CN116484326A - Multi-account access authority management method and related device based on NFT - Google Patents

Multi-account access authority management method and related device based on NFT Download PDF

Info

Publication number
CN116484326A
CN116484326A CN202310688364.2A CN202310688364A CN116484326A CN 116484326 A CN116484326 A CN 116484326A CN 202310688364 A CN202310688364 A CN 202310688364A CN 116484326 A CN116484326 A CN 116484326A
Authority
CN
China
Prior art keywords
nft
target
access
transaction
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310688364.2A
Other languages
Chinese (zh)
Other versions
CN116484326B (en
Inventor
李家琦
王永峰
白培基
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sunson Tech Co ltd
Original Assignee
Shenzhen Sunson Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sunson Tech Co ltd filed Critical Shenzhen Sunson Tech Co ltd
Priority to CN202310688364.2A priority Critical patent/CN116484326B/en
Publication of CN116484326A publication Critical patent/CN116484326A/en
Application granted granted Critical
Publication of CN116484326B publication Critical patent/CN116484326B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The invention relates to the technical field of authority management, and discloses a multi-account access authority management method based on an NFT (network File transfer) and a related device, which are used for realizing intelligent management of access authority and realizing attribute transfer among multiple accounts in a multi-channel transaction process of a digital product. The method comprises the following steps: creating an NFT data calculation model set, and generating a plurality of NFT management mechanisms according to the NFT data calculation model set; acquiring member information and digital collection of a target user, and generating a target NFT according to a plurality of NFT management mechanisms; receiving an access request sent by an access party, judging whether the access party has ownership of a target NFT, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result; and if the judgment result is that the access party has the ownership of the target NFT and the verification result is that the UTXO is not spent, providing the access party with the access right.

Description

Multi-account access authority management method and related device based on NFT
Technical Field
The invention relates to the technical field of authority management, in particular to a multi-account access authority management method based on NFT and a related device.
Background
The digital collection market is attracting more and more attention as one of the important fields of blockchain technology application. Digital collection management systems require the use of a variety of techniques to ensure the safety and reliability of digital collections, as well as the ease of digital collection management and transactions. The technology of verifying ownership of the digital collection by the access party and authorizing access to the digital collection is an important link in digital collection management.
Existing schemes may be limited by the speed of the blockchain when searching for transaction information on the blockchain, resulting in slow query speeds. Second, when granting access to a digital collection, the digital collection management system needs to grant the access party a point value attribute and a rights attribute for the digital collection, but some disputes may exist in assigning attributes to the digital collection.
Disclosure of Invention
The invention provides an NFT-based multi-account access right management method and a related device, which are used for realizing intelligent management of access rights and realizing attribute transfer among multiple accounts in a multi-channel transaction process of digital products.
The first aspect of the present invention provides a multi-account access right management method based on NFT, which includes:
Creating an NFT data calculation model set, and generating a plurality of NFT management mechanisms according to the NFT data calculation model set;
acquiring member information and digital stock of a target user, and taking an NFT unique ID as the member information and the identification of the digital stock according to the plurality of NFT management mechanisms to obtain a target NFT;
receiving an access request sent by an access party, and carrying out request analysis on the access request to obtain target access information;
judging whether the visitor has ownership of the target NFT according to the target access information, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result;
and if the judgment result is that the access party has the ownership of the target NFT and the verification result is that the UTXO is not spent, providing access rights for the access party.
With reference to the first aspect, in a first implementation manner of the first aspect of the present invention, the creating an NFT data computation model set and generating a plurality of NFT management mechanisms according to the NFT data computation model set includes:
respectively carrying out data calculation model creation on NFT casting issue, NFT copyright protection and NFT decentralization transaction to obtain an NFT issue model, an NFT copyright protection model and an NFT transaction model;
Performing model integration on the NFT issue model, the NFT copyright protection model and the NFT transaction model to generate an NFT data calculation model set;
creating a plurality of NFT management mechanisms according to the NFT data calculation model set, wherein the plurality of NFT management mechanisms comprise: NFT distribution mechanisms, NFT transaction mechanisms, and NFT copyright protection mechanisms.
With reference to the first aspect, in a second implementation manner of the first aspect of the present invention, the obtaining member information and digital collection of the target user, and using, according to the multiple NFT management mechanisms, an NFT unique ID as an identifier of the member information and the digital collection, to obtain the target NFT includes:
acquiring member information and digital collection of a target user, and acquiring a plurality of different account information corresponding to the target user;
carrying out association processing on the member information and the digital collection to obtain first association information;
giving financial attributes to the first association information, associating the plurality of different account information with the first association information, and generating second association information;
and generating a target NFT by taking the unique NFT ID as the identifier of the second association information according to the plurality of NFT management mechanisms.
With reference to the first aspect, in a third implementation manner of the first aspect of the present invention, the receiving an access request sent by an access party, and performing request analysis on the access request to obtain target access information includes:
receiving an access request sent by an access party;
carrying out request analysis on the access request to obtain a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in a final transaction locking script;
and taking a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in the final transaction locking script as target access information.
With reference to the first aspect, in a fourth implementation manner of the first aspect of the present invention, the determining, according to the target access information, whether the visitor has ownership of the target NFT, to obtain a determination result, and performing UTXO spending verification on a final transaction of the target NFT according to a preset full node, to obtain a verification result, includes:
searching transaction information from a preset blockchain according to the target access information;
judging whether the access party has ownership of the target NFT according to the transaction information, and obtaining a judgment result, wherein the judgment result comprises: the visitor has ownership of the target NFT or the visitor does not have ownership of the target NFT;
Transmitting the final transaction corresponding to the target NFT to a preset full node, and performing UTXO expense verification on the final transaction of the target NFT through the full node to obtain a verification result, wherein the verification result comprises the following steps: UTXOs are either not spent or UTXOs are spent.
With reference to the first aspect, in a fifth implementation manner of the first aspect of the present invention, if the determination result is that the visitor has ownership of the target NFT and the verification result is that the UTXO is not spent, providing the visitor with access rights includes:
if the judgment result is that the accessing party has the ownership of the target NFT and the verification result is that the UTXO is not spent, authorizing the accessing party to access the digital collection;
and when the access party is authorized to access the digital collection, determining to provide access rights for the access party.
With reference to the first aspect, in a sixth implementation manner of the first aspect of the present invention, the NFT-based multi-account access rights management method further includes:
creating a unique identifier of the digital collection when the visitor is visiting;
creating an integral value attribute and a equity attribute of the digital collection, and associating the integral value attribute and the equity attribute with a unique identifier of the digital collection;
When the visitor accesses the digital collection, verifying the identity of the visitor and giving the visitor corresponding point value attribute and rights attribute;
during a multi-channel transaction of a digital product, the accessing party transfers the credit value attribute and the equity attribute in a transaction between other accounts.
The second aspect of the present invention provides an NFT-based multi-account access right management apparatus, including:
the system comprises a creation module, a processing module and a processing module, wherein the creation module is used for creating an NFT data calculation model set and generating a plurality of NFT management mechanisms according to the NFT data calculation model set;
the acquisition module is used for acquiring member information and digital stock of a target user, and taking the unique NFT ID as the member information and the identification of the digital stock according to the multiple NFT management mechanisms to obtain a target NFT;
the analysis module is used for receiving an access request sent by an access party and carrying out request analysis on the access request to obtain target access information;
the processing module is used for judging whether the visitor has ownership of the target NFT according to the target access information, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result;
And the access module is used for providing access rights for the access party if the judgment result is that the access party has the ownership of the target NFT and the verification result is that the UTXO is not spent.
A third aspect of the present invention provides an NFT-based multi-account access rights management apparatus, comprising: a memory and at least one processor, the memory having instructions stored therein; the at least one processor invokes the instructions in the memory to cause the NFT-based multi-account access rights management device to perform the NFT-based multi-account access rights management method described above.
A fourth aspect of the present invention provides a computer-readable storage medium having instructions stored therein that, when executed on a computer, cause the computer to perform the NFT-based multi-account access rights management method described above.
In the technical scheme provided by the invention, an NFT data calculation model set is created, and a plurality of NFT management mechanisms are generated according to the NFT data calculation model set; acquiring member information and digital collection of a target user, and generating a target NFT according to a plurality of NFT management mechanisms; receiving an access request sent by an access party, judging whether the access party has ownership of a target NFT, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result; if the judgment result shows that the visitor has the ownership of the target NFT and the verification result shows that the UTXO is not spent, the method and the device provide access rights for the visitor, and the unique NFT ID is used for associating the member information of the user with the digital collection and associating different account information of the user with the digital collection, so that the method and the device are beneficial to enhancing the financial properties and transaction convenience of the digital collection. In the digital collection management process, an access request is used for determining whether an access party has ownership of a target NFT, and an integral value attribute and a benefit attribute are given to the access party, so that attribute transfer among multiple accounts is realized in the multi-channel transaction process of the digital product.
Drawings
FIG. 1 is a schematic diagram of one embodiment of a multi-account access rights management method based on NFT in an embodiment of the present invention;
FIG. 2 is a flow chart of obtaining a target NFT in an embodiment of the invention;
FIG. 3 is a flow chart of request parsing in an embodiment of the invention;
FIG. 4 is a flowchart of the judgment and verification in the embodiment of the present invention;
FIG. 5 is a schematic diagram of one embodiment of an NFT-based multi-account access rights management device in an embodiment of the invention;
fig. 6 is a schematic diagram of an embodiment of an NFT-based multi-account access rights management device according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an NFT-based multi-account access right management method and a related device, which are used for realizing intelligent management of access rights and realizing attribute transfer among multiple accounts in a multi-channel transaction process of a digital product. The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
For ease of understanding, a specific flow of an embodiment of the present invention is described below, referring to fig. 1, and one embodiment of a multi-account access rights management method based on NFT in an embodiment of the present invention includes:
s101, creating an NFT data calculation model set, and generating a plurality of NFT management mechanisms according to the NFT data calculation model set;
it may be understood that the executing body of the present invention may be a multi-account access rights management device based on NFT, and may also be a terminal or a server, which is not limited herein. The embodiment of the invention is described by taking a server as an execution main body as an example.
Specifically, first, the NFT data computation model set is one piece of raw data that can be used to compute NFTs, which can be used to generate digital assets that are non-replaceable and unique. An efficient algorithm is created to calculate NFT data and record it in a collection. To this end, NFT data may be calculated using an algorithm, and then each NFT data is recorded on a server. Different data structures may be used to record (e.g., groups, hash tables, etc.) for quick lookup and retrieval of data. Further, a plurality of NFT management mechanisms are generated from the NFT data computation model set. Some server code may be written to manage NFTs and generate one NFT management mechanism for each NFT data. The management mechanism may include data grouping, data tagging, data storage, and data retrieval functions. To this end, server code may be written to collect information about each NFT data, such as the collection to which the NFT data belongs, the owners of the NFT data, and the value of the NFT data, etc., and then record this information in an NFT management mechanism. Different tools and frameworks can be used to create this NFT management mechanism and store it on a server, such as RestfulAPI, mongoDB. Further, security and reliability of the NFT data computation model set and NFT management mechanisms are ensured. To achieve this, some security tools and techniques are used, such as encryption algorithms and digital signatures, to ensure confidentiality and integrity of the data. Some server code also needs to be written to ensure backup and recovery of data in case of data loss or corruption. Finally, the NFT data computation model set and NFT management mechanisms are tested and optimized to ensure their performance and stability. Different test tools and methods can be used to test the system and optimize it. NFT management mechanisms can be optimized to ensure their efficiency and scalability and to ensure that they can cope with different operating scenarios and requirements.
S102, acquiring member information and digital stock of a target user, and taking the unique ID of the NFT as the member information and the identification of the digital stock according to a plurality of NFT management mechanisms to obtain the target NFT;
specifically, first, acquiring member information of a target user requires accessing a database to acquire the information of the user. Database tools and frameworks can be used to connect databases and query for relevant information. Code is written to verify the identity of the user and obtain the relevant information. If the authentication of the user fails, the subsequent operation cannot be continued. If the verification is successful, the member information of the user can be acquired and recorded on the server. Different data structures may be used to record member information, such as hash tables, arrays, and the like. It is also necessary to ensure the security and reliability of member information and to backup and restore the information to prevent data loss. Further, a digital collection of the target user is obtained. This requires access to the NFT database to obtain digital collections owned by the user. Some code may be written to query the NFT database and obtain information about the digital collection owned by the user. For each digital collection, its ID and related information is recorded and associated with the corresponding member information. It is also necessary to write code to ensure the security and reliability of the digital collection and to clear or move the digital collection when necessary. To acquire a target NFT from multiple NFT management mechanisms, related algorithms and tools in the NFT management mechanisms are used. For each NFT unique ID, the NFT management mechanism containing the ID may be queried and the target NFT found based on the relevant information. Different policies may also be used to handle NFT ID query operations, such as using hash tables to optimize query speed. Furthermore, there is a need to ensure the security and reliability of NFT management mechanisms and to ensure that they can cope with different query scenarios and requirements. Finally, NFT management mechanisms are tested and optimized to ensure their performance and stability. Different test tools and methods can be used to test the system and optimize it. NFT management mechanisms can be optimized to ensure their efficiency and scalability and to ensure that they can cope with different operating scenarios and requirements.
S103, receiving an access request sent by an access party, and carrying out request analysis on the access request to obtain target access information;
it should be noted that, first, a port dedicated to receiving an access request is created on the server. This port may be created using a different network protocol and framework, such as the HTTP protocol or WebSocket protocol. For each access request, the server will receive its relevant information and further process it as needed. To this end, some server code is written to monitor the port and receive incoming requests. Further, the access request is subjected to request analysis, and target access information is obtained. This requires decoding the data in the request and converting it into a format that can be used by the server. Different decoding algorithms and tools may be used to parse the request data, such as a JSON decoder or an XML decoder. For each request, the request header and the request body are separated and stored separately on the server. It is also necessary to parse relevant information in the request header, such as the request method, request URL, request parameters, etc. For each target access information, a corresponding processing method can be found according to the request URL and the request method. Generally, some processor functions are written to handle different requests. For example, for a GET request, a query processor function may be written to query for relevant information; for POST requests, a create processor function may be written to create new data. When the corresponding processing function is found, the data in the request body can be transferred to the request body and can be processed according to the requirement. Finally, the security and reliability of the target access information are ensured. To this end, some security tools and techniques are used to protect the servers from attacks. For example, the request data may be encrypted using SSL/TLS protocol to ensure its confidentiality and integrity. Firewall or like tools may also be used to monitor and filter inbound and outbound network traffic. In addition, there is a need to ensure the health and performance of the server and to handle any failure or abnormal situation in a timely manner.
S104, judging whether the accessor has ownership of the target NFT according to the target access information, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result;
specifically, first, the ID of the NFT is acquired from the target access information. The NFT database may then be queried to obtain information about the NFT, such as the owner of the NFT and the value of the NFT. For each access request, it is authenticated to ensure that the identity of the accessing party is legitimate and has been allowed access to the NFT. This may be achieved by encoding on the server. If the authentication is successful, the visitor can be compared to the owner of the NFT to determine if the visitor has ownership of the NFT. If so, the visitor may use the NFT to conduct transactions or creations. If not, the visitor cannot use the NFT to conduct transactions and creations. This determination may be accomplished using code that queries a database. Further, UTXO spends verification to ensure validity and legitimacy of NFT transactions. A preset full node may be used to verify the UTXO cost of the target NFT to ensure that the transaction meets preset rules and criteria. The full node may access using a preset API to query its blockchain and find any information related to the NFT transaction. If the verification is successful, the NFT transaction is interpreted as legal and valid and can be processed in the next step. Otherwise, the transaction will be denied and the visitor will not be able to conduct the transaction using the NFT. This validation process may be implemented using a preset API and code that queries the database. Finally, the safety and reliability of the verification result are ensured. To this end, servers and transactions are protected from attacks using some security tools and techniques. For example, the transaction data may be encrypted using SSL/TLS protocols to ensure its confidentiality and integrity. Firewall or like tools may also be used to monitor and filter inbound and outbound network traffic.
And S105, if the judgment result is that the access party has the ownership of the target NFT and the verification result is that the UTXO is not spent, providing the access authority for the access party.
Specifically, first, the ID of the NFT is obtained from the target access information, and the code of the query database is used to obtain relevant information of the NFT, such as the owner of the NFT and the value of the NFT. If the visitor and the owner of the NFT are the same and the UTXO of the NFT is not spent, then access rights may be provided to the visitor. To this end, some authorization code is written to provide access rights for the accessing party. The authorization process typically requires the use of an encryption algorithm and associated security verification steps to ensure that the party is legitimate. Different encryption algorithms and frameworks may be used to implement the authorization process, such as the RSA algorithm or Public Key Infrastructure (PKI) framework. For each authorization request, it is authenticated and a related security check is performed. If the authorization verification is successful, the access party can be provided with access rights. A token or other authentication means may be used to identify the authorized party. For each authorized party, its associated information may be recorded and marked as having access rights. This may be achieved by storing and retrieving the relevant information on the server. Finally, the security and reliability of the authorization process is ensured. Some security tools and techniques may be used to protect servers and authorization processes from attacks. For example, the authorized communication may be encrypted using SSL/TLS protocol to ensure its confidentiality and integrity. Firewall or like tools may also be used to monitor and filter inbound and outbound network traffic.
In the embodiment of the invention, an NFT data calculation model set is created, and a plurality of NFT management mechanisms are generated according to the NFT data calculation model set; acquiring member information and digital collection of a target user, and generating a target NFT according to a plurality of NFT management mechanisms; receiving an access request sent by an access party, judging whether the access party has ownership of a target NFT, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result; if the judgment result shows that the visitor has the ownership of the target NFT and the verification result shows that the UTXO is not spent, the method and the device provide access rights for the visitor, and the unique NFT ID is used for associating the member information of the user with the digital collection and associating different account information of the user with the digital collection, so that the method and the device are beneficial to enhancing the financial properties and transaction convenience of the digital collection. In the digital collection management process, an access request is used for determining whether an access party has ownership of a target NFT, and an integral value attribute and a benefit attribute are given to the access party, so that attribute transfer among multiple accounts is realized in the multi-channel transaction process of the digital product.
In a specific embodiment, the process of executing step S101 may specifically include the following steps:
(1) Respectively carrying out data calculation model creation on NFT casting issue, NFT copyright protection and NFT decentralization transaction to obtain an NFT issue model, an NFT copyright protection model and an NFT transaction model;
(2) Carrying out model integration on an NFT issue model, an NFT copyright protection model and an NFT transaction model to generate an NFT data calculation model set;
(3) Creating a plurality of NFT management mechanisms according to the NFT data calculation model set, wherein the plurality of NFT management mechanisms comprise: NFT distribution mechanisms, NFT transaction mechanisms, and NFT copyright protection mechanisms.
Specifically, the server first creates a computational model for NFT casting distribution to manage the NFT casting and distribution process. In this model, relevant parameters and rules for NFT release are defined, such as the total amount of NFT, the value of NFT, and the sales price of NFT, etc. The model may be implemented using different data structures and algorithms, such as a chain structure or a hash table structure. For each NFT issue request, it is authenticated and related calculations including NFT quantity, NFT value, NFT sales price are performed. If the rules are met, the corresponding NFT data may be added to the database. Further, for NFT copyright protection, another computational model is created to manage the NFT copyright protection and authorization process. In this model, relevant parameters and rules of NFT copyright authorization are defined, such as rights of NFT authors, rights of NFT usage, confidentiality of NFT data, etc. The model may be implemented using different encryption algorithms and digital signature techniques, such as elliptic curve Encryption (ECC) algorithms or RSA algorithms. Each NFT copyright protection request is checked, including authentication, NFT authorization, etc., to ensure the security and legitimacy of the request. Finally, for NFT decentralization transactions, a third computational model is created to manage the NFT transaction process. In this model, relevant parameters and rules of NFT transactions are defined, such as transfer of NFT ownership, transaction of NFT entity rights, and determination of price, etc. The model may be implemented using different encryption algorithms and digital signature techniques, such as the ethernet protocol. For each NFT transaction request, checks are made including UTXO spending verification, identity verification, price calculation, etc. And then, carrying out model integration on the three NFT calculation models to generate an NFT data calculation model set. In this set, the entire lifecycle of the NFT is considered, including processes of NFT foundry release, NFT copyright protection, and NFT decentralization transactions. The integration process may be implemented using different integration techniques and frameworks. For each NFT data computation model set, a corresponding database structure and query interface is designed to support subsequent management operations. Finally, a plurality of NFT management mechanisms are created according to the NFT data calculation model set. For NFT distribution mechanisms, information such as the total amount, price, and sales of NFTs is managed. For NFT transaction mechanisms, operations such as transfer, validation, and revocation of NFTs are governed. For the NFT copyright protection mechanism, information such as rights of NFT authors, use permissions of NFT, and data confidentiality protection is managed. Different rights management and authentication techniques may be used to implement these mechanisms, such as Access Control statements or OAuth protocol, etc.
In a specific embodiment, as shown in fig. 2, the process of executing step S102 may specifically include the following steps:
s201, acquiring member information and digital collection of a target user, and acquiring a plurality of different account information corresponding to the target user;
s202, carrying out association processing on member information and digital collection to obtain first association information;
s203, endowing financial attributes of the first association information, and associating a plurality of different account information with the first association information to generate second association information;
s204, according to the NFT management mechanisms, the unique ID of the NFT is used as the identifier of the second association information, and the target NFT is generated.
Specifically, the server first obtains the member information of the target user and the digital collection owned by the member information from the database. And a plurality of different account numbers related to the account information of the target user are acquired according to the account information of the target user. In addition, authentication and validity checking of the acquired user information is required to ensure that it is legal and valid. Further, association processing is performed on the member information and the digital collection to generate first association information. The process may be implemented using different association algorithms and techniques, such as relational databases or graph databases. And for each target user, searching the member information and the digital collection in the database, and carrying out association processing on the member information and the digital collection to obtain first association information. And giving financial attributes to the first association information, associating a plurality of different account information with the first association information, and generating second association information. Specifically, the first associated information is analyzed and processed by using a financial analysis and prediction algorithm to obtain relevant financial attributes. Then, a plurality of different account information is associated with the first association information to generate second association information. And finally, according to rules and standards of a plurality of NFT management mechanisms, taking the unique ID of the NFT as the identification of the second association information, and generating the target NFT. Specifically, the existing transaction mechanism in the NFT calculation model set is used for carrying out operations such as UTXO expense verification and identity verification, and the security and the legality of the NFT are ensured. The target NFT is then added to the database and a unique NFT identifier is generated for it.
In a specific embodiment, as shown in fig. 3, the process of executing step S103 may specifically include the following steps:
s301, receiving an access request sent by an access party;
s302, carrying out request analysis on the access request to obtain a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in a final transaction locking script;
s303, taking a signature corresponding to a public key in a final transaction locking script as target access information, wherein the signature corresponds to a transaction chain between an original transaction and a final transaction corresponding to a target NFT.
Specifically, the server receives an access request from an access party. This step may be implemented using a communication protocol such as HTTP protocol or WebSocket protocol. After a request is received, it needs to be authenticated and checked for validity to ensure that the request is legitimate and valid. Further, in the request parsing stage, the access request needs to be parsed to obtain information such as a transaction chain between the original transaction and the final transaction corresponding to the target NFT, and a signature corresponding to the public key in the final transaction locking script. Specifically, the request may be parsed using a script parsing language or a programming language to obtain the target access information. Finally, in the target access information acquisition stage, a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in the final transaction locking script are required to be used as target access information. This information may be saved in a database or other data storage device for future access rights verification and authorization processing. When preserving target access information, attention is paid to the integrity, consistency and security of the data.
In a specific embodiment, as shown in fig. 4, the process of executing step S104 may specifically include the following steps:
s401, searching transaction information from a preset blockchain according to target access information;
s402, judging whether the visitor has ownership of the target NFT according to the transaction information to obtain a judgment result, wherein the judgment result comprises: the visitor has ownership of the target NFT or the visitor does not have ownership of the target NFT;
s403, sending the final transaction corresponding to the target NFT to a preset full node, and carrying out UTXO expense verification on the final transaction of the target NFT through the full node to obtain a verification result, wherein the verification result comprises the following steps: UTXOs are either not spent or UTXOs are spent.
Specifically, the server uses smart contracts preset on the blockchain to store and manage all transaction information, wherein each transaction corresponds to a unique transaction hash value; when a user needs to judge whether the user owns the ownership of the target NFT, the user can acquire the transaction information related to the target NFT by sending a request for inquiring the transaction information to the intelligent contract, and then, the user can determine whether the user owns the NFT by analyzing and comparing the transaction information; to prevent counterfeiting and tampering with the transaction information, each transaction needs to be digitally signed in a smart contract and converted to an irreversible hash value using a hash function; after the judgment of the ownership of the target NFT is completed, the corresponding final transaction can be sent to a preset full node, and UTXO expense verification is carried out on the final transaction of the target NFT through the full node so as to ensure that the final transaction is not spent; in order to ensure the security and integrity of the system, multiple signature verification needs to be performed on each transaction in the blockchain, and a cryptography algorithm is used for protecting private key information of a user; finally, a full network broadcast needs to be performed for each transaction so that other nodes and users can obtain the latest transaction information and ensure the consistency and stability of the blockchain.
In a specific embodiment, the process of executing step S105 may specifically include the following steps:
(1) If the judgment result is that the access party has the ownership of the target NFT and the verification result is that the UTXO is not spent, the access party is authorized to access the digital collection;
(2) When the access party is authorized to access the digital collection, it is determined to provide access rights to the access party.
Specifically, a digital collection access white list is stored in the intelligent contract, and user information with access authority, such as a public key of a user and corresponding authorization time, is recorded; when the visitor satisfies the condition that the visitor owns the ownership of the target NFT and the UTXO is not spent, the intelligent appointment automatically checks whether it is in the visitor whitelist; if the visitor is not in the white list, the smart contract will reject its access request; if the access party is in the white list, the intelligent contract automatically records the access log, namely records the public key of the access party, the access time, the hash value of the target collection and other information; meanwhile, after the access is finished, the intelligent contract can automatically delete the expired authorization information from the access white list so as to ensure that the access authority of the digital collection is only granted to legal users. To ensure the security and reliability of digital collections, multiple signatures and cryptographic algorithms are required to protect the access whitelists and access logs from security, and corresponding backup and disaster recovery mechanisms are employed to prevent any data loss and corruption. In addition, the following factors need to be considered when determining the rights to grant access: whether access time and number of times need to be limited; whether or not it is necessary to interoperate with other intelligent contracts, such as open auction contracts, etc.
In a specific embodiment, the method for performing NFT-based multi-account access rights management further includes the steps of:
(1) Creating a unique identifier of the digital collection when the visitor is visiting;
(2) Creating an integral value attribute and a equity attribute of the digital collection, and associating the integral value attribute and the equity attribute with a unique identifier of the digital collection;
(3) When the visitor accesses the digital collection, verifying the identity of the visitor and giving the corresponding integral numerical value attribute and rights attribute to the visitor;
(4) In a multi-channel transaction process for digital products, an accessing party transfers a point value attribute and a benefit attribute in transactions with other accounts.
Specifically, a unique identifier of the digital collection is stored in the intelligent contract, and an integral value attribute and a rights attribute of the digital collection are stored, wherein the integral value attribute can represent the value and scarcity degree of the digital collection, and the rights attribute can represent the use and control rights of the digital collection; when the access party accesses the digital collection, an identity verification request can be sent to the intelligent contract to acquire public key information, digital signature and other identity verification information of the access party; after the identity verification is passed, the intelligent closing date is automatically endowed with the integral value attribute and the rights attribute corresponding to the accessing party, for example, the integral value attribute and the rights attribute can be packaged into a digital transaction, and the digital signature and the multiple signature verification are carried out on the digital transaction by using a cryptography algorithm; the visitor can transfer the credit value attribute and the equity attribute in a digital transaction in a transaction with other accounts, for example, it can be included in a UTXO transaction, and converted to a tamper-resistant hash value using a hash function.
The multi-account access right management method based on NFT in the embodiment of the present invention is described above, and the multi-account access right management device based on NFT in the embodiment of the present invention is described below, referring to fig. 5, one embodiment of the multi-account access right management device based on NFT in the embodiment of the present invention includes:
a creating module 501, configured to create an NFT data computing model set, and generate a plurality of NFT management mechanisms according to the NFT data computing model set;
the obtaining module 502 is configured to obtain member information and digital collection of a target user, and according to the multiple NFT management mechanisms, use an NFT unique ID as an identifier of the member information and the digital collection, to obtain a target NFT;
the analyzing module 503 is configured to receive an access request sent by an accessing party, and perform request analysis on the access request to obtain target access information;
the processing module 504 is configured to determine whether the accessing party has ownership of the target NFT according to the target access information, obtain a determination result, and perform UTXO expense verification on a final transaction of the target NFT according to a preset full node, to obtain a verification result;
and the access module 505 is configured to provide access rights for the access party if the determination result is that the access party has ownership of the target NFT and the verification result is that the UTXO is not spent.
Creating an NFT data calculation model set through the cooperative cooperation of the components, and generating a plurality of NFT management mechanisms according to the NFT data calculation model set; acquiring member information and digital collection of a target user, and generating a target NFT according to a plurality of NFT management mechanisms; receiving an access request sent by an access party, judging whether the access party has ownership of a target NFT, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result; if the judgment result shows that the visitor has the ownership of the target NFT and the verification result shows that the UTXO is not spent, the method and the device provide access rights for the visitor, and the unique NFT ID is used for associating the member information of the user with the digital collection and associating different account information of the user with the digital collection, so that the method and the device are beneficial to enhancing the financial properties and transaction convenience of the digital collection. In the digital collection management process, an access request is used for determining whether an access party has ownership of a target NFT, and an integral value attribute and a benefit attribute are given to the access party, so that attribute transfer among multiple accounts is realized in the multi-channel transaction process of the digital product.
Fig. 5 above describes the multi-account access right management device based on NFT in the embodiment of the present invention in detail from the point of view of a modularized functional entity, and the multi-account access right management device based on NFT in the embodiment of the present invention is described in detail from the point of view of hardware processing.
Fig. 6 is a schematic structural diagram of an NFT-based multi-account access rights management device 600 according to an embodiment of the present invention, where the NFT-based multi-account access rights management device 600 may have a relatively large difference due to different configurations or performances, and may include one or more processors (central processing units, CPU) 610 (e.g., one or more processors) and a memory 620, and one or more storage media 630 (e.g., one or more mass storage devices) storing applications 633 or data 632. Wherein the memory 620 and the storage medium 630 may be transitory or persistent storage. The program stored on the storage medium 630 may include one or more modules (not shown), each of which may include a series of instruction operations in the NFT-based multi-account access rights management device 600. Still further, the processor 610 may be configured to communicate with the storage medium 630 to execute a series of instruction operations in the storage medium 630 on the NFT-based multi-account access rights management device 600.
The NFT-based multi-account access rights management device 600 may also include one or more power supplies 640, one or more wired or wireless network interfaces 650, one or more input/output interfaces 660, and/or one or more operating systems 631, such as Windows service, mac OSX, unix, linux, freeBSD, and the like. It will be appreciated by those skilled in the art that the NFT-based multi-account access rights management device architecture shown in fig. 6 does not constitute a limitation of the NFT-based multi-account access rights management device, and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The present invention also provides an NFT-based multi-account access right management device, where the NFT-based multi-account access right management device includes a memory and a processor, where the memory stores computer readable instructions, and the computer readable instructions, when executed by the processor, cause the processor to execute the steps of the NFT-based multi-account access right management method in the foregoing embodiments.
The present invention also provides a computer readable storage medium, which may be a non-volatile computer readable storage medium, and may also be a volatile computer readable storage medium, where instructions are stored in the computer readable storage medium, when the instructions are executed on a computer, cause the computer to perform the steps of the NFT-based multi-account access rights management method.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (randomacceS memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. The multi-account access right management method based on the NFT is characterized by comprising the following steps of:
creating an NFT data calculation model set, and generating a plurality of NFT management mechanisms according to the NFT data calculation model set;
acquiring member information and digital stock of a target user, and taking an NFT unique ID as the member information and the identification of the digital stock according to the plurality of NFT management mechanisms to obtain a target NFT;
receiving an access request sent by an access party, and carrying out request analysis on the access request to obtain target access information;
judging whether the visitor has ownership of the target NFT according to the target access information, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result;
And if the judgment result is that the access party has the ownership of the target NFT and the verification result is that the UTXO is not spent, providing access rights for the access party.
2. The NFT-based multi-account access rights management method of claim 1, wherein the creating an NFT data computing model set and generating a plurality of NFT management mechanisms from the NFT data computing model set comprises:
respectively carrying out data calculation model creation on NFT casting issue, NFT copyright protection and NFT decentralization transaction to obtain an NFT issue model, an NFT copyright protection model and an NFT transaction model;
performing model integration on the NFT issue model, the NFT copyright protection model and the NFT transaction model to generate an NFT data calculation model set;
creating a plurality of NFT management mechanisms according to the NFT data calculation model set, wherein the plurality of NFT management mechanisms comprise: NFT distribution mechanisms, NFT transaction mechanisms, and NFT copyright protection mechanisms.
3. The NFT-based multi-account access authority management method of claim 1, wherein the obtaining member information and digital collection of a target user, and using an NFT unique ID as the member information and an identification of the digital collection according to the plurality of NFT management mechanisms, to obtain the target NFT, comprises:
Acquiring member information and digital collection of a target user, and acquiring a plurality of different account information corresponding to the target user;
carrying out association processing on the member information and the digital collection to obtain first association information;
giving financial attributes to the first association information, associating the plurality of different account information with the first association information, and generating second association information;
and generating a target NFT by taking the unique NFT ID as the identifier of the second association information according to the plurality of NFT management mechanisms.
4. The NFT-based multi-account access right management method of claim 1, wherein the receiving the access request sent by the accessing party, and performing request parsing on the access request, to obtain the target access information, includes:
receiving an access request sent by an access party;
carrying out request analysis on the access request to obtain a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in a final transaction locking script;
and taking a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in the final transaction locking script as target access information.
5. The NFT-based multi-account access authority management method of claim 1, wherein the determining whether the visitor has ownership of the target NFT according to the target access information, obtaining a determination result, and performing UTXO spending verification on a final transaction of the target NFT according to a preset full node, obtaining a verification result, includes:
searching transaction information from a preset blockchain according to the target access information;
judging whether the access party has ownership of the target NFT according to the transaction information, and obtaining a judgment result, wherein the judgment result comprises: the visitor has ownership of the target NFT or the visitor does not have ownership of the target NFT;
transmitting the final transaction corresponding to the target NFT to a preset full node, and performing UTXO expense verification on the final transaction of the target NFT through the full node to obtain a verification result, wherein the verification result comprises the following steps: UTXOs are either not spent or UTXOs are spent.
6. The NFT-based multi-account access rights management method of claim 1, wherein providing access rights to an accessing party if the determining result is that the accessing party has ownership of a target NFT and the verifying result is UTXO is not spent, comprising:
If the judgment result is that the accessing party has the ownership of the target NFT and the verification result is that the UTXO is not spent, authorizing the accessing party to access the digital collection;
and when the access party is authorized to access the digital collection, determining to provide access rights for the access party.
7. The NFT-based multi-account access rights management method of claim 1, further comprising:
creating a unique identifier of the digital collection when the visitor is visiting;
creating an integral value attribute and a equity attribute of the digital collection, and associating the integral value attribute and the equity attribute with a unique identifier of the digital collection;
when the visitor accesses the digital collection, verifying the identity of the visitor and giving the visitor corresponding point value attribute and rights attribute;
during a multi-channel transaction of a digital product, the accessing party transfers the credit value attribute and the equity attribute in a transaction between other accounts.
8. An NFT-based multi-account access rights management apparatus, the NFT-based multi-account access rights management apparatus comprising:
The system comprises a creation module, a processing module and a processing module, wherein the creation module is used for creating an NFT data calculation model set and generating a plurality of NFT management mechanisms according to the NFT data calculation model set;
the acquisition module is used for acquiring member information and digital stock of a target user, and taking the unique NFT ID as the member information and the identification of the digital stock according to the multiple NFT management mechanisms to obtain a target NFT;
the analysis module is used for receiving an access request sent by an access party and carrying out request analysis on the access request to obtain target access information;
the processing module is used for judging whether the visitor has ownership of the target NFT according to the target access information, obtaining a judging result, and carrying out UTXO expense verification on the final transaction of the target NFT according to a preset full node to obtain a verification result;
and the access module is used for providing access rights for the access party if the judgment result is that the access party has the ownership of the target NFT and the verification result is that the UTXO is not spent.
9. An NFT-based multi-account access rights management apparatus, the NFT-based multi-account access rights management apparatus comprising: a memory and at least one processor, the memory having instructions stored therein;
The at least one processor invoking the instructions in the memory to cause the NFT-based multi-account access rights management device to perform the NFT-based multi-account access rights management method of any of claims 1-7.
10. A computer readable storage medium having instructions stored thereon, which when executed by a processor implement the NFT-based multi-account access rights management method of any of claims 1-7.
CN202310688364.2A 2023-06-12 2023-06-12 Multi-account access authority management method and related device based on NFT Active CN116484326B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310688364.2A CN116484326B (en) 2023-06-12 2023-06-12 Multi-account access authority management method and related device based on NFT

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310688364.2A CN116484326B (en) 2023-06-12 2023-06-12 Multi-account access authority management method and related device based on NFT

Publications (2)

Publication Number Publication Date
CN116484326A true CN116484326A (en) 2023-07-25
CN116484326B CN116484326B (en) 2024-01-26

Family

ID=87219834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310688364.2A Active CN116484326B (en) 2023-06-12 2023-06-12 Multi-account access authority management method and related device based on NFT

Country Status (1)

Country Link
CN (1) CN116484326B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090265343A1 (en) * 2008-04-17 2009-10-22 Express Digital Graphics, Inc. Systems and methods for creative works registration and ownership determinations
US9628573B1 (en) * 2012-05-01 2017-04-18 Amazon Technologies, Inc. Location-based interaction with digital works
CN113988857A (en) * 2021-11-08 2022-01-28 福建博泉哈希科技有限公司 NFT transaction method, transaction system, computer-readable storage medium and terminal device
CN114900334A (en) * 2022-04-14 2022-08-12 福建博泉哈希科技有限公司 NFT authority control method, system, computer readable storage medium and terminal device
CN115271962A (en) * 2022-08-19 2022-11-01 焦选宁 NFT transaction management system based on decentralized autonomous organization
WO2022248938A1 (en) * 2021-05-27 2022-12-01 Avea Media Inc. Authenticating data and communication sources
US20230033434A1 (en) * 2021-07-22 2023-02-02 Dapper Labs Inc. System and method for managing access to online digital collectibles
CN115983997A (en) * 2022-12-30 2023-04-18 蚂蚁区块链科技(上海)有限公司 Block chain-based collection management method, block chain node and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090265343A1 (en) * 2008-04-17 2009-10-22 Express Digital Graphics, Inc. Systems and methods for creative works registration and ownership determinations
US9628573B1 (en) * 2012-05-01 2017-04-18 Amazon Technologies, Inc. Location-based interaction with digital works
WO2022248938A1 (en) * 2021-05-27 2022-12-01 Avea Media Inc. Authenticating data and communication sources
US20230033434A1 (en) * 2021-07-22 2023-02-02 Dapper Labs Inc. System and method for managing access to online digital collectibles
CN113988857A (en) * 2021-11-08 2022-01-28 福建博泉哈希科技有限公司 NFT transaction method, transaction system, computer-readable storage medium and terminal device
CN114900334A (en) * 2022-04-14 2022-08-12 福建博泉哈希科技有限公司 NFT authority control method, system, computer readable storage medium and terminal device
CN115271962A (en) * 2022-08-19 2022-11-01 焦选宁 NFT transaction management system based on decentralized autonomous organization
CN115983997A (en) * 2022-12-30 2023-04-18 蚂蚁区块链科技(上海)有限公司 Block chain-based collection management method, block chain node and system

Also Published As

Publication number Publication date
CN116484326B (en) 2024-01-26

Similar Documents

Publication Publication Date Title
US11784791B2 (en) Verifying an identity based on multiple distributed data sources using a blockchain to safeguard the identity
CN111434084B (en) Permission to access information from an entity
KR101937220B1 (en) Method for generating and verifying a digital signature or message authentication code based on a block chain that does not require key management
EP3005648B1 (en) Terminal identification method, and method, system and apparatus of registering machine identification code
CN112507391B (en) Block chain-based electronic signature method, system, device and readable storage medium
CN112202705A (en) Digital signature verification generation and verification method and system
CN113256297B (en) Data processing method, device and equipment based on block chain and readable storage medium
CN111460400A (en) Data processing method and device and computer readable storage medium
CN110661779A (en) Block chain network-based electronic certificate management method, system, device and medium
Kairaldeen et al. Data integrity time optimization of a blockchain IoT smart home network using different consensus and hash algorithms
US11570005B2 (en) Systems and methods for proving immutability of blockchains
CN106529216B (en) Software authorization system and software authorization method based on public storage platform
CN116484326B (en) Multi-account access authority management method and related device based on NFT
CN116415214A (en) Data access control method and system based on digital signature
CN117034370B (en) Data processing method based on block chain network and related equipment
CN115544170B (en) Data hosting method and device based on block chain, electronic equipment and medium
US11755746B1 (en) Systems and methods for conducting blockchain actions based on network mappings of self-executing program characteristics
CN116938589A (en) Method and device for accessing white list by service of Hadoop distributed file system
CN115459997A (en) Traceable voting system, method and platform based on block chain
CN110597826A (en) Data isolation method and device based on block chain network
CN116562881A (en) Data authority processing method and device, electronic equipment and storage medium
CN113076331A (en) Middle station data processing method, device, equipment, storage medium and program product
CN115208640A (en) Named data network public key management method based on block chain intelligent contract
KR20130085333A (en) Method for certification at client with information made by server
CN117040930A (en) Resource processing method, device, product, equipment and medium of block chain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant