CN108243182A - Management authorization method, sub- management end, root management end and the storage medium of block chain - Google Patents

Management authorization method, sub- management end, root management end and the storage medium of block chain Download PDF

Info

Publication number
CN108243182A
CN108243182A CN201711029356.8A CN201711029356A CN108243182A CN 108243182 A CN108243182 A CN 108243182A CN 201711029356 A CN201711029356 A CN 201711029356A CN 108243182 A CN108243182 A CN 108243182A
Authority
CN
China
Prior art keywords
management
sub
management end
public key
participant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711029356.8A
Other languages
Chinese (zh)
Other versions
CN108243182B (en
Inventor
侯庭伟
孙建平
黄丽标
李俊
李浩国
陈鹏
蒋澜
周波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN201711029356.8A priority Critical patent/CN108243182B/en
Publication of CN108243182A publication Critical patent/CN108243182A/en
Application granted granted Critical
Publication of CN108243182B publication Critical patent/CN108243182B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of block chains to manage authorization method, and this method includes:Sub- management end generation management unsymmetrical key pair, and according to the son management public key of cipher key pair and the generation management qualification authentication request of sub- management end identity information;Root management end is sent this request to, so that root management end carries out audit certification to the management identity of the sub- management end;When the administrative authentication for receiving the return of root management end passes through information, block platform chain is managed by information and son management public key according to administrative authentication.The invention also discloses a seed management end, root management end and storage mediums.The sub- management end of the present invention can be managed qualification application on line to root management end, and it is responsible for being managed block platform chain together with root management end when application passes through, so that the participant of different zones can select suitable management end to carry out block platform chain access application according to actual conditions, avoid administration authority and concentrate to inconvenient caused by participant.

Description

Management authorization method, sub- management end, root management end and the storage medium of block chain
Technical field
The present invention relates to block chain technical field more particularly to a kind of management authorization method of block chain, sub- management end, roots Management end and storage medium.
Background technology
With the development of bit coin and block chain technology, start to have occurred on the market a kind of based on block chain application platform Mode of doing business.When being traded by this mode of doing business, transaction participant is that block chain is written and read by front end processor Operation.And for entire block chain, for considerations such as safeties, generally require to carry out the identity for the participant that merchandises true Recognize, only the participant of certification just has the permission that transaction request is sent to block chain node, therefore participant is by preposition Before machine is written and read operation to block chain, first has to carry out access application to relevant management organization, authentication is completed, to obtain The permission that must enter.
Traditional block chain management authorization method is to concentrate on the permission of access mandate in some mechanism or equipment, institute Some participants are required for this mechanism or carry out access application to this equipment.But since block chain node often covers Lid multiple regions (or even whole world), and participant may be from different regions, if the permission of admission authentication is concentrated on a certain In a mechanism or equipment, it is desirable that these All Activities participant arrives some mechanism or carries out access application by some equipment, It can make troubles to participant, reduce application and authentication efficiency.
Invention content
It is a primary object of the present invention to propose a kind of management authorization method of block chain, sub- management end, root management end and Storage medium, it is intended to which the access administration authority for solving block platform chain is concentrated, and participant applies for the technical issues of inconvenient.
To achieve the above object, the present invention provides a kind of management authorization method of block chain, and the management authorization method should For sub- management end, the management authorization method includes the following steps:
Generation son management unsymmetrical key pair, and according to the son management public key and son of the sub- management unsymmetrical key centering The generation management qualification authentication request of management end identity information;
The management qualification authentication request is sent to root management end, so that described management end is to the sub- management end Management identity carries out audit certification;
When the administrative authentication for receiving described management end return passes through information, information is passed through according to the administrative authentication Block platform chain is managed with sub- management public key.
Optionally, the generation management unsymmetrical key pair, and according to the son of the sub- management unsymmetrical key centering The step of management public key and the generation management qualification authentication request of sub- management end identity information, includes:
Generation son management unsymmetrical key pair, and obtain the root management public key of described management end;
The sub- management public key and sub- management end identity information are encrypted by described management public key, managed Qualification authentication is asked.
Optionally, the administrative authentication includes the root authentication signature of described management end by information,
Described the step of being managed according to the administrative authentication by information and son management public key to block platform chain, wraps It includes:
If receiving the application for registration of participant end transmission, return to corresponding administration authority to the participant end and believe Breath, so that the administration authority of the sub- management end is verified at the participant end, wherein the administration authority information includes described Authentication signature and son management public key;
When receiving the log-on message that the participant end is sent, according to the log-on message to the participant end Identity is participated in be audited;
When participation identity at the participant end passes through audit, the block platform chain is written into the log-on message, And corresponding participation certification is returned by information to the participant end, so that the participant end is led to by the participation certification Information is crossed to participate in business in the block platform chain.
Optionally, the log-on message includes by the participation public key at the participant end and participates in identity information, the ginseng With public key and participating in identity information by the sub- management public key encryption,
It is described when receiving the log-on message that the participant end is sent, according to the log-on message to the participant The step of participation identity at end is audited includes:
When receiving the log-on message that the participant sends, managed by the son of the sub- management unsymmetrical key centering The log-on message is decrypted in reason private key, obtains the participation public key and participates in identity information;
The participation identity at the participant end is audited according to the participation public key and participation identity information.
In addition, in order to achieve the above object, the present invention also provides a kind of management authorization method of block chain, the management authorizes Method is applied to root management end, and the management authorization method includes:
When receiving sub- management end transmission management qualification authentication request, included according to the management qualification authentication request Son management public key and sub- management end identity information the management identity of the sub- management end is audited;
When the management identity of the sub- management end passes through audit, the sub- management end identity information write-in block chain is put down Platform, and administrative authentication is returned by information to the sub- management end, so that the sub- management end passes through according to the administrative authentication Information and son management public key are managed the block platform chain.
Optionally, it is described when receiving sub- management end transmission management qualification authentication request, recognized according to the management qualification What the son management public key and sub- management end identity information that card request includes audited the management identity of the sub- management end Before step, further include:
Root management unsymmetrical key pair is generated, and by the root management public key publication of described management unsymmetrical key centering extremely The block platform chain;
Son management public key and sub- management end identity information in the management qualification authentication request is by described management public key Encryption, it is described when receiving sub- management end transmission management qualification authentication request, it is wrapped according in the management qualification authentication request The step of son management public key included and sub- management end identity information audit the management identity of the sub- management end includes:
When receiving the management qualification authentication request that the sub- management end is sent, pass through described management unsymmetrical key The management qualification authentication request is decrypted in the root management private key of centering, obtains the sub- management public key and sub- management end body Part information;
The management identity of the sub- management end is audited according to the sub- management public key and sub- management end identity information.
In addition, in order to achieve the above object, the present invention also provides a seed management end, the sub- management end include processor, Memory and the management authoring program that can be performed on the memory and by the processor is stored in, wherein the management authorizes When program is performed by the processor, realize as the above-mentioned block chain applied to sub- management end management authorization method the step of.
In addition, in order to achieve the above object, the present invention also provides a kind of management end, described management end include processor, Memory and the management authoring program that can be performed on the memory and by the processor is stored in, wherein the management authorizes When program is performed by the processor, realize as the above-mentioned block chain applied to root management end management authorization method the step of.
In addition, in order to achieve the above object, the present invention also provides a kind of storage medium, management is stored on the storage medium Authoring program, the management authoring program realize the management such as the above-mentioned block chain applied to sub- management end when being executed by processor The step of authorization method.
In addition, in order to achieve the above object, the present invention also provides a kind of storage medium, management is stored on the storage medium Authoring program, the management authoring program realize the management such as the above-mentioned block chain applied to root management end when being executed by processor The step of authorization method.
The sub- management end generation management unsymmetrical key pair of the present invention, and according to the sub- management unsymmetrical key centering Son management public key and the generation management qualification authentication request of sub- management end identity information;The management qualification authentication request is sent to Root management end, so that described management end carries out audit certification to the management identity of the sub- management end;Receiving described When the administrative authentication that management end returns passes through information, block chain is put down by information and son management public key according to the administrative authentication Platform is managed.In the above manner, on the son management end line of the present embodiment qualification application is managed to root management end, and Application can be responsible for being managed block platform chain together with root management end when passing through, so that the participant of different zones can Suitable management end is selected to carry out block platform chain access application according to actual conditions, avoid administration authority and concentrate to participant Caused inconvenience, while the quantity for increasing management end can also reduce the audit amount of access application, improve review efficiency, from And improve the efficiency of application;In addition, the way to manage by establishing two-stage multiterminal, also helps and keeps block chain decentralization The characteristics of, improve the efficiency of transaction.
Description of the drawings
Fig. 1 be the present embodiments relate to sub- management end hardware architecture diagram;
Fig. 2 is the flow diagram of the management authorization method first embodiment of block chain of the present invention;
Fig. 3 is the block chain management framework schematic diagram that the management authorization method first embodiment of block chain of the present invention is related to;
Fig. 4 is the flow diagram of the management authorization method second embodiment of block chain of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for representing that the suffix of such as " module ", " component " or " unit " of element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
The present embodiments relate to block chain management authorization method be mainly used in block chain participant manage system System, the participant manage system and include sub- management end and root management end.
For the present embodiments relate to sub- management end, please refer to Fig. 1, Fig. 1 is the embodiment of the present invention neutron tube Manage the hardware architecture diagram at end.In the embodiment of the present invention, sub- management end can include processor 1001 (such as CPU), communication Bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is used to implement these groups Connection communication between part;User interface 1003 can include display screen (Display), input unit such as keyboard (Keyboard);Network interface 1004 can optionally include standard wireline interface and wireless interface (such as WI-FI interfaces);It deposits Reservoir 1005 can be high-speed RAM memory or the memory (non-volatile memory) of stabilization, such as magnetic Disk storage, memory 1005 optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the sub- management end hardware configuration shown in Fig. 1 is not formed to sub- management end Restriction, can include that more or fewer components either combine certain components or different components is arranged than illustrating.
With continued reference to Fig. 1, in Fig. 1 as a kind of memory 1005 of computer storage media can include operating system, Network communication module and management authoring program.
In Fig. 1, network communication module be mainly used for connecting root management end, block platform chain node and participant end etc. its Its equipment, therewith into row data communication;And processor 1001 can be used for calling the management mandate journey stored in memory 1005 Sequence, and perform following operate:
Generation son management unsymmetrical key pair, and according to the son management public key and son of the sub- management unsymmetrical key centering The generation management qualification authentication request of management end identity information;
The management qualification authentication request is sent to root management end, so that described management end is to the sub- management end Management identity carries out audit certification;
When the administrative authentication for receiving described management end return passes through information, information is passed through according to the administrative authentication Block platform chain is managed with sub- management public key.
Further, the generation management unsymmetrical key pair, and according to the sub- management unsymmetrical key centering The step of son management public key and the generation management qualification authentication request of sub- management end identity information, includes:
Generation son management unsymmetrical key pair, and obtain the root management public key of described management end;
The sub- management public key and sub- management end identity information are encrypted by described management public key, managed Qualification authentication is asked.
Further, the administrative authentication includes the root authentication signature of described management end by information,
Described the step of being managed according to the administrative authentication by information and son management public key to block platform chain, wraps It includes:
If receiving the application for registration of participant end transmission, return to corresponding administration authority to the participant end and believe Breath, so that the administration authority of the sub- management end is verified at the participant end, wherein the administration authority information includes described Authentication signature and son management public key;
When receiving the log-on message that the participant end is sent, according to the log-on message to the participant end Identity is participated in be audited;
When participation identity at the participant end passes through audit, the block platform chain is written into the log-on message, And corresponding participation certification is returned by information to the participant end, so that the participant end is led to by the participation certification Information is crossed to participate in business in the block platform chain.
Further, the log-on message includes by the participation public key at the participant end and participates in identity information, described It participates in public key and participates in identity information by the sub- management public key encryption,
It is described when receiving the log-on message that the participant end is sent, according to the log-on message to the participant The step of participation identity at end is audited includes:
When receiving the log-on message that the participant sends, managed by the son of the sub- management unsymmetrical key centering The log-on message is decrypted in reason private key, obtains the participation public key and participates in identity information;
The participation identity at the participant end is audited according to the participation public key and participation identity information.
For the present embodiments relate to root management end, hardware configuration can refer to the hardware knot of above-mentioned sub- management end Structure, i.e. root management end can include processor (such as CPU), communication bus, user interface, network interface, memory.For place Manage device (such as CPU), communication bus, user interface, network interface, function and the function of corresponding part in above-mentioned sub- management end It is similar.For memory portion, including operating system, network communication module and management authoring program;Each root management end Operating system can be identical from the system of sub- management end or uses different operating system;Network communication module is mainly used In miscellaneous equipments such as connexon management end, block platform chain node and participant ends, therewith into row data communication;And processor can To call the management authoring program stored in memory, and perform following operate:
When receiving sub- management end transmission management qualification authentication request, included according to the management qualification authentication request Son management public key and sub- management end identity information the management identity of the sub- management end is audited;
When the management identity of the sub- management end passes through audit, the sub- management end identity information write-in block chain is put down Platform, and administrative authentication is returned by information to the sub- management end, so that the sub- management end passes through according to the administrative authentication Information and son management public key are managed the block platform chain.
Further, processor may call upon the management authoring program stored in memory, and perform following operate:
Root management unsymmetrical key pair is generated, and by the root management public key publication of described management unsymmetrical key centering extremely The block platform chain;
Son management public key and sub- management end identity information in the management qualification authentication request is by described management public key Encryption, it is described when receiving sub- management end transmission management qualification authentication request, it is wrapped according in the management qualification authentication request The step of son management public key included and sub- management end identity information audit the management identity of the sub- management end includes:
When receiving the management qualification authentication request that the sub- management end is sent, pass through described management unsymmetrical key The management qualification authentication request is decrypted in the root management private key of centering, obtains the sub- management public key and sub- management end body Part information;
The management identity of the sub- management end is audited according to the sub- management public key and sub- management end identity information.
Hardware configuration based on above-mentioned sub- management end and root management end proposes the management authorization method of block chain of the present invention Each embodiment.
With reference to Fig. 2, Fig. 2 is the flow diagram of the management authorization method first embodiment of block chain of the present invention.
In the present embodiment, the management authorization method is applied to sub- management end, and the management authorization method includes following step Suddenly:
Step S10 generates son management unsymmetrical key pair, and is managed according to the son of the sub- management unsymmetrical key centering Public key and the generation management qualification authentication request of sub- management end identity information;
Traditional block chain management authorization method is that the permission of block chain access mandate is concentrated on some mechanism or is set In standby, all participants are required for this mechanism or carry out access application to this equipment.But due to block chain node Multiple regions (or even whole world) are often covered, and participant may be from different regions, if the authority set by admission authentication In in some mechanism or equipment, it is desirable that these All Activities participant arrives some mechanism or is carried out by some equipment accurate Enter application, can make troubles to participant, reduce application and authentication efficiency.Based on the problem, proposed in the present embodiment a kind of The management authorization method of block chain by building two-level management mandate system, the permission of admission authentication is authorized multiple and different The mechanism or system equipment in region facilitate transaction participant to carry out access application for registration, improve the efficiency of application and certification, so as to Improve the trading efficiency of block platform chain transaction.
In the present embodiment, include block platform chain, participant end, participant's management for the block chain transaction system of transaction System.Wherein, block platform chain includes several block chain nodes again, as distributed shared data library, is subjected to ginseng The transaction data transmitted by the management data of system transmission and participant end is managed with person;Participant end is as transaction participant institute The transaction terminal used can be realized in a manner of front end processor in specific implementation, and participant end is being needed by participating in Person manages the certification of system, confirms that the identity of its user (transaction participant) can just carry out the write operation of block platform chain. Traditional participant manages system and only includes a root management end, is uniformly responsible for the access at all participant ends by the root management end Certification;And in the present embodiment, under an initial root management end, several sub- management ends are may also include, by two-level management end It is collectively responsible for the management of participant.
Sub- management end, to realize the management function to block platform chain, needs to first pass through when accessing block platform chain The administrative authentication of root management end obtains corresponding administration authority.Specifically, sub- management end will generate a pair of of unsymmetrical key at random Right, the unsymmetrical key is to can be described as sub- management unsymmetrical key pair;Son management unsymmetrical key is considered as sub- management end Identity, when passing through administrative authentication, sub- management end will use the sub- management unsymmetrical key to carrying out block chain management.It is generating During son management unsymmetrical key pair, sub- management end will extract cipher key pair sub- management public key from the sub- management is non-, and according to The sub- management public key and the generation management qualification authentication request of sub- management end identity information, to be managed permission to root management end Application.Wherein, the user which can be including sub- management end address location information, sub- management end The information such as the device identification of true identity information, sub- management end of (sub- manager), certain sub- management end identity information may be used also To include other contents;And for the son management private key of sub- management unsymmetrical key centering, then it is stored not by sub- management end secret Show outside.
Further, for the management qualification authentication ask, including son management identity information may be related to son The privacy of manager;Therefore it in order to ensure the safety of information, in generation management qualification authentication request, will also carry out relevant Encryption, the request is avoided, which to be intercepted in transmission process by disabled user, leads to information leakage.In the present embodiment, it is contemplated that root pipe End is managed when being managed to block platform chain and by a pair of of unsymmetrical key to being managed, therefore using root The unsymmetrical key of management end is to being encrypted.Specifically, the unsymmetrical key of root management end is non-to can be described as root management Symmetric key pair;Root management unsymmetrical key centering root management public key be often publicity in block platform chain, which represent The identity of root management end, root management private key, which is then that the storage of root management end secret is not outer, to be shown;Other ends in block platform chain to Private information is sent to root management end, can be managed after information is encrypted in public key by the root of publicity will be transmitted, root pipe The root management private key that reason end is stored when receiving the private information by secret again carries out parsing deciphering to it;On the other hand, Even if third party acquires the private information, private key is managed due to the third party and without root necessary to decryption, also The private information can not be decrypted and read content therein, so as to ensure that the safety of information.Based on this principle, The root for obtaining root management end is also managed public key by the sub- management end in the present embodiment in generation son management unsymmetrical key pair, And pass through root management public key antithetical phrase management public key and sub- management end identity information is encrypted, obtaining management qualification authentication please It asks.
It further walks, can inquire to obtain in block platform chain when sub- management end obtains root management public key;Certainly it is right For the sub- management end having, when not passing through administrative authentication, it is understood that there may be the feelings that block platform chain is inquired can not be accessed Condition;Therefore, sub- management end can also send relevant Pubic-Key search information or greeting class message (Say_ to root management end Hello packet) so that root management end replys corresponding management public key;Public key is managed in the root for receiving the reply of root management end When, then public key is managed by the root and is encrypted.
The management qualification authentication request is sent to root management end, so that described management end is to the son by step S20 The management identity of management end carries out audit certification;
In the present embodiment, sub- management end is in generation management qualification authentication request, you can proposes management money to root management end Lattice application obtains the administration authority of block platform chain.At this point, the management qualification authentication can be sent to root management by sub- management end End so that root management end is managed qualification examination authentication procedure according to management qualification authentication request, judges whether antithetical phrase pipe Authorize administration authority in reason end.
Step S30, when the administrative authentication for receiving described management end return passes through information, according to the administrative authentication Block platform chain is managed by information and son management public key.
In the present embodiment, root management end is after the management qualification authentication of sub- management end request is audited, if thinking pipe Reason end and its identity of user (sub- manager) meet management condition, then can ratify sub- manager by sub- management end, with son Identity representated by management public key is participated in the management of block platform chain, and relevant administration authority is authorized to sub- management end, and It is written in block platform chain after signing to sub- management end identity information and carries out publicity;It will also be returned simultaneously to sub- management end Corresponding administrative authentication passes through information.Sub- management end just obtains management and participates in when receiving the administrative authentication and passing through information Person enters the permission of block platform chain, becomes the two level manager in participant's management system, as shown in figure 3, Fig. 3 is this reality Apply the block chain management framework schematic diagram of example.In figure 3, root management end is one-level management person, and sub- management end is (including sub- management end A, sub- management end b, sub- management end c) become two level manager in the mandate for obtaining root management end.The ginseng of transaction participant at this time It can both select to carry out access application to root management end with person end, access application can also be carried out to sub- management end, joined for transaction It is provided a convenient with person.
What deserves to be explained is the sub- management end in the present embodiment, can be provided in different regions, so as to facilitate difference The transaction participant in region carries out the access application of block platform chain nearby;Meanwhile the access of the sub- management end for each department Time can also be different.That is, for entire block chain transaction system and participative management system, with good Scalability, can under the premise of system overall architecture is not changed, according to the actual business requirement of each department to sub- management end into Row is correspondingly added and is reduced, and to adapt to the development of economy and business, while also reduces operation cost.For example, for former area Two regions of A and B that block platform chain node is covered, the originally trading volume of a-quadrant and access applications is less, therefore only in B Region sets up a sub- management end b, unified that the participant end in two regions of A and B is managed;And with economic hair Exhibition, the trading volume and access applications of a-quadrant are continuously increased, and the audit pressure of original sub- management end b increases therewith, while The application operation at the participant end of inconvenient a-quadrant;Therefore, a sub- management end a can be newly set up in a-quadrant, passes through sub- management End a and sub- management end b is managed jointly, and participant end is facilitated to carry out access application.
In the present embodiment, sub- management end generation management unsymmetrical key pair, and according to the sub- management unsymmetrical key The son management public key of centering and the generation management qualification authentication request of sub- management end identity information;By the management qualification authentication request Root management end is sent to, so that described management end carries out audit certification to the management identity of the sub- management end;It is receiving When the administrative authentication that described management end returns passes through information, according to the administrative authentication by information and son management public key to area Block platform chain is managed.In the above manner, qualification Shen is managed to root management end on the son management end line of the present embodiment Please, and when application passes through can be responsible for being managed block platform chain together with root management end, so that different zones Participant can select suitable management end to carry out block platform chain access application according to actual conditions, avoid administration authority concentration To inconvenience caused by participant, while the quantity for increasing management end can also reduce the audit amount of access application, improve careful Core efficiency, so as to improve the efficiency of application;In addition, the way to manage by establishing two-stage multiterminal, also helps holding block The characteristics of chain decentralization, improves the efficiency of transaction.
With continued reference to Fig. 2, in the step S30 of Fig. 2, the administrative authentication includes described participant end by information Root authentication signature, described the step of being managed according to the administrative authentication by information and son management public key to block platform chain Including:
If receiving the application for registration of participant end transmission, return to corresponding administration authority to the participant end and believe Breath, so that the administration authority of the sub- management end is verified at the participant end, wherein the administration authority information includes described Authentication signature and son management public key;When receiving the log-on message that the participant end is sent, according to the log-on message pair The participation identity at the participant end is audited;When participation identity at the participant end passes through audit, by the registration The block platform chain is written in information, and returns to corresponding participation certification by information to the participant end, for the ginseng It is participated in business in the block platform chain by information by the participation certification with person end.
In the present embodiment, sub- management end is just obtained when the administrative authentication for receiving the return of root management end passes through information Management participant enters the permission of block platform chain;At this time sub- management end for the two level management in participant's management system Person is provided with audit participant's end access application and ratifies its permission into block platform chain.Wherein, root management end is returned Administrative authentication can be used for proving that it has by information, including the root authentication signature at root participant end, the root authentication signature Imitate the validity of administration authority;It can also include other contents, such as the time of certification, administration authority in certain authentication signature Validity, the true identity of the owner of the administration authority, the public key (sub- management public key) of administration authority etc..If at this point, have Participant wishes at end to carry out access application to sub- management end, then can send relevant application information to management terminal first, for Sub- management end carries out participating in qualification examination authentication procedure according to this application information.And it considers during application, participant Include the true identity information of participant end and its user (transaction participant) in the improved data information in end, and these Information may be related to the privacy of transaction participant;Therefore in order to ensure the safety of information, qualification authentication is managed in generation During request, relevant encryption will be also carried out, the request is avoided, which to be intercepted in transmission process by disabled user, leads to information leakage. In the present embodiment, due to the public key of sub- management end be by root management end audit and certification, and the private key of sub- management end be by Sub- management end secret storage is not outer to be shown, therefore using sub- management unsymmetrical key to being encrypted into application information.
Specifically, in the present embodiment, participant end first sends registration Shen when needing to carry out access application to sub- management end Please (Say_Hello messages).Sub- management end can return to corresponding administration authority when receiving the application for registration to participant end Information;Wherein, root management end is included in the administration authority information to the root of sub- management end administration authority certification signature, sub- management The son management public key at end, can also include other contents, such as sub- management end is to the label of public key certainly in the administration authority information Name etc..Participant end first can verify the management identity of sub- management end when receiving the administration authority information;It participates in Therein signature is read out in this section of meeting, and it is verified, judge the root signature whether be root management end actual signature; If so, illustrating that sub- management end is by root management end certification, sub- management end is believable management end, is then continued at this time to son The subsequent application operation of management end;If conversely, the root signature it is not validated, illustrate sub- management end be it is incredible, at this time It will stop carrying out access application to sub- management end.
In the present embodiment, participant end will be managed when determining that sub- management end is credible by the son in the administration authority information Log-on message is encrypted in reason public key;Wherein log-on message include participant end carrying out the participation of block chain transaction Public key, the true identity information of participant, the information such as device identification at participant end, certain sub- management end identity information may be used also To include other contents;When encrypting completion, which can be sent to sub- management end by participant end.Son management End when receiving the encrypted log-on message, can first pass through the son management private key of sub- management end secret storage to log-on message into Row decryption obtains participation public key therein and participates in identity information, and according to the participation public key and participates in identity information to participating in The participation identity of person end and its user (transaction participant) are audited, and judge whether to authorize participation permission to participant end.
Further, in review process of the sub- management end to participating in request, both included judging to hand over according to practical business rule Whether easy participant there is transaction to participate in qualification, further include the audit to participating in public key uniqueness.Specifically, participant Duan areas It is into row information (transmission of message), the participation public key generation by its corresponding public key that participates in when being traded in block platform chain The table identity at participant end, therefore the participation public key must be unique in block platform chain.Sub- management end is being examined During core, it will the uniqueness of the participation public key is judged, it is ensured that do not have in block platform chain identical with the participation public key Public key, so as to ensure to participate in the uniqueness of the identity representated by public key, ensure being normally carried out for block platform chain transaction.
In the present embodiment, sub- management end when after being audited to the request at participant end, if think participant end and its The identity of user's (transaction participant) meets the requirements, then the participant that ratifies to merchandise by participant end, to participate in public key institute's generation The identity of table is participated in the transaction of block platform chain, and relevant participation permission is authorized, and to participant's identity to participant end Information, which is written to after being signed in block platform chain, carries out publicity, and is signed to it (sub- signature), to show the participation The identity of person end and the participant that merchandises are believable;Corresponding participation certification will be also returned to participant end simultaneously and passes through information. Participant end obtains the permission of read-write block chain at this time, can be signed and merchandised by the public key of oneself, the transaction block of signature What chain node can be verified.
Further, sub- management end is prescribed a time limit authorizing right to participate in participant end, and also participant end and transaction will be participated in The identity information of person is recorded.In block chain if any transaction participant by a certain participant end carry out system attack or Person carries out wash sale, fraud when illegal acts, and the regulator system of block chain transaction system can be sent to sub- management end Identification information, the information include the participant end identity of the system attack or fraud detected;Sub- management end is receiving It is non-so as to assist to determine with the participant end identity in the information is compared with the identity information recorded during to the information The true identity of judicial act person.
What deserves to be explained is although sub- management end is responsible for the access management of transaction participant, it does not simultaneously intervene block chain Original process of exchange in platform, therefore new center is not formed, still maintain the decentralization of block chain, distributed data The features such as storage, point-to-point transmission, so as to improve the efficiency of transaction.
In the present embodiment, sub- management end is when obtaining the mandate of root management end, you can the access at complete independently participant end Application audit and mandate, provide a convenient to transaction participant, improve the efficiency of transaction.
With reference to Fig. 4, Fig. 4 is the flow diagram of the management authorization method second embodiment of block chain of the present invention.
Based on above-mentioned embodiment illustrated in fig. 2, the management authorization method of the present embodiment is applied to root management end, and the management is awarded Power method includes:
Step S40, please according to the management qualification authentication when receiving sub- management end transmission management qualification authentication request The son included management public key and sub- management end identity information is asked to audit the management identity of the sub- management end;
In the present embodiment, block platform chain, participant end, participant in block chain transaction system manage the brief of system It introduces and can be found in shown in step S10, do not repeating herein.
In the present embodiment, root management end is when receiving sub- management end transmission management qualification authentication request, you can according to this The son that management qualification authentication request includes manages public key and sub- management end identity information, to sub- management end and its user's (son Manager) management identity audited, judge whether to authorize administration authority to sub- management end.
Root management end both includes judging that sub- manager is according to practical business rule in the review process to management request It is no that there is block chain to manage qualification, further include the audit of antithetical phrase management public key uniqueness.Specifically, sub- management end is to block chain It is to be carried out by its corresponding sub- management public key, which represents the body of sub- management end when platform is managed Part, therefore the sub- management public key must be unique in block platform chain.Root management end is when being audited, it will to the son The uniqueness of management public key is judged, it is ensured that do not have the public key identical with the sub- management public key in block platform chain, so as to Ensure the uniqueness of the identity representated by son management public key, ensure the management of block platform chain and being normally carried out for transaction.
When the management identity of the sub- management end passes through audit, the sub- management end identity information is written by step S50 Block platform chain, and administrative authentication is returned by information to the sub- management end, so that the sub- management end is according to the management Certification is managed the block platform chain by information and son management public key.
In the present embodiment, root management end when after being audited to the request of sub- management end, if think sub- management end and its The identity of user (sub- manager) meets the requirements, then ratify sub- manager by sub- management end, with representated by sub- management public key Identity participate in the management of block platform chain, authorize relevant administration authority, and to sub- management end identity to sub- management end Information, which is written to after being signed in block platform chain, carries out publicity;Also it will return to corresponding administrative authentication to sub- management end simultaneously Pass through information.Sub- management end just obtains management participant and enters block chain and put down when receiving the administrative authentication and passing through information The permission of platform.At this time sub- management end for the two level manager in participant's management system, the participant for the participant that merchandises End can both select to carry out access application to root management end, access application can also be carried out to sub- management end, for the participant that merchandises It provides a convenient.
Further, for sub- management end send management qualification authentication ask, including son management identity information can It can be related to the privacy of sub- manager;Therefore in order to ensure the safety of information, in generation management qualification authentication request, also Relevant encryption will be carried out, the request is avoided, which to be intercepted in transmission process by disabled user, leads to information leakage.The present embodiment In, it is contemplated that root management end when being managed to block platform chain and by a pair of of unsymmetrical key to being managed, Therefore using the unsymmetrical key of root management end to being encrypted.Specifically, root management end first can in initialization First a pair of of unsymmetrical key pair of random generation, the unsymmetrical key is to can be described as root management unsymmetrical key pair;In generation root pipe Manage unsymmetrical key pair when, root management end can by therein management public key be publicity in block platform chain, which represent roots The identity of management end, root management private key, which is then that the storage of root management end secret is not outer, to be shown;Other ends in block platform chain to Root management end sends private information, and can be managed after information is encrypted in public key by the root of publicity will be transmitted, root management The root stored again by secret when receiving the private information management private key is held to carry out parsing deciphering to it;On the other hand, i.e., Third party is made to acquire the private information, due to the third party and without root management private key necessary to decryption, also with regard to nothing Method is decrypted the private information and reads content therein, so as to ensure that the safety of information.Based on this principle, sheet The root for obtaining root management end can be managed public key by the sub- management end in embodiment in generation son management unsymmetrical key pair, and Public key antithetical phrase management public key is managed by the root and sub- management end identity information is encrypted, obtains management qualification authentication request, Management qualification authentication request is being sent to root management end.Root management end is receiving the encrypted management qualification authentication request When, the root that unsymmetrical key centering is managed by root is managed into private key, the management qualification authentication request is decrypted, obtained The sub- management public key and sub- management end identity information, and according to the sub- management public key and sub- management end identity information to described The management identity of sub- management end is audited.
It further walks, can inquire to obtain in block platform chain when sub- management end obtains root management public key;Certainly it is right For the sub- management end having, when not passing through administrative authentication, it is understood that there may be the feelings that block platform chain is inquired can not be accessed Condition, therefore, sub- management end can also send relevant Pubic-Key search information or greeting class message (Say_ to root management end Hello packet);Root management end then can when receiving the Pubic-Key search information or greeting class message (Say_Hello messages) Reply corresponding management public key;Receive root management end reply root manage public key when, then by the root manage public key into Row encryption.
In specific implementation, root management end will also manage sub- management end and son when authorizing administration authority to sub- management end The identity information of reason person is recorded.In block chain if any transaction participant by a certain participant end carry out system attack, Or wash sale, fraud are carried out when illegal acts, the regulator system of block chain transaction system can be sent out to root management end Identification information is sent, which includes the participation permission conferrer at the participant end of the system attack or fraud detected The identity of (sub- management end);Root management end when receiving the information, with by the sub- management end identity in the information with record Identity information is compared, so as to assist the true identity for the access person for determining the illegal act person.
In the present embodiment, root management end is when receiving sub- management end transmission management qualification authentication request, according to the pipe The son management public key and sub- management end identity information that reason qualification authentication request includes to the management identity of the sub- management end into Row audit;When the management identity of the sub- management end passes through audit, the sub- management end identity information write-in block chain is put down Platform, and administrative authentication is returned by information to the sub- management end, so that the sub- management end passes through according to the administrative authentication Information and son management public key are managed the block platform chain.In the above manner, the root management end of the present embodiment can line On be managed qualification to sub- management end and authorize, be responsible for being managed block platform chain together with sub- management end so that The participant of different zones can select suitable management end to carry out block platform chain access application according to actual conditions, avoid pipe It manages to inconvenience caused by participant in authority set, while the quantity for increasing management end can also reduce the audit of access application Amount, improves review efficiency, so as to improve the efficiency of application;In addition, the way to manage by establishing two-stage multiterminal, also advantageous In keep block chain decentralization the characteristics of, the efficiency of transaction is improved.
In addition, in order to achieve the above object, the present invention also provides a kind of storage medium, management is stored on the storage medium Authoring program, the management authoring program is realized when being executed by processor is applied to sub- management end or applied to root management as above-mentioned The step of management authorization method of the block chain at end.
Wherein, the management authoring program is performed the management mandate that realized method can refer to block chain of the present invention The each embodiment of method, details are not described herein again.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, computer takes Be engaged in device, air conditioner or the network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of management authorization method of block chain, which is characterized in that the management authorization method is applied to sub- management end, described Management authorization method includes the following steps:
Generation son management unsymmetrical key pair, and managed according to the son management public key and son of the sub- management unsymmetrical key centering Hold identity information generation management qualification authentication request;
The management qualification authentication request is sent to root management end, for management of the described management end to the sub- management end Identity carries out audit certification;
When the administrative authentication for receiving described management end return passes through information, information and son are passed through according to the administrative authentication Management public key is managed block platform chain.
2. management authorization method as described in claim 1, which is characterized in that the generation management unsymmetrical key pair, and It please according to the son management public key of the sub- management unsymmetrical key centering and the generation management qualification authentication of sub- management end identity information The step of asking includes:
Generation son management unsymmetrical key pair, and obtain the root management public key of described management end;
The sub- management public key and sub- management end identity information are encrypted by described management public key, obtain management qualification Certification request.
3. management authorization method as described in claim 1, which is characterized in that the administrative authentication includes described by information The root authentication signature of management end,
Described the step of being managed according to the administrative authentication by information and son management public key to block platform chain, includes:
If receiving the application for registration of participant end transmission, corresponding administration authority information is returned to the participant end, with The administration authority of the sub- management end is verified for the participant end, wherein the administration authority information includes described certification label Name and son management public key;
When receiving the log-on message that the participant end is sent, according to participation of the log-on message to the participant end Identity is audited;
When participation identity at the participant end passes through audit, by the log-on message write-in block platform chain, and to The participant end returns to corresponding participation certification by information, so that the participant end passes through letter by the participation certification Breath is participated in business in the block platform chain.
4. management authorization method as claimed in claim 3, which is characterized in that the log-on message is included by the participant end Participation public key and participate in identity information, the participation public key and participate in identity information by the sub- management public key encryption,
It is described when receiving the log-on message that the participant end is sent, according to the log-on message to the participant end The step of identity is audited is participated in include:
It is private by the son management of the sub- management unsymmetrical key centering when receiving the log-on message that the participant sends The log-on message is decrypted in key, obtains the participation public key and participates in identity information;
The participation identity at the participant end is audited according to the participation public key and participation identity information.
5. a kind of management authorization method of block chain, which is characterized in that the management authorization method is applied to root management end, described Management authorization method includes:
When receiving sub- management end transmission management qualification authentication request, the son included is asked according to the management qualification authentication Management public key and sub- management end identity information audit the management identity of the sub- management end;
When the management identity of the sub- management end passes through audit, block platform chain is written into the sub- management end identity information, And administrative authentication is returned by information to the sub- management end, so that the sub- management end passes through information according to the administrative authentication The block platform chain is managed with sub- management public key.
6. management authorization method as claimed in claim 5, which is characterized in that described to receive sub- management end transmission management money During lattice certification request, the son management public key and sub- management end identity information included according to the management qualification authentication request is to institute Before stating the step of the management identity of sub- management end is audited, further include:
Root management unsymmetrical key pair is generated, and the root of described management unsymmetrical key centering is managed into public key publication to described Block platform chain;
Son management public key and sub- management end identity information in the management qualification authentication request manage public key encryption by described, The son when receiving sub- management end transmission management qualification authentication request, included according to the management qualification authentication request The step of management public key and sub- management end identity information audit the management identity of the sub- management end includes:
When receiving the management qualification authentication request that the sub- management end is sent, pass through described management unsymmetrical key centering Root management private key to it is described management qualification authentication request be decrypted, obtain the sub- management public key and sub- management end identity letter Breath;
The management identity of the sub- management end is audited according to the sub- management public key and sub- management end identity information.
A 7. seed management end, which is characterized in that the sub- management end includes processor, memory and is stored in the memory Management authoring program that is upper and being performed by the processor, wherein when the management authoring program is performed by the processor, The step of realizing the management authorization method of block chain according to any one of claims 1 to 4.
8. a kind of management end, which is characterized in that described management end includes processor, memory and be stored in the memory Management authoring program that is upper and being performed by the processor, wherein when the management authoring program is performed by the processor, The step of realizing the management authorization method of the block chain as described in any one of claim 5 to 6.
9. a kind of storage medium, which is characterized in that management authoring program is stored on the storage medium, the management authorizes journey The step of management authorization method of block chain according to any one of claims 1 to 4 is realized when sequence is executed by processor.
10. a kind of storage medium, which is characterized in that management authoring program is stored on the storage medium, the management authorizes The step of management authorization method of the block chain as described in any one of claim 5 to 6 is realized when program is executed by processor.
CN201711029356.8A 2017-10-26 2017-10-26 Block chain management authorization method, sub-management end, root management end and storage medium Active CN108243182B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711029356.8A CN108243182B (en) 2017-10-26 2017-10-26 Block chain management authorization method, sub-management end, root management end and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711029356.8A CN108243182B (en) 2017-10-26 2017-10-26 Block chain management authorization method, sub-management end, root management end and storage medium

Publications (2)

Publication Number Publication Date
CN108243182A true CN108243182A (en) 2018-07-03
CN108243182B CN108243182B (en) 2020-08-18

Family

ID=62700394

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711029356.8A Active CN108243182B (en) 2017-10-26 2017-10-26 Block chain management authorization method, sub-management end, root management end and storage medium

Country Status (1)

Country Link
CN (1) CN108243182B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754226A (en) * 2019-01-03 2019-05-14 中国联合网络通信集团有限公司 Data managing method, equipment and storage medium
CN109753769A (en) * 2018-11-23 2019-05-14 众安信息技术服务有限公司 A kind of software authorization method and system based on block chain
CN110493039A (en) * 2018-08-06 2019-11-22 腾讯科技(深圳)有限公司 Device management method and equipment management system based on block chain
CN110619526A (en) * 2019-09-19 2019-12-27 阿里巴巴集团控股有限公司 Business service providing method, device, equipment and system based on block chain
CN109241763B (en) * 2018-07-04 2020-03-24 青岛闪收付信息技术有限公司 Block generating method based on permission issue
CN111159736A (en) * 2019-12-25 2020-05-15 联通(广东)产业互联网有限公司 Application control method and system of block chain
CN111614679A (en) * 2020-05-22 2020-09-01 深圳前海微众银行股份有限公司 Federal learning qualification recovery method, device and readable storage medium
CN113536388A (en) * 2020-04-16 2021-10-22 中移物联网有限公司 Data sharing method and system based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system
CN107079037A (en) * 2016-09-18 2017-08-18 深圳前海达闼云端智能科技有限公司 Identity identifying method, device, node and system based on block chain
KR101780635B1 (en) * 2016-04-28 2017-09-21 주식회사 코인플러그 Method for creating, registering, revoking certificate information and server using the same
WO2017171165A1 (en) * 2015-12-14 2017-10-05 (주)코인플러그 System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017171165A1 (en) * 2015-12-14 2017-10-05 (주)코인플러그 System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same
KR101780635B1 (en) * 2016-04-28 2017-09-21 주식회사 코인플러그 Method for creating, registering, revoking certificate information and server using the same
CN107079037A (en) * 2016-09-18 2017-08-18 深圳前海达闼云端智能科技有限公司 Identity identifying method, device, node and system based on block chain
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241763B (en) * 2018-07-04 2020-03-24 青岛闪收付信息技术有限公司 Block generating method based on permission issue
CN110493039A (en) * 2018-08-06 2019-11-22 腾讯科技(深圳)有限公司 Device management method and equipment management system based on block chain
CN110493039B (en) * 2018-08-06 2021-06-04 腾讯科技(深圳)有限公司 Block chain-based equipment management method and equipment management system
CN109753769A (en) * 2018-11-23 2019-05-14 众安信息技术服务有限公司 A kind of software authorization method and system based on block chain
CN109753769B (en) * 2018-11-23 2021-03-02 众安信息技术服务有限公司 Software authorization method and system based on block chain
CN109754226A (en) * 2019-01-03 2019-05-14 中国联合网络通信集团有限公司 Data managing method, equipment and storage medium
CN109754226B (en) * 2019-01-03 2021-01-26 中国联合网络通信集团有限公司 Data management method, device and storage medium
CN110619526A (en) * 2019-09-19 2019-12-27 阿里巴巴集团控股有限公司 Business service providing method, device, equipment and system based on block chain
CN111159736A (en) * 2019-12-25 2020-05-15 联通(广东)产业互联网有限公司 Application control method and system of block chain
CN113536388A (en) * 2020-04-16 2021-10-22 中移物联网有限公司 Data sharing method and system based on block chain
CN111614679A (en) * 2020-05-22 2020-09-01 深圳前海微众银行股份有限公司 Federal learning qualification recovery method, device and readable storage medium

Also Published As

Publication number Publication date
CN108243182B (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN108243182A (en) Management authorization method, sub- management end, root management end and the storage medium of block chain
US10171476B2 (en) System and method for protecting the privacy of identity and financial information of the consumer conducting online business
CN108064440A (en) FIDO authentication method, device and system based on block chain
CN103229452B (en) The identification of mobile hand-held device and communication authentication
CN104217327B (en) A kind of financial IC card internet terminal and its method of commerce
CN109840771A (en) A kind of block chain intimacy protection system and its method based on homomorphic cryptography
CN109660485A (en) A kind of authority control method and system based on the transaction of block chain
CN110417750A (en) File based on block chain technology is read and method, terminal device and the storage medium of storage
CN107547514A (en) Identity identifying method, system and computer-readable recording medium
CN107666388A (en) Block chain information encryption method based on complete homomorphic cryptography method
CN110086626A (en) Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair
CN106097073A (en) A kind of block chain gives the method for the numeral exclusive ID of account trading process
CN105553654B (en) Key information processing method and device, key information management system
CN104393993B (en) A kind of safety chip and its implementation for electricity-selling terminal
CN105022966B (en) Database data encryption decryption method and system
WO1996007256A1 (en) Certifying system
CN103854180B (en) Credit voucher generating method and system, and application authorization method and system
CN105871923B (en) Information processing method, information record node and participation node
KR100824743B1 (en) Method for user authentication using mobile phone and system therefor
CN110060148A (en) Assets shared data circulation method, apparatus, equipment and medium based on block chain
CN107743067A (en) Awarding method, system, terminal and the storage medium of digital certificate
CN106487765A (en) Authorize access method and the equipment using the method
CN110278180A (en) Exchange method, device, equipment and the storage medium of Financial Information
CN110445840A (en) A method of file storage and reading based on block chain technology
CN109919614A (en) A kind of method for protecting intelligent contract privacy using zero-knowledge proof in block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant