CN112286881A - Document authentication and tracing method and device - Google Patents

Document authentication and tracing method and device Download PDF

Info

Publication number
CN112286881A
CN112286881A CN202011171478.2A CN202011171478A CN112286881A CN 112286881 A CN112286881 A CN 112286881A CN 202011171478 A CN202011171478 A CN 202011171478A CN 112286881 A CN112286881 A CN 112286881A
Authority
CN
China
Prior art keywords
document
user
description block
authentication
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011171478.2A
Other languages
Chinese (zh)
Other versions
CN112286881B (en
Inventor
贾武阳
黄博
冯海萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jindiyun Technology Co ltd
Original Assignee
Jindiyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jindiyun Technology Co ltd filed Critical Jindiyun Technology Co ltd
Priority to CN202011171478.2A priority Critical patent/CN112286881B/en
Publication of CN112286881A publication Critical patent/CN112286881A/en
Application granted granted Critical
Publication of CN112286881B publication Critical patent/CN112286881B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/164File meta data generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a document authentication and source tracing method and device, and document modification records and personnel information for executing the modification records are traced through a block chain, so that the reliability of the document modification records and the personnel information for executing the modification records is ensured. The method in the embodiment of the application comprises the following steps: receiving a document source tracing request; according to the tracing request, a modification record description block and a first authentication identification of the document are inquired from the local data table, the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identification code, and the first authentication identification is an identification code of the modification record description block in the block chain system; calculating a hash abstract of the modification record description block; sending a modification record authentication request to the blockchain system according to the hash abstract of the modification record description block and the first authentication identifier; and receiving the modification record authentication result sent by the block chain system.

Description

Document authentication and tracing method and device
Technical Field
The present application relates to the field of computer data processing technologies, and in particular, to a document authentication and traceability method and apparatus.
Background
Design documents (drawings for product design) are taken as creative efforts of workers, creative achievements of the designers are reflected, in the prior art, when tracing the source of the design documents, the design sources are generally traced through user associated data when a user uploads the design documents, and thus associated information stored in a database can be tampered actually.
Further, the design tracking of the materials and the BOM (design list) derived from the drawings is derived from the correlation data, and the correlation is very fragile and easy to be tampered.
Disclosure of Invention
The embodiment of the application provides a document authentication and tracing method and device, which trace a document modification record and personnel information for executing the modification record through a block chain, so that the reliability of the document modification record and the personnel information for executing the modification record is ensured.
A first aspect of the embodiments of the present application provides a document authentication and tracing method, including:
receiving a document source tracing request;
according to the source tracing request, inquiring a modification record description block and a first authentication identification of the document from the local data table, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identification code, and the first authentication identification is an identification code of the modification record description block in the block chain system;
calculating a hash digest of the modified record description block;
sending a modification record authentication request to the block chain system according to the hash abstract of the modification record description block and the first authentication identifier;
and receiving a modification record authentication result sent by the block chain system.
Preferably, before querying the modification record description block and the first authentication identifier of the document from the local data table according to the source tracing request, the method further includes:
according to the source tracing request, inquiring the user description block and the second authentication identification from a local data table, wherein a user login name and user identity information associated with the user login name are recorded in the user description block, and the second authentication identification is an identification code of the user description block in a block chain system;
calculating a hash digest of the user description block;
sending a user information authentication request to a block chain system according to the hash abstract of the user description block and the second authentication identifier;
receiving a user information authentication result sent by the block chain system;
and if the user information authentication result is credible, triggering the step of inquiring the modification record description block and the first authentication identification of the document from the local data table according to the source tracing request.
Preferably, the method further comprises:
and if the modified record authentication result is credible, prompting that the modified record of the document is credible.
Preferably, before the receiving the request for tracing the source of the document, the method further includes:
acquiring the user login name and user identity information associated with the user login name;
constructing a user description block according to the user login name and the user identity information;
writing the user description block into the local data table;
calculating a hash digest of the user description block;
writing a hash digest of the user description block into the blockchain system;
receiving the second authentication identifier sent by the block chain system;
and writing the second authentication identification into the local data table.
Preferably, the method further comprises:
acquiring design parameters and modification records of the document;
acquiring a hash abstract of the user description block and the second authentication identifier;
constructing a modified record description block according to the design parameters, the modified record, the hash abstract of the user description block and the second authentication identifier;
writing the modified record description block into the local data table;
calculating a hash digest of the modified record description block;
writing the hash digest of the modified record description block into the blockchain system;
receiving the first authentication identification sent by the block chain system;
and writing the first authentication identification into the local data table.
Preferably, the receiving a document source tracing request includes:
receiving the document source tracing request sent by a user through a document;
or the like, or, alternatively,
and receiving the document source tracing request sent by a user through the material or bill of material associated with the document.
Preferably, the receiving the document source tracing request initiated by the user through the document includes:
receiving a document source tracing request initiated by a user through a tracing control in a program where a document is located;
the receiving the document source tracing request initiated by the user through the material or the bill of materials associated with the document comprises:
and receiving the document source tracing request initiated by a user through a tracing control in a program in which the material or bill of material associated with the document is located.
A second aspect of the embodiments of the present application provides an authentication and source tracing apparatus for a document, including:
the receiving unit is used for receiving a source tracing request of a document;
the query unit is used for querying a modification record description block and a first authentication identifier of the document from the local data table according to the source tracing request, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identifier, and the first authentication identifier is an identifier of the modification record description block in the block chain system;
a calculation unit, configured to calculate a hash digest of the modified record description block;
a sending unit, configured to send a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier;
and the receiving unit is used for receiving the modification record authentication result sent by the block chain system.
Preferably, the querying unit is further configured to query, according to the source tracing request, the user description block and the second authentication identifier from a local data table before querying, according to the source tracing request, the modification record description block and the first authentication identifier of the document from the local data table, where the user description block records a user login name and user identity information associated with the user login name, and the second authentication identifier is an identifier code of the user description block in a block chain system;
the computing unit is further configured to compute a hash digest of the user description block;
the sending unit is further configured to send a user information authentication request to the blockchain system according to the hash digest of the user description block and the second authentication identifier;
the receiving unit is further configured to receive a user information authentication result sent by the blockchain system, and trigger a step of querying, according to the source tracing request, a modification record description block and a first authentication identifier of the document from the local data table when the user information authentication result is trusted.
Preferably, the apparatus further comprises:
and the prompting unit is used for prompting the credibility of the modification record of the document when the verification result of the modification record is credible.
Preferably, the apparatus further comprises:
the obtaining unit is used for obtaining the user login name and user identity information related to the user login name before the source tracing request of the received document is received;
the construction unit is used for constructing a user description block according to the user login name and the user identity information;
a writing unit, configured to store the user description block in the local data table;
preferably, the calculating unit is further configured to calculate a hash digest of the user description block;
the writing unit is further configured to write the hash digest of the user description block into the blockchain system;
the receiving unit is further configured to receive the second authentication identifier sent by the blockchain system;
the writing unit is further configured to write the second authentication identifier into the local data table.
Preferably, the first and second liquid crystal materials are,
the acquisition unit is also used for acquiring the design parameters and the modification records of the document;
the obtaining unit is further configured to obtain a hash digest of the user description block and the second authentication identifier;
the construction unit is further used for constructing the modified record description block according to the design parameters, the modified record, the hash abstract of the user description block and the second authentication identifier;
the writing unit is further configured to store the modified record description block into the local data table;
the calculation unit is further configured to calculate a hash digest of the modified record description block;
the writing unit is further configured to write the hash digest of the modified record description block into the blockchain system;
the receiving unit is further configured to receive the first authentication identifier sent by the blockchain system;
the writing unit is further configured to write the first authentication identifier into the local data table.
Preferably, the receiving unit is specifically configured to:
receiving the document source tracing request sent by a user through a document;
or the like, or, alternatively,
and receiving the document source tracing request sent by a user through the material or bill of material associated with the document.
Preferably, the receiving unit is specifically configured to:
receiving a document source tracing request initiated by a user through a tracing control in a program where a document is located;
and receiving the document source tracing request initiated by a user through a tracing control in a program in which the material or bill of material associated with the document is located.
A third aspect of the embodiments of the present application provides a computer apparatus, including a memory and a processor, where the processor is configured to implement the method for authenticating and tracing a document provided by the first aspect of the embodiments of the present application when executing a computer program stored in the memory.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is used, when executed by a processor, to implement the method for authenticating and tracing a document provided in the first aspect of the embodiments of the present application.
According to the technical scheme, the embodiment of the application has the following advantages:
in the embodiment of the application, a source tracing request of a document is received; according to the source tracing request, inquiring a modification record description block and a first authentication identification of the document from the local data table, wherein the modification record description block records a modification record aiming at the document, and the first authentication identification is an identification code of the modification record description block in the block chain system; calculating a hash digest of the modified record description block; sending a modification record authentication request to the block chain system according to the hash abstract of the modification record description block and the first authentication identifier; and receiving a modification record authentication result sent by the block chain system. In the embodiment of the application, the modification record of the document and the personnel information for executing the modification record are traced back from the blockchain system through the first authentication identifier, so that the reliability of the personnel information for modifying the document and executing the modification record is ensured through the blockchain system.
Drawings
FIG. 1 is a schematic diagram of an embodiment of an authentication and traceability method of a document in an embodiment of the present application;
FIG. 2 is a schematic diagram of another embodiment of an authentication and traceability method of a document in an embodiment of the present application;
FIG. 3 is a schematic diagram of another embodiment of an authentication and traceability method of a document in an embodiment of the present application;
FIG. 4 is a schematic diagram of another embodiment of an authentication and traceability method of a document in an embodiment of the present application
Fig. 5 is a schematic diagram of an embodiment of an authentication and traceability device of a document in an embodiment of the present application.
Detailed Description
The embodiment of the application provides a document authentication and tracing method and device, which trace a document modification record and personnel information for executing the modification record through a block chain, so that the reliability of the document modification record and the personnel information for executing the modification record is ensured.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of understanding, the following describes in detail an authentication and traceability method of a document in an embodiment of the present application, and with reference to fig. 1, an embodiment of the authentication and traceability method of the document in the embodiment of the present application includes:
101. receiving a document source tracing request;
when a tracing request needs to be executed on a document, the tracing request may be initiated through the current document, and specific ways of initiating the tracing request include, but are not limited to, initiating through a tracing control in document design software or initiating through a tracing control in an authentication tracing device of the document.
In addition, the traceability request in the application can be initiated through a material or a bill of materials associated with the document except for initiating the request for the document, and if the current design document is a mobile phone shell, materials related to the mobile phone shell, such as shell materials, pattern materials on the shell, and the like, can also initiate the traceability request through a traceability control in the program where the material or the bill of materials is located.
It should be noted that the material and the bill of material herein are generally materials associated with the design object in the design document, wherein the association relationship includes direct association or indirect association.
102. According to the source tracing request, inquiring a modification record description block and a first authentication identification of the document from the local data table, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identification code, and the first authentication identification is an identification code of the modification record description block in the block chain system;
after a tracing request of a document is received, a modification record description block and a first authentication identifier of the document are inquired from a local data table so as to send an authentication request to a block chain system and verify the reliability of the document modification record and the personnel information for executing the modification record.
Specifically, the modification record block of the document is used as a data set for describing document information and modification information, wherein design parameters and modification records of the document, a user description block and a second authentication identification code are recorded, the first authentication identification is address identification information of the document modification record description block in a block chain system, and is used for quickly searching the modification record description block in the block chain, and if the document modification record description block is stored in a fifth data block in the block chain system, the corresponding first authentication identification is the fifth data block. It should be noted that the above example is only an illustrative illustration of the first authentication identifier, and in practical cases, the first authentication identifier may further include a data block name or a code of the modification record description block in the blockchain system, and is not limited herein.
The specific contents of the user description block and the second authentication identification code will be described in detail in the following embodiments, which are not described again here.
103. Calculating a hash digest of the modified record description block;
in order to save the storage space of the data blocks in the blockchain, the hash digest of the modification record description block can be calculated, only the hash digest is written into the blockchain system, and meanwhile, the reliability of the modification record description block is also ensured due to the non-tamper property of the hash digest.
104. Sending a modification record authentication request to the block chain system according to the hash abstract of the modification record description block and the first authentication identifier;
and after the hash abstract and the first authentication identification of the modified record description block are obtained, sending a modified record authentication request to the block chain system according to the modified record description block and the first authentication identification.
After the block chain system receives the authentication request, the hash abstract of the modification record description block written before is taken out from the block chain system according to the first authentication identifier, the hash abstract of the modification record description block in the authentication request is compared with the hash abstract of the modification record description block written before, if the two hash abstracts are the same, the modification record is determined to be credible, otherwise, the modification record is determined to be untrustworthy.
105. And receiving a modification record authentication result sent by the block chain system.
And after sending an authentication request to the blockchain system, the blockchain system checks the authenticity of the modification record description block according to the authentication request and sends a modification record authentication result to the authentication traceability device of the document according to the check result.
In the embodiment of the application, a source tracing request of a document is received; according to the source tracing request, inquiring a modification record description block and a first authentication identification of the document from the local data table, wherein the modification record description block records a modification record aiming at the document, and the first authentication identification is an identification code of the modification record description block in the block chain system; calculating a hash digest of the modified record description block; sending a modification record authentication request to the block chain system according to the hash abstract of the modification record description block and the first authentication identifier; and receiving a modification record authentication result sent by the block chain system. In the embodiment of the application, the modification record of the document and the personnel information for executing the modification record are traced back from the blockchain system through the first authentication identifier, so that the reliability of the personnel information for modifying the document and executing the modification record is ensured through the blockchain system.
Based on the embodiment described in fig. 1, after receiving a document tracing request, before querying the modification record description block and the first authentication identifier of the document from the local data table, the following steps may also be performed, and with reference to fig. 2 in particular, another embodiment of the document authentication tracing method in the embodiment of the present application includes:
201. according to the source tracing request, inquiring the user description block and the second authentication identification from a local data table, wherein a user login name and user identity information associated with the user login name are recorded in the user description block, and the second authentication identification is an identification code of the user description block in a block chain system;
after receiving a tracing request of a document, an authentication tracing device of the document firstly queries a user description block and a second authentication identifier from a local data table according to the tracing request, wherein a user login name and user identity information associated with the user login name are recorded in the user description block, the second authentication identifier is a storage address identifier of the user description block in a block chain system, and description of the second authentication identifier can refer to the description of the first authentication identifier in the above embodiment, which is not described herein again.
Because the user description block records the user login name and the user identity information associated with the user login name, before checking the modification record description block, the reliability of the user identity information is generally ensured, and if the reliability of the user information does not pass, the user information in the modification record is unreliable, so before checking the reliability of the user modification record description block, the reliability of the user identity information can be checked through the user description block.
202. Calculating a hash digest of the user description block;
after the user description block is obtained, a hash digest of the user description block is further computed for sending an authentication request to the blockchain system.
203. Sending a user information authentication request to a block chain system according to the hash abstract of the user description block and the second authentication identifier;
and after the hash abstract of the user description block is obtained, sending a user information authentication request to the block chain system according to the hash abstract of the user description block and the second authentication identifier.
And after receiving the authentication request, the blockchain system takes out the hash abstract of the user description block written before from the blockchain system according to the second authentication identifier, compares the hash abstract of the user description block in the authentication request with the hash abstract of the user description block written before, if the two hash abstracts are the same, determines that the user description block is credible, namely determines that the user login name and the reliability of the user identity information associated with the user login name are reliable, and otherwise determines that the user description block is not credible.
204. Receiving a user information authentication result sent by the block chain system;
after sending an authentication request to the blockchain system, the blockchain system checks the authenticity of the user description block according to the authentication request, and sends an authentication result of the user description block, namely an authentication result of the user information, to the authentication tracing device of the document according to the checking result.
205. And if the user information authentication result is credible, triggering the step of inquiring the modification record description block and the first authentication identification of the document from the local data table according to the source tracing request.
And if the user information authentication result is credible, triggering the step of inquiring the modification record description block and the first authentication identifier of the document from the local data table according to the tracing request, and otherwise, ending the process.
In the embodiment of the application, before the modified record description block is authenticated, the user identity information is checked through the user description block, the operation of authenticating the modified record description block is triggered when the user information authentication result is credible, and the flow is directly ended when the user information authentication result is not credible, so that on one hand, the convenience of authenticating the modified record description block is improved, and on the other hand, the reliability of the verification result of the modified record description block is improved again.
Based on the embodiments described in fig. 1 and fig. 2, when the result of the verification of the modification record is trusted, the document authentication traceability device may further send a prompt message, where the prompt message is used to indicate that the modification record of the document is trusted, and particularly in an actual application scenario, the prompt message may be displayed in a graphic form, for example, all the modification records are marked green, or may be displayed in a text form, where no specific limitation is made here.
Based on the embodiments described in fig. 1 and fig. 2, before receiving a document source tracing request, a user description block needs to be written into a local data table and a block chain system, and this embodiment specifically describes a process of writing the user description block into the local data table, and referring to fig. 3 specifically, another embodiment of the document authentication source tracing method in the embodiment of the present application includes:
301. acquiring the user login name and user identity information associated with the user login name;
before the user description block is acquired from the local data table, the user description block needs to be constructed and written into the local data table.
Specifically, the description block includes a user login name and user identity information associated with the user login name, where the user identity information includes, but is not limited to, a user identification card, a user mailbox, a user name, and the like.
302. Constructing a user description block according to the user login name and the user identity information;
after the user login name and the user identity information are obtained, a user description block is constructed according to the user login name and the user identity information, wherein the user description block can be understood as data record information comprising the user login name and the user identity information related to the user login name.
303. Storing the user description block into the local data table;
in order to facilitate subsequent retrieval of the user description block from the local data table, the user description block needs to be stored in the local data table, so as to facilitate execution of step 201 in the embodiment of fig. 2.
304. Calculating a hash digest of the user description block;
in the conventional blockchain system, generally, when writing data content, in order to save data space, a hash digest of the data content can be written, and at the same time, because of the non-tamper property of the hash digest and the blockchain system, the reliability of the data content in the blockchain is also ensured.
305. Writing a hash digest of the user description block into the blockchain system;
after the hash digest of the user description block is obtained, the hash digest of the user description block is further written into the blockchain system for performing the steps of the embodiment described in fig. 2.
306. Receiving the second authentication identifier sent by the block chain system;
in order to facilitate fast acquisition of the user description block from the blockchain system, when the user description block is written into the blockchain system, a second authentication identifier sent by the blockchain system may be further received, where the second authentication identifier is address identification information stored in the blockchain system by the user description block.
307. And writing the second authentication identification into the local data table.
In order to facilitate the query of the user description block from the block chain, the second authentication identifier, i.e. the storage address identifier of the user description block, needs to be written into the local data table at the same time for executing the embodiment described in fig. 2.
The embodiment of the application describes the generation process of the user description block and the second authentication identifier in the local data table in detail, and the implementability of the embodiment of the application is improved.
Based on the embodiment described in fig. 3, after writing the hash digest of the user description block into the blockchain system, it is further necessary to write the modification record description block into the local data table and the blockchain system, and referring to fig. 4 in particular, another embodiment of the authentication tracing method in the document in the embodiment of the present application includes:
401. acquiring design parameters and modification records of the document;
after the user description block is written into the blockchain system, the modification record description block needs to be further written into the blockchain system, wherein before the modification record description block is constructed, the design parameters and the modification records of the document need to be acquired.
Specifically, when the design parameters of the document are obtained, the design parameters and the modification record may be obtained by calling an API interface of the design software, where the modification record records a specific time and a specific location for modifying a certain design parameter of the document from an original first value to a subsequent second value, and executing the modification. It should be noted that, in addition to the above parameters, other parameters may be added to the modification record according to the actual application scenario to reflect the modification record in more detail, and the specific content in the modification record is not limited herein.
402. Acquiring a hash abstract of the user description block and the second authentication identifier;
when the modified record description block is constructed, in addition to the design parameters and the modified record of the document, the hash digest and the second authentication identifier of the user description block need to be obtained, where the description of the hash digest and the second authentication identifier of the user description block is similar to that described in the embodiment of fig. 2, and is not repeated here.
403. Constructing a modified record description block according to the design parameters, the modified record, the hash abstract of the user description block and the second authentication identifier;
specifically, a modification record description block is constructed according to the design parameters of the document, the modification record, the hash abstract of the user description block and the second authentication identifier, wherein the modification record description block records the modification record of the document and the personnel information for executing the modification record.
404. Storing the modified record description block into the local data table;
after obtaining the modified record description block, in order to conveniently trace the source of the modified record description block at a later stage, the modified record description block needs to be stored in a local data table for correspondingly executing the steps described in the embodiment of fig. 1.
405. Calculating a hash digest of the modified record description block;
in the conventional blockchain system, generally, when writing data content, in order to save data space, a hash digest of the data content can be written, and at the same time, because of the non-tamper property of the hash digest and the blockchain system, the reliability of the data content in the blockchain is also ensured.
Therefore, before writing the modified record description block into the blockchain system, the hash digest of the modified record description block needs to be calculated.
406. Writing the hash digest of the modified record description block into the blockchain system;
after the hash digest of the modified record description block is obtained, the hash digest of the modified record description block is further written into the blockchain system for performing the steps of the embodiment described in fig. 1.
407. Receiving the first authentication identification code sent by the block chain system;
in order to facilitate fast acquisition of the modified record description block from the blockchain system, in writing the modified record description block into the blockchain system, a first authentication identifier sent by the blockchain system may be further received, where the first authentication identifier is address identification information stored in the blockchain system by the modified record description block.
408. And writing the first authentication identification code into the local data table.
In order to facilitate the query of the modified record description block from the block chain, the first authentication identifier, i.e. the storage address identifier of the modified record description block, needs to be written into the local data table at the same time for executing the embodiment described in fig. 1.
The embodiment of the application describes the generation process of the modification record description block and the first authentication identifier in the local data table in detail, and the implementability of the embodiment of the application is improved.
The above describes the authentication tracing method of the document in the embodiment of the present application, and the following describes the authentication tracing apparatus of the document in the present application, referring to fig. 5, an embodiment of the authentication tracing apparatus of the document in the embodiment of the present application includes:
a receiving unit 501, configured to receive a document source tracing request;
a query unit 502, configured to query, according to the source tracing request, a modification record description block and a first authentication identifier of the document from the local data table, where the modification record description block records design parameters and a modification record of the document, a user description block, and a second authentication identifier, and the first authentication identifier is an identifier of the modification record description block in the block chain system;
a calculating unit 503, configured to calculate a hash digest of the modified record description block;
a sending unit 504, configured to send a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier;
a receiving unit 501, configured to receive a modification record authentication result sent by the blockchain system;
preferably, the querying unit 502 is further configured to query, according to the traceability request, the user description block and the second authentication identifier from the local data table before querying, according to the traceability request, the modification record description block and the first authentication identifier of the document from the local data table, where the user description block records a user login name and user identity information associated with the user login name, and the second authentication identifier is an identifier code of the user description block in the block chain system;
the calculating unit 503 is further configured to calculate a hash digest of the user description block;
the sending unit 504 is further configured to send a user information authentication request to the blockchain system according to the hash digest of the user description block and the second authentication identifier;
the receiving unit 501 is further configured to receive a user information authentication result sent by the blockchain system, and trigger a step of querying, according to the source tracing request, a modification record description block and a first authentication identifier of the document from the local data table when the user information authentication result is trusted.
Preferably, the apparatus further comprises:
and a prompting unit 505, configured to prompt that the modification record of the document is authentic when the modification record authentication result is authentic.
Preferably, the apparatus further comprises:
an obtaining unit 506, configured to obtain the user login name and user identity information associated with the user login name before the source tracing request of the received document is received;
a constructing unit 507, configured to construct a user description block according to the user login name and the user identity information;
a writing unit 508, configured to store the user description block in the local data table;
preferably, the calculating unit 503 is further configured to calculate a hash digest of the user description block;
the writing unit 508 is further configured to write the hash digest of the user description block into the blockchain system;
the receiving unit 501 is further configured to receive the second authentication identifier sent by the blockchain system;
the writing unit 508 is further configured to write the second authentication identifier into the local data table.
Preferably, the first and second liquid crystal materials are,
the obtaining unit 506 is further configured to obtain design parameters and modification records of the document;
the obtaining unit 506 is further configured to obtain a hash digest of the user description block and the second authentication identifier;
the constructing unit 507 is further configured to construct the modified record description block according to the design parameters and the modified record, the hash digest of the user description block, and the second authentication identifier;
the writing unit 508 is further configured to store the modified record description block into the local data table;
the calculating unit 503 is further configured to calculate a hash digest of the modified record description block;
the writing unit 508 is further configured to write the hash digest of the modified record description block into the blockchain system;
the receiving unit 501 is further configured to receive the first authentication identifier sent by the blockchain system;
the writing unit 508 is further configured to write the first authentication identifier into the local data table.
Preferably, the receiving unit 501 is specifically configured to:
receiving the document source tracing request sent by a user through a document;
or the like, or, alternatively,
and receiving the document source tracing request sent by a user through the material or bill of material associated with the document.
Preferably, the receiving unit 501 is specifically configured to:
receiving a document source tracing request initiated by a user through a tracing control in a program where a document is located;
and receiving the document source tracing request initiated by a user through a tracing control in a program in which the material or bill of material associated with the document is located.
It should be noted that the functions of the units in this embodiment are similar to those described in the embodiments of fig. 1 to 4, and are not described again here.
In the embodiment of the present application, a source tracing request of a document is received by a receiving unit 501; querying, by a querying unit 502, a modification record description block of the document, in which a modification record for the document is recorded, and a first authentication identifier, which is an identification code of the modification record description block in the blockchain system, from the local data table according to the tracing request; calculating, by the calculating unit 503, a hash digest of the modified record description block; sending a modified record authentication request to the blockchain system by a sending unit 504 according to the hash digest of the modified record description block and the first authentication identifier; the modification record authentication result sent by the blockchain system is received by the receiving unit 501. In the embodiment of the application, the modification record of the document and the personnel information for executing the modification record are traced back from the blockchain system through the first authentication identifier, so that the reliability of the personnel information for modifying the document and executing the modification record is ensured through the blockchain system.
The authentication tracing apparatus in the embodiment of the present application is described above from the perspective of the modular functional entity, and the computer apparatus in the embodiment of the present application is described below from the perspective of hardware processing:
the computer device is used for realizing the functions of the document authentication and source tracing device, and one embodiment of the computer device in the embodiment of the application comprises the following steps:
a processor and a memory;
the memory is used for storing the computer program, and the processor is used for realizing the following steps when executing the computer program stored in the memory:
receiving a document source tracing request;
according to the source tracing request, inquiring a modification record description block and a first authentication identification of the document from the local data table, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identification code, and the first authentication identification is an identification code of the modification record description block in the block chain system;
calculating a hash digest of the modified record description block;
sending a modification record authentication request to the block chain system according to the hash abstract of the modification record description block and the first authentication identifier;
and receiving a modification record authentication result sent by the block chain system.
In some embodiments of the present application, the processor may be further configured to:
according to the source tracing request, inquiring the user description block and the second authentication identification from a local data table, wherein a user login name and user identity information associated with the user login name are recorded in the user description block, and the second authentication identification is an identification code of the user description block in a block chain system;
calculating a hash digest of the user description block;
sending a user information authentication request to a block chain system according to the hash abstract of the user description block and the second authentication identifier;
receiving a user information authentication result sent by the block chain system;
and if the user information authentication result is credible, triggering the step of inquiring the modification record description block and the first authentication identification of the document from the local data table according to the source tracing request.
In some embodiments of the present application, the processor may be further configured to:
and if the modified record authentication result is credible, prompting that the modified record of the document is credible.
In some embodiments of the present application, the processor may be further configured to:
acquiring the user login name and user identity information associated with the user login name;
constructing a user description block according to the user login name and the user identity information;
writing the user description block into the local data table;
calculating a hash digest of the user description block;
writing a hash digest of the user description block into the blockchain system;
receiving the second authentication identifier sent by the block chain system;
and writing the second authentication identification into the local data table.
In some embodiments of the present application, the processor may be further configured to:
acquiring design parameters and modification records of the document;
acquiring a hash abstract of the user description block and the second authentication identifier;
constructing a modified record description block according to the design parameters, the modified record, the hash abstract of the user description block and the second authentication identifier;
writing the modified record description block into the local data table;
calculating a hash digest of the modified record description block;
writing the hash digest of the modified record description block into the blockchain system;
receiving the first authentication identification sent by the block chain system;
and writing the first authentication identification into the local data table.
In some embodiments of the present application, the processor may be further configured to:
receiving the document source tracing request sent by a user through a document;
or the like, or, alternatively,
and receiving the document source tracing request sent by a user through the material or bill of material associated with the document.
In some embodiments of the present application, the processor may be further configured to:
receiving a document source tracing request initiated by a user through a tracing control in a program where a document is located;
and receiving the document source tracing request initiated by a user through a tracing control in a program in which the material or bill of material associated with the document is located.
It is to be understood that, when the processor in the computer apparatus described above executes the computer program, the functions of each unit in the corresponding apparatus embodiments may also be implemented, and are not described herein again. Illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory and executed by the processor to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, and the instruction segments are used for describing the execution process of the computer program in the document authentication and source tracing device. For example, the computer program may be divided into units in the authentication traceability device of the document, and each unit may realize specific functions as described in the authentication traceability device of the corresponding document.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing equipment. The computer device may include, but is not limited to, a processor, a memory. It will be appreciated by those skilled in the art that the processor, memory are merely examples of a computer apparatus and are not meant to be limiting, and that more or fewer components may be included, or certain components may be combined, or different components may be included, for example, the computer apparatus may also include input output devices, network access devices, buses, etc.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable gate array (FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like which is the control center for the computer device and which connects the various parts of the overall computer device using various interfaces and lines.
The memory may be used to store the computer programs and/or modules, and the processor may implement various functions of the computer device by running or executing the computer programs and/or modules stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the terminal, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The present application further provides a computer-readable storage medium for implementing the functions of the authentication traceability device of a document, wherein a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the processor can be configured to perform the following steps:
receiving a document source tracing request;
according to the source tracing request, inquiring a modification record description block and a first authentication identification of the document from the local data table, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identification code, and the first authentication identification is an identification code of the modification record description block in the block chain system;
calculating a hash digest of the modified record description block;
sending a modification record authentication request to the block chain system according to the hash abstract of the modification record description block and the first authentication identifier;
and receiving a modification record authentication result sent by the block chain system.
In some embodiments of the present application, the computer program stored on the computer-readable storage medium, when executed by the processor, may be specifically configured to perform the following steps:
according to the source tracing request, inquiring the user description block and the second authentication identification from a local data table, wherein a user login name and user identity information associated with the user login name are recorded in the user description block, and the second authentication identification is an identification code of the user description block in a block chain system;
calculating a hash digest of the user description block;
sending a user information authentication request to a block chain system according to the hash abstract of the user description block and the second authentication identifier;
receiving a user information authentication result sent by the block chain system;
and if the user information authentication result is credible, triggering the step of inquiring the modification record description block and the first authentication identification of the document from the local data table according to the source tracing request.
In some embodiments of the present application, the computer program stored on the computer-readable storage medium, when executed by the processor, may be specifically configured to perform the following steps:
and if the modified record authentication result is credible, prompting that the modified record of the document is credible.
In some embodiments of the present application, the computer program stored on the computer-readable storage medium, when executed by the processor, may be specifically configured to perform the following steps:
acquiring the user login name and user identity information associated with the user login name;
constructing a user description block according to the user login name and the user identity information;
writing the user description block into the local data table;
calculating a hash digest of the user description block;
writing a hash digest of the user description block into the blockchain system;
receiving the second authentication identifier sent by the block chain system;
and writing the second authentication identification into the local data table.
In some embodiments of the present application, the computer program stored on the computer-readable storage medium, when executed by the processor, may be specifically configured to perform the following steps:
acquiring design parameters and modification records of the document;
acquiring a hash abstract of the user description block and the second authentication identifier;
constructing a modified record description block according to the design parameters, the modified record, the hash abstract of the user description block and the second authentication identifier;
writing the modified record description block into the local data table;
calculating a hash digest of the modified record description block;
writing the hash digest of the modified record description block into the blockchain system;
receiving the first authentication identification sent by the block chain system;
and writing the first authentication identification into the local data table.
In some embodiments of the present application, the computer program stored on the computer-readable storage medium, when executed by the processor, may be specifically configured to perform the following steps:
receiving the document source tracing request sent by a user through a document;
or the like, or, alternatively,
and receiving the document source tracing request sent by a user through the material or bill of material associated with the document.
In some embodiments of the present application, the computer program stored on the computer-readable storage medium, when executed by the processor, may be specifically configured to perform the following steps:
receiving a document source tracing request initiated by a user through a tracing control in a program where a document is located;
and receiving the document source tracing request initiated by a user through a tracing control in a program in which the material or bill of material associated with the document is located.
It will be appreciated that the integrated units, if implemented as software functional units and sold or used as a stand-alone product, may be stored in a corresponding one of the computer readable storage media. Based on such understanding, all or part of the flow of the method according to the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium and used by a processor to implement the steps of the above embodiments of the method. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. An authentication and source tracing method for a document, the method comprising:
receiving a document source tracing request;
according to the source tracing request, inquiring a modification record description block and a first authentication identification of the document from a local data table, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identification code, and the first authentication identification is an identification code of the modification record description block in the block chain system;
calculating a hash digest of the modified record description block;
sending a modification record authentication request to a block chain system according to the hash abstract of the modification record description block and the first authentication identifier;
and receiving a modification record authentication result sent by the block chain system.
2. The method according to claim 1, wherein before querying the local data table for the modified record description block and the first authentication identifier of the document according to the tracing request, the method further comprises:
according to the source tracing request, inquiring the user description block and the second authentication identification from the local data table, wherein a user login name and user identity information associated with the user login name are recorded in the user description block, and the second authentication identification is an identification code of the user description block in a block chain system;
calculating a hash digest of the user description block;
sending a user information authentication request to the block chain system according to the hash abstract of the user description block and the second authentication identifier;
receiving a user information authentication result sent by the block chain system;
and if the user information authentication result is credible, triggering the step of inquiring the modification record description block and the first authentication identification of the document from the local data table according to the source tracing request.
3. The method of claim 1, further comprising:
and if the modified record authentication result is credible, prompting that the modified record of the document is credible.
4. The method of claim 2, wherein prior to the receiving a request for document traceability, the method further comprises:
acquiring the user login name and user identity information associated with the user login name;
constructing a user description block according to the user login name and the user identity information;
writing the user description block into the local data table;
calculating a hash digest of the user description block;
writing a hash digest of the user description block into the blockchain system;
receiving the second authentication identifier sent by the block chain system;
and writing the second authentication identification into the local data table.
5. The method of claim 4, further comprising:
acquiring design parameters and modification records of the document;
acquiring a hash abstract of the user description block and the second authentication identifier;
constructing a modified record description block according to the design parameters, the modified record, the hash abstract of the user description block and the second authentication identifier;
writing the modified record description block into the local data table;
calculating a hash digest of the modified record description block;
writing the hash digest of the modified record description block into the blockchain system;
receiving the first authentication identification sent by the block chain system;
and writing the first authentication identification into the local data table.
6. The method according to any one of claims 1 to 5, wherein the receiving a request for tracing a document comprises:
receiving the document source tracing request initiated by a user through a document;
or the like, or, alternatively,
receiving the document source tracing request initiated by a user through the material or the bill of material associated with the document.
7. The method according to claim 6, wherein the receiving the document tracing request initiated by the user through the document comprises:
receiving a document source tracing request initiated by a user through a tracing control in a program where a document is located;
the receiving the document source tracing request initiated by the user through the material or the bill of materials associated with the document comprises:
and receiving the document source tracing request initiated by a user through a tracing control in a program in which the material or bill of material associated with the document is located.
8. An apparatus for authenticated traceability of a document, the apparatus comprising:
the receiving unit is used for receiving a source tracing request of a document;
the query unit is used for querying a modification record description block and a first authentication identifier of the document from a local data table according to the tracing request, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identifier, and the first authentication identifier is an identifier code of the modification record description block in the block chain system;
a calculation unit, configured to calculate a hash digest of the modified record description block;
a sending unit, configured to send a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier;
the receiving unit is further configured to receive a modification record authentication result sent by the blockchain system.
9. A computer arrangement comprising a memory and a processor, wherein the processor, when executing a computer program stored on the memory, is configured to carry out a method of authenticated traceability of a document according to any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, the computer program, when being executed by a processor, is configured to implement the method for authenticated tracing of a document according to any one of claims 1 to 7.
CN202011171478.2A 2020-10-28 2020-10-28 Document authentication tracing method and device Active CN112286881B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011171478.2A CN112286881B (en) 2020-10-28 2020-10-28 Document authentication tracing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011171478.2A CN112286881B (en) 2020-10-28 2020-10-28 Document authentication tracing method and device

Publications (2)

Publication Number Publication Date
CN112286881A true CN112286881A (en) 2021-01-29
CN112286881B CN112286881B (en) 2024-04-05

Family

ID=74372484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011171478.2A Active CN112286881B (en) 2020-10-28 2020-10-28 Document authentication tracing method and device

Country Status (1)

Country Link
CN (1) CN112286881B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115408590A (en) * 2022-10-31 2022-11-29 北京亿赛通科技发展有限责任公司 Document tracking and tracing method, device and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061838A (en) * 2019-04-28 2019-07-26 广州大学 A kind of the decentralization storage system and its realization, information retrieval method of DNS resource record
CN110263015A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
CN110597868A (en) * 2019-09-24 2019-12-20 腾讯科技(深圳)有限公司 Information query method, device, terminal and storage medium based on block chain
CN110929229A (en) * 2019-11-26 2020-03-27 中国石油大学(华东) Block chain-based office document credibility verification method and system
CN111144133A (en) * 2019-12-23 2020-05-12 传神语联网网络科技股份有限公司 Translation document keyword modification traceability system and method based on block chain
CN111177172A (en) * 2019-12-31 2020-05-19 江苏荣泽信息科技股份有限公司 Electronic deposit certificate system based on block chain
CN111538786A (en) * 2020-04-24 2020-08-14 上海简苏网络科技有限公司 Block chain data desensitization and tracing storage method and device
CN111611554A (en) * 2020-04-21 2020-09-01 哈尔滨工业大学 Drawing file circulation and tracing system and method based on alliance block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061838A (en) * 2019-04-28 2019-07-26 广州大学 A kind of the decentralization storage system and its realization, information retrieval method of DNS resource record
CN110263015A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
CN110597868A (en) * 2019-09-24 2019-12-20 腾讯科技(深圳)有限公司 Information query method, device, terminal and storage medium based on block chain
CN110929229A (en) * 2019-11-26 2020-03-27 中国石油大学(华东) Block chain-based office document credibility verification method and system
CN111144133A (en) * 2019-12-23 2020-05-12 传神语联网网络科技股份有限公司 Translation document keyword modification traceability system and method based on block chain
CN111177172A (en) * 2019-12-31 2020-05-19 江苏荣泽信息科技股份有限公司 Electronic deposit certificate system based on block chain
CN111611554A (en) * 2020-04-21 2020-09-01 哈尔滨工业大学 Drawing file circulation and tracing system and method based on alliance block chain
CN111538786A (en) * 2020-04-24 2020-08-14 上海简苏网络科技有限公司 Block chain data desensitization and tracing storage method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115408590A (en) * 2022-10-31 2022-11-29 北京亿赛通科技发展有限责任公司 Document tracking and tracing method, device and system

Also Published As

Publication number Publication date
CN112286881B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
US11323260B2 (en) Method and device for identity verification
CN107396360B (en) Block verification method and device
EP3720045B1 (en) Blockchain-based data verification method and apparatus
CN108446407B (en) Database auditing method and device based on block chain
CN109815657B (en) Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment
CN110188096B (en) Index creating method, device and equipment for data record
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
US10602202B1 (en) System and techniques for digital data lineage verification
CN110162662B (en) Verification method, device and equipment for data records in block chain type account book
KR101948721B1 (en) Method and apparatus for examining forgery of file by using file hash value
CN112000730B (en) Tracing information writing and tracing information verification method and system based on block chain
CN109145651B (en) Data processing method and device
CN111628863B (en) Data signature method and device, electronic equipment and storage medium
CN110347678B (en) Financial data storage method, system, device and equipment
CN111429250A (en) Data management method and device in escort scene
CN112286881B (en) Document authentication tracing method and device
CN112363997B (en) Data version management method, device and storage medium
CN114266680A (en) Block chain-based electronic contract signing method, device and system
CN116993523A (en) Configurable account checking method, device, equipment and storage medium
CN110059081A (en) Data output method, device and the computer equipment shown based on data
CN113949632B (en) Dynamic node configuration method and device for block chain
CN112507014B (en) Data storage method, device and system based on credible account book database
CN111459899B (en) Log sharing method and device and terminal equipment
CN113806335A (en) Data migration method and device applied to block chain
CN113094732A (en) Certificate storage data verification method, verification device, certificate storage method and certificate storage device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant