[go: up one dir, main page]

CN110263575B - Method for realizing data fusion and data privacy protection based on Hash algorithm and session control - Google Patents

Method for realizing data fusion and data privacy protection based on Hash algorithm and session control Download PDF

Info

Publication number
CN110263575B
CN110263575B CN201910540892.7A CN201910540892A CN110263575B CN 110263575 B CN110263575 B CN 110263575B CN 201910540892 A CN201910540892 A CN 201910540892A CN 110263575 B CN110263575 B CN 110263575B
Authority
CN
China
Prior art keywords
data
mapping
providing module
user
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910540892.7A
Other languages
Chinese (zh)
Other versions
CN110263575A (en
Inventor
傅跃兵
卞阳
丁海莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Fudata Technology Co ltd
Original Assignee
Shanghai Fudata Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Fudata Technology Co ltd filed Critical Shanghai Fudata Technology Co ltd
Priority to CN201910540892.7A priority Critical patent/CN110263575B/en
Publication of CN110263575A publication Critical patent/CN110263575A/en
Application granted granted Critical
Publication of CN110263575B publication Critical patent/CN110263575B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0255Targeted advertisements based on user history
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computational Linguistics (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a method for realizing data fusion and data privacy protection based on a Hash algorithm and session control, which comprises a demand module sending a query request after Hash calculation to a mapping data providing module; the mapping data providing module inquires whether data exists; the demand module queries the image data providing module for provider data; the image data providing module inquires a previous n-bit hash value list to obtain; the mapping data providing module returns hit information to the portrait data providing module; the image data providing module queries data. By adopting the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, disclosed by the invention, the leakage of high-sensitivity information caused by the query of low-sensitivity information is avoided, and the data derviation caused by data diffusion is also avoided. This patent implementation scheme makes the three parties all expect the user to portrait the information, all can not leak user privacy information, has ensured individual user and enterprise user's data privacy and data security.

Description

Method for realizing data fusion and data privacy protection based on Hash algorithm and session control
Technical Field
The invention relates to the field of data protection, in particular to the field of user data fusion protection, and specifically relates to a method for realizing data fusion and data privacy protection based on a hash algorithm and session control.
Background
Data incompleteness problem:
in fact, enterprises providing services for individual users all have user data with different dimensions, and the user data owned by each enterprise is incomplete. Such as:
a company providing a fixed point service for apps only has information about mobile phone devices and which apps have been installed by users (user interest characteristics can be derived from a user installation list), and information about user activity time;
an application providing H5 business services through handset registration, which only knows the handset number of the user and the data of the self service content;
app providing services in Native mode, which has mobile phone number and equipment number, and information of service field;
the mobile service company knows the user's phone number and some user characteristics associated with the call, etc.
There are many business scenario enterprises that it is not enough to know information in their own domain, for example, if an App needs to push advertisements to users, he needs to have wider user characteristics to achieve the best advertisement effect, and at this time, he needs to merge more characteristics to serve higher quality technical services.
Data leakage during data fusion:
to illustrate how data leaks occur, in one example, the example roles are as follows:
(1) a demand side: the method comprises the steps that a user mobile phone number is available, and a batch of Apps of user tag data are expected to be obtained;
(2) a user portrait provider: having a collection of user tag data and associated mobile phone device numbers (e.g., a company providing a point-of-purchase service);
(3) a mapping data providing module: and the corresponding relation between the mobile phone number and the mobile phone equipment number is possessed.
The query scene is shown in the description and the attached fig. 1 to fig. 3, and the description and the attached fig. 1 illustrate that the user equipment information is leaked to a demand side in the scene; description figure 2 illustrates that this scenario leaks user pictorial information to the mapping data providing module; description fig. 3 illustrates that in this scenario, information relating to the mobile phone number and the device is leaked to the image provider.
Problems caused by data leakage:
data compliance issues: the equipment information and the mobile phone number belong to high-sensitivity information, and the user characteristics belong to low-sensitivity information, so that the leakage of the high-sensitivity information is generated due to the inquiry of the low-sensitivity information in the case;
data derogation caused by data diffusion allows other parties to obtain data which is not required to be obtained in different query scenes, and a data provider can accumulate and exchange the data, so that the data value of the original provider is reduced.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method for realizing data fusion and data privacy protection based on a Hash algorithm and session control, which meets the requirements of completeness, safety and privacy.
In order to achieve the above purpose, the method for implementing data fusion and data privacy protection based on the hash algorithm and session control of the present invention comprises:
the method for realizing data fusion and data privacy protection based on the Hash algorithm and session control is mainly characterized by comprising the following steps of:
(1) the demand module sends a query request of the mobile phone number hash value to the mapping data providing module;
(2) the mapping data providing module inquires whether the same mobile phone number hash data exists, and if so, returns a result to the demand module; otherwise, not returning the result;
(3) the requirement module initiates a query request to the portrait data providing module;
(4) the portrait data providing module locally inquires a data list matched with the first n-bit hash value of the request and sends an inquiry request to the mapping data providing module;
(5) the mapping data providing module inquires whether the corresponding session data has a data list of hit requests, if so, the hit data is returned, otherwise, the data is not returned;
(6) the representation data providing module determines whether there is return data, and if so, queries locally the user representation data for return to the user, otherwise, does not return data.
Preferably, the step (2) specifically comprises the following steps:
(2.1) inquiring corresponding mapping data according to the requested hash value;
(2.2) if the corresponding mapping data exists, returning the corresponding equipment number of the mobile phone to the demand module, carrying out hash calculation, then taking the front n-bit numerical value, simultaneously creating a conference locally and providing a temporary token for the demand module; otherwise, no data is returned.
Preferably, the provider data in step (3) includes the first n-bit value after the device hash calculation and the temporary token.
Preferably, the step (4) specifically includes the following steps:
(4.1) the portrait data providing module searches the front n-bit matched data in the user portrait library according to the n-bit equipment hash value requested by the demand module;
(4.2) if the data is matched to be more than or equal to 1, sending a query request to the mapping data providing module; otherwise, directly returning an empty result to the demand module.
Preferably, the mapping data is mapping information of the user, including a corresponding relationship between a mobile phone number and an equipment number.
Preferably, the temporary token is generated by the mapping service provider server, is associated with the user information, and is stored by the server in session control within a limited time.
By adopting the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, disclosed by the invention, the leakage of high-sensitivity information caused by the query of low-sensitivity information is avoided, and the data derviation caused by data diffusion is also avoided. This patent implementation scheme makes the three parties all expect the user to portrait the information, all can not leak user privacy information, has ensured individual user and enterprise user's data privacy and data security.
Drawings
Fig. 1 is a schematic diagram of a first query scenario in the prior art.
Fig. 2 is a diagram illustrating a second query scenario in the prior art.
Fig. 3 is a diagram illustrating a third query scenario in the prior art.
Fig. 4 is a structural diagram of a method for implementing data fusion and data privacy protection based on a hash algorithm and session control according to the present invention.
Fig. 5 is a sequence diagram of a method for implementing data fusion and data privacy protection based on a hash algorithm and session control according to the present invention.
Detailed Description
In order to more clearly describe the technical contents of the present invention, the following further description is given in conjunction with specific embodiments.
The method for realizing data fusion and data privacy protection based on the Hash algorithm and session control comprises the following steps:
(1) the demand module sends a query request of the mobile phone number hash value to the mapping data providing module;
(2) the mapping data providing module inquires whether the same mobile phone number hash data exists, and if so, returns a result to the demand module; otherwise, not returning the result;
(2.1) inquiring corresponding mapping data according to the requested hash value;
(2.2) if the corresponding mapping data exists, returning the corresponding equipment number of the mobile phone to the demand module, carrying out hash calculation, then taking the front n-bit numerical value, simultaneously creating a conference locally and providing a temporary token for the demand module; otherwise, no data is returned.
(3) The requirement module initiates a query request to the portrait data providing module;
(4) the portrait data providing module locally inquires a data list matched with the first n-bit hash value of the request and sends an inquiry request to the mapping data providing module;
(4.1) the portrait data providing module searches the front n-bit matched data in the user portrait library according to the n-bit equipment hash value requested by the demand module;
(4.2) if the data is matched to be more than or equal to 1, sending a query request to the mapping data providing module; otherwise, directly returning an empty result to the demand module.
(5) The mapping data providing module inquires whether the corresponding session data has a data list of hit requests, if so, the hit data is returned, otherwise, the data is not returned;
(6) the representation data providing module determines whether there is return data, and if so, queries locally the user representation data for return to the user, otherwise, does not return data.
As a preferred embodiment of the present invention, the provider data in step (3) includes the first n-bit value after the device hash calculation and the temporary token.
As a preferred embodiment of the present invention, the mapping data is mapping information of a user, and includes a correspondence between a mobile phone number and an equipment number.
In a preferred embodiment of the present invention, the temporary token is generated by the server, associated with the user information, and stored by the server in session control for a limited time.
In the claims and the description of the present invention, the Hash refers to an algorithm that performs hashing and hashing on an input content with an arbitrary length and converts the input content into an irreversible output with a fixed length, such as MD5, which is a simple Hash algorithm. Irreversible means you cannot restore the output value to the input value again through the algorithm. Session is called "Session control" in network applications, and the attributes and configuration information required for a user Session are stored in this Session. In this patent, the information of a user is stored in a server when the request of the user is limited, so that the information of the corresponding user can be quickly found in the next request, and the specifically stored information is as follows: token, and Mapping information of the user corresponding to the token. Token is a temporary Token generated by the server and providing the access end, and the Token is stored in the Session within a limited time, and is associated with the user information. Mapping refers to Mapping information (Mapping data) of a user, and in the case of the patent, a corresponding relationship between a mobile phone number and an equipment number is referred to as Mapping relationship, and in addition, as follows: the corresponding relationship between the user identity card and the mobile phone number is also called Mapping and the like.
The query sent by the demand direction mapping data providing module is a query after Hash, and the mapping data providing module can only be matched in a library of the demand direction mapping data providing module and cannot be decompiled. If the mapping data providing module has the user information to be queried, a Session is maintained and a token is returned to the user, wherein the token has a different value even if the same user queries for multiple times. The mapping data providing module only returns the first n bits after the Hash of the device number to prevent the Hash data leakage problem.
In an embodiment of the present invention, the image data is user tag data. In the specification of the present invention, fig. 4 is divided into a demander, a mapping data provider, and a label provider, where the demander is a demand module, the label provider is a portrait data providing module, and the mapping data provider is a mapping data providing module. In the description of the present invention, fig. 5 is divided into a demander, a provider 1, and a provider 2, where the demander is a demand module, the provider 1 is a mapping data providing module, and the provider 2 is a portrait data providing module.
1. A demand side:
token: because the value is a session value, the long-term effectiveness is not achieved;
n bits before the hash of the device: since the hash is not complete, there is no hash leakage;
user portrait: service requirement data.
2. A mapping data providing module:
inquiring the mobile phone number Hash: the mapping data providing module can record the hash of the query user, but the data does not generate actual value;
device hash list information requested by a portrait provider: the information is similar to the hash of the mobile phone number of the inquiring party, and no additional value is generated.
The execution description is as follows:
matching the n front bits of the hash of the equipment of the demand side in a user portrait library, and returning to null if the n front bits of the hash of the equipment of the demand side cannot be matched; and if the m pieces are matched, sending a request to the mapping data providing module. If the mapping data providing module has a returned result, the portrait information is extracted.
3. Image provider:
token: the same as the demand side;
n bits before the hash of the device: the same as the demand side;
mapping return information: returning the information hit in the send list, there is no added value to the image side.
The execution description is as follows:
inquiring corresponding equipment information according to the token, matching whether equipment corresponding to the token exists in the sent hash list, and returning to null if the equipment corresponding to the token does not exist in the sent hash list; if there is a match, the hash value of the device is returned.
In conclusion, the scheme of the figure 4 in the specification does not generate information leakage.
The timing diagram for implementing the invention is shown in fig. 5, and omits the query ending part if the data cannot be found in the request.
The invention provides data privacy protection, and sends information hash values including mobile phone numbers and equipment numbers instead of sending plain texts in all request processes. The requesting party may not obtain other data than the user representation data, but may obtain other data in the data leakage scenario. The mapping data providing module may not obtain additional data other than the service, and may obtain user portrait data in the data leakage scenario 2. The image provider cannot obtain other user information in addition to the service, and Mapping information is obtained in the data leakage scenario 3. This patent implementation scheme makes three parties all expect the user to portrait the information, all can not leak user's privacy information.
By adopting the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, disclosed by the invention, the leakage of high-sensitivity information caused by the query of low-sensitivity information is avoided, and the data derviation caused by data diffusion is also avoided. This patent implementation scheme makes the three parties all expect the user to portrait the information, all can not leak user privacy information, has ensured individual user and enterprise user's data privacy and data security.
In this specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims (6)

1. A method for realizing data fusion and data privacy protection based on a hash algorithm and session control is characterized by comprising the following steps:
(1) the demand module sends a query request after the hash value is calculated by the query parameter to the mapping data providing module;
(2) the mapping data providing module inquires whether the mapping data which is obtained by calculating the hash value according to the inquiry parameters exists or not, and if the mapping data exists, the mapping data providing module returns a corresponding mapping data result and a temporary token for carrying out the conversation to the demand module; otherwise, not returning the result;
(3) the requirement module initiates a query request comprising the mapping data result and a temporary token for carrying out the session to the portrait data providing module;
(4) the portrait data providing module locally inquires a data list matched with the first n-bit hash value of the request, and sends an inquiry request comprising the matched data list and a temporary token for carrying out the session to the mapping data providing module;
(5) the mapping data providing module inquires whether the corresponding session data has a matching data list of a hit request, if so, the hit data is returned, otherwise, the data is not returned;
(6) and the portrait data providing module judges whether returned data exist or not, if so, the user tag data corresponding to the hit data is inquired locally and returned to the user, otherwise, the data are not returned.
2. The method for realizing data fusion and data privacy protection based on a hash algorithm and session control according to claim 1, wherein the step (2) specifically comprises the following steps:
(2.1) inquiring corresponding mapping data according to the requested hash value;
(2.2) if the corresponding mapping data exists, returning a mapping value corresponding to the input to the demand module, performing hash calculation, taking a first n-digit value, creating a session locally, and providing the session with a temporary token for the demand module; otherwise, no data is returned.
3. The method for implementing data fusion and data privacy protection based on hash algorithm and session control as claimed in claim 1, wherein the query request in step (3) includes the first n-bit value of the mapped data hash value and the temporary token.
4. The method for realizing data fusion and data privacy protection based on a hash algorithm and session control according to claim 1, wherein the step (4) specifically comprises the following steps:
(4.1) the portrait data providing module searches the first n matched data in the user tag library according to the n hash values requested by the demand module;
(4.2) if the data is matched to be more than or equal to 1, sending a query request to the mapping data providing module; otherwise, directly returning an empty result to the demand module.
5. The method for realizing data fusion and data privacy protection based on the hash algorithm and the session control as claimed in claim 1, wherein the mapping data is mapping information of a user, including a corresponding relationship between a mobile phone number and a mobile phone device number or a corresponding relationship between a mobile phone number and an identification number.
6. The method for implementing data fusion and data privacy protection based on hash algorithm and session control as claimed in claim 2, wherein the temporary token is generated by the mapping data provider server, associated with the user information, and stored by the server in session control within a limited time.
CN201910540892.7A 2019-06-21 2019-06-21 Method for realizing data fusion and data privacy protection based on Hash algorithm and session control Active CN110263575B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910540892.7A CN110263575B (en) 2019-06-21 2019-06-21 Method for realizing data fusion and data privacy protection based on Hash algorithm and session control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910540892.7A CN110263575B (en) 2019-06-21 2019-06-21 Method for realizing data fusion and data privacy protection based on Hash algorithm and session control

Publications (2)

Publication Number Publication Date
CN110263575A CN110263575A (en) 2019-09-20
CN110263575B true CN110263575B (en) 2020-11-13

Family

ID=67920175

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910540892.7A Active CN110263575B (en) 2019-06-21 2019-06-21 Method for realizing data fusion and data privacy protection based on Hash algorithm and session control

Country Status (1)

Country Link
CN (1) CN110263575B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231746B (en) * 2020-09-10 2024-02-02 杭州锘崴信息科技有限公司 Joint data analysis method, device, system and computer readable storage medium
CN112966168B (en) * 2021-03-11 2022-05-17 支付宝(杭州)信息技术有限公司 Business label query method and device for realizing privacy protection
CN113536379B (en) * 2021-07-19 2022-11-29 建信金融科技有限责任公司 Private data query method and device and electronic equipment
CN114219052A (en) * 2022-02-23 2022-03-22 富算科技(上海)有限公司 Graph data fusion method and device, electronic equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9727751B2 (en) * 2010-10-29 2017-08-08 Nokia Technologies Oy Method and apparatus for applying privacy policies to structured data
CN102546532B (en) * 2010-12-07 2016-03-30 中国移动通信集团公司 Capacity calling method, request unit, platform and system
US20180189753A1 (en) * 2017-01-05 2018-07-05 Beskatta, LLC Infrastructure for obligation management and validation

Also Published As

Publication number Publication date
CN110263575A (en) 2019-09-20

Similar Documents

Publication Publication Date Title
CN110263575B (en) Method for realizing data fusion and data privacy protection based on Hash algorithm and session control
CN112804354B (en) Method and device for data transmission across chains, computer equipment and storage medium
US8756657B2 (en) Mobile or user device authentication and tracking
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
US9438609B2 (en) Device verification prior to registration
CN108777750A (en) A kind of user mobile phone security privacy guard method based on Quick Response Code
WO2021135602A1 (en) Number privacy protection method, network device and computer storage medium
US20170270561A1 (en) Method, terminal and server for monitoring advertisement exhibition
CN111260475B (en) Data processing method, block link point equipment and storage medium
CN109088812A (en) Information processing method, device, computer equipment and storage medium
EP3637737A1 (en) Method and system for synchronizing user identities
CN111597060B (en) Data calling method and device, computer equipment and storage medium
WO2019148795A1 (en) Value transfer method, apparatus, computer device, and storage medium
CN112131535B (en) Integrated small program authorization method for multi-deployment environment
CN106936816B (en) Method and system for query and positioning
KR102169265B1 (en) Checking Method for Information about Client's Mobile Phone Number, Information Providing Server, Client Managing Server, and Telecommunications Company Server Used Therein
CN108769436A (en) It is a kind of that guard method is customized based on the user mobile phone security privacy of USSD and Quick Response Code
US9825970B2 (en) Managing access to content for a sponsored data campaign
CN103944987A (en) Method and device for integrating individual resources for users
CN116095081A (en) Event processing method and device based on block chain system, equipment and medium
CN105025000A (en) Data access internal audit method oriented to virtual desktop and information safety apparatus
WO2018001227A1 (en) Number display control method and device, and click to dial-up system
CN105376727A (en) Data card processing method and device
CN116151903B (en) Service processing method and device based on sales promotion management system
CN111212062B (en) Information completion method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant