CN114095220A - Telephone communication verification method, device, equipment and storage medium - Google Patents

Telephone communication verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN114095220A
CN114095220A CN202111322066.9A CN202111322066A CN114095220A CN 114095220 A CN114095220 A CN 114095220A CN 202111322066 A CN202111322066 A CN 202111322066A CN 114095220 A CN114095220 A CN 114095220A
Authority
CN
China
Prior art keywords
communication
verification
token
information
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111322066.9A
Other languages
Chinese (zh)
Inventor
张伟春
邱振涛
李子阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weway Shenzhen Network Technology Co ltd
Original Assignee
Weway Shenzhen Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weway Shenzhen Network Technology Co ltd filed Critical Weway Shenzhen Network Technology Co ltd
Priority to CN202111322066.9A priority Critical patent/CN114095220A/en
Publication of CN114095220A publication Critical patent/CN114095220A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to the technical field of safety, and discloses a telephone communication verification method, which comprises the following steps: when a communication request is received, a token retrieval index of the receiving end is constructed according to communication information of telephone communication, a communication token of the sending end of the communication information is searched from a pre-constructed token server by using the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container, a target verification certificate in the verification container is obtained, and the identity of the sending end is verified by using the searched communication token and the target verification certificate, so that a telephone communication verification result is obtained. The invention also provides a telephone communication verification device, electronic equipment and a computer readable storage medium. The invention can solve the problem that the telephone communication can not be authenticated.

Description

Telephone communication verification method, device, equipment and storage medium
Technical Field
The present invention relates to the field of security technologies, and in particular, to a method and an apparatus for verifying telephone communication, an electronic device, and a computer-readable storage medium.
Background
Currently, fraud calls and nuisance calls are increasing due to the fact that a large amount of user privacy information is leaked out intentionally or unintentionally. To avoid supervision, some individuals or organizations illegally falsely call others or other organizations with their telephone numbers, engage in fraud, or play advertisements. More and more people are not very much, and the incoming call with unknown number is directly refused. This situation results in many units/organizations having customer service calls that are not accessible, which severely affects the units/organizations' normal operations. Therefore, a need exists for a method of authenticating telephone communications.
Disclosure of Invention
The invention provides a telephone communication verification method, a telephone communication verification device, equipment and a storage medium, and mainly aims to solve the problem that identity verification cannot be performed in telephone communication.
In order to achieve the above object, the present invention provides a method for verifying telephone communication applied to a receiving end, comprising:
when a communication request is received, a token retrieval index of the receiving end is constructed according to communication information of telephone communication, and a communication token of the sending end of the communication information is searched from a pre-constructed token server by using the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container;
acquiring a target authentication certificate in the authentication container;
and carrying out identity authentication on the sending end by using the searched communication token and the target authentication certificate to obtain a telephone communication authentication result.
Optionally, the performing identity authentication on the sending end by using the searched communication token and the target authentication certificate to obtain a phone communication authentication result includes:
decrypting the encrypted information in the searched communication token by using the verification container, and acquiring a verification certificate corresponding to the decrypted certificate ID according to the decrypted certificate ID;
judging whether the certificate of verification corresponding to the decrypted certificate ID is consistent with the target certificate of verification;
if the verification certificate corresponding to the decrypted certificate ID is inconsistent with the target verification certificate, determining that the telephone communication verification result is that the sending end of the telephone communication fails to verify;
and if the verification certificate corresponding to the decrypted certificate ID is consistent with the target verification certificate, determining that the telephone communication verification result is that the transmitting end of the telephone communication passes the verification.
Optionally, after determining that the result of the verification of the telephone communication is that the sender of the telephone communication is verified, the method further includes:
carrying out signature verification processing on the signature adding information in the searched communication token by using the public key corresponding to the target verification certificate to obtain signature verification information;
and extracting token information in the communication token, and assembling sending end identity information based on the communication information, the token information, the verification certificate passing the verification and the verification information.
In order to achieve the above object, the present invention provides a method for verifying telephone communication applied to a transmitting end, comprising:
when a communication request is sent to the receiving end, acquiring a verification container according to communication information of telephone communication;
generating a communication token for a sender of the telephone communication based on the authentication credentials in the authentication container;
and caching the communication token to a pre-constructed token server so that a receiving end of the telephone communication acquires the communication token from the token server to carry out telephone communication verification.
Optionally, the generating a communication token of the sender of the telephone communication based on the authentication certificate in the authentication container includes:
the communication information is signed by using the verification container to obtain signed information;
carrying out hash processing on the communication information by using the verification container to obtain hash information;
encrypting the verification certificate by using the verification container to obtain encrypted information;
and acquiring the information of the sending end, and splicing the information of the sending end, the tagging information, the hash information and the encryption information to obtain a communication token of the sending end.
Optionally, the processing, by using the verification container, of signing the communication information to obtain signed information includes:
acquiring the sending time of a sending end of the telephone communication, and constructing retrieval time based on the sending time;
extracting a sending end identification, a receiving end identification and a calling field in the communication information, splicing the sending end identification, the receiving end identification, the retrieval time and the calling field to obtain first token splicing information, and performing signature adding processing on the first token splicing information by using a signature algorithm in the verification container to obtain the signature adding information.
Optionally, the performing hash processing on the communication information by using the verification container to obtain hash information includes:
splicing the sending end identification, the receiving end identification and the retrieval time to obtain second token splicing information, and carrying out hash processing on the second token splicing information by utilizing a hash algorithm in the verification container to obtain an initial hash value;
and intercepting a preset number of fields from the initial hash value as the hash information.
In order to solve the above problem, the present invention also provides a telephone communication authentication apparatus comprising:
the communication token searching module is used for constructing a token retrieval index of the receiving end according to communication information of telephone communication when a communication request is received, and searching a communication token of a transmitting end of the communication information from a pre-constructed token server by using the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container;
and the telephone communication verification module is used for acquiring the target verification certificate in the verification container and verifying the identity of the sending end by using the searched communication token and the target verification certificate to obtain a telephone communication verification result.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
and the processor executes the instructions stored in the memory to realize the telephone communication verification method.
In order to solve the above problem, the present invention further provides a computer-readable storage medium having at least one instruction stored therein, where the at least one instruction is executed by a processor in an electronic device to implement the telephone communication authentication method described above.
The invention directly searches the communication token of the sending end by constructing the token retrieval index of the receiving end, and can improve the speed of identity authentication of the sending end in telephone communication. And the identity authentication can be accurately carried out on the sending end through the target verification certificate in the verification container and the searched communication token, so that the accuracy of the identity authentication is further improved. Meanwhile, the identity authentication can be safely carried out on the telephone communication sending end by searching the communication token of the sending end and based on the confidentiality of the communication token and the verification certificate. Therefore, the telephone communication verification method, the telephone communication verification device, the electronic equipment and the computer readable storage medium can solve the problem that identity verification cannot be performed in telephone communication.
Drawings
Fig. 1 is a schematic flow chart of a telephone communication verification method according to a first embodiment of the present invention;
fig. 2 is a schematic flow chart of a telephone communication verification method according to a second embodiment of the present invention;
fig. 3 is a functional block diagram of a telephone communication authentication apparatus provided in a first apparatus embodiment of the present invention;
fig. 4 is a functional block diagram of a telephone communication authentication apparatus provided in a second apparatus embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device of a telephone communication verification method according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the application provides a telephone communication verification method. The execution subject of the telephone communication verification method includes, but is not limited to, at least one of electronic devices such as a server and a terminal, which can be configured to execute the method provided by the embodiment of the present application. In other words, the telephone communication verification method may be performed by software or hardware installed in the terminal device or the server device, and the software may be a block chain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
Referring to fig. 1, a flowchart of a telephone communication verification method according to a first embodiment of the present invention is shown. In this embodiment, the method for verifying telephone communication is applied to a sending end, and includes:
s10, when the sending end sends the communication request to the receiving end, the sending end obtains the verification container according to the communication information of the telephone communication.
In the embodiment of the invention, the telephone communication can be fixed line communication, intelligent terminal communication, internet communication and the like. The communication information comprises identity ID of the sending end, sending end information, sending end identification, receiving end identification and the like. For example, when telephone communication is performed by a mobile phone, the communication information includes the ID of the calling mobile phone, company information of the calling number, the last three digits of the called number, and the like.
In this embodiment, when the transmitting side makes a call to the receiving side (i.e., the transmitting side transmits a communication request to the receiving side), S10 is started. The verification container is constructed in advance and comprises a verification certificate, a hash algorithm, a signature algorithm, an encryption algorithm and the like, for example, the verification container C comprises a verification certificate Cert, a signature algorithm SM2, a hash algorithm SM3, an encryption algorithm SM4 and the like.
In the embodiment of the invention, the verification container can be directly obtained through the identity ID of the sending end.
And S11, generating a communication token of the sender of the telephone communication based on the verification certificate in the verification container.
Specifically, the generating a communication token of the sender of the telephone communication based on the authentication certificate in the authentication container includes:
the communication information is signed by using the verification container to obtain signed information;
carrying out hash processing on the communication information by using the verification container to obtain hash information;
encrypting the verification certificate by using the verification container to obtain encrypted information;
and acquiring the information of the sending end, and splicing the information of the sending end, the tagging information, the hash information and the encryption information to obtain a communication token of the sending end.
In detail, the obtaining of the signed information by using the verification container to sign the communication information includes:
acquiring the sending time of a sending end of the telephone communication, and constructing retrieval time based on the sending time;
extracting a sending end identification, a receiving end identification and a calling field in the communication information, splicing the sending end identification, the receiving end identification, the retrieval time and the calling field to obtain first token splicing information, and performing signature adding processing on the first token splicing information by using a signature algorithm in the verification container to obtain the signature adding information.
In an optional embodiment of the present invention, the retrieval time may be obtained by dividing the sending time by a preset value, for example, the tagging information may be a signurevalue, and the tagging is performed by an SM2 algorithm in a verification container, where the first token splicing information in the signurevalue includes: the calling party (sender id) + called party (receiver id) + send time/100 (retrieve time) + call destination (call field), which may be "normal call".
In detail, the hashing the communication information by using the verification container to obtain hash information includes:
splicing the sending end identification, the receiving end identification and the retrieval time to obtain second token splicing information, and carrying out hash processing on the second token splicing information by utilizing a hash algorithm in the verification container to obtain an initial hash value;
and intercepting a preset number of fields from the initial hash value as the hash information.
In an optional embodiment of the present invention, for example, the hash information may be used as a token index tokenIndex, and the SM3 algorithm in the verification container is used to splice information of the second token: the hash processing is carried out on the calling party (the sender identification) + the called party (the receiver identification) + the sending time/100 (the retrieval time), and the first 16-bit field is intercepted as a token index.
Specifically, the encrypting the certificate of authentication by using the authentication container to obtain encrypted information includes:
and extracting the certificate ID and the certificate identification of the verification certificate, splicing the certificate ID, the certificate identification and the sending time to obtain third token splicing information, and encrypting the third token splicing information by using an encryption algorithm in the verification container to obtain the encrypted information.
In an optional embodiment of the present invention, the encryption information may be a cremental (encrypted by the SM4 algorithm in the authentication container), and the third token concatenation information in the cremental includes cert.idi (certificate ID) + current time + cert.ki (certificate ID).
In an optional embodiment of the present invention, the communication token (identytoken) is token index + signatureValue + creatential + time + message, where time is sending time, and message is sending end information (sending end company name, etc.) in the communication information.
S12, caching the communication token to a pre-constructed token server, so that a receiving end of the telephone communication acquires the communication token from the token server to carry out telephone communication verification.
In the embodiment of the invention, the communication token is uploaded to the token server through udp.
In the embodiment of the invention, the communication token at the sending end of the telephone communication is generated through the verification certificate in the verification container, so that the generation efficiency of the communication token is improved, and meanwhile, the generation of the communication token comprises signature adding processing, hash processing and encryption processing, so that the safety of the communication token is further improved.
According to the invention, the verification container is obtained through the communication information of the telephone communication, the communication token of the sending end of the telephone communication is generated based on the verification certificate in the verification container, the speed and the safety of generating the communication token can be improved, and the authentication is carried out based on the communication token, so that the accuracy of the authentication is improved. Therefore, the telephone communication verification method applied to the sending end can solve the problem that the identity verification cannot be carried out in telephone communication.
Referring to fig. 2, a flowchart of a telephone communication verification method according to a second embodiment of the present invention is shown. In the embodiment, the telephone communication verification method is applied to a receiving end and comprises the steps of
S20, when a communication request is received, a token retrieval index of the receiving end is constructed according to communication information of telephone communication, and a communication token of the sending end of the communication information is searched from a pre-constructed token server by using the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container.
Specifically, the constructing a token retrieval index of the receiving end according to the communication information of the telephone communication includes:
acquiring receiving time of a receiving end of the telephone communication, constructing index time based on the receiving time, splicing the sending end identification, the receiving end identification and the index time to obtain index splicing information, and performing hash processing on the index splicing information to obtain a token index;
and intercepting the preset number of fields from the token index to serve as a token retrieval index.
In an optional embodiment of the present invention, the search time may be determined by determining whether the receiving time/100 is greater than 20, if the receiving time/100 is greater than 20, the search time is the receiving time/100, and if the receiving time/100 is less than or equal to 20, the search time is the receiving time/100-1.
In an optional embodiment of the present invention, the token server is matched through the token retrieval index, and the found communication token (token index) is returned after matching is successful.
S21, obtaining the target verification certificate in the verification container, and performing identity verification on the sending end by using the searched communication token and the target verification certificate to obtain a telephone communication verification result.
Specifically, the performing authentication on the sending end by using the found communication token and the target authentication certificate to obtain a phone communication authentication result includes:
decrypting the encrypted information in the searched communication token by using the verification container, and acquiring a verification certificate corresponding to the decrypted certificate ID according to the decrypted certificate ID;
judging whether the certificate of verification corresponding to the decrypted certificate ID is consistent with the target certificate of verification;
if the verification certificate corresponding to the decrypted certificate ID is inconsistent with the target verification certificate, determining that the telephone communication verification result is that the sending end of the telephone communication fails to verify;
and if the verification certificate corresponding to the decrypted certificate ID is consistent with the target verification certificate, determining that the telephone communication verification result is that the transmitting end of the telephone communication passes the verification.
In the embodiment of the invention, the certificate idi is obtained by decrypting the createntry in the searched communication token, and the certificate Cert is pulled from the server according to the certificate idi.
In another embodiment of the present invention, after determining that the result of the verification of the telephone communication is that the sender of the telephone communication passes the verification, the method further includes:
carrying out signature verification processing on the signature adding information in the searched communication token by using the public key corresponding to the target verification certificate to obtain signature verification information;
and extracting token information in the communication token, and assembling sending end identity information based on the communication information, the token information, the verification certificate passing the verification and the verification information.
In an optional embodiment of the present invention, for example, the identity information of the sending end includes a calling party, a called party, a time, a message, a Cert, an identity ID, a signed value after signature verification, and the like, where the time and the message are token information extracted from the communication token.
In the embodiment of the invention, the identity information of the sending end is directly assembled by using the verification certificate and the communication token for the sending end which passes the verification in the telephone communication, and the sending end passes the verification, so that the safety of the sending end can be ensured, meanwhile, the traceability of the identity of the sending end is also improved by assembling the identity information of the sending end, and the accuracy of the identity verification of the sending end is further improved.
The invention directly searches the communication token of the sending end by constructing the token retrieval index of the receiving end, and can improve the speed of identity authentication of the sending end in telephone communication. And the identity authentication can be accurately carried out on the sending end through the target verification certificate in the verification container and the searched communication token, so that the accuracy of the identity authentication is further improved. Meanwhile, the identity authentication can be safely carried out on the telephone communication sending end by searching the communication token of the sending end and based on the confidentiality of the communication token and the verification certificate. Therefore, the telephone communication verification method applied to the receiving end can solve the problem that the identity verification cannot be carried out in the telephone communication.
Fig. 3 is a functional block diagram of a telephone communication authentication apparatus according to a first embodiment of the present invention.
The phone communication verification apparatus 100 provided by the first apparatus embodiment of the present invention may be installed in an electronic device. According to the implemented functions, the telephone communication verification apparatus 100 may include a verification container acquisition module 101 and a communication token uploading module 102. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the verification container obtaining module 101 is configured to, when the sending end sends a communication request to the receiving end, obtain a verification container according to communication information of telephone communication by the sending end;
the communication token uploading module 102 is configured to generate a communication token at a sending end of the telephone communication based on the verification certificate in the verification container, and cache the communication token in a pre-constructed token server, so that a receiving end of the telephone communication obtains the communication token from the token server to perform telephone communication verification.
In detail, the specific implementation of each module of the telephone communication verification apparatus 100 is as follows:
step one, when the sending end sends a communication request to the receiving end, the sending end obtains a verification container according to communication information of telephone communication.
In the embodiment of the invention, the telephone communication can be fixed line communication, intelligent terminal communication, internet communication and the like. The communication information comprises identity ID of the sending end, sending end information, sending end identification, receiving end identification and the like. For example, when telephone communication is performed by a mobile phone, the communication information includes the ID of the calling mobile phone, company information of the calling number, the last three digits of the called number, and the like.
In this embodiment, when the transmitting side makes a call to the receiving side (i.e., the transmitting side transmits a communication request to the receiving side), S10 is started. The verification container is constructed in advance and comprises a verification certificate, a hash algorithm, a signature algorithm, an encryption algorithm and the like, for example, the verification container C comprises a verification certificate Cert, a signature algorithm SM2, a hash algorithm SM3, an encryption algorithm SM4 and the like.
In the embodiment of the invention, the verification container can be directly obtained through the identity ID of the sending end.
And step two, generating a communication token of the sending end of the telephone communication based on the verification certificate in the verification container.
Specifically, the generating a communication token of the sender of the telephone communication based on the authentication certificate in the authentication container includes:
the communication information is signed by using the verification container to obtain signed information;
carrying out hash processing on the communication information by using the verification container to obtain hash information;
encrypting the verification certificate by using the verification container to obtain encrypted information;
and acquiring the information of the sending end, and splicing the information of the sending end, the tagging information, the hash information and the encryption information to obtain a communication token of the sending end.
In detail, the obtaining of the signed information by using the verification container to sign the communication information includes:
acquiring the sending time of a sending end of the telephone communication, and constructing retrieval time based on the sending time;
extracting a sending end identification, a receiving end identification and a calling field in the communication information, splicing the sending end identification, the receiving end identification, the retrieval time and the calling field to obtain first token splicing information, and performing signature adding processing on the first token splicing information by using a signature algorithm in the verification container to obtain the signature adding information.
In an optional embodiment of the present invention, the retrieval time may be obtained by dividing the sending time by a preset value, for example, the tagging information may be a signurevalue, and the tagging is performed by an SM2 algorithm in a verification container, where the first token splicing information in the signurevalue includes: the calling party (sender id) + called party (receiver id) + send time/100 (retrieve time) + call destination (call field), which may be "normal call".
In detail, the hashing the communication information by using the verification container to obtain hash information includes:
splicing the sending end identification, the receiving end identification and the retrieval time to obtain second token splicing information, and carrying out hash processing on the second token splicing information by utilizing a hash algorithm in the verification container to obtain an initial hash value;
and intercepting a preset number of fields from the initial hash value as the hash information.
In an optional embodiment of the present invention, for example, the hash information may be used as a token index tokenIndex, and the SM3 algorithm in the verification container is used to splice information of the second token: the hash processing is carried out on the calling party (the sender identification) + the called party (the receiver identification) + the sending time/100 (the retrieval time), and the first 16-bit field is intercepted as a token index.
Specifically, the encrypting the certificate of authentication by using the authentication container to obtain encrypted information includes:
and extracting the certificate ID and the certificate identification of the verification certificate, splicing the certificate ID, the certificate identification and the sending time to obtain third token splicing information, and encrypting the third token splicing information by using an encryption algorithm in the verification container to obtain the encrypted information.
In an optional embodiment of the present invention, the encryption information may be a cremental (encrypted by the SM4 algorithm in the authentication container), and the third token concatenation information in the cremental includes cert.idi (certificate ID) + current time + cert.ki (certificate ID).
In an optional embodiment of the present invention, the communication token (identytoken) is token index + signatureValue + creatential + time + message, where time is sending time, and message is sending end information (sending end company name, etc.) in the communication information.
And step three, caching the communication token to a pre-constructed token server so that a receiving end of the telephone communication acquires the communication token from the token server to carry out telephone communication verification.
In the embodiment of the invention, the communication token is uploaded to the token server through udp.
In the embodiment of the invention, the communication token at the sending end of the telephone communication is generated through the verification certificate in the verification container, so that the generation efficiency of the communication token is improved, and meanwhile, the generation of the communication token comprises signature adding processing, hash processing and encryption processing, so that the safety of the communication token is further improved.
According to the invention, the verification container is obtained through the communication information of the telephone communication, the communication token of the sending end of the telephone communication is generated based on the verification certificate in the verification container, the speed and the safety of generating the communication token can be improved, and the authentication is carried out based on the communication token, so that the accuracy of the authentication is improved. Therefore, the telephone communication verification device applied to the sending end can solve the problem that the identity verification cannot be carried out in the telephone communication
Fig. 4 is a functional block diagram of a telephone communication authentication apparatus according to a second embodiment of the present invention.
The phone communication verification apparatus 200 according to the second apparatus embodiment of the present invention may be installed in an electronic device. Depending on the implemented functionality, the telephonic communication authentication apparatus 200 may include a communication token lookup module 201 and a telephonic communication authentication module 202. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the communication token searching module 201 is configured to, when a communication request is received, construct a token retrieval index of the receiving end according to communication information of telephone communication, and search a communication token of the sending end of the communication information from a pre-constructed token server by using the token retrieval index, where the communication token is generated according to a verification certificate in a verification container;
the phone communication verification module 202 is configured to obtain a target verification certificate in the verification container, and perform identity verification on the sending end by using the found communication token and the target verification certificate to obtain a phone communication verification result.
In detail, the specific implementation of each module of the telephone communication verification device 200 is as follows:
step one, when a communication request is received, a token retrieval index of the receiving end is constructed according to communication information of telephone communication, a communication token of the sending end of the communication information is searched from a pre-constructed token server by utilizing the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container.
Specifically, the constructing a token retrieval index of the receiving end according to the communication information of the telephone communication includes:
acquiring receiving time of a receiving end of the telephone communication, constructing index time based on the receiving time, splicing the sending end identification, the receiving end identification and the index time to obtain index splicing information, and performing hash processing on the index splicing information to obtain a token index;
and intercepting the preset number of fields from the token index to serve as a token retrieval index.
In an optional embodiment of the present invention, the search time may be determined by determining whether the receiving time/100 is greater than 20, if the receiving time/100 is greater than 20, the search time is the receiving time/100, and if the receiving time/100 is less than or equal to 20, the search time is the receiving time/100-1.
In an optional embodiment of the present invention, the token server is matched through the token retrieval index, and the found communication token (token index) is returned after matching is successful.
And step two, acquiring a target verification certificate in the verification container, and performing identity verification on the sending end by using the searched communication token and the target verification certificate to obtain a telephone communication verification result.
Specifically, the performing authentication on the sending end by using the found communication token and the target authentication certificate to obtain a phone communication authentication result includes:
decrypting the encrypted information in the searched communication token by using the verification container, and acquiring a verification certificate corresponding to the decrypted certificate ID according to the decrypted certificate ID;
judging whether the certificate of verification corresponding to the decrypted certificate ID is consistent with the target certificate of verification;
if the verification certificate corresponding to the decrypted certificate ID is inconsistent with the target verification certificate, determining that the telephone communication verification result is that the sending end of the telephone communication fails to verify;
and if the verification certificate corresponding to the decrypted certificate ID is consistent with the target verification certificate, determining that the telephone communication verification result is that the transmitting end of the telephone communication passes the verification.
In the embodiment of the invention, the certificate idi is obtained by decrypting the createntry in the searched communication token, and the certificate Cert is pulled from the server according to the certificate idi.
In another embodiment of the present invention, after determining that the result of the verification of the telephone communication is that the sender of the telephone communication passes the verification, the method further includes:
carrying out signature verification processing on the signature adding information in the searched communication token by using the public key corresponding to the target verification certificate to obtain signature verification information;
and extracting token information in the communication token, and assembling sending end identity information based on the communication information, the token information, the verification certificate passing the verification and the verification information.
In an optional embodiment of the present invention, for example, the identity information of the sending end includes a calling party, a called party, a time, a message, a Cert, an identity ID, a signed value after signature verification, and the like, where the time and the message are token information extracted from the communication token.
In the embodiment of the invention, the identity information of the sending end is directly assembled by using the verification certificate and the communication token for the sending end which passes the verification in the telephone communication, and the sending end passes the verification, so that the safety of the sending end can be ensured, meanwhile, the traceability of the identity of the sending end is also improved by assembling the identity information of the sending end, and the accuracy of the identity verification of the sending end is further improved.
The invention directly searches the communication token of the sending end by constructing the token retrieval index of the receiving end, and can improve the speed of identity authentication of the sending end in telephone communication. And the identity authentication can be accurately carried out on the sending end through the target verification certificate in the verification container and the searched communication token, so that the accuracy of the identity authentication is further improved. Meanwhile, the identity authentication can be safely carried out on the telephone communication sending end by searching the communication token of the sending end and based on the confidentiality of the communication token and the verification certificate. Therefore, the telephone communication verification method applied to the receiving end can solve the problem that the identity verification cannot be carried out in the telephone communication.
Fig. 5 is a schematic structural diagram of an electronic device implementing a telephone communication verification method according to an embodiment of the present invention.
The electronic device may comprise a processor 10, a memory 11, a communication interface 12 and a bus 13, and may further comprise a computer program, such as a telephone communication authentication program, stored in the memory 11 and executable on the processor 10.
The memory 11 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device, for example a removable hard disk of the electronic device. The memory 11 may also be an external storage device of the electronic device in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device. The memory 11 may be used not only to store application software installed in the electronic device and various types of data, such as codes of a telephone communication authentication program, etc., but also to temporarily store data that has been output or is to be output.
The processor 10 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the whole electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device by running or executing programs or modules (e.g., a telephone communication authentication program, etc.) stored in the memory 11 and calling data stored in the memory 11.
The communication interface 12 is used for communication between the electronic device and other devices, and includes a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), which are typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device and for displaying a visualized user interface.
The bus 13 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 13 may be divided into an address bus, a data bus, a control bus, etc. The bus 13 is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
Fig. 5 shows only an electronic device having components, and those skilled in the art will appreciate that the structure shown in fig. 5 does not constitute a limitation of the electronic device, and may include fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
For example, although not shown, the electronic device may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so that functions of charge management, discharge management, power consumption management and the like are realized through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device may further include a network interface, and optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used to establish a communication connection between the electronic device and other electronic devices.
Optionally, the electronic device may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device and for displaying a visualized user interface.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The telephone communication verification program stored in the memory 11 of the electronic device is a combination of a plurality of instructions, and when running in the processor 10, can implement the telephone communication verification method provided by any one of the foregoing method embodiments.
In detail, when the electronic device is a sending-end electronic device, the telephone communication verification method includes:
when a communication request is sent to the receiving end, acquiring a verification container according to communication information of telephone communication;
generating a communication token for a sender of the telephone communication based on the authentication credentials in the authentication container;
and caching the communication token to a pre-constructed token server so that a receiving end of the telephone communication acquires the communication token from the token server to carry out telephone communication verification.
Further, when the electronic device is a receiving-end electronic device, the telephone communication verification method includes:
when a communication request is received, a token retrieval index of the receiving end is constructed according to communication information of telephone communication, and a communication token of the sending end of the communication information is searched from a pre-constructed token server by using the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container;
acquiring a target authentication certificate in the authentication container;
and carrying out identity authentication on the sending end by using the searched communication token and the target authentication certificate to obtain a telephone communication authentication result.
Specifically, the specific implementation method of the instruction by the processor 10 may refer to the description of the relevant steps in the embodiment corresponding to the drawings, which is not described herein again.
Further, the electronic device integrated module/unit, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer readable storage medium. The computer readable storage medium may be volatile or non-volatile. For example, the computer-readable medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM).
The present invention also provides a computer-readable storage medium, which stores a computer program that, when executed by a processor of an electronic device at a transmitting end, can implement:
when a communication request is sent to the receiving end, acquiring a verification container according to communication information of telephone communication;
generating a communication token for a sender of the telephone communication based on the authentication credentials in the authentication container;
and caching the communication token to a pre-constructed token server so that a receiving end of the telephone communication acquires the communication token from the token server to carry out telephone communication verification.
Further, the computer program, when executed by a processor of an electronic device at a receiving end, may implement:
when a communication request is received, a token retrieval index of the receiving end is constructed according to communication information of telephone communication, and a communication token of the sending end of the communication information is searched from a pre-constructed token server by using the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container;
acquiring a target authentication certificate in the authentication container;
and carrying out identity authentication on the sending end by using the searched communication token and the target authentication certificate to obtain a telephone communication authentication result.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A method for verifying telephone communication, the method being applied to a receiving end and comprising:
when a communication request is received, a token retrieval index of the receiving end is constructed according to communication information of telephone communication, and a communication token of the sending end of the communication information is searched from a pre-constructed token server by using the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container;
acquiring a target authentication certificate in the authentication container;
and carrying out identity authentication on the sending end by using the searched communication token and the target authentication certificate to obtain a telephone communication authentication result.
2. The method for verifying telephone communication according to claim 1, wherein said performing authentication on said sender using said found communication token and said target authentication certificate to obtain a telephone communication verification result comprises:
decrypting the encrypted information in the searched communication token by using the verification container, and acquiring a verification certificate corresponding to the decrypted certificate ID according to the decrypted certificate ID;
judging whether the certificate of verification corresponding to the decrypted certificate ID is consistent with the target certificate of verification;
if the verification certificate corresponding to the decrypted certificate ID is inconsistent with the target verification certificate, determining that the telephone communication verification result is that the sending end of the telephone communication fails to verify;
and if the verification certificate corresponding to the decrypted certificate ID is consistent with the target verification certificate, determining that the telephone communication verification result is that the transmitting end of the telephone communication passes the verification.
3. The telephone communication authentication method according to claim 2, wherein after determining that the telephone communication authentication result is that the sender of the telephone communication is authenticated, the method further comprises:
carrying out signature verification processing on the signature adding information in the searched communication token by using the public key corresponding to the target verification certificate to obtain signature verification information;
and extracting token information in the communication token, and assembling sending end identity information based on the communication information, the token information, the verification certificate passing the verification and the verification information.
4. A telephone communication verification method is applied to a sending end and comprises the following steps:
when a communication request is sent to the receiving end, acquiring a verification container according to communication information of telephone communication;
generating a communication token for a sender of the telephone communication based on the authentication credentials in the authentication container;
and caching the communication token to a pre-constructed token server so that a receiving end of the telephone communication acquires the communication token from the token server to carry out telephone communication verification.
5. The telephony communication authentication method of claim 4, wherein the generating a communication token for a sender of the telephony communication based on the authentication credentials in the authentication container comprises:
the communication information is signed by using the verification container to obtain signed information;
carrying out hash processing on the communication information by using the verification container to obtain hash information;
encrypting the verification certificate by using the verification container to obtain encrypted information;
and acquiring the information of the sending end, and splicing the information of the sending end, the tagging information, the hash information and the encryption information to obtain a communication token of the sending end.
6. The method for authenticating telephone communication according to claim 5, wherein said signing the communication information with the authentication container to obtain signed information comprises:
acquiring the sending time of a sending end of the telephone communication, and constructing retrieval time based on the sending time;
extracting a sending end identification, a receiving end identification and a calling field in the communication information, splicing the sending end identification, the receiving end identification, the retrieval time and the calling field to obtain first token splicing information, and performing signature adding processing on the first token splicing information by using a signature algorithm in the verification container to obtain the signature adding information.
7. The telephony communication authentication method of claim 6, wherein the hashing the communication information using the authentication container to obtain hash information comprises:
splicing the sending end identification, the receiving end identification and the retrieval time to obtain second token splicing information, and carrying out hash processing on the second token splicing information by utilizing a hash algorithm in the verification container to obtain an initial hash value;
and intercepting a preset number of fields from the initial hash value as the hash information.
8. A telephone communication authentication apparatus, the apparatus comprising:
the communication token searching module is used for constructing a token retrieval index of the receiving end according to communication information of telephone communication when a communication request is received, and searching a communication token of a transmitting end of the communication information from a pre-constructed token server by using the token retrieval index, wherein the communication token is generated according to a verification certificate in a verification container;
and the telephone communication verification module is used for acquiring the target verification certificate in the verification container and verifying the identity of the sending end by using the searched communication token and the target verification certificate to obtain a telephone communication verification result.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the telephone communication authentication method of any one of claims 1 to 3 or claims 4 to 7.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements a telephone communication authentication method according to any one of claims 1 to 3 or claims 4 to 7.
CN202111322066.9A 2021-11-09 2021-11-09 Telephone communication verification method, device, equipment and storage medium Pending CN114095220A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111322066.9A CN114095220A (en) 2021-11-09 2021-11-09 Telephone communication verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111322066.9A CN114095220A (en) 2021-11-09 2021-11-09 Telephone communication verification method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114095220A true CN114095220A (en) 2022-02-25

Family

ID=80299370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111322066.9A Pending CN114095220A (en) 2021-11-09 2021-11-09 Telephone communication verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114095220A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI803330B (en) * 2022-05-26 2023-05-21 國立成功大學 Authentication method using block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789841A (en) * 2015-11-23 2017-05-31 中国电信股份有限公司 Method for processing business, terminal, server and system
CN110290102A (en) * 2019-04-26 2019-09-27 武汉众邦银行股份有限公司 Service security system and method based on application
CN112929339A (en) * 2021-01-21 2021-06-08 艾迪通证技术(北京)有限公司 Message transmitting method for protecting privacy

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789841A (en) * 2015-11-23 2017-05-31 中国电信股份有限公司 Method for processing business, terminal, server and system
CN110290102A (en) * 2019-04-26 2019-09-27 武汉众邦银行股份有限公司 Service security system and method based on application
CN112929339A (en) * 2021-01-21 2021-06-08 艾迪通证技术(北京)有限公司 Message transmitting method for protecting privacy

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI803330B (en) * 2022-05-26 2023-05-21 國立成功大學 Authentication method using block chain

Similar Documents

Publication Publication Date Title
CN110113167B (en) Information protection method and system of intelligent terminal and readable storage medium
US10073916B2 (en) Method and system for facilitating terminal identifiers
CN113055380B (en) Message processing method and device, electronic equipment and medium
CN102045335B (en) Terminal device, signature generation server, simple id management system, simple id management method
CN112311779B (en) Data access control method and device applied to block chain system
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN113127915A (en) Data encryption desensitization method and device, electronic equipment and storage medium
CN110677261B (en) Trusted two-dimensional code generation method and device, electronic equipment and storage medium
CN110266653B (en) Authentication method, system and terminal equipment
CN114553532A (en) Data secure transmission method and device, electronic equipment and storage medium
CN114499859A (en) Password verification method, device, equipment and storage medium
CN114760114A (en) Identity authentication method, device, equipment and medium
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN109951416B (en) Credible verification method and terminal
CN114095220A (en) Telephone communication verification method, device, equipment and storage medium
CN113434882A (en) Communication protection method and device of application program, computer equipment and storage medium
CN110890979B (en) Automatic deployment method, device, equipment and medium for fort machine
CN114125158B (en) Anti-harassment method, device, equipment and storage medium based on trusted telephone
CN114172923B (en) Data transmission method, communication system and communication device
CN115001784A (en) Data storage method and device, electronic equipment and computer readable storage medium
CN111949996A (en) Generation method, encryption method, system, device and medium of security private key
CN111934882B (en) Identity authentication method and device based on block chain, electronic equipment and storage medium
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN114567443A (en) Block chain-based electronic contract signing method and device
CN114091041A (en) Data transmission method, device, equipment and medium based on embedded equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination