CN112286881B - Document authentication tracing method and device - Google Patents

Document authentication tracing method and device Download PDF

Info

Publication number
CN112286881B
CN112286881B CN202011171478.2A CN202011171478A CN112286881B CN 112286881 B CN112286881 B CN 112286881B CN 202011171478 A CN202011171478 A CN 202011171478A CN 112286881 B CN112286881 B CN 112286881B
Authority
CN
China
Prior art keywords
document
description block
user
authentication
tracing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011171478.2A
Other languages
Chinese (zh)
Other versions
CN112286881A (en
Inventor
贾武阳
黄博
冯海萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jindiyun Technology Co ltd
Original Assignee
Jindiyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jindiyun Technology Co ltd filed Critical Jindiyun Technology Co ltd
Priority to CN202011171478.2A priority Critical patent/CN112286881B/en
Publication of CN112286881A publication Critical patent/CN112286881A/en
Application granted granted Critical
Publication of CN112286881B publication Critical patent/CN112286881B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/164File meta data generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a document authentication tracing method and device, which trace document modification records and personnel information for executing the modification records through a blockchain, thereby ensuring the reliability of the document modification records and the personnel information for executing the modification records. The method comprises the following steps: receiving a tracing request of a document; inquiring a modification record description block and a first authentication identifier of a document from a local data table according to the tracing request, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identifier, and the first authentication identifier is the identifier of the modification record description block in a blockchain system; calculating a hash digest of the modified record description block; sending a modified record authentication request to a blockchain system according to the hash abstract of the modified record description block and the first authentication identifier; and receiving a modification record authentication result sent by the block chain system.

Description

Document authentication tracing method and device
Technical Field
The application relates to the technical field of computer data processing, in particular to a document authentication tracing method and device.
Background
The design document (drawing of product design) is used as creative effort of a worker, creative achievement of the designer is reflected, and when the design document is traced in the prior art, the user related data is generally used for tracing the design source when the user uploads the design document, so that related information stored in a database can be tampered in practice.
Further, the design tracking of the materials and BOM (design manifest) derived from the drawing is also deduced from the associated data, and the associated relationship is very fragile and is easy to tamper.
Disclosure of Invention
The embodiment of the application provides a document authentication tracing method and device, which trace back document modification records and personnel information for executing the modification records through a blockchain, thereby ensuring the reliability of the document modification records and the personnel information for executing the modification records.
An embodiment of the present application provides a document authentication tracing method, including:
receiving a tracing request of a document;
inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request, wherein the modification record description block records design parameters of the document, a modification record, a user description block and a second authentication identifier, and the first authentication identifier is the identifier of the modification record description block in the blockchain system;
Calculating a hash digest of the modified record description block;
sending a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier;
and receiving a modification record authentication result sent by the block chain system.
Preferably, before querying the modification record description block and the first authentication identifier of the document from the local data table according to the tracing request, the method further includes:
inquiring the user description block and the second authentication identifier from a local data table according to the tracing request, wherein the user description block records a user login name and user identity information associated with the user login name, and the second authentication identifier is an identifier code of the user description block in a blockchain system;
calculating a hash digest of the user description block;
sending a user information authentication request to a blockchain system according to the hash digest of the user description block and the second authentication identifier;
receiving a user information authentication result sent by the block chain system;
and if the user information authentication result is credible, triggering a step of inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request.
Preferably, the method further comprises:
and if the modification record authentication result is credible, prompting that the modification record of the document is credible.
Preferably, before the receiving the request for tracing the document, the method further includes:
acquiring the user login name and user identity information associated with the user login name;
constructing a user description block according to the user login name and the user identity information;
writing the user description block into the local data table;
calculating a hash digest of the user description block;
writing the hash digest of the user description block into the blockchain system;
receiving the second authentication identifier sent by the blockchain system;
and writing the second authentication identification into the local data table.
Preferably, the method further comprises:
acquiring design parameters and modification records of the document;
acquiring the hash abstract of the user description block and the second authentication identifier;
constructing a modified record description block according to the design parameters, the modified record, the hash digest of the user description block and the second authentication identifier;
writing the modification record description block into the local data table;
Calculating a hash digest of the modified record description block;
writing the hash digest of the modified record description block into the blockchain system;
receiving the first authentication identifier sent by the blockchain system;
and writing the first authentication identification into the local data table.
Preferably, the receiving the trace-source request of the document includes:
receiving the document tracing request sent by a user through a document;
or alternatively, the first and second heat exchangers may be,
and receiving the document tracing request sent by the user through the materials or bill of materials associated with the document.
Preferably, the receiving the document tracing request initiated by the user through the document includes:
receiving a document tracing request initiated by a user through a tracing control in a program where a document is located;
the receiving the document traceability request initiated by the user through the materials or bill of materials associated with the document comprises the following steps:
and receiving a document tracing request initiated by a user through a tracing control in a program of a material or a bill of materials associated with the document.
A second aspect of the present application provides an authentication tracing device for a document, including:
the receiving unit is used for receiving a tracing request of the document;
The query unit is used for querying a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identifier, and the first authentication identifier is the identifier of the modification record description block in the blockchain system;
a calculation unit for calculating a hash digest of the modification record description block;
the sending unit is used for sending a modification record authentication request to the blockchain system according to the hash digest of the modification record description block and the first authentication identifier;
and the receiving unit is used for receiving the modification record authentication result sent by the block chain system.
Preferably, the query unit is further configured to query, before querying, according to the tracing request, a modification record description block and a first authentication identifier of the document from the local data table, according to the tracing request, the user description block and the second authentication identifier, in which a user login name and user identity information associated with the user login name are recorded in the user description block, and the second authentication identifier is an identifier code of the user description block in a blockchain system;
The computing unit is further used for computing the hash digest of the user description block;
the sending unit is further configured to send a user information authentication request to a blockchain system according to the hash digest of the user description block and the second authentication identifier;
the receiving unit is further configured to receive a user information authentication result sent by the blockchain system, and trigger a step of querying, according to the tracing request, a modification record description block and a first authentication identifier of the document from the local data table when the user information authentication result is trusted.
Preferably, the apparatus further comprises:
and the prompting unit is used for prompting the credibility of the modification record of the document when the authentication result of the modification record is credible.
Preferably, the apparatus further comprises:
the acquisition unit is used for acquiring the user login name and user identity information associated with the user login name before the received document tracing request;
the construction unit is used for constructing a user description block according to the user login name and the user identity information;
a writing unit, configured to store the user description block into the local data table;
preferably, the computing unit is further configured to compute a hash digest of the user description block;
The writing unit is further configured to write the hash digest of the user description block into the blockchain system;
the receiving unit is further configured to receive the second authentication identifier sent by the blockchain system;
the writing unit is further configured to write the second authentication identifier into the local data table.
Preferably, the method comprises the steps of,
the acquisition unit is also used for acquiring the design parameters and the modification records of the document;
the obtaining unit is further configured to obtain the hash digest of the user description block and the second authentication identifier;
the construction unit is further configured to construct a modified record description block according to the design parameter and the modified record, the hash digest of the user description block, and the second authentication identifier;
the writing unit is further configured to store the modification record description block into the local data table;
the calculating unit is further used for calculating the hash digest of the modification record description block;
the writing unit is further configured to write a hash digest of the modification record description block into the blockchain system;
the receiving unit is further configured to receive the first authentication identifier sent by the blockchain system;
The writing unit is further configured to write the first authentication identifier into the local data table.
Preferably, the receiving unit is specifically configured to:
receiving the document tracing request sent by a user through a document;
or alternatively, the first and second heat exchangers may be,
and receiving the document tracing request sent by the user through the materials or bill of materials associated with the document.
Preferably, the receiving unit is specifically configured to:
receiving a document tracing request initiated by a user through a tracing control in a program where a document is located;
and receiving a document tracing request initiated by a user through a tracing control in a program of a material or a bill of materials associated with the document.
A third aspect of the embodiments of the present application provides a computer apparatus, including a memory and a processor, where the processor is configured to implement the method for tracing authentication of a document provided in the first aspect of the embodiments of the present application when executing a computer program stored on the memory.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is configured to implement the method for tracing authentication of a document provided in the first aspect of the embodiments of the present application when the computer program is executed by a processor.
From the above technical solutions, the embodiments of the present application have the following advantages:
in the embodiment of the application, a tracing request of a document is received; inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request, wherein the modification record description block records a modification record aiming at the document, and the first authentication identifier is an identification code of the modification record description block in the blockchain system; calculating a hash digest of the modified record description block; sending a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier; and receiving a modification record authentication result sent by the block chain system. In the embodiment of the application, the first authentication mark is used for tracing the modification record of the document and the personnel information for executing the modification record from the blockchain system, so that the reliability of the document modification record and the personnel information for executing the modification record is ensured through the blockchain system.
Drawings
FIG. 1 is a schematic diagram of one embodiment of a method for tracing document authentication in the embodiment of the present application;
FIG. 2 is a schematic diagram of another embodiment of a method for tracing document authentication in the embodiment of the present application;
FIG. 3 is a schematic diagram of another embodiment of a method for tracing document authentication in the embodiment of the present application;
FIG. 4 is a schematic diagram of another embodiment of a document authentication tracing method in an embodiment of the present application
Fig. 5 is a schematic diagram of an embodiment of an authentication traceability device in an embodiment of the present application.
Detailed Description
The embodiment of the application provides a document authentication tracing method and device, which trace back document modification records and personnel information for executing the modification records through a blockchain, thereby ensuring the reliability of the document modification records and the personnel information for executing the modification records.
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
The terms first, second, third, fourth and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of understanding, the following describes in detail the document authentication tracing method in the embodiment of the present application, please refer to fig. 1, and one embodiment of the document authentication tracing method in the embodiment of the present application includes:
101. receiving a tracing request of a document;
when a tracing request needs to be executed on a document, the tracing request can be initiated through the current document, and the specific manner of initiating the tracing request includes, but is not limited to, initiation through a tracing control in document design software or initiation through a tracing control in a document authentication tracing device.
In addition, besides initiating a request for a document, the traceability request in the application can also be initiated through a material or a bill of materials associated with the document, if the current design document is a mobile phone shell, materials related to the mobile phone shell, such as shell materials, pattern materials on the shell and the like, can also initiate the traceability request through traceability controls in the program.
It should be noted that, the materials and bill of materials herein are generally materials associated with a design object in a design document, where the association relationship includes a direct association or an indirect association.
102. Inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request, wherein the modification record description block records design parameters of the document, a modification record, a user description block and a second authentication identifier, and the first authentication identifier is the identifier of the modification record description block in the blockchain system;
After receiving the tracing request of the document, inquiring a modification record description block and a first authentication identifier of the document from a local data table, and sending an authentication request to a blockchain system to verify the reliability of the document modification record and personnel information for executing the modification record.
Specifically, the modification record block of the document is used as a data set for describing document information and modification information, wherein the design parameters and modification records of the document, the user description block and the second authentication identification code are recorded, the first authentication identification is the address identification information of the document modification record description block in the blockchain system and is used for quickly searching the modification record description block in the blockchain, and if the document modification record description block is stored in a fifth data block in the blockchain system, the corresponding first authentication identification is the fifth data block. It should be noted that the foregoing examples are only schematic illustrations of the first authentication identifier, and in practical cases, the first authentication identifier may further include a data block name or a code of the modification record description block in the blockchain system, which is not limited in particular herein.
The specific contents of the user description block and the second authentication identifier will be described in detail in the following embodiments, which are not repeated here.
103. Calculating a hash digest of the modified record description block;
in order to save the storage space of the data blocks in the blockchain, the hash digest of the modified record description block can be calculated, and the hash digest is only written into the blockchain system, and meanwhile, the reliability of the modified record description block is ensured because of the non-tamper property of the hash digest.
104. Sending a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier;
after the hash abstract and the first authentication identifier of the modified record description block are obtained, a modified record authentication request is sent to the blockchain system according to the modified record description block and the first authentication identifier.
After receiving the authentication request, the blockchain system takes out the hash abstract of the previously written modification record description block from the blockchain system according to the first authentication identifier, compares the hash abstract of the modification record description block in the authentication request with the hash abstract of the previously written modification record description block, and if the two hash digests are identical, the modification record is determined to be trusted, otherwise, the modification record is determined to be not trusted.
105. And receiving a modification record authentication result sent by the block chain system.
After sending an authentication request to the blockchain system, the blockchain system checks the authenticity of the modification record description block according to the authentication request, and sends a modification record authentication result to an authentication traceability device of the document according to the check result.
In the embodiment of the application, a tracing request of a document is received; inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request, wherein the modification record description block records a modification record aiming at the document, and the first authentication identifier is an identification code of the modification record description block in the blockchain system; calculating a hash digest of the modified record description block; sending a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier; and receiving a modification record authentication result sent by the block chain system. In the embodiment of the application, the first authentication mark is used for tracing the modification record of the document and the personnel information for executing the modification record from the blockchain system, so that the reliability of the document modification record and the personnel information for executing the modification record is ensured through the blockchain system.
Based on the embodiment described in fig. 1, after receiving the tracing request of the document, before querying the modification record description block and the first authentication identifier of the document from the local data table, the following steps may be further executed, referring specifically to fig. 2, and another embodiment of the method for tracing the document authentication in the embodiment of the present application includes:
201. inquiring the user description block and the second authentication identifier from a local data table according to the tracing request, wherein the user description block records a user login name and user identity information associated with the user login name, and the second authentication identifier is an identifier code of the user description block in a blockchain system;
after receiving the tracing request of the document, the authentication tracing device of the document firstly queries a user description block and a second authentication identifier from a local data table according to the tracing request, wherein the user description block records a user login name and user identity information associated with the user login name, the second authentication identifier is a storage address identifier of the user description block in the blockchain system, and description of the second authentication identifier can refer to description of the first authentication identifier in the above embodiment and is not repeated here.
Because the user login name and the user identity information associated with the user login name are recorded in the user description block, before checking the modification record description block, the reliability of the user identity information is generally ensured, if the reliability of the user information does not pass, the reliability of the user information in the modification record is also unreliable, so before checking the reliability of the user modification record description block, the reliability of the user identity information can be checked through the user description block.
202. Calculating a hash digest of the user description block;
after the user description block is obtained, a hash digest of the user description block is further computed for use in sending an authentication request to the blockchain system.
203. Sending a user information authentication request to a blockchain system according to the hash digest of the user description block and the second authentication identifier;
after the hash digest of the user description block is obtained, a user information authentication request is sent to the blockchain system according to the hash digest of the user description block and the second authentication identifier.
After receiving the authentication request, the blockchain system takes out the hash abstract of the user description block written before from the blockchain system according to the second authentication identifier, compares the hash abstract of the user description block in the authentication request with the hash abstract of the user description block written before, and if the two hash abstracts are identical, the user description block is determined to be trusted, namely, the reliability of the user login name and the user identity information associated with the user login name is determined, otherwise, the user description block is determined to be not trusted.
204. Receiving a user information authentication result sent by the block chain system;
after sending an authentication request to the blockchain system, the blockchain system checks the authenticity of the user description block according to the authentication request, and sends an authentication result of the user description block, namely an authentication result of the user information, to an authentication traceability device of the document according to the checking result.
205. And if the user information authentication result is credible, triggering a step of inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request.
If the user information authentication result is credible, triggering a step of inquiring a modification record description block and a first authentication identifier of a document from a local data table according to the tracing request, and otherwise ending the flow.
In the embodiment of the application, before the modification record description block is authenticated, the user identity information is checked through the user description block, when the user information authentication result is credible, the operation of authenticating the modification record description block is triggered, and when the user information authentication result is not credible, the flow is directly ended, so that on one hand, the convenience of authenticating the modification record description block is improved, and on the other hand, the reliability of the authentication result of the modification record description block is improved again.
Based on the embodiments described in fig. 1 and fig. 2, when the modification record authentication result is trusted, the authentication traceability device of the document may further send a hint information, where the hint information is used to indicate that the modification record of the document is trusted, and in particular in an actual application scenario, the hint information may be displayed in a graphic form, for example, the modification record is marked green, and may also be displayed in a text form, which is not limited herein.
Based on the embodiments described in fig. 1 and fig. 2, before receiving a tracing request of a document, a user description block needs to be written into a local data table and a blockchain system, and this embodiment specifically describes a process of writing the user description block into the local data table, and referring specifically to fig. 3, another embodiment of an authentication tracing method of a document in this embodiment of the present application includes:
301. acquiring the user login name and user identity information associated with the user login name;
before the user description block is obtained from the local data table, it is also necessary to construct the user description block and write the user description block into the local data table.
Specifically, the description block includes a user login name and user identity information associated with the user login name, where the user identity information includes, but is not limited to, a user identification card, a user mailbox, a user name, and the like.
302. Constructing a user description block according to the user login name and the user identity information;
after obtaining the user login name and the user identity information, a user description block is constructed according to the user login name and the user identity information, wherein the user description block can be understood as data record information comprising the user login name and the user identity information associated with the user login name.
303. Storing the user description block into the local data table;
to facilitate subsequent retrieval of the user description block from the local data table, the user description block needs to be stored to the local data table to facilitate execution of step 201 in the embodiment of fig. 2.
304. Calculating a hash digest of the user description block;
in the existing blockchain system, generally, when data content is written, in order to save data space, a hash digest of the data content can be written, and meanwhile, because the hash digest and the blockchain system are not tamper-proof, the reliability of the data content in the blockchain is ensured.
305. Writing the hash digest of the user description block into the blockchain system;
after the hash digest of the user description block is obtained, the hash digest of the user description block is further written into the blockchain system for performing the steps of the embodiment described in fig. 2.
306. Receiving the second authentication identifier sent by the blockchain system;
in order to facilitate the quick acquisition of the user description block from the blockchain system, the second authentication identifier sent by the blockchain system may be further received in writing the user description block into the blockchain system, where the second authentication identifier is address identification information stored by the user description block in the blockchain system.
307. And writing the second authentication identification into the local data table.
To facilitate querying the user description block from the blockchain, a second authentication identifier, i.e., the storage address identifier of the user description block, needs to be written simultaneously to the local data table for use in performing the embodiment described in fig. 2.
The embodiment of the application describes the generation process of the user description block and the second authentication identifier in the local data table in detail, so that the feasibility of the embodiment of the application is improved.
Based on the embodiment described in fig. 3, after writing the hash digest of the user description block into the blockchain system, the modification record description block needs to be further written into the local data table and the blockchain system, and referring specifically to fig. 4, another embodiment of the document authentication tracing method in the embodiment of the present application includes:
401. Acquiring design parameters and modification records of the document;
after writing the user description block into the blockchain system, further writing the modification record description block into the blockchain system is needed, wherein the design parameters of the document and the modification record are needed to be acquired before the modification record description block is constructed.
Specifically, when the design parameters of the document are obtained, the design parameters and a modification record can be obtained by calling an API (application program interface) of the design software, wherein the modification record records the specific time and the specific place for executing the modification, and the specific time and the specific place for modifying a certain design parameter of the document from an original first numerical value to a later second numerical value are recorded. It should be noted that, in addition to the above parameters, other parameters may be added to the modification record according to the actual application scenario, so as to reflect the modification record in more detail, and specific contents in the modification record are not limited herein.
402. Acquiring the hash abstract of the user description block and the second authentication identifier;
when constructing the modification record description block, besides obtaining the design parameters and the modification record of the document, the hash digest and the second authentication identifier of the user description block need to be obtained, wherein the related description of the hash digest and the second authentication identifier of the user description block is similar to that described in the embodiment of fig. 2, and is not repeated here.
403. Constructing a modified record description block according to the design parameters, the modified record, the hash digest of the user description block and the second authentication identifier;
specifically, a modification record description block is constructed according to design parameters of the document, the modification record, the hash digest of the user description block and the second authentication identifier, wherein the modification record description block records modification records of the document and personnel information for executing the modification records.
404. Storing the modification record description block into the local data table;
after the modified record description block is obtained, for convenience in tracing the modified record description block at a later stage, the modified record description block needs to be stored in a local data table for correspondingly performing the steps described in the embodiment of fig. 1.
405. Calculating a hash digest of the modified record description block;
in the existing blockchain system, generally, when data content is written, in order to save data space, a hash digest of the data content can be written, and meanwhile, because the hash digest and the blockchain system are not tamper-proof, the reliability of the data content in the blockchain is ensured.
It is necessary to calculate a hash digest of the modified record description block before writing the modified record description block to the blockchain system.
406. Writing the hash digest of the modified record description block into the blockchain system;
after the hash digest of the modified record description block is obtained, the hash digest of the modified record description block is further written into the blockchain system for performing the steps of the embodiment described in fig. 1.
407. Receiving the first authentication identification code sent by the blockchain system;
in order to facilitate the quick acquisition of the modification record description block from the blockchain system, the modification record description block may be written into the blockchain system, and further receive a first authentication identifier sent by the blockchain system, where the first authentication identifier is address identification information stored in the blockchain system by the modification record description block.
408. Writing the first authentication identification code into the local data table.
To facilitate querying the modified record description block from the blockchain, the first authentication identification, i.e., the storage address identification of the modified record description block, needs to be written simultaneously into the local data table for use in performing the embodiment described in fig. 1.
The embodiment of the application describes the generation process of the modification record description block and the first authentication identifier in the local data table in detail, so that the feasibility of the embodiment of the application is improved.
The method for tracing document authentication in the embodiment of the present application is described above, and next, the document authentication tracing device in the embodiment of the present application is described below, referring to fig. 5, an embodiment of the document authentication tracing device in the embodiment of the present application includes:
a receiving unit 501, configured to receive a tracing request of a document;
the query unit 502 is configured to query, according to the tracing request, a modification record description block and a first authentication identifier of the document from the local data table, where the modification record description block records design parameters and modification records of the document, a user description block, and a second authentication identifier, and the first authentication identifier is an identifier of the modification record description block in the blockchain system;
a calculating unit 503, configured to calculate a hash digest of the modification record description block;
a sending unit 504, configured to send a modification record authentication request to the blockchain system according to the hash digest of the modification record description block and the first authentication identifier;
the receiving unit 501 is further configured to receive a modification record authentication result sent by the blockchain system;
preferably, the querying unit 502 is further configured to query, before querying, according to the tracing request, a modification record description block and a first authentication identifier of the document from the local data table, according to the tracing request, the user description block and the second authentication identifier, in which a user login name and user identity information associated with the user login name are recorded in the user description block, and the second authentication identifier is an identifier code of the user description block in a blockchain system;
The calculating unit 503 is further configured to calculate a hash digest of the user description block;
the sending unit 504 is further configured to send a user information authentication request to a blockchain system according to the hash digest of the user description block and the second authentication identifier;
the receiving unit 501 is further configured to receive a user information authentication result sent by the blockchain system, and trigger a step of querying, according to the tracing request, a modification record description block and a first authentication identifier of the document from the local data table when the user information authentication result is trusted.
Preferably, the apparatus further comprises:
and the prompting unit 505 is configured to prompt that the modification record of the document is trusted when the modification record authentication result is trusted.
Preferably, the apparatus further comprises:
an obtaining unit 506, configured to obtain, before the received request for tracing the document, the user login name and user identity information associated with the user login name;
a constructing unit 507, configured to construct a user description block according to the user login name and the user identity information;
a writing unit 508, configured to store the user description block into the local data table;
Preferably, the calculating unit 503 is further configured to calculate a hash digest of the user description block;
the writing unit 508 is further configured to write the hash digest of the user description block into the blockchain system;
the receiving unit 501 is further configured to receive the second authentication identifier sent by the blockchain system;
the writing unit 508 is further configured to write the second authentication identifier into the local data table.
Preferably, the method comprises the steps of,
the obtaining unit 506 is further configured to obtain design parameters and modification records of the document;
the obtaining unit 506 is further configured to obtain the hash digest of the user description block and the second authentication identifier;
the constructing unit 507 is further configured to construct a modified record description block according to the design parameter and the modified record, the hash digest of the user description block, and the second authentication identifier;
the writing unit 508 is further configured to store the modification record description block into the local data table;
the calculating unit 503 is further configured to calculate a hash digest of the modification record description block;
the writing unit 508 is further configured to write the hash digest of the modified record description block into the blockchain system;
The receiving unit 501 is further configured to receive the first authentication identifier sent by the blockchain system;
the writing unit 508 is further configured to write the first authentication identifier into the local data table.
Preferably, the receiving unit 501 is specifically configured to:
receiving the document tracing request sent by a user through a document;
or alternatively, the first and second heat exchangers may be,
and receiving the document tracing request sent by the user through the materials or bill of materials associated with the document.
Preferably, the receiving unit 501 is specifically configured to:
receiving a document tracing request initiated by a user through a tracing control in a program where a document is located;
and receiving a document tracing request initiated by a user through a tracing control in a program of a material or a bill of materials associated with the document.
It should be noted that the functions of the units in this embodiment are similar to those described in the embodiments of fig. 1 to 4, and are not repeated here.
In the embodiment of the present application, a receiving unit 501 receives a tracing request of a document; inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request by an inquiring unit 502, wherein the modification record description block records a modification record aiming at the document, and the first authentication identifier is an identification code of the modification record description block in the blockchain system; calculating a hash digest of the modified record description block by a calculation unit 503; transmitting, by the transmitting unit 504, a modification record authentication request to the blockchain system according to the hash digest of the modification record description block and the first authentication identifier; the modified record authentication result transmitted by the blockchain system is received through the receiving unit 501. In the embodiment of the application, the first authentication mark is used for tracing the modification record of the document and the personnel information for executing the modification record from the blockchain system, so that the reliability of the document modification record and the personnel information for executing the modification record is ensured through the blockchain system.
The authentication traceability device of the file in the embodiment of the present application is described above from the point of view of the modularized functional entity, and the computer device in the embodiment of the present application is described below from the point of view of hardware processing:
the computer device is used for realizing the function of an authentication traceability device of a document, and one embodiment of the computer device in the embodiment of the application comprises:
a processor and a memory;
the memory is used for storing a computer program, and the processor is used for executing the computer program stored in the memory, and the following steps can be realized:
receiving a tracing request of a document;
inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request, wherein the modification record description block records design parameters of the document, a modification record, a user description block and a second authentication identifier, and the first authentication identifier is the identifier of the modification record description block in the blockchain system;
calculating a hash digest of the modified record description block;
sending a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier;
And receiving a modification record authentication result sent by the block chain system.
In some embodiments of the present application, the processor may be further configured to implement the following steps:
inquiring the user description block and the second authentication identifier from a local data table according to the tracing request, wherein the user description block records a user login name and user identity information associated with the user login name, and the second authentication identifier is an identifier code of the user description block in a blockchain system;
calculating a hash digest of the user description block;
sending a user information authentication request to a blockchain system according to the hash digest of the user description block and the second authentication identifier;
receiving a user information authentication result sent by the block chain system;
and if the user information authentication result is credible, triggering a step of inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request.
In some embodiments of the present application, the processor may be further configured to implement the following steps:
and if the modification record authentication result is credible, prompting that the modification record of the document is credible.
In some embodiments of the present application, the processor may be further configured to implement the following steps:
acquiring the user login name and user identity information associated with the user login name;
constructing a user description block according to the user login name and the user identity information;
writing the user description block into the local data table;
calculating a hash digest of the user description block;
writing the hash digest of the user description block into the blockchain system;
receiving the second authentication identifier sent by the blockchain system;
and writing the second authentication identification into the local data table.
In some embodiments of the present application, the processor may be further configured to implement the following steps:
acquiring design parameters and modification records of the document;
acquiring the hash abstract of the user description block and the second authentication identifier;
constructing a modified record description block according to the design parameters, the modified record, the hash digest of the user description block and the second authentication identifier;
writing the modification record description block into the local data table;
calculating a hash digest of the modified record description block;
writing the hash digest of the modified record description block into the blockchain system;
Receiving the first authentication identifier sent by the blockchain system;
and writing the first authentication identification into the local data table.
In some embodiments of the present application, the processor may be further configured to implement the following steps:
receiving the document tracing request sent by a user through a document;
or alternatively, the first and second heat exchangers may be,
and receiving the document tracing request sent by the user through the materials or bill of materials associated with the document.
In some embodiments of the present application, the processor may be further configured to implement the following steps:
receiving a document tracing request initiated by a user through a tracing control in a program where a document is located;
and receiving a document tracing request initiated by a user through a tracing control in a program of a material or a bill of materials associated with the document.
It will be appreciated that when the processor in the above-described computer apparatus executes the computer program, the functions of each unit in the corresponding embodiments of the apparatus may also be implemented, which is not described herein. For example, the computer program may be partitioned into one or more modules/units, which are stored in the memory and executed by the processor to complete the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing a specific function for describing the execution of the computer program in an authentication trace-out means of the document. For example, the computer program may be divided into units in the authentication tracing device of the above document, and each unit may implement a specific function described in the authentication tracing device of the above corresponding document.
The computer device can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer device may include, but is not limited to, a processor, a memory. It will be appreciated by those skilled in the art that the processor, memory, etc. are merely examples of computer apparatus and are not limiting of computer apparatus, and may include more or fewer components, or may combine certain components, or different components, e.g., the computer apparatus may also include input and output devices, network access devices, buses, etc.
The processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf Programmable gate arrays (FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like that is a control center of the computer device, connecting various parts of the overall computer device using various interfaces and lines.
The memory may be used to store the computer program and/or modules, and the processor may implement various functions of the computer device by running or executing the computer program and/or modules stored in the memory, and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the terminal, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash Card (Flash Card), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
The present application also provides a computer readable storage medium for implementing the function of the document authentication tracing apparatus, on which a computer program is stored, which when executed by a processor, can be used to perform the following steps:
Receiving a tracing request of a document;
inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request, wherein the modification record description block records design parameters of the document, a modification record, a user description block and a second authentication identifier, and the first authentication identifier is the identifier of the modification record description block in the blockchain system;
calculating a hash digest of the modified record description block;
sending a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier;
and receiving a modification record authentication result sent by the block chain system.
In some embodiments of the present application, the computer program stored in the computer readable storage medium is executed by a processor, and the processor may be specifically configured to perform the following steps:
inquiring the user description block and the second authentication identifier from a local data table according to the tracing request, wherein the user description block records a user login name and user identity information associated with the user login name, and the second authentication identifier is an identifier code of the user description block in a blockchain system;
Calculating a hash digest of the user description block;
sending a user information authentication request to a blockchain system according to the hash digest of the user description block and the second authentication identifier;
receiving a user information authentication result sent by the block chain system;
and if the user information authentication result is credible, triggering a step of inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request.
In some embodiments of the present application, the computer program stored in the computer readable storage medium is executed by a processor, and the processor may be specifically configured to perform the following steps:
and if the modification record authentication result is credible, prompting that the modification record of the document is credible.
In some embodiments of the present application, the computer program stored in the computer readable storage medium is executed by a processor, and the processor may be specifically configured to perform the following steps:
acquiring the user login name and user identity information associated with the user login name;
constructing a user description block according to the user login name and the user identity information;
writing the user description block into the local data table;
Calculating a hash digest of the user description block;
writing the hash digest of the user description block into the blockchain system;
receiving the second authentication identifier sent by the blockchain system;
and writing the second authentication identification into the local data table.
In some embodiments of the present application, the computer program stored in the computer readable storage medium is executed by a processor, and the processor may be specifically configured to perform the following steps:
acquiring design parameters and modification records of the document;
acquiring the hash abstract of the user description block and the second authentication identifier;
constructing a modified record description block according to the design parameters, the modified record, the hash digest of the user description block and the second authentication identifier;
writing the modification record description block into the local data table;
calculating a hash digest of the modified record description block;
writing the hash digest of the modified record description block into the blockchain system;
receiving the first authentication identifier sent by the blockchain system;
and writing the first authentication identification into the local data table.
In some embodiments of the present application, the computer program stored in the computer readable storage medium is executed by a processor, and the processor may be specifically configured to perform the following steps:
Receiving the document tracing request sent by a user through a document;
or alternatively, the first and second heat exchangers may be,
and receiving the document tracing request sent by the user through the materials or bill of materials associated with the document.
In some embodiments of the present application, the computer program stored in the computer readable storage medium is executed by a processor, and the processor may be specifically configured to perform the following steps:
receiving a document tracing request initiated by a user through a tracing control in a program where a document is located;
and receiving a document tracing request initiated by a user through a tracing control in a program of a material or a bill of materials associated with the document.
It will be appreciated that the integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a corresponding one of the computer readable storage media. Based on such understanding, the present application implements all or part of the flow of the above-described corresponding embodiment method, and may also be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, where the computer program, when executed by a processor, may implement the steps of the above-described respective method embodiments. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The above embodiments are merely for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (10)

1. A method for authenticating and tracing a document, the method comprising:
receiving a tracing request of a document;
inquiring a modification record description block and a first authentication identifier of the document from a local data table according to the tracing request, wherein the modification record description block records design parameters of the document, a modification record, a user description block and a second authentication identifier, and the first authentication identifier is the identifier of the modification record description block in a block chain system;
Calculating a hash digest of the modified record description block;
sending a modified record authentication request to the blockchain system according to the hash digest of the modified record description block and the first authentication identifier;
and receiving a modification record authentication result sent by the block chain system.
2. The method of claim 1, wherein prior to querying the modification record description block and the first authentication identity of the document from the local data table in accordance with the trace-back request, the method further comprises:
inquiring the user description block and the second authentication identifier from the local data table according to the tracing request, wherein the user description block records a user login name and user identity information associated with the user login name, and the second authentication identifier is an identifier code of the user description block in a blockchain system;
calculating a hash digest of the user description block;
transmitting a user information authentication request to the blockchain system according to the hash digest of the user description block and the second authentication identifier;
receiving a user information authentication result sent by the block chain system;
and if the user information authentication result is credible, triggering a step of inquiring a modification record description block and a first authentication identifier of the document from the local data table according to the tracing request.
3. The method according to claim 1, wherein the method further comprises:
and if the modification record authentication result is credible, prompting that the modification record of the document is credible.
4. The method of claim 2, wherein prior to the receiving the request for tracing the document, the method further comprises:
acquiring the user login name and user identity information associated with the user login name;
constructing a user description block according to the user login name and the user identity information;
writing the user description block into the local data table;
calculating a hash digest of the user description block;
writing the hash digest of the user description block into the blockchain system;
receiving the second authentication identifier sent by the blockchain system;
and writing the second authentication identification into the local data table.
5. The method according to claim 4, wherein the method further comprises:
acquiring design parameters and modification records of the document;
acquiring the hash abstract of the user description block and the second authentication identifier;
constructing a modified record description block according to the design parameters, the modified record, the hash digest of the user description block and the second authentication identifier;
Writing the modification record description block into the local data table;
calculating a hash digest of the modified record description block;
writing the hash digest of the modified record description block into the blockchain system;
receiving the first authentication identifier sent by the blockchain system;
and writing the first authentication identification into the local data table.
6. The method of any one of claims 1 to 5, wherein receiving a request for tracing a document comprises:
receiving a document tracing request initiated by a user through a document;
or alternatively, the first and second heat exchangers may be,
and receiving a document tracing request initiated by a user through a material or a bill of materials associated with the document.
7. The method of claim 6, wherein the receiving the document tracing request initiated by the user through the document comprises:
receiving a document tracing request initiated by a user through a tracing control in a program where a document is located;
the receiving the document traceability request initiated by the user through the materials or bill of materials associated with the document comprises the following steps:
and receiving a document tracing request initiated by a user through a tracing control in a program of a material or a bill of materials associated with the document.
8. An authentication traceability device for documents, the device comprising:
the receiving unit is used for receiving a tracing request of the document;
the query unit is used for querying a modification record description block and a first authentication identifier of the document from a local data table according to the tracing request, wherein the modification record description block records design parameters and modification records of the document, a user description block and a second authentication identifier, and the first authentication identifier is the identifier of the modification record description block in a blockchain system;
a calculation unit for calculating a hash digest of the modification record description block;
the sending unit is used for sending a modification record authentication request to the blockchain system according to the hash digest of the modification record description block and the first authentication identifier;
the receiving unit is further configured to receive a modification record authentication result sent by the blockchain system.
9. A computer device comprising a memory and a processor, wherein the processor, when executing a computer program stored on the memory, is configured to implement the document authentication tracing method of any one of claims 1 to 7.
10. A computer readable storage medium having stored thereon a computer program for implementing the document authentication tracing method according to any one of claims 1 to 7 when the computer program is executed by a processor.
CN202011171478.2A 2020-10-28 2020-10-28 Document authentication tracing method and device Active CN112286881B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011171478.2A CN112286881B (en) 2020-10-28 2020-10-28 Document authentication tracing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011171478.2A CN112286881B (en) 2020-10-28 2020-10-28 Document authentication tracing method and device

Publications (2)

Publication Number Publication Date
CN112286881A CN112286881A (en) 2021-01-29
CN112286881B true CN112286881B (en) 2024-04-05

Family

ID=74372484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011171478.2A Active CN112286881B (en) 2020-10-28 2020-10-28 Document authentication tracing method and device

Country Status (1)

Country Link
CN (1) CN112286881B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115408590B (en) * 2022-10-31 2023-02-28 北京亿赛通科技发展有限责任公司 Document tracking and tracing method, device and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061838A (en) * 2019-04-28 2019-07-26 广州大学 A kind of the decentralization storage system and its realization, information retrieval method of DNS resource record
CN110263015A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
CN110597868A (en) * 2019-09-24 2019-12-20 腾讯科技(深圳)有限公司 Information query method, device, terminal and storage medium based on block chain
CN110929229A (en) * 2019-11-26 2020-03-27 中国石油大学(华东) Block chain-based office document credibility verification method and system
CN111144133A (en) * 2019-12-23 2020-05-12 传神语联网网络科技股份有限公司 Translation document keyword modification traceability system and method based on block chain
CN111177172A (en) * 2019-12-31 2020-05-19 江苏荣泽信息科技股份有限公司 Electronic deposit certificate system based on block chain
CN111538786A (en) * 2020-04-24 2020-08-14 上海简苏网络科技有限公司 Block chain data desensitization and tracing storage method and device
CN111611554A (en) * 2020-04-21 2020-09-01 哈尔滨工业大学 Drawing file circulation and tracing system and method based on alliance block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061838A (en) * 2019-04-28 2019-07-26 广州大学 A kind of the decentralization storage system and its realization, information retrieval method of DNS resource record
CN110263015A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
CN110597868A (en) * 2019-09-24 2019-12-20 腾讯科技(深圳)有限公司 Information query method, device, terminal and storage medium based on block chain
CN110929229A (en) * 2019-11-26 2020-03-27 中国石油大学(华东) Block chain-based office document credibility verification method and system
CN111144133A (en) * 2019-12-23 2020-05-12 传神语联网网络科技股份有限公司 Translation document keyword modification traceability system and method based on block chain
CN111177172A (en) * 2019-12-31 2020-05-19 江苏荣泽信息科技股份有限公司 Electronic deposit certificate system based on block chain
CN111611554A (en) * 2020-04-21 2020-09-01 哈尔滨工业大学 Drawing file circulation and tracing system and method based on alliance block chain
CN111538786A (en) * 2020-04-24 2020-08-14 上海简苏网络科技有限公司 Block chain data desensitization and tracing storage method and device

Also Published As

Publication number Publication date
CN112286881A (en) 2021-01-29

Similar Documents

Publication Publication Date Title
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN107396360B (en) Block verification method and device
CN109815657B (en) Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment
CN107798038B (en) Data response method and data response equipment
CN110266763B (en) Method, system and storage medium for implementing block chain network interconnected across network segments
US20210182955A1 (en) Financial transaction management system, method, storage medium and server
CN109902493B (en) Script issuing method and server
CN111611249A (en) Data management method, device, equipment and storage medium
CN110347678B (en) Financial data storage method, system, device and equipment
CN112286881B (en) Document authentication tracing method and device
CN111445319A (en) Voucher generation method and device, computer equipment and storage medium
CN111008220A (en) Dynamic identification method and device of data source, storage medium and electronic device
CN112667638B (en) Dynamic report generation method and device, terminal equipment and readable storage medium
CN108255950B (en) Data storage method and terminal equipment
CN112597192A (en) Data query method, device, server and medium
CN112541645A (en) Data processing method and system along with vehicle product project development and related device
CN113051622B (en) Index construction method, device, equipment and storage medium
CN112039893B (en) Private transaction processing method and device, electronic equipment and readable storage medium
CN111045983B (en) Nuclear power station electronic file management method, device, terminal equipment and medium
CN113094732A (en) Certificate storage data verification method, verification device, certificate storage method and certificate storage device
CN114006819A (en) Detection strategy generation and device, and data transmission method and device
CN112800130A (en) Data uplink method, system, device, equipment and storage medium
CN112035471A (en) Transaction processing method and computer equipment
CN113032820A (en) File storage method, access method, device, equipment and storage medium
CN108874553B (en) Message pushing method, device and system, storage medium and processor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant