WO2022151990A1 - 基于区块链的透明供应链认证方法、装置、设备及介质 - Google Patents
基于区块链的透明供应链认证方法、装置、设备及介质 Download PDFInfo
- Publication number
- WO2022151990A1 WO2022151990A1 PCT/CN2021/143255 CN2021143255W WO2022151990A1 WO 2022151990 A1 WO2022151990 A1 WO 2022151990A1 CN 2021143255 W CN2021143255 W CN 2021143255W WO 2022151990 A1 WO2022151990 A1 WO 2022151990A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- asset information
- server
- supply chain
- blockchain
- target
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000008859 change Effects 0.000 claims description 41
- 238000012423 maintenance Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 12
- 230000008569 process Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000007689 inspection Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Definitions
- the present application relates to the field of server technology, and in particular, to a blockchain-based transparent supply chain authentication method, device, device and medium.
- FIG 1 shows the existing server transparent supply chain authentication method, that is, the transparent supply chain database is used to record the tracing information of the transparent supply chain components, and the SN number of the main board of the server is consistent with the supply chain information, or there is a trusted server.
- TPM Trusted Platform Module
- the existing transparent supply chain authentication methods have the following defects: First, whether the original information of the transparent supply chain is stored in the central server or the local server, there is a risk of being lost or tampered with; second, in addition to the main board SN and TPM, There is a lack of inspection on whether other component assets in the equipment comply with the supply chain data; third, the certificate transmission of the transparent supply chain is manual transmission, and there is a risk of errors.
- a blockchain-based transparent supply chain authentication method comprising:
- the server If the server is started, the current asset information of the server is read, and the blockchain feature value of the preset non-volatile storage space of the server is read;
- the target transparent supply chain certificate is issued to the server, so that the server obtains work authority based on the target transparent supply chain certificate.
- the method further includes:
- the asset information change record is stored in the blockchain storage system.
- the query is performed in a blockchain storage system by using the blockchain characteristic value to obtain a target transparent supply chain certificate and target original asset information, and the current asset information is compared with the target
- the steps for comparing raw asset information include:
- the original asset information stored in the target block is used as the target asset information
- the transparent supply chain certificate stored in the target block is used as the target transparent supply chain certificate.
- the method further includes:
- the target transparent supply chain certificate is sent to the server, so that the server obtains work authority based on the target transparent supply chain certificate.
- the method further includes:
- target transparent supply chain certificate is the same as the local certificate, allowing the server to use the target transparent supply chain certificate to obtain work authority;
- the server is prevented from using the target transparent supply chain certificate to obtain work authority.
- the preset non-volatile storage space is an EEPROM electronic label provided in the field replaceable unit FRU in the server.
- the asset information includes the model category and SN number of all components in the server.
- a blockchain-based transparent supply chain authentication device comprising:
- the storage module is used to store the transparent supply chain certificate and original asset information distributed by the server when it leaves the factory in the blockchain storage system to obtain the blockchain characteristic value, and store the blockchain characteristic value in the server's preset non-volatile storage module. in volatile storage space;
- the reading module is used to read the current asset information of the server when the server is started, and read the blockchain characteristic value of the preset non-volatile storage space of the server;
- the query module is used to query in the blockchain storage system by using the blockchain characteristic value to obtain the target transparent supply chain certificate and target original asset information, and perform the current asset information with the target original asset information. Compared;
- a certificate issuing module configured to issue the target transparent supply chain certificate to the server when the current asset information is consistent with the target original asset information, so that the server obtains work authority based on the target transparent supply chain certificate.
- a computer device comprising:
- the memory stores a computer program that can run on the processor, and when the processor executes the program, the aforementioned blockchain-based transparent supply chain authentication method is executed.
- a computer-readable storage medium stores a computer program, and the computer program executes the aforementioned blockchain-based transparent supply chain authentication method when executed by a processor.
- the above-mentioned blockchain-based transparent supply chain authentication method obtains the blockchain feature value by storing the transparent supply chain certificate and the original asset information distributed by the server when the server leaves the factory in the blockchain storage system to obtain the blockchain feature value.
- the value is stored in the preset non-volatile storage space of the server, and the current asset information and blockchain feature value of the server are read when the server is started, and then the blockchain feature value is used to query in the blockchain storage system
- the target transparent supply chain certificate and the target original asset information if the current asset information is consistent with the target original asset information, issue the target transparent supply chain certificate to the server, so that the server can obtain the work authority based on the target transparent supply chain certificate, and use the regional
- the way of blockchain storage ensures that supply chain information will not be lost or tampered with, and realizes the automation and credibility of server transparent supply chain authentication.
- the present application also provides a blockchain-based transparent supply chain authentication device, a computer device, and a computer-readable storage medium, which can also achieve the above technical effects, and will not be repeated here.
- 1 is a schematic diagram of an existing server transparent supply chain authentication method
- FIG. 2 is a schematic flowchart of a blockchain-based transparent supply chain authentication method provided by an embodiment of the present application
- FIG. 3A is a schematic diagram of interaction among a server, a control center, and a blockchain storage system provided by another embodiment of the present application;
- Fig. 3B adopts the block chain storage system in Fig. 3A to maintain the schematic diagram of asset information change records
- Fig. 3C adopts the schematic diagram that the control center maintains the asset information change record in Fig. 3A;
- FIG. 4 is a schematic flowchart of data storage in a blockchain storage system provided by another embodiment of the present application.
- FIG. 5 is a schematic flowchart of providing a blockchain-based transparent supply chain authentication method according to yet another embodiment of the present application.
- FIG. 6 is an internal structure diagram of a computer device in another embodiment of the present application.
- the present application provides a blockchain-based transparent supply chain authentication method, the method includes:
- the way of the blockchain storage system has the characteristics of multi-centralization, traceability, and non-tampering, which ensures that the supply chain information will not be lost or tampered with, and the blockchain characteristic value can be distributed with the server when the server leaves the factory.
- S300 query the blockchain storage system by using the blockchain characteristic value to obtain the target transparent supply chain certificate and target original asset information, and compare the current asset information with the target original asset information;
- the above-mentioned blockchain-based transparent supply chain authentication method obtains the blockchain feature value by storing the transparent supply chain certificate and the original asset information distributed by the server when the server leaves the factory in the blockchain storage system to obtain the blockchain feature value.
- the value is stored in the preset non-volatile storage space of the server, and the current asset information and blockchain feature value of the server are read when the server is started, and then the blockchain feature value is used to query in the blockchain storage system
- the target transparent supply chain certificate and the target original asset information if the current asset information is consistent with the target original asset information, issue the target transparent supply chain certificate to the server, so that the server can obtain the work authority based on the target transparent supply chain certificate, and use the regional
- the way of blockchain storage ensures that supply chain information will not be lost or tampered with, and realizes the automation and credibility of server transparent supply chain authentication.
- the server may change the component asset information due to factors such as maintenance or expansion during the working process, it is necessary to maintain the record of the component asset information change, in the asset information comparison Considering the historical change factor at the same time, if the user has the modification authority of the blockchain storage system, the method further includes:
- S520A store the asset information change record in the blockchain storage system.
- step S300 includes:
- the above-mentioned transparent supply chain authentication method based on blockchain when the component asset information of the server is changed due to maintenance or expansion, the change record is input into the blockchain storage system, and the feature value of the server is compared.
- the equipment asset information, transparent supply chain certificate, supply chain process information and asset change records can be obtained synchronously by using the blockchain feature value of this server.
- the control center uses the asset information of the server to compare with the equipment asset information and asset change records in the blockchain to realize the asset inspection function.
- the method further includes:
- the change record is input into the maintenance change record database, and the equipment asset information in the blockchain storage system is obtained.
- Transparent supply chain certificate, supply chain process information also obtain asset information change records from maintenance change record data, you can use the asset information of the control center to use the server's asset information and the equipment asset information in the blockchain system, and the maintenance change record database.
- the asset information change records are compared to realize the asset inspection function.
- the method further includes
- S610 store the local certificate in the trusted module of the server in advance, and compare the target transparent supply chain certificate with the local certificate stored in the trusted module of the server;
- the preset non-volatile storage space is an EEPROM electronic label provided in the field replaceable unit FRU in the server.
- the asset information includes model categories and SN numbers of all components in the server.
- the server has non-volatile storage space for storing the server blockchain characteristic value, the model category and SN asset number of the main board, and the model category and SN asset number of each sub-component.
- This non-volatile storage space may be implemented by an EEPROM electronic tag in the FRU field replaceable unit, or by other means. It supports accessing and reading through the I2C channel of the server BMC or other methods.
- control center as the main body of execution.
- FIG. 4 and FIG. 5 the method of the present application can be implemented by the following steps:
- Step 1 When the server is processing, enter the server's supply chain information, component equipment asset information, and transparent supply chain certificate into the system, upload it to the blockchain storage system, and obtain the unique blockchain corresponding to this server.
- Step 2 and distribute the blockchain feature value with the server during the production and processing of the server, and store it in the non-volatile storage space of the server.
- Step 3 After the server is started, the server automatically reads the blockchain characteristic value and the mainboard SN asset information (including the category and number) in the non-volatile storage space of the main board of the device, and reads the non-volatile storage space of each sub-component. Subcomponents in SN asset information (including category and number);
- Step 4 the server automatically initiates a transparent supply chain certification application to the control center, and sends the transparent supply chain blockchain characteristic value of the server, and the SN asset information of the main board and each component;
- Step 5 the control center accesses the blockchain storage system through the blockchain characteristic value, and automatically obtains the equipment asset information, transparent supply chain certificate, and supply chain process information in the blockchain;
- Step 6 After the control center automatically compares the equipment asset information in the blockchain with the equipment asset information uploaded by the server, it sends the transparent supply chain authentication certificate to the server;
- Step 7 the server obtains the transparent supply chain authentication certificate and has the corresponding work authority
- Step 8 The control center maintains a maintenance record change table to record the asset information changes of the server sub-components due to maintenance or expansion.
- the control center compares the asset information to be consistent, the change process of the component asset information in the maintenance record change table needs to be considered. .
- Step 9 Store the local certificate corresponding to the supply chain certificate in the server TPM module.
- the server needs to verify that the local certificate matches the supply chain certificate before it has the corresponding work authority.
- the above-mentioned blockchain-based transparent supply chain authentication method saves the transparent supply chain information in the form of blockchain, and the blockchain characteristic value is distributed with the server, ensuring that the supply chain information will not be lost or tampered with. Asset inspection to achieve complete server supply information. After the server is powered on, the blockchain characteristic value/key asset information is automatically uploaded, and the control center automatically obtains the blockchain information/checks the asset compliance/issues a certificate to the server to achieve transparent server supply. Chain certification is automated and credible.
- the present application also provides a blockchain-based transparent supply chain authentication device, the device comprising:
- the storage module is used to store the transparent supply chain certificate and original asset information distributed by the server when it leaves the factory in the blockchain storage system to obtain the blockchain characteristic value, and store the blockchain characteristic value in the server's preset non-volatile storage module. in volatile storage space;
- the reading module is used to read the current asset information of the server when the server is started, and read the blockchain characteristic value of the preset non-volatile storage space of the server;
- the query module is used to query in the blockchain storage system by using the blockchain characteristic value to obtain the target transparent supply chain certificate and target original asset information, and perform the current asset information with the target original asset information. Compared;
- a certificate issuing module configured to issue the target transparent supply chain certificate to the server when the current asset information is consistent with the target original asset information, so that the server obtains work authority based on the target transparent supply chain certificate.
- each module in the above-mentioned blockchain-based transparent supply chain authentication device can be implemented in whole or in part by software, hardware and combinations thereof.
- the above modules can be embedded in or independent of the processor in the computer device in the form of hardware, or stored in the memory in the computer device in the form of software, so that the processor can call and execute the operations corresponding to the above modules.
- a computer device is provided, and the computer device may be a server.
- the computer device includes a processor, memory, a network interface, and a database connected by a system bus.
- the processor of the computer device is used to provide computing and control capabilities.
- the memory of the computer device includes a non-volatile storage medium, an internal memory.
- the nonvolatile storage medium stores an operating system, a computer program, and a database.
- the internal memory provides an environment for the execution of the operating system and computer programs in the non-volatile storage medium.
- the database of the computer device is used to store data.
- the network interface of the computer device is used to communicate with an external terminal through a network connection.
- the computer program implements the blockchain-based transparent supply chain authentication method described above when executed by the processor.
- Nonvolatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- Volatile memory may include random access memory (RAM) or external cache memory.
- RAM is available in various forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Road (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
- SRAM static RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDRSDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM synchronous chain Road (Synchlink) DRAM
- SLDRAM synchronous chain Road (Synchlink) DRAM
- Rambus direct RAM
- DRAM direct memory bus dynamic RAM
- RDRAM memory bus dynamic RAM
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本申请公开了一种基于区块链的透明供应链认证方法、装置、设备及介质。该方法包括:将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将区块链特征值存储至服务器的预设非易失性存储空间中;若服务器启动,则读取服务器的当前资产信息,以及读取区块链特征值;利用区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,并将当前资产信息与目标原始资产信息进行对比;若当前资产信息与目标原始资产信息一致,则将目标透明供应链证书发放至服务器,以使服务器基于目标透明供应链证书获取工作权限。本申请的方案实现了服务器透明供应链认证自动化、可信化。
Description
本申请要求在2021年01月16日提交中国专利局、申请号为202110058583.3、发明名称为“基于区块链的透明供应链认证方法、装置、设备及介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及服务器技术领域,尤其涉及一种基于区块链的透明供应链认证方法、装置、设备及介质。
近些年来人们越来越担心假冒电子零件可能会导致业务关键型应用程序发生故障。例如2011年,美国国会通过了新法案,要求采购受成本会计准则(CAS)控制,以“检测和避免假冒电子零件”,又例如2015年,国防部联邦采购法规补充(DFARS)扩展了这些要求。为了便于跟踪单个组件采购的可溯性使最终用户能够跟踪这些部件原部件制造商提出了透明供应链(Transparent supply chain,简称TSC)。
图1示出了现有服务器透明供应链认证方式,即采用透明供应链数据库记录透明供应链组件的追述信息,并确保服务器的主板SN号与供应链信息保持一致,或者在有服务器的可信模块(Trusted Platform Module,简称TPM)的情况下,确保服务器的TPM证书与透明供应链证书相吻合,从而确认此服务器的供应链经过认证以允许运行相关信任程序,并用于发生问题后对供应链做回溯。然而,现有透明供应链认证方式存在以下缺陷:第一,透明供应链的原始信息不论保存在中心服务器或者本地服务器,均有遗失或被篡改的风险;第二,除主板SN和TPM外,对设备中的其它部件 资产是否符合供应链数据缺少检验;第三,透明供应链的证书传递是人工传递,存在出错风险。
发明内容
有鉴于此,有必要针对以上技术问题提供安全性更高、且能够自动认证的一种基于区块链的透明供应链认证方法、装置、设备及介质。
根据本申请的第一方面,提供了一种基于区块链的透明供应链认证方法,所述方法包括:
将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将所述区块链特征值存储至服务器的预设非易失性存储空间中;
若服务器启动,则读取服务器的当前资产信息,以及读取服务器的预设非易失性存储空间的所述区块链特征值;
利用所述区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,并将所述当前资产信息与所述目标原始资产信息进行对比;
若所述当前资产信息与所述目标原始资产信息一致,则将所述目标透明供应链证书发放至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
在其中一个实施例中,所述方法还包括:
获取服务器的维修记录数据,并根据所述维修记录数据确定资产信息变动记录;
将所述资产信息变动记录存储至所述区块链存储系统。
在其中一个实施例中,所述利用所述区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,并将所述当前资产信息与所述目标原始资产信息进行对比的步骤包括:
基于所述区块链特征值确定目标区块;
若所述目标区块中不存在资产信息变动记录,则将所述目标区块中存储的原始资产信息作为所述目标资产信息;
若所述目标区块中存在资产信息变动记录,则根据所述资产变动记录和目标区块中存储的原始资产信息确定目标资产信息;
将所述目标区块中存储的透明供应链证书作为所述目标透明供应链证书。
在其中一个实施例中,所述方法还包括:
若所述当前资产信息与所述目标原始资产信息不一致,则获取服务器的维修记录数据,并根据所述维修记录数据确定资产信息变动记录;
判断与所述目标原始资产信息不一致的当前资产信息是否与资产信息变动记录一致;
若与所述目标原始资产信息不一致的当前资产信息与资产信息变动记录一致,则将所述目标透明供应链证书发送至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
在其中一个实施例中,所述方法还包括:
预先在服务器的可信模块中存储本地证书,并将所述目标透明供应链证书与的可信模块中存储的本地证书进行对比;
若所述目标透明供应链证书与本地证书相同,则允许使服务器使用所述目标透明供应链证书获取工作权限;
若所述目标透明供应链证书与本地证书不相同,则阻止服务器使用所述目标透明供应链证书获取工作权限。
在其中一个实施例中,所述预设非易失性存储空间为设置在服务器中的现场可更换单元FRU中的EEPROM电子标签。
在其中一个实施例中,资产信息包括服务器中所有部件的型号类别和SN编号。
根据本申请的第二方面,提供了一种基于区块链的透明供应链认证装 置,所述装置包括:
存储模块,用于将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将所述区块链特征值存储至服务器的预设非易失性存储空间中;
读取模块,用于在服务器启动时,则读取服务器的当前资产信息,以及读取服务器的预设非易失性存储空间的所述区块链特征值;
查询模块,用于利用所述区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,并将所述当前资产信息与所述目标原始资产信息进行对比;
证书发放模块,用于在所述当前资产信息与所述目标原始资产信息一致时,则将所述目标透明供应链证书发放至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
根据本申请的第三方面,还提供了一种计算机设备,该计算机设备包括:
至少一个处理器;以及
存储器,存储器存储有可在处理器上运行的计算机程序,处理器执行程序时执行前述的基于区块链的透明供应链认证方法。
根据本申请的第四方面,还提供了一种计算机可读存储介质,计算机可读存储介质存储有计算机程序,计算机程序被处理器执行时执行前述的基于区块链的透明供应链认证方法。
上述一种基于区块链的透明供应链认证方法,通过将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将区块链特征值存储至服务器的预设非易失性存储空间中,以及在服务器启动时读取服务器的当前资产信息和区块链特征值,进而利用区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,如果当前资产信息与目标原始资产信息一致,则将目标透明供应链证书发放至服务器,以使服务器基于目标透明供应链证书获 取工作权限,以区块链的方式保存确保供应链信息不会被遗失或篡改,实现了服务器透明供应链认证自动化、可信化。
此外,本申请还提供了一种基于区块链的透明供应链认证装置、一种计算机设备和一种计算机可读存储介质,同样能实现上述技术效果,这里不再赘述。
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的实施例。
图1为现有服务器透明供应链认证方式的示意图;
图2为本申请一个实施例提供的一种基于区块链的透明供应链认证方法的流程示意图;
图3A为本申请又一个实施例提供的服务器、控制中心及区块链存储系统之间的交互示意图;
图3B采用图3A中的区块链存储系统维护资产信息变动记录的示意图;
图3C采用图3A中控制中心维护资产信息变动记录的示意图;
图4为本申请另一个实施例提供的区块链存储系统存储数据的流程示意图;
图5为本申请又一个实施例提供基于区块链的透明供应链认证方法的流程示意图;
图6为本申请另一个实施例中算机设备的内部结构图。
为使本申请的目的、技术方案和优点更加清楚明白,以下结合具体实 施例,并参照附图,对本申请实施例进一步详细说明。
需要说明的是,本申请实施例中所有使用“第一”和“第二”的表述均是为了区分两个相同名称非相同的实体或者非相同的参量,可见“第一”“第二”仅为了表述的方便,不应理解为对本申请实施例的限定,后续实施例对此不再一一说明。
在一个实施例中,请参照图2和图3A所示,本申请提供了一种基于区块链的透明供应链认证方法,所述方法包括:
S100,将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将所述区块链特征值存储至服务器的预设非易失性存储空间中;
其中,区块链存储系统的方式具有多中心化、可追溯性、不可篡改性的特性,确保供应链信息不会被遗失或篡改,可以将区块链特征值在服务器出厂时随服务器发放。
S200,若服务器启动,则读取服务器的当前资产信息,以及读取服务器的预设非易失性存储空间的所述区块链特征值;
S300,利用所述区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,并将所述当前资产信息与所述目标原始资产信息进行对比;
S400,若所述当前资产信息与所述目标原始资产信息一致,则将所述目标透明供应链证书发放至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
上述一种基于区块链的透明供应链认证方法,通过将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将区块链特征值存储至服务器的预设非易失性存储空间中,以及在服务器启动时读取服务器的当前资产信息和区块链特征值,进而利用区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,如果当前资产信息与目标原始资产信息一致,则将目 标透明供应链证书发放至服务器,以使服务器基于目标透明供应链证书获取工作权限,以区块链的方式保存确保供应链信息不会被遗失或篡改,实现了服务器透明供应链认证自动化、可信化。
在又一个实施例中,请参照图3B所示,考虑到服务器在工作过程中因为维修或扩配等因素,会发生部件资产信息变化,需要维护部件资产信息变化的记录,在资产信息比对时一起考虑历史变更因素,假如用户具有区块链存储系统的修改权限,所述方法还包括:
S510A,获取服务器的维修记录数据,并根据所述维修记录数据确定资产信息变动记录;
S520A,将所述资产信息变动记录存储至所述区块链存储系统。
在又一个实施例中,请参照图3C所示,与假如区块链存储系统,前述步骤S300包括:
S310,基于所述区块链特征值确定目标区块;
S320,若所述目标区块中不存在资产信息变动记录,则将所述目标区块中存储的原始资产信息作为所述目标资产信息;
S330,若所述目标区块中存在资产信息变动记录,则根据所述资产变动记录和目标区块中存储的原始资产信息确定目标资产信息;
S340,将所述目标区块中存储的透明供应链证书作为所述目标透明供应链证书。
上述一种基于区块链的透明供应链认证方法,通过在服务器因为维修或扩配导致的部件资产信息变更时,将变更记录输入在区块链存储系统中,并与本服务器的特征值做关联,使用本服务器的区块链特征值可以同步获取到设备资产信息、透明供应链证书、供应链过程信息和资产变更记录。控制中心使用服务器的资产信息与区块链中的设备资产信息、资产变更记录做比对,实现资产检验功能。
可选地,所述方法还包括:
S510B,若所述当前资产信息与所述目标原始资产信息不一致,则获取服务器的维修记录数据,并根据所述维修记录数据确定资产信息变动记录;
S520B,判断与所述目标原始资产信息不一致的当前资产信息是否与资产信息变动记录一致;
S530B,若与所述目标原始资产信息不一致的当前资产信息与资产信息变动记录一致,则将所述目标透明供应链证书发送至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
需要说的是,与前述实施例不同,在服务器因为维修或扩配导致的部件资产信息变更时,将变更记录输入在中维修变更记录数据库中,在获取区块链存储系统中的设备资产信息、透明供应链证书、供应链过程信息时,也从维修变更记录数据中获取资产信息变动记录,可以利用控制中心使用服务器的资产信息与区块链系统中的设备资产信息、维修变更记录数据库中的资产信息变更记录做比对,实现资产检验功能。
在又一个实施例中,所述方法还包括
S610,预先在服务器的可信模块中存储本地证书,并将所述目标透明供应链证书与的可信模块中存储的本地证书进行对比;
S620,若所述目标透明供应链证书与本地证书相同,则允许使服务器使用所述目标透明供应链证书获取工作权限;
S630,若所述目标透明供应链证书与本地证书不相同,则阻止服务器使用所述目标透明供应链证书获取工作权限。
可选地,所述预设非易失性存储空间为设置在服务器中的现场可更换单元FRU中的EEPROM电子标签。
可选地,资产信息包括服务器中所有部件的型号类别和SN编号。
举例来说,服务器具有非易失性存储空间,可供存储服务器区块链特征值,主板的型号类别和SN资产编号,各子部件的型号类别和SN资产编号。此非易失性存储空间可以由FRU现场可更换单元中的EEPROM电子标签来实现,也可以由其它方式实现。支持通过服务器BMC的I2C通道, 或者其它方式进行访问读取。
在又一个实施例中,为了便于理解本申请的技术方案,下面以控制中心为执行主体说明,具体请参照图4和图5所示,本申请方法具体可采用以下步骤实施:
步骤1,在服务器加工时,将本服务器的供应链信息、各部件设备资产信息、透明供应链证书录入系统中,上传至区块链存储系统中,并得到与本服务器对应的唯一区块链特征值,可通过该特征值检索区块链系统中与本服务器相关的信息;
步骤2,并将此区块链特征值在服务器生产加工时随服务器发放,存放在服务器的非易失性存储空间里。
步骤3,服务器启动后,服务器自动读取本设备主板非易失性存储空间中的区块链特征值和主板SN资产信息(包括类别和编号),读取各子部件非易失性存储空间中的子部件SN资产信息(包括类别和编号);
步骤4,服务器自动向控制中心发起透明供应链认证申请,发送服务器的透明供应链区块链特征值,主板和各部件的SN资产信息;
步骤5,控制中心通过区块链特征值访问区块链存储系统,自动获取区块链中的设备资产信息、透明供应链证书、供应链过程信息;
步骤6,控制中心自动对比区块链中的设备资产信息与服务器上传的设备资产信息一致后,将透明供应链认证证书发送给服务器;
步骤7,服务器获取到透明供应链认证证书,具备相应的工作权限;
步骤8,控制中心维护一张维修记录变更表,记录服务器子部件由于维修或扩配造成的资产信息变动,在控制中心对比资产信息一致时,需要考虑维修记录变更表中的部件资产信息变动过程。
步骤9,在服务器TPM模块中存放与供应链证书对应的本地证书,服务器需要检验本地证书和供应链证书匹配后,才能具备相应的工作权限。
上述一种基于区块链的透明供应链认证方法,通过将透明供应链信息 以区块链的方式保存,区块链特征值随服务器发放,确保供应链信息不会被遗失或篡改,通过全部件资产检验实现服务器供应信息无遗漏,通过服务器开机后自动上传区块链特征值/关键资产信息,控制中心自动获取区块链信息/核对资产符合度/向服务器下发证书,实现服务器透明供应链认证自动化、可信化。
在又一个实施例中,本申请还提供了一种基于区块链的透明供应链认证装置,所述装置包括:
存储模块,用于将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将所述区块链特征值存储至服务器的预设非易失性存储空间中;
读取模块,用于在服务器启动时,则读取服务器的当前资产信息,以及读取服务器的预设非易失性存储空间的所述区块链特征值;
查询模块,用于利用所述区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,并将所述当前资产信息与所述目标原始资产信息进行对比;
证书发放模块,用于在所述当前资产信息与所述目标原始资产信息一致时,则将所述目标透明供应链证书发放至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
需要说明的是,关于基于区块链的透明供应链认证装置的具体限定可以参见上文中对基于区块链的透明供应链认证方法的限定,在此不再赘述。上述基于区块链的透明供应链认证装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
根据本申请的另一方面,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图请参照图6所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处 理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机程序和数据库。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的数据库用于存储数据。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时实现以上所述的基于区块链的透明供应链认证方法。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。
Claims (10)
- 一种基于区块链的透明供应链认证方法,其特征在于,所述方法包括:将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将所述区块链特征值存储至服务器的预设非易失性存储空间中;若服务器启动,则读取服务器的当前资产信息,以及读取服务器的预设非易失性存储空间的所述区块链特征值;利用所述区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,并将所述当前资产信息与所述目标原始资产信息进行对比;若所述当前资产信息与所述目标原始资产信息一致,则将所述目标透明供应链证书发放至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:获取服务器的维修记录数据,并根据所述维修记录数据确定资产信息变动记录;将所述资产信息变动记录存储至所述区块链存储系统。
- 根据权利要求2所述的方法,其特征在于,所述利用所述区块链特征值在区块链存储系统中进行查询以得到目标透明供应链证书和目标原始资产信息,并将所述当前资产信息与所述目标原始资产信息进行对比的步骤包括:基于所述区块链特征值确定目标区块;若所述目标区块中不存在资产信息变动记录,则将所述目标区块中存储的原始资产信息作为所述目标资产信息;若所述目标区块中存在资产信息变动记录,则根据所述资产变动记录和目标区块中存储的原始资产信息确定目标资产信息;将所述目标区块中存储的透明供应链证书作为所述目标透明供应链证书。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:若所述当前资产信息与所述目标原始资产信息不一致,则获取服务器的维修记录数据,并根据所述维修记录数据确定资产信息变动记录;判断与所述目标原始资产信息不一致的当前资产信息是否与资产信息变动记录一致;若与所述目标原始资产信息不一致的当前资产信息与资产信息变动记录一致,则将所述目标透明供应链证书发送至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:预先在服务器的可信模块中存储本地证书,并将所述目标透明供应链证书与的可信模块中存储的本地证书进行对比;若所述目标透明供应链证书与本地证书相同,则允许使服务器使用所述目标透明供应链证书获取工作权限;若所述目标透明供应链证书与本地证书不相同,则阻止服务器使用所述目标透明供应链证书获取工作权限。
- 根据权利要求1至5任意一项所述的方法,其特征在于,所述预设非易失性存储空间为设置在服务器中的现场可更换单元FRU中的EEPROM电子标签。
- 根据权利要求1所述的方法,其特征在于,资产信息包括服务器中所有部件的型号类别和SN编号。
- 一种基于区块链的透明供应链认证装置,其特征在于,所述装置包括:存储模块,用于将服务器出厂时分配的透明供应链证书和原始资产信息存储至区块链存储系统以得到区块链特征值,并将所述区块链特征值存储至服务器的预设非易失性存储空间中;读取模块,用于在服务器启动时,则读取服务器的当前资产信息,以及读取服务器的预设非易失性存储空间的所述区块链特征值;查询模块,用于利用所述区块链特征值在区块链存储系统中进行查询以 得到目标透明供应链证书和目标原始资产信息,并将所述当前资产信息与所述目标原始资产信息进行对比;证书发放模块,用于在所述当前资产信息与所述目标原始资产信息一致时,则将所述目标透明供应链证书发放至服务器,以使服务器基于所述目标透明供应链证书获取工作权限。
- 一种计算机设备,其特征在于,包括:至少一个处理器;以及存储器,所述存储器存储有可在所述处理器中运行的计算机程序,所述处理器执行所述程序时执行权利要求1至7任意一项所述的方法。
- 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时执行权利要求1至7任意一项所述的方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/037,859 US20230410125A1 (en) | 2021-01-16 | 2021-12-30 | Blockchain-based transparent supply chain authentication method and apparatus, and device and medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110058583.3 | 2021-01-16 | ||
CN202110058583.3A CN112785318B (zh) | 2021-01-16 | 2021-01-16 | 基于区块链的透明供应链认证方法、装置、设备及介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022151990A1 true WO2022151990A1 (zh) | 2022-07-21 |
Family
ID=75756886
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/143255 WO2022151990A1 (zh) | 2021-01-16 | 2021-12-30 | 基于区块链的透明供应链认证方法、装置、设备及介质 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20230410125A1 (zh) |
CN (1) | CN112785318B (zh) |
WO (1) | WO2022151990A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116366678A (zh) * | 2023-06-02 | 2023-06-30 | 杭州端点网络科技有限公司 | 一种数据运营智能平台动态数据分布式存储系统 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112785318B (zh) * | 2021-01-16 | 2022-05-17 | 苏州浪潮智能科技有限公司 | 基于区块链的透明供应链认证方法、装置、设备及介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270650A (zh) * | 2014-09-29 | 2015-01-07 | 广州创维平面显示科技有限公司 | 一种互联网电视的安全控制系统及方法 |
CN105184188A (zh) * | 2015-08-12 | 2015-12-23 | 北京因特信安软件科技有限公司 | 基于资产证书的可信终端设备管理方法 |
US20170041150A1 (en) * | 2014-01-27 | 2017-02-09 | Mitsubishi Electric Corporation | Device certificate providing apparatus, device certificate providing system, and non-transitory computer readable recording medium which stores device certificate providing program |
CN107493273A (zh) * | 2017-08-02 | 2017-12-19 | 深圳市易成自动驾驶技术有限公司 | 身份认证方法、系统及计算机可读存储介质 |
CN111859359A (zh) * | 2020-06-04 | 2020-10-30 | 青岛海信智慧家居系统股份有限公司 | 一种智能设备授权系统、方法、装置、设备及介质 |
CN112785318A (zh) * | 2021-01-16 | 2021-05-11 | 苏州浪潮智能科技有限公司 | 基于区块链的透明供应链认证方法、装置、设备及介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102016730B1 (ko) * | 2017-05-24 | 2019-09-03 | 라온시큐어(주) | 프로그래밍이 가능한 블록체인과 통합 아이디 기반의 사용자 인증 방법 및 시스템 |
CN112492006B (zh) * | 2018-10-31 | 2023-12-05 | 创新先进技术有限公司 | 一种基于区块链的节点管理方法和装置 |
CN111507844A (zh) * | 2020-04-17 | 2020-08-07 | 上海哈世科技有限公司 | 基于联盟链的供应链金融管理方法及系统 |
CN112115205B (zh) * | 2020-11-23 | 2021-02-02 | 腾讯科技(深圳)有限公司 | 基于数字证书认证的跨链信任方法、装置、设备以及介质 |
-
2021
- 2021-01-16 CN CN202110058583.3A patent/CN112785318B/zh active Active
- 2021-12-30 WO PCT/CN2021/143255 patent/WO2022151990A1/zh active Application Filing
- 2021-12-30 US US18/037,859 patent/US20230410125A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170041150A1 (en) * | 2014-01-27 | 2017-02-09 | Mitsubishi Electric Corporation | Device certificate providing apparatus, device certificate providing system, and non-transitory computer readable recording medium which stores device certificate providing program |
CN104270650A (zh) * | 2014-09-29 | 2015-01-07 | 广州创维平面显示科技有限公司 | 一种互联网电视的安全控制系统及方法 |
CN105184188A (zh) * | 2015-08-12 | 2015-12-23 | 北京因特信安软件科技有限公司 | 基于资产证书的可信终端设备管理方法 |
CN107493273A (zh) * | 2017-08-02 | 2017-12-19 | 深圳市易成自动驾驶技术有限公司 | 身份认证方法、系统及计算机可读存储介质 |
CN111859359A (zh) * | 2020-06-04 | 2020-10-30 | 青岛海信智慧家居系统股份有限公司 | 一种智能设备授权系统、方法、装置、设备及介质 |
CN112785318A (zh) * | 2021-01-16 | 2021-05-11 | 苏州浪潮智能科技有限公司 | 基于区块链的透明供应链认证方法、装置、设备及介质 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116366678A (zh) * | 2023-06-02 | 2023-06-30 | 杭州端点网络科技有限公司 | 一种数据运营智能平台动态数据分布式存储系统 |
CN116366678B (zh) * | 2023-06-02 | 2023-08-01 | 杭州端点网络科技有限公司 | 一种数据运营智能平台动态数据分布式存储系统 |
Also Published As
Publication number | Publication date |
---|---|
US20230410125A1 (en) | 2023-12-21 |
CN112785318A (zh) | 2021-05-11 |
CN112785318B (zh) | 2022-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022151990A1 (zh) | 基于区块链的透明供应链认证方法、装置、设备及介质 | |
CN108874644B (zh) | 数据监控方法、装置、计算机设备及存储介质 | |
US10318412B1 (en) | Systems, methods, and apparatus for dynamic software generation and testing | |
US9372769B2 (en) | Server and inspecting method thereof | |
CN109492884B (zh) | 合规风险信息展示方法、装置、计算机设备及存储介质 | |
WO2020050943A4 (en) | Methods for requesting and authenticating photographic image data | |
CN110866289B (zh) | 基于区块链的数据处理方法、装置、服务器及存储介质 | |
WO2020232883A1 (zh) | 脚本缺陷扫描方法、装置、计算机设备和存储介质 | |
CN110063042A (zh) | 一种数据库故障的响应方法及其终端 | |
CN114036489A (zh) | 一种基于大数据的信息安全管理方法及系统 | |
CN111176666B (zh) | 一种bios+me镜像的刷新方法、系统、设备及可读介质 | |
CN112215015A (zh) | 翻译文本修订方法、装置、计算机设备和存储介质 | |
WO2020177381A1 (zh) | 服务器测试方法、装置、计算机设备及存储介质 | |
WO2020238049A1 (zh) | log4j日志框架的属性配置方法、装置和计算机设备 | |
US20220327242A1 (en) | Data management method and apparatus | |
US20220164729A1 (en) | Automated control compliance evidence manager using a secure distributed ledger | |
CN115617777A (zh) | 计量数据信息管理方法、装置、电子设备及存储介质 | |
WO2019056545A1 (zh) | 测试机自动化管理方法、装置、设备及存储介质 | |
CN112699023B (zh) | 项目接口测试方法、装置、计算机设备及存储介质 | |
CN114996209A (zh) | 一种配置修改方法、装置、设备及可读存储介质 | |
CN114629690A (zh) | 设备安全基线合规检测方法、装置和计算机设备 | |
CN111913980B (zh) | 一种设备管理方法及装置 | |
WO2019242112A1 (zh) | 审计字段信息获取方法、装置、计算机设备和存储介质 | |
CN113128805A (zh) | 一种流式数据的治理方法、装置、电子设备和存储介质 | |
WO2019237590A1 (zh) | 文件安全管理方法、装置、计算机设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21919177 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21919177 Country of ref document: EP Kind code of ref document: A1 |