, system and medium based on block chain and intelligent contract
JP4836735B2 (en) Electronic information verification program, electronic information verification apparatus, and electronic information verification method
CN110826091B (en) File signature method and device, electronic equipment and readable storage medium
US20150379524A1 (en) Method and system for authenticating physical items
CN112862589A (en) Identity verification method, device and system in financial scene
CN111311341A (en) Bill processing method, apparatus and medium
EP2306377A1 (en) Method and system for providing secure codes for marking on items
CN112633813B (en) Precious commodity distribution management method based on blockchain technology
CN114254269A (en) System and method for determining rights of biological digital assets based on block chain technology
CN112884484A (en) Enterprise identity authentication method and system based on block chain
CN106712958B (en) Information acquisition method and system, real-name system information acquisition method, system and application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination