[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112948784B - Internet of things terminal identity authentication method, computer storage medium and electronic equipment - Google Patents

Internet of things terminal identity authentication method, computer storage medium and electronic equipment Download PDF

Info

Publication number
CN112948784B
CN112948784B CN202110304930.6A CN202110304930A CN112948784B CN 112948784 B CN112948784 B CN 112948784B CN 202110304930 A CN202110304930 A CN 202110304930A CN 112948784 B CN112948784 B CN 112948784B
Authority
CN
China
Prior art keywords
internet
things
terminal
registration
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110304930.6A
Other languages
Chinese (zh)
Other versions
CN112948784A (en
Inventor
田娟
马宝罗
刘阳
池程
朱斯语
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN202110304930.6A priority Critical patent/CN112948784B/en
Publication of CN112948784A publication Critical patent/CN112948784A/en
Application granted granted Critical
Publication of CN112948784B publication Critical patent/CN112948784B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An identity authentication method of an internet of things terminal, a computer storage medium and electronic equipment, wherein the internet of things terminal generates a verification number based on a verification formula and current time; acquiring registration time of an Internet of things terminal; encrypting the registration time and the current time through a private key; and sending the identification, the verification number, the encrypted registration time and the encrypted current time of the terminal of the Internet of things to an industrial enterprise platform so that the industrial enterprise platform can carry out identity verification on the terminal of the Internet of things based on the identification, the verification number, the encrypted registration time and the encrypted current time of the terminal of the Internet of things. The invention generates the verification number based on the verification formula and the current time, and sends the terminal identification of the Internet of things, the verification number, the encrypted registration time and the encrypted current time to the industrial enterprise platform so that the industrial enterprise platform can complete the identity verification of the terminal of the Internet of things based on the terminal identification of the Internet of things, the verification number, the encrypted registration time and the encrypted current time.

Description

Internet of things terminal identity authentication method, computer storage medium and electronic equipment
Technical Field
The application relates to the technology of the internet of things, in particular to an internet of things terminal identity authentication method, a computer storage medium and electronic equipment.
Background
Along with the continuous expansion of the application field of the Internet of things, the number of terminals connected to the Internet of things is exponentially increased, the types of terminals are different, the use scene and the use type are more complicated, and the Internet of things brings convenience and comfort to our daily lives and brings a series of safety problems.
After an unauthorized terminal is connected to the Internet of things, huge potential safety hazards can be brought to the network, and the intelligent degree of most terminals in the Internet of things is low, so that widely used authentication technology in the Internet cannot be directly used for authenticating the terminals of the Internet of things, and terminal authentication is used as a first barrier for the safety of the Internet of things, which is a problem to be solved urgently at present.
Disclosure of Invention
The embodiment of the application provides an identity authentication method of an internet of things terminal, a computer storage medium and electronic equipment, which are used for solving the technical problems.
According to a first aspect of an embodiment of the present application, there is provided an identity authentication method for an internet of things terminal, applied to the internet of things terminal, the method including:
generating a verification number based on a verification formula and a current time;
Acquiring the registration time of the terminal of the Internet of things;
encrypting the registration time and the current time through a private key;
And sending the identification, the verification number, the encrypted registration time and the encrypted current time of the Internet of things terminal to an industrial enterprise platform, so that the industrial enterprise platform performs identity authentication on the Internet of things terminal based on the identification, the verification number, the encrypted registration time and the encrypted current time of the Internet of things terminal.
Optionally, the method further comprises:
Sending an identification registration application to an industrial identification management platform so that the industrial identification management platform registers the Internet of things terminal according to the registration application to obtain an identification, registration time, a private key, a public key and a verification formula of the Internet of things terminal, and storing the identification, registration time, the private key, the public key and the verification formula of the Internet of things terminal on a blockchain;
And receiving the identification, registration time, private key and verification formula of the terminal of the Internet of things fed back by the industrial identification management platform.
Optionally, the identification is a distributed identifier DID;
The registration application comprises a delivery label of the terminal of the Internet of things;
the verification formula is a hash value of the r power of k and the current time, wherein k is a value obtained by shifting a binary code of a factory label by m bits to the right, and m is the upper rounding of the quotient of the decimal value of the lowest digit of the DID and 3.
According to a second aspect of the embodiment of the present application, there is provided an identity authentication method for an internet of things terminal, applied to an industrial identifier management platform, the method comprising:
acquiring an identification registration application sent by an Internet of things terminal;
Registering the Internet of things terminal according to the identifier registration application to obtain an identifier, registration time, a private key, a public key and a verification formula of the Internet of things terminal, and storing the identifier, registration time, the private key, the public key and the verification formula of the Internet of things terminal on a blockchain;
And feeding back the identification, the registration time and the private key of the Internet of things terminal to the Internet of things terminal so that the Internet of things terminal can complete identity authentication based on the identification, the registration time and the private key of the Internet of things terminal.
Optionally, the identification is a distributed identifier DID;
The registration application comprises a delivery label of the terminal of the Internet of things;
The registering the internet of things terminal according to the identifier registration application to obtain an identifier, registration time, a private key, a public key and a verification formula of the internet of things terminal, wherein the registering comprises the following steps:
Taking the receiving time of the identification registration application as registration time;
Generating a DID, a private key and a public key of the terminal of the Internet of things according to a preset DID generation rule;
Generating a random number r according to the registration time;
And determining a verification formula as a hash value of the r power of k and the current time, wherein k is a value obtained by right shifting a binary code of a factory label by m bits, and m is the upper rounding of the quotient of the decimal value of the DID least significant bit and 3.
According to a third aspect of the embodiment of the present application, there is provided an internet of things terminal identity authentication method, applied to an industrial enterprise platform, the method comprising:
Acquiring an identifier of an internet of things terminal, a verification number generated by the internet of things terminal based on a verification formula and a current time, a registration time encrypted by a private key of the internet of things terminal and a current time encrypted by the private key of the internet of things terminal;
Acquiring registration time, public key and verification formula corresponding to the identification of the terminal of the Internet of things from a blockchain;
decrypting the encrypted registration time and the encrypted current time by the public key;
And if the registration time obtained by decryption is the same as the identification registration time obtained in the blockchain, and the value obtained based on the current time obtained by decryption and the verification formula is the same as the verification number, determining that the identity authentication of the terminal of the Internet of things is successful.
Optionally, the internet of things terminal identifier is a distributed identifier DID.
Optionally, the method further comprises: the verification formula is a hash value of the r power of k and the current time, wherein k is a value obtained by shifting a binary code of a factory label by m bits to the right, and m is the upper rounding of the quotient of the decimal value of the lowest digit of the DID and 3;
And the value obtained based on the current time and the verification formula is the r power of k and the hash value of the current time obtained by decryption.
According to a fourth aspect of embodiments of the present application there is provided a computer storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method of the first aspect, or the second aspect, or the third aspect, above.
According to a fifth aspect of an embodiment of the present application, there is provided an electronic device, including a memory for storing one or more programs, and one or more processors; the one or more programs, when executed by the one or more processors, implement the method as described above in the first aspect, or the second aspect, or the third aspect.
In the scheme provided in this embodiment, the verification number is generated based on the verification formula and the current time, and the identifier of the terminal of the internet of things, the verification number, the encrypted registration time and the encrypted current time are sent to the industrial enterprise platform, so that the industrial enterprise platform completes the identity verification of the terminal of the internet of things based on the identifier of the terminal of the internet of things, the verification number, the encrypted registration time and the encrypted current time.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 shows a flow diagram of a first method for authenticating an identity of an internet of things terminal according to an embodiment of the present application;
Fig. 2 shows a flow chart of a second method for authenticating the identity of an internet of things terminal according to an embodiment of the present application;
Fig. 3 is a schematic flow chart of a third method for authenticating the identity of an internet of things terminal according to an embodiment of the present application;
Fig. 4 is a schematic flow chart of a fourth method for authenticating the identity of an internet of things terminal according to an embodiment of the present application;
fig. 5 is a schematic diagram of an implementation architecture of a fifth method for authenticating an identity of an internet of things terminal according to an embodiment of the present application;
fig. 6 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Along with the continuous expansion of the application field of the Internet of things, the number of terminals connected to the Internet of things is exponentially increased, and the terminals are different in variety, so that the Internet of things terminals with a plurality of types are more diversified in network, and a series of safety problems are brought while the daily life of people is more comfortable. After an unauthorized terminal is connected to the Internet of things, huge potential safety hazards are brought to the network, and most terminals in the Internet of things are low in intelligence, so that widely used authentication technology in the Internet cannot be directly used for authenticating the terminals of the Internet of things, and terminal authentication serving as a first barrier of Internet of things safety is a problem to be solved urgently at present.
Based on the authentication formula and the current time, the authentication number is generated, and the internet of things terminal identification, the authentication number, the encrypted registration time and the encrypted current time are sent to an industrial enterprise platform, so that the industrial enterprise platform completes the authentication of the internet of things terminal based on the internet of things terminal identification, the authentication number, the encrypted registration time and the encrypted current time.
Referring to fig. 1, the method for authenticating the identity of the terminal of the internet of things applied to the terminal of the internet of things provided in the embodiment specifically includes:
101, generating a verification number based on a verification formula and the current time.
102, Acquiring the registration time of the terminal of the Internet of things.
103, Encrypting the registration time and the current time by the private key.
104, Sending the identification, the verification number, the encrypted registration time and the encrypted current time of the terminal of the Internet of things to the industrial enterprise platform so that the industrial enterprise platform can carry out identity authentication on the terminal of the Internet of things based on the identification, the verification number, the encrypted registration time and the encrypted current time of the terminal of the Internet of things.
Before executing step 101, an identifier registration application is further sent to the industrial identifier management platform, so that the industrial identifier management platform registers the internet of things terminal according to the registration application, obtains an identifier, registration time, a private key, a public key and a verification formula of the internet of things terminal, and stores the identifier, registration time, the private key, the public key and the verification formula of the internet of things terminal on the blockchain.
And receiving the identification, registration time, private key and verification formula of the terminal of the Internet of things fed back by the industrial identification management platform.
In addition, the identifier is identified as a distributed identifier DID.
The registration application includes a factory label of the terminal of the internet of things.
The verification formula is the hash value of the r power of k+the current time, wherein k is the value obtained by shifting the binary code of the factory label by m bits to the right, and m is the upper rounding of the quotient of the decimal value of the DID lowest bit and 3.
According to the method provided by the embodiment, the terminal of the Internet of things generates the verification number based on the verification formula and the current time, and the terminal identification of the Internet of things, the verification number, the encrypted registration time and the encrypted current time are sent to the industrial enterprise platform, so that the industrial enterprise platform completes the identity verification of the terminal of the Internet of things based on the terminal identification of the Internet of things, the verification number, the encrypted registration time and the encrypted current time.
Referring to fig. 2, the method for authenticating the identity of the terminal of the internet of things applied to the industrial identifier management platform provided in this embodiment specifically includes:
and 201, acquiring an identification registration application sent by the terminal of the Internet of things.
202, Registering the terminal of the Internet of things according to the identifier registration application to obtain the identifier, registration time, private key, public key and verification formula of the terminal of the Internet of things, and storing the identifier, registration time, private key, public key and verification formula of the terminal of the Internet of things on a blockchain.
203, Feeding back the identification, registration time and private key of the internet of things terminal to the internet of things terminal so that the internet of things terminal can complete identity authentication based on the identification, registration time and private key of the internet of things terminal.
Wherein the identification is a distributed identifier DID.
The registration application includes a factory label of the terminal of the internet of things.
In addition, the internet of things terminal is registered according to the identifier registration application, so as to obtain the identifier, registration time, private key, public key and verification formula of the internet of things terminal, and the method specifically comprises the following steps:
The receiving time of the identification registration application is taken as the registration time.
And generating the DID, the private key and the public key of the terminal of the Internet of things according to a preset DID generation rule.
A random number r is generated from the registration time.
And determining a verification formula as a hash value of the r power of k and the current time, wherein k is a value obtained by right shifting a binary code of a factory label by m bits, and m is the upper rounding of the quotient of the decimal value of the DID least significant bit and 3.
The body is the method provided by the embodiment, and the industrial identification management platform obtains the identification registration application sent by the terminal of the Internet of things. And registering the Internet of things terminal according to the identifier registration application to obtain the identifier, registration time, private key, public key and verification formula of the Internet of things terminal, and storing the identifier, registration time, private key, public key and verification formula of the Internet of things terminal on the blockchain. The identification, registration time and private key of the internet of things terminal are fed back to the internet of things terminal, so that the internet of things terminal can complete identity authentication based on the identification, registration time and private key of the internet of things terminal, and the identity authentication of the internet of things terminal is achieved.
Referring to fig. 3, the method for authenticating the identity of the terminal of the internet of things applied to the industrial enterprise platform provided in the embodiment specifically includes:
301, obtaining an identifier of an internet of things terminal, a verification number generated by the internet of things terminal based on a verification formula and current time, registration time of the internet of things terminal encrypted by a private key and current time of the internet of things terminal encrypted by the private key.
302, Acquiring registration time, public key and verification formula corresponding to the identification of the terminal of the Internet of things from the blockchain.
303 Decrypting the encrypted registration time and the encrypted current time with the public key.
304, If the registration time obtained by decryption is the same as the identification registration time obtained in the blockchain, and the value obtained based on the current time obtained by decryption and the verification formula is the same as the verification number, determining that the identity authentication of the terminal of the internet of things is successful.
The terminal identification of the internet of things is a distributed identifier DID.
The verification formula is the hash value of the r power of k+the current time, wherein k is the value obtained by shifting the binary code of the factory label by m bits to the right, and m is the upper rounding of the quotient of the decimal value of the DID lowest bit and 3.
The hash value of the current time obtained by decryption is obtained based on the current time and the verification formula, wherein the value of the hash value is the r power of k.
According to the method provided by the embodiment, the industrial enterprise platform obtains the identification of the terminal of the Internet of things, the verification number generated by the terminal of the Internet of things based on the verification formula and the current time, the registration time of the terminal of the Internet of things encrypted by the private key and the current time of the terminal of the Internet of things encrypted by the private key. And acquiring registration time, public key and verification formula corresponding to the identification of the terminal of the Internet of things from the blockchain. Decrypting the encrypted registration time and the encrypted current time through the public key, and if the registration time obtained by decryption is the same as the identification registration time obtained in the blockchain and the value obtained based on the current time obtained by decryption and the verification formula is the same as the verification number, determining that the identity authentication of the terminal of the Internet of things is successful, thereby realizing the identity authentication of the terminal of the Internet of things.
Referring to fig. 4, in a system composed of an internet of things terminal, an industrial identifier management platform and an industrial enterprise platform, the implementation flow of the method for authenticating the identity of the internet of things terminal provided in this embodiment is as follows:
401, the terminal of the internet of things sends an identifier registration application to the industrial identifier management platform.
The registration application may include a factory label of the terminal of the internet of things.
And the factory label is written into the internet of things terminal by a manufacturer of the internet of things terminal when the internet of things terminal is shipped.
402, The industrial identifier management platform obtains an identifier registration application sent by the terminal of the internet of things.
403, The industrial identifier management platform registers the internet of things terminal according to the identifier registration application to obtain an identifier, registration time, a private key, a public key and a verification formula of the internet of things terminal, and stores the identifier, registration time, the private key, the public key and the verification formula of the internet of things terminal on the blockchain.
The identifier of the terminal of the internet of things may be a DID (Decentralized Identifier, distributed identifier). The DID is independent of any centralized registry, an identity provider or a certificate authority, is a globally unique identity, and has the characteristics of global uniqueness, high resolvability, encryption and encryption verification. The DID document is a JSON-LD Object, comprising 6 parts (all optional): did identifiers; 2. a collection of encrypted material. Such as a public key; 3. a set of encryption protocols; 4. a set of service endpoints; 5. a time stamp; 6. an optional JSON-LD signature that is used to prove that this DID document is legitimate.
If the registration application can include the factory label of the internet of things terminal, registering the internet of things terminal according to the identification registration application in the step to obtain the specific implementation modes of the identification, registration time, private key, public key and verification formula of the internet of things terminal, wherein the specific implementation modes are as follows:
1. The receiving time of the identification registration application is taken as the registration time.
2. And generating the DID, the private key and the public key of the terminal of the Internet of things according to a preset DID generation rule.
3. A random number r is generated from the registration time.
This section may employ existing schemes for generating random numbers based on time, and is not limited herein.
4. The verification formula is determined as a hash value of k to the power of r+the current time.
The r power of k is k r, namely the verification formula is k r +the hash value of the current time. k is a value obtained by shifting a binary code of a factory label by m bits to the right, namely, k=the binary code of the factory label > > m, and m is the upper rounding of the quotient of the decimal value of the lowest digit of the DID and 3.
That is, m is an upper integer value of X, x=decimal value of the least significant digit of DID/3.
If DID least significant bit is 1, then m is 1, i.e., 1/3=0.333 rounded up.
The hash value of the current time in this formula is a variable, which is the hash value at the time when the validation formula is used.
404, The industrial identification management platform feeds back the identification, registration time and private key of the internet of things terminal to the internet of things terminal.
And 405, the internet of things terminal receives the identification, registration time, private key and verification formula of the internet of things terminal fed back by the industrial identification management platform.
The steps 401 to 405 are activation processes of the terminal of the internet of things, and the activation processes are not steps that need to be executed each time the identity of the terminal of the internet of things is authenticated, but are steps executed when the identity of the terminal of the internet of things is authenticated for the first time, or steps executed when one or more of the identity, registration time, private key and verification formula of the terminal of the internet of things changes.
And 406, the terminal of the Internet of things generates a verification number based on the verification formula and the current time.
Because the internet of things terminal has obtained the identification, registration time, private key and verification formula of the internet of things terminal fed back by the industrial identification management platform in the activation stage, the current time is brought into the verification formula: the r power of k+hash value of the current time.
407, The internet of things terminal obtains the registration time of the internet of things terminal.
And 408, the internet of things terminal encrypts the registration time and the current time through the private key.
409, The internet of things terminal sends the identification, the verification number, the encrypted registration time and the encrypted current time of the internet of things terminal to the industrial enterprise platform.
410, The industrial enterprise platform obtains the identification of the terminal of the internet of things, the verification number generated by the terminal of the internet of things based on the verification formula and the current time, the registration time of the terminal of the internet of things encrypted by the private key and the current time of the terminal of the internet of things encrypted by the private key.
411, The industrial enterprise platform obtains the registration time, the public key and the verification formula corresponding to the identifier of the terminal of the internet of things from the blockchain.
412, The industrial enterprise platform decrypts the encrypted registration time and the encrypted current time with the public key.
413, If the registration time obtained by decryption is the same as the identification registration time obtained in the blockchain, and the value obtained based on the current time obtained by decryption and the verification formula is the same as the verification number, the industrial enterprise platform determines that the identity authentication of the terminal of the internet of things is successful.
According to the method provided by the embodiment, the industrial enterprise platform compares the registration time and the verification number sent by the terminal of the Internet of things with the registration time and the verification number obtained based on the blockchain, if the registration time and the verification number are the same, the authentication is successful, and the security authentication of the terminal of the Internet of things is realized.
In addition, after the industrial enterprise platform determines that the identity authentication of the terminal of the Internet of things is successful, the data sent by the terminal of the Internet of things after the authentication is received, and the data are processed and stored.
The above method will be described again by taking the architecture shown in fig. 5 as an example.
And step 1, activating the terminal of the Internet of things through industrial identification management.
At this time, the industrial identifier management platform registers the internet of things terminal to obtain an identifier, registration time, a private key, a public key and a verification formula of the internet of things terminal, stores the identifier, registration time, the private key, the public key and the verification formula of the internet of things terminal on the blockchain, and simultaneously sends the identifier, registration time, the private key and the verification formula of the internet of things terminal to the internet of things terminal.
This step corresponds to steps 401 to 405 described above.
And 2, the terminal of the Internet of things obtains the identifier, the verification number, the encrypted registration time and the encrypted current time based on the identifier, the registration time, the private key and the verification formula, and sends the identifier, the verification number, the encrypted registration time and the encrypted current time to an industrial enterprise platform.
This step corresponds to steps 406 to 409 described above.
And step 3, the industrial enterprise platform acquires the registration time, the public key and the verification formula corresponding to the identification of the terminal of the Internet of things from the blockchain, and performs identity authentication based on the registration time, the public key and the verification formula acquired by the blockchain, the identification, the verification number, the encrypted registration time and the encrypted current time sent by the terminal of the Internet of things.
This step corresponds to steps 410 to 413 described above.
According to the method provided by the embodiment, the verification number is generated based on the verification formula and the current time, and the identification of the terminal of the Internet of things, the verification number, the encrypted registration time and the encrypted current time are sent to the industrial enterprise platform, so that the industrial enterprise platform completes the identity verification of the terminal of the Internet of things based on the identification of the terminal of the Internet of things, the verification number, the encrypted registration time and the encrypted current time.
Based on the same inventive concept, the present embodiment provides a computer storage medium having a computer program stored thereon.
If the computer storage medium is located in the terminal of the internet of things, the program when executed by the processor realizes the following steps.
And generating a verification number based on the verification formula and the current time.
And acquiring the registration time of the terminal of the Internet of things.
The registration time and the current time are encrypted by the private key.
And sending the identification, the verification number, the encrypted registration time and the encrypted current time of the terminal of the Internet of things to the industrial enterprise platform so that the industrial enterprise platform can carry out identity authentication on the terminal of the Internet of things based on the identification, the verification number, the encrypted registration time and the encrypted current time of the terminal of the Internet of things.
Optionally, the method further comprises:
And sending an identification registration application to the industrial identification management platform so that the industrial identification management platform registers the Internet of things terminal according to the registration application to obtain the identification, registration time, private key, public key and verification formula of the Internet of things terminal, and storing the identification, registration time, private key, public key and verification formula of the Internet of things terminal on the blockchain.
And receiving the identification, registration time, private key and verification formula of the terminal of the Internet of things fed back by the industrial identification management platform.
Optionally identified as a distributed identifier DID.
The registration application includes a factory label of the terminal of the internet of things.
The verification formula is the hash value of the r power of k+the current time, wherein k is the value obtained by shifting the binary code of the factory label by m bits to the right, and m is the upper rounding of the quotient of the decimal value of the DID lowest bit and 3.
The computer program stored on the computer storage medium provided in this embodiment generates a verification number based on a verification formula and a current time, and sends the internet of things terminal identifier, the verification number, the encrypted registration time and the encrypted current time to the industrial enterprise platform, so that the industrial enterprise platform completes identity verification of the internet of things terminal based on the internet of things terminal identifier, the verification number, the encrypted registration time and the encrypted current time.
If the computer storage medium is located in the industrial identification management platform, the program when executed by the processor implements the following steps.
And acquiring an identification registration application sent by the terminal of the Internet of things.
And registering the Internet of things terminal according to the identifier registration application to obtain the identifier, registration time, private key, public key and verification formula of the Internet of things terminal, and storing the identifier, registration time, private key, public key and verification formula of the Internet of things terminal on the blockchain.
And feeding back the identification, registration time and private key of the Internet of things terminal to the Internet of things terminal so that the Internet of things terminal can complete identity authentication based on the identification, registration time and private key of the Internet of things terminal.
Optionally identified as a distributed identifier DID.
The registration application includes a factory label of the terminal of the internet of things.
Registering the terminal of the Internet of things according to the identifier registration application to obtain the identifier, registration time, private key, public key and verification formula of the terminal of the Internet of things, wherein the method comprises the following steps:
The receiving time of the identification registration application is taken as the registration time.
And generating the DID, the private key and the public key of the terminal of the Internet of things according to a preset DID generation rule.
A random number r is generated from the registration time.
And determining a verification formula as a hash value of the r power of k and the current time, wherein k is a value obtained by right shifting a binary code of a factory label by m bits, and m is the upper rounding of the quotient of the decimal value of the DID least significant bit and 3.
The embodiment provides a computer program stored on a computer storage medium, and obtains an identifier registration application sent by an internet of things terminal. And registering the Internet of things terminal according to the identifier registration application to obtain the identifier, registration time, private key, public key and verification formula of the Internet of things terminal, and storing the identifier, registration time, private key, public key and verification formula of the Internet of things terminal on the blockchain. The identification, registration time and private key of the internet of things terminal are fed back to the internet of things terminal, so that the internet of things terminal can complete identity authentication based on the identification, registration time and private key of the internet of things terminal, and the identity authentication of the internet of things terminal is achieved.
If the computer storage medium is located on an industrial enterprise platform, the program when executed by the processor performs the following steps.
The method comprises the steps of obtaining an identifier of an Internet of things terminal, a verification number generated by the Internet of things terminal based on a verification formula and current time, registration time of the Internet of things terminal encrypted through a private key and current time of the Internet of things terminal encrypted through the private key.
And acquiring registration time, public key and verification formula corresponding to the identification of the terminal of the Internet of things from the blockchain.
The encrypted registration time and the encrypted current time are decrypted by the public key.
If the registration time obtained through decryption is the same as the identification registration time obtained in the blockchain, and the value obtained based on the current time obtained through decryption and the verification formula is the same as the verification number, the terminal identity authentication of the Internet of things is determined to be successful.
Optionally, the internet of things terminal identifier is a distributed identifier DID.
Optionally, the method further comprises: the verification formula is the hash value of the r power of k+the current time, wherein k is the value obtained by shifting the binary code of the factory label by m bits to the right, and m is the upper rounding of the quotient of the decimal value of the DID lowest bit and 3.
The hash value of the current time obtained by decryption is obtained based on the current time and the verification formula, wherein the value of the hash value is the r power of k.
The computer program stored on the computer storage medium provided in this embodiment obtains the identifier of the terminal of the internet of things, the verification number generated by the terminal of the internet of things based on the verification formula and the current time, the registration time of the terminal of the internet of things encrypted by the private key, and the current time of the terminal of the internet of things encrypted by the private key. And acquiring registration time, public key and verification formula corresponding to the identification of the terminal of the Internet of things from the blockchain. Decrypting the encrypted registration time and the encrypted current time through the public key, and if the registration time obtained by decryption is the same as the identification registration time obtained in the blockchain and the value obtained based on the current time obtained by decryption and the verification formula is the same as the verification number, determining that the identity authentication of the terminal of the Internet of things is successful, thereby realizing the identity authentication of the terminal of the Internet of things.
Based on the same inventive concept, this embodiment provides an electronic device, referring to fig. 6, including a memory 601, a processor 602, a bus 603, and a computer program stored in the memory 601 and capable of running on the processor 602, where if the electronic device is an internet of things terminal, the processor 602 performs the following steps when executing the program.
And generating a verification number based on the verification formula and the current time.
And acquiring the registration time of the terminal of the Internet of things.
The registration time and the current time are encrypted by the private key.
And sending the identification, the verification number, the encrypted registration time and the encrypted current time of the terminal of the Internet of things to the industrial enterprise platform so that the industrial enterprise platform can carry out identity authentication on the terminal of the Internet of things based on the identification, the verification number, the encrypted registration time and the encrypted current time of the terminal of the Internet of things.
Optionally, the method further comprises:
And sending an identification registration application to the industrial identification management platform so that the industrial identification management platform registers the Internet of things terminal according to the registration application to obtain the identification, registration time, private key, public key and verification formula of the Internet of things terminal, and storing the identification, registration time, private key, public key and verification formula of the Internet of things terminal on the blockchain.
And receiving the identification, registration time, private key and verification formula of the terminal of the Internet of things fed back by the industrial identification management platform.
Optionally identified as a distributed identifier DID.
The registration application includes a factory label of the terminal of the internet of things.
The verification formula is the hash value of the r power of k+the current time, wherein k is the value obtained by shifting the binary code of the factory label by m bits to the right, and m is the upper rounding of the quotient of the decimal value of the DID lowest bit and 3.
The electronic device provided by the embodiment generates the verification number based on the verification formula and the current time, and sends the identifier of the terminal of the internet of things, the verification number, the encrypted registration time and the encrypted current time to the industrial enterprise platform, so that the industrial enterprise platform completes the identity verification of the terminal of the internet of things based on the identifier of the terminal of the internet of things, the verification number, the encrypted registration time and the encrypted current time.
If the electronic device is an industrial identifier management platform, the processor 602 performs the following steps when executing the program.
And acquiring an identification registration application sent by the terminal of the Internet of things.
And registering the Internet of things terminal according to the identifier registration application to obtain the identifier, registration time, private key, public key and verification formula of the Internet of things terminal, and storing the identifier, registration time, private key, public key and verification formula of the Internet of things terminal on the blockchain.
And feeding back the identification, registration time and private key of the Internet of things terminal to the Internet of things terminal so that the Internet of things terminal can complete identity authentication based on the identification, registration time and private key of the Internet of things terminal.
Optionally identified as a distributed identifier DID.
The registration application includes a factory label of the terminal of the internet of things.
Registering the terminal of the Internet of things according to the identifier registration application to obtain the identifier, registration time, private key, public key and verification formula of the terminal of the Internet of things, wherein the method comprises the following steps:
The receiving time of the identification registration application is taken as the registration time.
And generating the DID, the private key and the public key of the terminal of the Internet of things according to a preset DID generation rule.
A random number r is generated from the registration time.
And determining a verification formula as a hash value of the r power of k and the current time, wherein k is a value obtained by right shifting a binary code of a factory label by m bits, and m is the upper rounding of the quotient of the decimal value of the DID least significant bit and 3.
The electronic device provided in this embodiment obtains an identifier registration application sent by the terminal of the internet of things. And registering the Internet of things terminal according to the identifier registration application to obtain the identifier, registration time, private key, public key and verification formula of the Internet of things terminal, and storing the identifier, registration time, private key, public key and verification formula of the Internet of things terminal on the blockchain. The identification, registration time and private key of the internet of things terminal are fed back to the internet of things terminal, so that the internet of things terminal can complete identity authentication based on the identification, registration time and private key of the internet of things terminal, and the identity authentication of the internet of things terminal is achieved.
If the electronic device is an industrial enterprise platform, the processor 602 performs the following steps when executing the program.
The method comprises the steps of obtaining an identifier of an Internet of things terminal, a verification number generated by the Internet of things terminal based on a verification formula and current time, registration time of the Internet of things terminal encrypted through a private key and current time of the Internet of things terminal encrypted through the private key.
And acquiring registration time, public key and verification formula corresponding to the identification of the terminal of the Internet of things from the blockchain.
The encrypted registration time and the encrypted current time are decrypted by the public key.
If the registration time obtained through decryption is the same as the identification registration time obtained in the blockchain, and the value obtained based on the current time obtained through decryption and the verification formula is the same as the verification number, the terminal identity authentication of the Internet of things is determined to be successful.
Optionally, the internet of things terminal identifier is a distributed identifier DID.
Optionally, the method further comprises: the verification formula is the hash value of the r power of k+the current time, wherein k is the value obtained by shifting the binary code of the factory label by m bits to the right, and m is the upper rounding of the quotient of the decimal value of the DID lowest bit and 3.
The hash value of the current time obtained by decryption is obtained based on the current time and the verification formula, wherein the value of the hash value is the r power of k.
The electronic device provided by the embodiment obtains the identifier of the terminal of the internet of things, the verification number generated by the terminal of the internet of things based on the verification formula and the current time, the registration time of the terminal of the internet of things encrypted by the private key and the current time of the terminal of the internet of things encrypted by the private key. And acquiring registration time, public key and verification formula corresponding to the identification of the terminal of the Internet of things from the blockchain. Decrypting the encrypted registration time and the encrypted current time through the public key, and if the registration time obtained by decryption is the same as the identification registration time obtained in the blockchain and the value obtained based on the current time obtained by decryption and the verification formula is the same as the verification number, determining that the identity authentication of the terminal of the Internet of things is successful, thereby realizing the identity authentication of the terminal of the Internet of things.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (9)

1. The identity authentication method for the terminal of the Internet of things is characterized by being applied to the terminal of the Internet of things, and comprises the following steps:
Generating a verification number based on a verification formula and current time, wherein the verification formula is a hash value of r power of k and current time, k is a value obtained by shifting a binary code of a factory label by m bits to the right, m is a quotient of a decimal value of the lowest digit of the DID and 3, r is a random number generated according to registration time, and the registration time is the receiving time of an identification registration application sent by an industrial identification management platform receiving an Internet of things terminal;
Acquiring the registration time of the terminal of the Internet of things;
encrypting the registration time and the current time through a private key;
And sending the identifier, the verification number, the encrypted registration time and the encrypted current time of the Internet of things terminal to an industrial enterprise platform so that the industrial enterprise platform can carry out identity authentication on the Internet of things terminal based on the identifier, the verification number, the encrypted registration time and the encrypted current time of the Internet of things terminal, wherein the identifier of the Internet of things terminal is a distributed identifier DID.
2. The method according to claim 1, wherein the method further comprises:
Sending an identification registration application to an industrial identification management platform so that the industrial identification management platform registers the Internet of things terminal according to the registration application to obtain an identification, registration time, a private key, a public key and a verification formula of the Internet of things terminal, and storing the identification, registration time, the private key, the public key and the verification formula of the Internet of things terminal on a blockchain;
And receiving the identification, registration time, private key and verification formula of the terminal of the Internet of things fed back by the industrial identification management platform.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
The registration application comprises a delivery label of the terminal of the Internet of things.
4. A terminal identity authentication method of the Internet of things is characterized in that,
Applied to an industrial identification management platform, the method comprises the following steps:
acquiring an identification registration application sent by an Internet of things terminal;
Registering the Internet of things terminal according to the identifier registration application to obtain an identifier, registration time, a private key, a public key and a verification formula of the Internet of things terminal, and storing the identifier, registration time, the private key, the public key and the verification formula of the Internet of things terminal on a blockchain, wherein the verification formula is a hash value of r power of k and current time, k is a value obtained by right shifting m bits of a binary code of a factory label, m is a whole of a quotient of a decimal value of a DID least bit and 3, r is a random number generated according to registration time, the registration time is a receiving time of the industrial identifier management platform for receiving the identifier registration application sent by the Internet of things terminal, and the identifier of the Internet of things terminal is a distributed identifier DID;
And feeding back the identification, the registration time and the private key of the Internet of things terminal to the Internet of things terminal so that the Internet of things terminal can complete identity authentication based on the identification, the registration time and the private key of the Internet of things terminal.
5. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
The registration application comprises a delivery label of the terminal of the Internet of things;
The registering the internet of things terminal according to the identifier registration application to obtain an identifier, registration time, a private key, a public key and a verification formula of the internet of things terminal, wherein the registering comprises the following steps:
Taking the receiving time of the identification registration application as registration time;
Generating a DID, a private key and a public key of the terminal of the Internet of things according to a preset DID generation rule;
Generating a random number r according to the registration time;
And determining a verification formula as a hash value of the r power of k and the current time, wherein k is a value obtained by right shifting a binary code of a factory label by m bits, and m is the upper rounding of the quotient of the decimal value of the DID least significant bit and 3.
6. A terminal identity authentication method of the Internet of things is characterized in that,
Applied to an industrial enterprise platform, the method comprising:
Acquiring an identifier of an internet of things terminal, a verification number generated by the internet of things terminal based on a verification formula and a current time, a registration time encrypted by a private key of the internet of things terminal and a current time encrypted by the private key of the internet of things terminal;
Acquiring registration time, a public key and a verification formula corresponding to an identifier of the Internet of things terminal from a blockchain, wherein the verification formula is a hash value of r times of k and current time, k is a value obtained by right shifting a factory-numbered binary code by m bits, m is a decimal value of the lowest position of a DID (direct digital identifier) and an upper rounding of a quotient of 3, r is a random number generated according to the registration time, the registration time is the receiving time of an identifier registration application sent by the Internet of things terminal by an industrial identifier management platform, and the identifier of the Internet of things terminal is a distributed identifier DID;
decrypting the encrypted registration time and the encrypted current time by the public key;
And if the registration time obtained by decryption is the same as the identification registration time obtained in the blockchain, and the value obtained based on the current time obtained by decryption and the verification formula is the same as the verification number, determining that the identity authentication of the terminal of the Internet of things is successful.
7. The method of claim 6, wherein the step of providing the first layer comprises,
The method further comprises the steps of: and the value obtained based on the current time and the verification formula is the r power of k and the hash value of the current time obtained by decryption.
8. A computer storage medium, characterized in that,
A computer program stored thereon, which when executed by a processor performs the steps of the method according to any of claims 1 to 3, or which when executed by a processor performs the steps of the method according to claim 4 or 5, or which when executed by a processor performs the steps of the method according to any of claims 6 or 7.
9. An electronic device, characterized in that,
Comprising a memory for storing one or more programs, and one or more processors; the one or more programs, when executed by the one or more processors, implement the method of any of claims 1-3, or the method of claim 4 or 5, or the method of any of claims 6 or 7.
CN202110304930.6A 2021-03-23 2021-03-23 Internet of things terminal identity authentication method, computer storage medium and electronic equipment Active CN112948784B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110304930.6A CN112948784B (en) 2021-03-23 2021-03-23 Internet of things terminal identity authentication method, computer storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110304930.6A CN112948784B (en) 2021-03-23 2021-03-23 Internet of things terminal identity authentication method, computer storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN112948784A CN112948784A (en) 2021-06-11
CN112948784B true CN112948784B (en) 2024-05-14

Family

ID=76227883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110304930.6A Active CN112948784B (en) 2021-03-23 2021-03-23 Internet of things terminal identity authentication method, computer storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN112948784B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113591103B (en) * 2021-06-29 2024-02-23 中国电力科学研究院有限公司 Identity authentication method and system between intelligent terminals of electric power Internet of things
CN113420250A (en) * 2021-07-19 2021-09-21 卢恩妍 Data control mode and system based on Internet of things
CN114070586A (en) * 2021-10-19 2022-02-18 中诚区块链研究院(南京)有限公司 Cooperative working method of block chain and Internet of things
CN114205140B (en) * 2021-12-09 2023-04-11 四川启睿克科技有限公司 Block chain-based credible unified identification generation method for Internet of things equipment
CN114448727B (en) * 2022-04-02 2022-06-21 中国信息通信研究院 Information processing method and system based on industrial internet identification analysis system
CN115225339B (en) * 2022-06-28 2024-03-26 国网电力科学研究院有限公司 Safe access and data transmission method and system for sensing terminal of power transmission Internet of things
CN115208698B (en) * 2022-09-15 2022-12-09 中国信息通信研究院 Block chain-based Internet of things identity authentication method and device
CN116614228B (en) * 2023-06-08 2024-03-08 嵩山实验室 Internet of things terminal access registration method and device applied to power industry

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678572A (en) * 2013-12-09 2014-03-26 中国科学院计算机网络信息中心 Method and system for searching for Internet of Things information based on two layers of DHTs
CN107895111A (en) * 2017-10-11 2018-04-10 西安电子科技大学 Internet of things equipment supply chain trust systems management method, computer program, computer
CN108429802A (en) * 2018-03-07 2018-08-21 国家计算机网络与信息安全管理中心 Internet of things equipment information acquisition method and device
CN108668258A (en) * 2018-05-09 2018-10-16 中国信息通信研究院 V2X communicates quick identity authorization system and method
CN108737381A (en) * 2018-04-23 2018-11-02 厦门盛华电子科技有限公司 A kind of extended authentication method of Internet of things system
CN111835752A (en) * 2020-07-09 2020-10-27 国网山西省电力公司信息通信分公司 Lightweight authentication method based on equipment identity and gateway
CN112218294A (en) * 2020-09-08 2021-01-12 深圳市燃气集团股份有限公司 5G-based access method and system for Internet of things equipment and storage medium
CN112699352A (en) * 2021-03-23 2021-04-23 中国信息通信研究院 Trusted data acquisition terminal identity verification method, computer storage medium and electronic equipment
CN113569210A (en) * 2021-07-09 2021-10-29 远光软件股份有限公司 Distributed identity authentication method, equipment access method and device
US11379213B1 (en) * 2019-12-06 2022-07-05 Equinix, Inc. Decentralized identifiers for securing device registration and software updates

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311883B (en) * 2018-03-27 2020-11-10 华为技术有限公司 Identity management method, device, communication network and storage medium
US11392702B2 (en) * 2019-03-17 2022-07-19 Microsoft Technology Licensing, Llc Discovery and matching of internet of things (IoT) devices and services using a secure global registry

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678572A (en) * 2013-12-09 2014-03-26 中国科学院计算机网络信息中心 Method and system for searching for Internet of Things information based on two layers of DHTs
CN107895111A (en) * 2017-10-11 2018-04-10 西安电子科技大学 Internet of things equipment supply chain trust systems management method, computer program, computer
CN108429802A (en) * 2018-03-07 2018-08-21 国家计算机网络与信息安全管理中心 Internet of things equipment information acquisition method and device
CN108737381A (en) * 2018-04-23 2018-11-02 厦门盛华电子科技有限公司 A kind of extended authentication method of Internet of things system
CN108668258A (en) * 2018-05-09 2018-10-16 中国信息通信研究院 V2X communicates quick identity authorization system and method
US11379213B1 (en) * 2019-12-06 2022-07-05 Equinix, Inc. Decentralized identifiers for securing device registration and software updates
CN111835752A (en) * 2020-07-09 2020-10-27 国网山西省电力公司信息通信分公司 Lightweight authentication method based on equipment identity and gateway
CN112218294A (en) * 2020-09-08 2021-01-12 深圳市燃气集团股份有限公司 5G-based access method and system for Internet of things equipment and storage medium
CN112699352A (en) * 2021-03-23 2021-04-23 中国信息通信研究院 Trusted data acquisition terminal identity verification method, computer storage medium and electronic equipment
CN113569210A (en) * 2021-07-09 2021-10-29 远光软件股份有限公司 Distributed identity authentication method, equipment access method and device

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
A Decentralized Lightweight Blockchain-based Authentication Mechanism for IoT Systems;Umair Khalid 等;Cluster Computing;第23卷;第2067-2087页 *
Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of Things;Parikshit N. 等;Springer VS;第266卷;第361-374页 *
一种物联网网关架构及设备接入实现研究;陈文艺;田创;;信息技术(第10期);第115-119页 *
基于区块链的分布式物联网设备身份认证机制研究;谭琛;陈美娟;Amuah Ebenezer Ackah;;物联网学报;4(第02期);第70-77页 *
面向MES的工业互联网标识数据 互通系统设计;柴森春 等;信息通信技术与政策(第08期);第62-66页 *

Also Published As

Publication number Publication date
CN112948784A (en) 2021-06-11

Similar Documents

Publication Publication Date Title
CN112948784B (en) Internet of things terminal identity authentication method, computer storage medium and electronic equipment
CN105915338B (en) Generate the method and system of key
CN109478214B (en) Apparatus and method for certificate registration
CN108471403B (en) Account migration method and device, terminal equipment and storage medium
CN113128999B (en) Block chain privacy protection method and device
CN109787754B (en) Data encryption and decryption method, computer readable storage medium and server
CN110740038B (en) Blockchain and communication method, gateway, communication system and storage medium thereof
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
US20200044838A1 (en) Data encryption method and system using device authentication key
CN112241527B (en) Secret key generation method and system of terminal equipment of Internet of things and electronic equipment
CN113343201A (en) Registration request processing method, user identity information management method and device
CN114218548B (en) Identity verification certificate generation method, authentication method, device, equipment and medium
CN112699352B (en) Trusted data acquisition terminal identity verification method, computer storage medium and electronic equipment
CN110149311B (en) Data processing method, device, server and readable storage medium
CN112737783B (en) Decryption method and device based on SM2 elliptic curve
CN112948896A (en) Signature information verification method and information signature method
CN117436043A (en) Method and device for verifying source of file to be executed and readable storage medium
CN112016055A (en) Software authorized activation code generation method and system based on hardware characteristics
EP3800825B1 (en) Method and device for configuring alias credential
CN116709312A (en) Safety protection method and device and electronic equipment
CN115766270A (en) File decryption method, file encryption method, key management method, device and equipment
CN106454435B (en) Conditional access method and related equipment and system
CN113536238A (en) Software use authorization authentication method and system based on cryptographic technology and related products
CN113067701B (en) Method and device for updating binding relationship
CN116827542B (en) Digital certificate management method and system of intelligent device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant