WO2020108152A1 - Procédé, dispositif et équipement électronique pour empêcher l'utilisation abusive de données d'identité - Google Patents

Procédé, dispositif et équipement électronique pour empêcher l'utilisation abusive de données d'identité Download PDF

Info

Publication number
WO2020108152A1
WO2020108152A1 PCT/CN2019/111584 CN2019111584W WO2020108152A1 WO 2020108152 A1 WO2020108152 A1 WO 2020108152A1 CN 2019111584 W CN2019111584 W CN 2019111584W WO 2020108152 A1 WO2020108152 A1 WO 2020108152A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity data
user
identity
smart contract
applicable scope
Prior art date
Application number
PCT/CN2019/111584
Other languages
English (en)
Chinese (zh)
Inventor
栗志果
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2020108152A1 publication Critical patent/WO2020108152A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • One or more embodiments of this specification relate to the field of blockchain technology, and in particular, to a method and device for preventing misuse of identity data, and electronic equipment.
  • biometrics has been widely used in various scenarios to achieve efficient and accurate identity verification.
  • the website can identify and verify the user by collecting identity data such as the user's face image and based on the corresponding face recognition and other technical means In order to provide related business functions for the verified identity information.
  • one or more embodiments of this specification provide a method, device and electronic device for preventing misuse of identity data.
  • a method for preventing misuse of identity data is proposed, which is applied to a blockchain node.
  • the method includes:
  • the smart contract is used to add restriction information related to the applicable scope to the identity data.
  • a device for preventing misuse of identity data is proposed for use in a blockchain node.
  • the device includes:
  • An obtaining unit obtaining the user's identity data, so as to authenticate the user according to the identity data
  • a calling unit calls a smart contract, and the smart contract is used to add restriction information related to the applicable scope to the identity data.
  • an electronic device including:
  • Memory for storing processor executable instructions
  • the processor executes the executable instruction to implement the method as described in the above embodiment.
  • FIG. 1 is a flowchart of a method for preventing misuse of identity data according to an exemplary embodiment.
  • FIG. 2 is a schematic diagram of a house rental scenario provided by an exemplary embodiment.
  • FIG. 3 is a schematic diagram of implementing real person authentication provided by an exemplary embodiment.
  • FIG. 4 is a schematic diagram of an anti-misuse processing for identity data provided by an exemplary embodiment.
  • FIG. 5 is a schematic structural diagram of an apparatus provided by an exemplary embodiment.
  • FIG. 6 is a block diagram of an apparatus provided by an exemplary embodiment.
  • the steps of the corresponding method are not necessarily performed in the order shown and described in this specification.
  • the method may include more or fewer steps than described in this specification.
  • the single step described in this specification may be decomposed into multiple steps for description in other embodiments; and the multiple steps described in this specification may also be combined into a single step in other embodiments. description.
  • FIG. 1 is a flowchart of a method for preventing misuse of identity data according to an exemplary embodiment. As shown in Figure 1, this method is applied to blockchain nodes and can include the following steps:
  • Step 102 Obtain the user's identity data to authenticate the user according to the identity data.
  • the user's identity data can be obtained and identity authentication can be implemented, which is not limited in this specification.
  • identity data of the user may be obtained when the preset service request initiated by the user has identity restrictions.
  • the identity authentication method may include any of the following: face recognition, real person authentication, etc., which is not limited in this specification.
  • the acquired identity data may include the face image of the user.
  • the acquired identity data may include face images, face videos, certificate images, audio (such as a specific verification code read out by the user, etc.), etc.
  • the electronic device can be configured as a blockchain node in the blockchain network, for example, the electronic device can include a server, PC, tablet Various types of computers, mobile phones, etc.
  • blockchain nodes can be carried on any form of electronic equipment, and this manual does not limit this.
  • Step 104 Determine the applicable scope of the user's declaration of the identity data.
  • the electronic device used by the user may display several alternatives, respectively corresponding to the applicable scope of application; and the user may select one or more alternatives as the application of the declared identity data range.
  • user audio, audio information contained in the user video, display content in the user video, etc. may be obtained, and the audio content or video display content may be analyzed to determine the user's application for the identity data declaration range. For example, when the user audio includes "this authentication is only used for XXX business" and so on, it indicates that the user declares that his identity data is only used for this "XXX business".
  • step 106 a smart contract is invoked, and the smart contract is used to add restriction information related to the applicable scope to the identity data.
  • the actual application scenario of the identity data can be compared with the restriction information, and the authenticity of the identity data can be determined if the two are consistent , So as to prevent the identity data from being misused or maliciously used in other scenarios.
  • the restriction information can still restrict the identity data, which helps to improve the security of the identity data.
  • the operation of adding the restriction information by calling the smart contract can be implemented automatically and efficiently on the one hand, and can avoid the unreliability caused by human participation and ensure loyalty on the other hand Implement the operation of adding restricted information.
  • the smart contract may send a processing instruction to the local device or the external device, so that the local device or the external device (which can transmit the identity data and the applicable range of information to the external device) can respond to the processing instruction, thereby identifying the identity Add the corresponding restriction information to the data.
  • a smart contract may be used to confirm whether the applicable scope is consistent with the predefined applicable scope in the smart contract.
  • one or more application scopes can be predefined in the smart contract, and when the application scope declared by the user is consistent with the predefined application scope in the smart contract, the application scope declared by the user can be determined to be valid, and the corresponding can be added accordingly Restricted information; and when the scope of application declared by the user is inconsistent with the predefined scope of application in the smart contract, it indicates that there may be user operation errors or other abnormal conditions, and it can be determined that the scope of application declared by the user is invalid.
  • the smart contract in the case where the blockchain node obtains its identity data based on the preset business request initiated by the user, the smart contract can be used to confirm the business that corresponds to the preset business request Whether the scope is consistent; when the confirmation is consistent, the applicable scope declared by the user can be determined to be valid, and corresponding restriction information can be added accordingly; and when the confirmation is inconsistent, indicating that there may be a user's operation error or other abnormal conditions, the judgment may be determined The application scope declared by the user is invalid.
  • the identity data may be visual information
  • the visual information may include image information, video information, etc., which is not limited in this specification.
  • the restriction information may include: a watermark added to the identity data to characterize the applicable range, that is, a digital watermark or an electronic watermark.
  • an identity authentication result may be generated, the identity authentication result includes the identity data and result information, and the identity authentication result and/or the digital summary information of the identity authentication result are recorded in a block Chain, so as to make the data on the blockchain publicly searchable and non-tamperable, so that the identity verification result or its digital summary can be verified from the blockchain at any time in the subsequent process.
  • the identity authentication result by recording the identity authentication result locally on the blockchain node and recording the digital summary information (such as the hash value) of the identity authentication result on the blockchain, based on the unique mapping relationship between the identity authentication result and the digital summary information , You can verify the corresponding identity authentication results based on the digital summary information, and at the same time avoid the public record of identity authentication results (especially identity data and other content) in the blockchain, which helps improve security and privacy.
  • the digital summary information such as the hash value
  • a transaction can be issued to the blockchain to record the identity authentication result or its digital summary information on the blockchain.
  • the transfer described in this specification refers to a piece of data that is created by the client of the blockchain and needs to be finally released to the distributed database of the blockchain.
  • a narrowly defined transaction refers to a value transfer issued by the user to the blockchain; for example, in the traditional Bitcoin blockchain network, the transaction can be a transfer initiated by the user in the blockchain.
  • the generalized transaction refers to a piece of business data with business intent published by the user to the blockchain; for example, the operator can build an alliance chain based on actual business needs, relying on the alliance chain to deploy some other types that have nothing to do with value transfer Online business (for example, rental business, vehicle scheduling business, insurance claims business, credit service, medical service, etc.), and in this type of alliance chain, the transaction can be a business with business intent issued by the user in the alliance chain Message or business request.
  • value transfer Online business for example, rental business, vehicle scheduling business, insurance claims business, credit service, medical service, etc.
  • FIG. 2 is a schematic diagram of a house rental scenario provided by an exemplary embodiment.
  • the mobile phone 21 can be run through the APP client of the house rental platform or the website that loads the house rental platform To provide user A with a house rental function.
  • the house leasing platform can authenticate user A to facilitate the effective management of user A’s personal identity, timely discover possible risks (such as intercepting risk users, etc.) and ensure subsequent signing The lease agreement and other agreements are true and effective.
  • the house rental platform may initiate a call request to a server 22 with real person authentication capability to call the real person authentication service provided by the server 22.
  • the server 22 may belong to the enterprise of the house rental platform, or the server 22 may belong to the third-party enterprise, which is not limited in this specification.
  • the server 22 can also provide a real-person authentication service and an identity data anti-misuse scheme based on this specification to other platforms, which is not limited in this specification.
  • FIG. 3 is a schematic diagram of implementing real person authentication provided by an exemplary embodiment.
  • the mobile phone 21 can collect an image of the user A through the camera module, so that the collected picture or video includes the face image of the user A, the image of the user A holding a valid certificate (such as an ID card), the user A executes the corresponding action image according to the instructions as identity data for user A, and the identity data is uploaded to the server 22 by the mobile phone 21, so that the server 22 can be based on face detection, face recognition, OCR certificate recognition, living body detection A variety of technical means, etc., to implement real person authentication for user A.
  • a valid certificate such as an ID card
  • the server 22 After the real person authentication is completed, the server 22 will obtain the relevant identity data of the user A, such as the face image shown on the right side of FIG. 3 or the image of the user A holding a valid certificate mentioned above. At the same time, after completing the real person authentication, the server 22 will also feedback the authentication result to the housing rental platform, and the authentication result usually contains not only the result information of "passed authentication” or "failed authentication", but also the above-mentioned identity data .
  • both the server 22 and the house rental platform have the opportunity to obtain the user A's identity data, making it possible for the server 22 and the house rental platform to misuse or maliciously steal the user A's identity data and apply it to real person authentication in other scenarios In the process of signing the agreement, etc., it will cause adverse effects.
  • FIG. 4 is a schematic diagram of an anti-misuse process for identity data provided by an exemplary embodiment.
  • user A in the process of real person authentication, can declare the applicable scope of the identity data generated at the time.
  • the server 22 can display the applicable scope confirmation interface to the user A through the mobile phone 21.
  • the applicable scope confirmation interface Contains alternatives corresponding to several predefined application ranges, so that user A can choose from the alternatives or provide a new custom application range, or server 22 does not need to provide an application range confirmation interface, but user A directly declares the corresponding Scope of application.
  • the user A can enter text on the mobile phone 21 to form the scope of application in the form of text. Or, user A may issue a voice indicating the applicable range, such as reading the alternatives passed in the applicable range confirmation interface, or user A may organize the voice content by itself.
  • the mobile phone 21 can be directly uploaded to the server 22; when the applicable scope is in voice form, the mobile phone 21 can obtain the corresponding text content through voice recognition, and upload the recognized text content to the server 22, or The mobile phone 21 can directly upload the voice to the server 22 for the server 22 to perform voice recognition and corresponding processing.
  • a client of the blockchain is configured on the server 22, that is, the server 22 itself belongs to a blockchain node in the blockchain network. Therefore, the server 22 can call a pre-generated smart contract, and the smart contract can check the applicable scope declared by the user A.
  • the smart contract may be pre-defined with several optional application ranges, and the smart contract may compare the application range declared by user A with the above optional application range; when the application range declared by user A does not belong to the optional application range When, you can output the failed test.
  • the smart contract can separately determine the applicable scope declared by user A and the current business scenario, for example, when the applicable scope declared by user A is "only for house rental", and the identity data is called by the house rental platform to the real person Generated by the authentication service, that is, the current business belongs to the "house rental", smart contract can determine that the scope of application declared by user A matches the current business belongs to the scene; and if the scope of application declared by user A is "only for house rental ", the current business belongs to the scene "house sales", the smart contract can determine that the scope of application declared by the user A does not match the current business belongs to the scene, the smart contract can output failed test.
  • the server 22 may request the user A to re-state the applicable scope of the identity data; if the output of the smart contract fails the verification within a given number of times (such as 3 times), the server 22 may determine A real person authentication fails, regardless of whether it has actually passed the real person authentication, and the server 22 should delete the user A's identity data and avoid providing the user A's identity data to the house rental platform.
  • the smart contract can only check the applicable scope declared by user A according to the predefined optional scope; or, the smart contract can only check the applicable scope declared by user A according to the scenario of the current business; or, the smart contract
  • the predefined optional application range and the current business scenario can be considered at the same time. Of course, the actual operation may not be implemented at the same time. For example, the predefined optional application range can be considered first, and then the current business scenario is considered.
  • the smart contract when the smart contract determines that the scope of application declared by user A passes the test, the smart contract can output a processing instruction for the identity data of user A, thereby adding restriction information related to the scope of declaration of user A to the identity data of user A, such as A digital watermark such as "only for house rental" can be added to the face image shown in FIG. 3, thereby forming a face image shown on the right side of FIG.
  • restriction information such as a digital watermark
  • user A's identity data when applied to other scenes, it can be quickly identified based on the digital watermark in the identity data, thereby refusing to process or facilitating retrospectively.
  • the server 22 may return a real person authentication result of the identity data to the house rental platform, the authentication result includes the result information and the identity data added with limited information, which can prevent the identity data from being misused by the house rental platform Or malicious misappropriation.
  • the server 22 can also record the authentication result into the blockchain, on the one hand, it can ensure that the authentication result cannot be tampered with, and on the other hand, it is convenient to query the blockchain ledger afterwards to trace the authentication result.
  • the server 22 can generate digital summary information (such as a hash value) of the authentication result, and record the digital summary information into the blockchain, which can also be traced back.
  • FIG. 5 is a schematic structural diagram of a device provided by an exemplary embodiment. Please refer to FIG. 5.
  • the device includes a processor 502, an internal bus 504, a network interface 506, a memory 508, and a non-volatile memory 510.
  • the processor 502 reads the corresponding computer program from the non-volatile memory 510 into the memory 508 and then runs it to form a device for preventing misuse of identity data at a logical level.
  • one or more embodiments of this specification do not exclude other implementations, such as a logic device or a combination of software and hardware, etc., that is to say, the execution body of the following processing flow is not limited to each
  • the logic unit may also be a hardware or logic device.
  • the device for preventing misuse of identity data is applied to a blockchain node.
  • the device may include:
  • the obtaining unit 61 obtains the user's identity data to authenticate the user according to the identity data;
  • the determining unit 62 determines the applicable scope of the user's declaration of the identity data
  • the calling unit 63 calls a smart contract, and the smart contract is used to add restriction information related to the applicable scope to the identity data.
  • the acquiring unit 61 is specifically configured to: when the preset service request initiated by the user has an identity restriction, acquire the identity data of the user;
  • the smart contract is also used to confirm whether the applicable scope is consistent with the business scope corresponding to the preset business request.
  • the smart contract is also used to confirm whether the applicable scope is consistent with the predefined applicable scope in the smart contract.
  • the restriction information includes: a watermark added to the identity data to characterize the applicable range.
  • Optional also includes:
  • the generating unit 64 generates an identity authentication result, and the identity authentication result includes the identity data and result information;
  • the recording unit 65 records the identity authentication result and/or the digital summary information of the identity authentication result on the blockchain.
  • the identity authentication method includes any one of the following: face recognition and real person authentication.
  • the system, device, module or unit explained in the above embodiments may be specifically implemented by a computer chip or entity, or implemented by a product with a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet computer, wearable device, or any combination of these devices.
  • the computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in computer-readable media, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
  • RAM random access memory
  • ROM read only memory
  • flash RAM flash random access memory
  • Computer-readable media including permanent and non-permanent, removable and non-removable media, can store information by any method or technology.
  • the information may be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic disk storage, quantum memory, graphene-based storage media or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices.
  • computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves.
  • first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as second information, and similarly, the second information may also be referred to as first information.
  • word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination”.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un procédé et un dispositif ainsi qu'un type d'équipement électronique qui permettent d'empêcher l'utilisation abusive de données d'identité, et qui peuvent s'appliquer à des nœuds de chaîne de blocs. Le procédé comprend les étapes suivantes : obtention de données d'identité d'un utilisateur pour soumettre l'utilisateur à une authentification d'identité selon les données d'identité (102) ; détermination d'un champ d'application indiqué par l'utilisateur pour les données d'identité (104) ; révocation d'un contrat intelligent, le contrat intelligent étant utilisé pour ajouter les informations de restriction de données d'identité associées au champ d'application (106).
PCT/CN2019/111584 2018-11-30 2019-10-17 Procédé, dispositif et équipement électronique pour empêcher l'utilisation abusive de données d'identité WO2020108152A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811453028.5A CN110032846B (zh) 2018-11-30 2018-11-30 身份数据的防误用方法及装置、电子设备
CN201811453028.5 2018-11-30

Publications (1)

Publication Number Publication Date
WO2020108152A1 true WO2020108152A1 (fr) 2020-06-04

Family

ID=67235280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/111584 WO2020108152A1 (fr) 2018-11-30 2019-10-17 Procédé, dispositif et équipement électronique pour empêcher l'utilisation abusive de données d'identité

Country Status (3)

Country Link
CN (1) CN110032846B (fr)
TW (1) TW202022669A (fr)
WO (1) WO2020108152A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110032846B (zh) * 2018-11-30 2021-11-02 创新先进技术有限公司 身份数据的防误用方法及装置、电子设备
CN110555296B (zh) * 2019-08-01 2020-08-18 阿里巴巴集团控股有限公司 基于区块链的身份验证方法、装置及设备
US10756901B2 (en) 2019-08-01 2020-08-25 Alibaba Group Holding Limited Blockchain-based identity authentication method, apparatus, and device
CN111885339A (zh) * 2020-07-01 2020-11-03 海尔优家智能科技(北京)有限公司 隐私处理方法及装置、计算机可读的存储介质、电子介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659429A (zh) * 2017-08-11 2018-02-02 四川大学 基于区块链的数据共享方法
CN107862215A (zh) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 一种数据存储方法、数据查询方法及装置
CN108038179A (zh) * 2017-12-07 2018-05-15 泰康保险集团股份有限公司 身份信息认证方法与装置
CN110032846A (zh) * 2018-11-30 2019-07-19 阿里巴巴集团控股有限公司 身份数据的防误用方法及装置、电子设备

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453407B (zh) * 2016-11-23 2019-10-15 江苏通付盾科技有限公司 基于区块链的身份认证方法、认证服务器及用户终端
CN107579998A (zh) * 2017-10-17 2018-01-12 光载无限(北京)科技有限公司 基于区块链、数字身份和智能合约的个人数据中心及数字身份认证方法
CN107911373B (zh) * 2017-11-24 2019-09-06 中钞信用卡产业发展有限公司杭州区块链技术研究院 一种区块链权限管理方法及系统
CN108122109B (zh) * 2017-12-15 2021-05-07 广州天宁信息技术有限公司 一种电子凭据身份管理的方法及装置
CN108173850B (zh) * 2017-12-28 2021-03-19 杭州趣链科技有限公司 一种基于区块链智能合约的身份认证系统和身份认证方法
CN108683646B (zh) * 2018-04-28 2021-03-16 厦门美图之家科技有限公司 一种认证方法及计算设备
CN108769133A (zh) * 2018-05-04 2018-11-06 珠海市筑巢科技有限公司 一种基于区块链的飞行数据共享方法、计算机装置及计算机可读存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659429A (zh) * 2017-08-11 2018-02-02 四川大学 基于区块链的数据共享方法
CN107862215A (zh) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 一种数据存储方法、数据查询方法及装置
CN108038179A (zh) * 2017-12-07 2018-05-15 泰康保险集团股份有限公司 身份信息认证方法与装置
CN110032846A (zh) * 2018-11-30 2019-07-19 阿里巴巴集团控股有限公司 身份数据的防误用方法及装置、电子设备

Also Published As

Publication number Publication date
CN110032846B (zh) 2021-11-02
TW202022669A (zh) 2020-06-16
CN110032846A (zh) 2019-07-19

Similar Documents

Publication Publication Date Title
WO2021068636A1 (fr) Procédé, appareil, dispositif et système de création sur chaîne de blocs d'une revendication vérifiable
TWI762818B (zh) 基於區塊鏈的發票創建方法及裝置、電子設備
CN108665946B (zh) 一种业务数据的访问方法和装置
TWI728678B (zh) 基於區塊鏈的企業認證、認證追溯方法、裝置及設備
US11797519B2 (en) Atomic capture of a set of related files, using a distributed ledger, for proof of authenticity
TWI753228B (zh) 基於區塊鏈的資料驗證方法及裝置、電子設備
US11127088B2 (en) Cross-blockchain interaction method, system, computer device, and storage medium
US10541806B2 (en) Authorizing account access via blinded identifiers
WO2020108152A1 (fr) Procédé, dispositif et équipement électronique pour empêcher l'utilisation abusive de données d'identité
US11113412B2 (en) System and method for monitoring and verifying software behavior
WO2020119294A1 (fr) Procédé, appareil et système de partage de données, et dispositif électronique
WO2020063176A1 (fr) Procédé et dispositif d'authentification d'identité d'utilisateur dans un réseau
US10812477B2 (en) Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
CN110768968B (zh) 基于可验证声明的授权方法、装置、设备及系统
CN113542288B (zh) 业务授权方法、装置、设备及系统
CN111898139B (zh) 数据读写方法及装置、电子设备
TW201917666A (zh) 資料審計的方法及裝置
CN113468602B (zh) 一种数据检验方法、装置及设备
TW202009760A (zh) 身份資訊的識別方法及裝置
WO2020182005A1 (fr) Procédé de traitement d'informations dans un transfert d'héritage de certificat d'actif numérique, et dispositif associé
US9235840B2 (en) Electronic transaction notification system and method
WO2019210698A1 (fr) Procédé d'authentification
CN114266680A (zh) 基于区块链的电子合同签约方法、装置及系统
CN113792307A (zh) 印章管理方法、装置及电子设备
CN112291321A (zh) 业务处理方法、装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19890363

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19890363

Country of ref document: EP

Kind code of ref document: A1