CN108243182A - Management authorization method, sub- management end, root management end and the storage medium of block chain - Google Patents
Management authorization method, sub- management end, root management end and the storage medium of block chain Download PDFInfo
- Publication number
- CN108243182A CN108243182A CN201711029356.8A CN201711029356A CN108243182A CN 108243182 A CN108243182 A CN 108243182A CN 201711029356 A CN201711029356 A CN 201711029356A CN 108243182 A CN108243182 A CN 108243182A
- Authority
- CN
- China
- Prior art keywords
- management
- sub
- management end
- public key
- participant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of block chains to manage authorization method, and this method includes:Sub- management end generation management unsymmetrical key pair, and according to the son management public key of cipher key pair and the generation management qualification authentication request of sub- management end identity information;Root management end is sent this request to, so that root management end carries out audit certification to the management identity of the sub- management end;When the administrative authentication for receiving the return of root management end passes through information, block platform chain is managed by information and son management public key according to administrative authentication.The invention also discloses a seed management end, root management end and storage mediums.The sub- management end of the present invention can be managed qualification application on line to root management end, and it is responsible for being managed block platform chain together with root management end when application passes through, so that the participant of different zones can select suitable management end to carry out block platform chain access application according to actual conditions, avoid administration authority and concentrate to inconvenient caused by participant.
Description
Technical field
The present invention relates to block chain technical field more particularly to a kind of management authorization method of block chain, sub- management end, roots
Management end and storage medium.
Background technology
With the development of bit coin and block chain technology, start to have occurred on the market a kind of based on block chain application platform
Mode of doing business.When being traded by this mode of doing business, transaction participant is that block chain is written and read by front end processor
Operation.And for entire block chain, for considerations such as safeties, generally require to carry out the identity for the participant that merchandises true
Recognize, only the participant of certification just has the permission that transaction request is sent to block chain node, therefore participant is by preposition
Before machine is written and read operation to block chain, first has to carry out access application to relevant management organization, authentication is completed, to obtain
The permission that must enter.
Traditional block chain management authorization method is to concentrate on the permission of access mandate in some mechanism or equipment, institute
Some participants are required for this mechanism or carry out access application to this equipment.But since block chain node often covers
Lid multiple regions (or even whole world), and participant may be from different regions, if the permission of admission authentication is concentrated on a certain
In a mechanism or equipment, it is desirable that these All Activities participant arrives some mechanism or carries out access application by some equipment,
It can make troubles to participant, reduce application and authentication efficiency.
Invention content
It is a primary object of the present invention to propose a kind of management authorization method of block chain, sub- management end, root management end and
Storage medium, it is intended to which the access administration authority for solving block platform chain is concentrated, and participant applies for the technical issues of inconvenient.
To achieve the above object, the present invention provides a kind of management authorization method of block chain, and the management authorization method should
For sub- management end, the management authorization method includes the following steps:
Generation son management unsymmetrical key pair, and according to the son management public key and son of the sub- management unsymmetrical key centering
The generation management qualification authentication request of management end identity information;
The management qualification authentication request is sent to root management end, so that described management end is to the sub- management end
Management identity carries out audit certification;
When the administrative authentication for receiving described management end return passes through information, information is passed through according to the administrative authentication
Block platform chain is managed with sub- management public key.
Optionally, the generation management unsymmetrical key pair, and according to the son of the sub- management unsymmetrical key centering
The step of management public key and the generation management qualification authentication request of sub- management end identity information, includes:
Generation son management unsymmetrical key pair, and obtain the root management public key of described management end;
The sub- management public key and sub- management end identity information are encrypted by described management public key, managed
Qualification authentication is asked.
Optionally, the administrative authentication includes the root authentication signature of described management end by information,
Described the step of being managed according to the administrative authentication by information and son management public key to block platform chain, wraps
It includes:
If receiving the application for registration of participant end transmission, return to corresponding administration authority to the participant end and believe
Breath, so that the administration authority of the sub- management end is verified at the participant end, wherein the administration authority information includes described
Authentication signature and son management public key;
When receiving the log-on message that the participant end is sent, according to the log-on message to the participant end
Identity is participated in be audited;
When participation identity at the participant end passes through audit, the block platform chain is written into the log-on message,
And corresponding participation certification is returned by information to the participant end, so that the participant end is led to by the participation certification
Information is crossed to participate in business in the block platform chain.
Optionally, the log-on message includes by the participation public key at the participant end and participates in identity information, the ginseng
With public key and participating in identity information by the sub- management public key encryption,
It is described when receiving the log-on message that the participant end is sent, according to the log-on message to the participant
The step of participation identity at end is audited includes:
When receiving the log-on message that the participant sends, managed by the son of the sub- management unsymmetrical key centering
The log-on message is decrypted in reason private key, obtains the participation public key and participates in identity information;
The participation identity at the participant end is audited according to the participation public key and participation identity information.
In addition, in order to achieve the above object, the present invention also provides a kind of management authorization method of block chain, the management authorizes
Method is applied to root management end, and the management authorization method includes:
When receiving sub- management end transmission management qualification authentication request, included according to the management qualification authentication request
Son management public key and sub- management end identity information the management identity of the sub- management end is audited;
When the management identity of the sub- management end passes through audit, the sub- management end identity information write-in block chain is put down
Platform, and administrative authentication is returned by information to the sub- management end, so that the sub- management end passes through according to the administrative authentication
Information and son management public key are managed the block platform chain.
Optionally, it is described when receiving sub- management end transmission management qualification authentication request, recognized according to the management qualification
What the son management public key and sub- management end identity information that card request includes audited the management identity of the sub- management end
Before step, further include:
Root management unsymmetrical key pair is generated, and by the root management public key publication of described management unsymmetrical key centering extremely
The block platform chain;
Son management public key and sub- management end identity information in the management qualification authentication request is by described management public key
Encryption, it is described when receiving sub- management end transmission management qualification authentication request, it is wrapped according in the management qualification authentication request
The step of son management public key included and sub- management end identity information audit the management identity of the sub- management end includes:
When receiving the management qualification authentication request that the sub- management end is sent, pass through described management unsymmetrical key
The management qualification authentication request is decrypted in the root management private key of centering, obtains the sub- management public key and sub- management end body
Part information;
The management identity of the sub- management end is audited according to the sub- management public key and sub- management end identity information.
In addition, in order to achieve the above object, the present invention also provides a seed management end, the sub- management end include processor,
Memory and the management authoring program that can be performed on the memory and by the processor is stored in, wherein the management authorizes
When program is performed by the processor, realize as the above-mentioned block chain applied to sub- management end management authorization method the step of.
In addition, in order to achieve the above object, the present invention also provides a kind of management end, described management end include processor,
Memory and the management authoring program that can be performed on the memory and by the processor is stored in, wherein the management authorizes
When program is performed by the processor, realize as the above-mentioned block chain applied to root management end management authorization method the step of.
In addition, in order to achieve the above object, the present invention also provides a kind of storage medium, management is stored on the storage medium
Authoring program, the management authoring program realize the management such as the above-mentioned block chain applied to sub- management end when being executed by processor
The step of authorization method.
In addition, in order to achieve the above object, the present invention also provides a kind of storage medium, management is stored on the storage medium
Authoring program, the management authoring program realize the management such as the above-mentioned block chain applied to root management end when being executed by processor
The step of authorization method.
The sub- management end generation management unsymmetrical key pair of the present invention, and according to the sub- management unsymmetrical key centering
Son management public key and the generation management qualification authentication request of sub- management end identity information;The management qualification authentication request is sent to
Root management end, so that described management end carries out audit certification to the management identity of the sub- management end;Receiving described
When the administrative authentication that management end returns passes through information, block chain is put down by information and son management public key according to the administrative authentication
Platform is managed.In the above manner, on the son management end line of the present embodiment qualification application is managed to root management end, and
Application can be responsible for being managed block platform chain together with root management end when passing through, so that the participant of different zones can
Suitable management end is selected to carry out block platform chain access application according to actual conditions, avoid administration authority and concentrate to participant
Caused inconvenience, while the quantity for increasing management end can also reduce the audit amount of access application, improve review efficiency, from
And improve the efficiency of application;In addition, the way to manage by establishing two-stage multiterminal, also helps and keeps block chain decentralization
The characteristics of, improve the efficiency of transaction.
Description of the drawings
Fig. 1 be the present embodiments relate to sub- management end hardware architecture diagram;
Fig. 2 is the flow diagram of the management authorization method first embodiment of block chain of the present invention;
Fig. 3 is the block chain management framework schematic diagram that the management authorization method first embodiment of block chain of the present invention is related to;
Fig. 4 is the flow diagram of the management authorization method second embodiment of block chain of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for representing that the suffix of such as " module ", " component " or " unit " of element is only
Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
The present embodiments relate to block chain management authorization method be mainly used in block chain participant manage system
System, the participant manage system and include sub- management end and root management end.
For the present embodiments relate to sub- management end, please refer to Fig. 1, Fig. 1 is the embodiment of the present invention neutron tube
Manage the hardware architecture diagram at end.In the embodiment of the present invention, sub- management end can include processor 1001 (such as CPU), communication
Bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is used to implement these groups
Connection communication between part;User interface 1003 can include display screen (Display), input unit such as keyboard
(Keyboard);Network interface 1004 can optionally include standard wireline interface and wireless interface (such as WI-FI interfaces);It deposits
Reservoir 1005 can be high-speed RAM memory or the memory (non-volatile memory) of stabilization, such as magnetic
Disk storage, memory 1005 optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the sub- management end hardware configuration shown in Fig. 1 is not formed to sub- management end
Restriction, can include that more or fewer components either combine certain components or different components is arranged than illustrating.
With continued reference to Fig. 1, in Fig. 1 as a kind of memory 1005 of computer storage media can include operating system,
Network communication module and management authoring program.
In Fig. 1, network communication module be mainly used for connecting root management end, block platform chain node and participant end etc. its
Its equipment, therewith into row data communication;And processor 1001 can be used for calling the management mandate journey stored in memory 1005
Sequence, and perform following operate:
Generation son management unsymmetrical key pair, and according to the son management public key and son of the sub- management unsymmetrical key centering
The generation management qualification authentication request of management end identity information;
The management qualification authentication request is sent to root management end, so that described management end is to the sub- management end
Management identity carries out audit certification;
When the administrative authentication for receiving described management end return passes through information, information is passed through according to the administrative authentication
Block platform chain is managed with sub- management public key.
Further, the generation management unsymmetrical key pair, and according to the sub- management unsymmetrical key centering
The step of son management public key and the generation management qualification authentication request of sub- management end identity information, includes:
Generation son management unsymmetrical key pair, and obtain the root management public key of described management end;
The sub- management public key and sub- management end identity information are encrypted by described management public key, managed
Qualification authentication is asked.
Further, the administrative authentication includes the root authentication signature of described management end by information,
Described the step of being managed according to the administrative authentication by information and son management public key to block platform chain, wraps
It includes:
If receiving the application for registration of participant end transmission, return to corresponding administration authority to the participant end and believe
Breath, so that the administration authority of the sub- management end is verified at the participant end, wherein the administration authority information includes described
Authentication signature and son management public key;
When receiving the log-on message that the participant end is sent, according to the log-on message to the participant end
Identity is participated in be audited;
When participation identity at the participant end passes through audit, the block platform chain is written into the log-on message,
And corresponding participation certification is returned by information to the participant end, so that the participant end is led to by the participation certification
Information is crossed to participate in business in the block platform chain.
Further, the log-on message includes by the participation public key at the participant end and participates in identity information, described
It participates in public key and participates in identity information by the sub- management public key encryption,
It is described when receiving the log-on message that the participant end is sent, according to the log-on message to the participant
The step of participation identity at end is audited includes:
When receiving the log-on message that the participant sends, managed by the son of the sub- management unsymmetrical key centering
The log-on message is decrypted in reason private key, obtains the participation public key and participates in identity information;
The participation identity at the participant end is audited according to the participation public key and participation identity information.
For the present embodiments relate to root management end, hardware configuration can refer to the hardware knot of above-mentioned sub- management end
Structure, i.e. root management end can include processor (such as CPU), communication bus, user interface, network interface, memory.For place
Manage device (such as CPU), communication bus, user interface, network interface, function and the function of corresponding part in above-mentioned sub- management end
It is similar.For memory portion, including operating system, network communication module and management authoring program;Each root management end
Operating system can be identical from the system of sub- management end or uses different operating system;Network communication module is mainly used
In miscellaneous equipments such as connexon management end, block platform chain node and participant ends, therewith into row data communication;And processor can
To call the management authoring program stored in memory, and perform following operate:
When receiving sub- management end transmission management qualification authentication request, included according to the management qualification authentication request
Son management public key and sub- management end identity information the management identity of the sub- management end is audited;
When the management identity of the sub- management end passes through audit, the sub- management end identity information write-in block chain is put down
Platform, and administrative authentication is returned by information to the sub- management end, so that the sub- management end passes through according to the administrative authentication
Information and son management public key are managed the block platform chain.
Further, processor may call upon the management authoring program stored in memory, and perform following operate:
Root management unsymmetrical key pair is generated, and by the root management public key publication of described management unsymmetrical key centering extremely
The block platform chain;
Son management public key and sub- management end identity information in the management qualification authentication request is by described management public key
Encryption, it is described when receiving sub- management end transmission management qualification authentication request, it is wrapped according in the management qualification authentication request
The step of son management public key included and sub- management end identity information audit the management identity of the sub- management end includes:
When receiving the management qualification authentication request that the sub- management end is sent, pass through described management unsymmetrical key
The management qualification authentication request is decrypted in the root management private key of centering, obtains the sub- management public key and sub- management end body
Part information;
The management identity of the sub- management end is audited according to the sub- management public key and sub- management end identity information.
Hardware configuration based on above-mentioned sub- management end and root management end proposes the management authorization method of block chain of the present invention
Each embodiment.
With reference to Fig. 2, Fig. 2 is the flow diagram of the management authorization method first embodiment of block chain of the present invention.
In the present embodiment, the management authorization method is applied to sub- management end, and the management authorization method includes following step
Suddenly:
Step S10 generates son management unsymmetrical key pair, and is managed according to the son of the sub- management unsymmetrical key centering
Public key and the generation management qualification authentication request of sub- management end identity information;
Traditional block chain management authorization method is that the permission of block chain access mandate is concentrated on some mechanism or is set
In standby, all participants are required for this mechanism or carry out access application to this equipment.But due to block chain node
Multiple regions (or even whole world) are often covered, and participant may be from different regions, if the authority set by admission authentication
In in some mechanism or equipment, it is desirable that these All Activities participant arrives some mechanism or is carried out by some equipment accurate
Enter application, can make troubles to participant, reduce application and authentication efficiency.Based on the problem, proposed in the present embodiment a kind of
The management authorization method of block chain by building two-level management mandate system, the permission of admission authentication is authorized multiple and different
The mechanism or system equipment in region facilitate transaction participant to carry out access application for registration, improve the efficiency of application and certification, so as to
Improve the trading efficiency of block platform chain transaction.
In the present embodiment, include block platform chain, participant end, participant's management for the block chain transaction system of transaction
System.Wherein, block platform chain includes several block chain nodes again, as distributed shared data library, is subjected to ginseng
The transaction data transmitted by the management data of system transmission and participant end is managed with person;Participant end is as transaction participant institute
The transaction terminal used can be realized in a manner of front end processor in specific implementation, and participant end is being needed by participating in
Person manages the certification of system, confirms that the identity of its user (transaction participant) can just carry out the write operation of block platform chain.
Traditional participant manages system and only includes a root management end, is uniformly responsible for the access at all participant ends by the root management end
Certification;And in the present embodiment, under an initial root management end, several sub- management ends are may also include, by two-level management end
It is collectively responsible for the management of participant.
Sub- management end, to realize the management function to block platform chain, needs to first pass through when accessing block platform chain
The administrative authentication of root management end obtains corresponding administration authority.Specifically, sub- management end will generate a pair of of unsymmetrical key at random
Right, the unsymmetrical key is to can be described as sub- management unsymmetrical key pair;Son management unsymmetrical key is considered as sub- management end
Identity, when passing through administrative authentication, sub- management end will use the sub- management unsymmetrical key to carrying out block chain management.It is generating
During son management unsymmetrical key pair, sub- management end will extract cipher key pair sub- management public key from the sub- management is non-, and according to
The sub- management public key and the generation management qualification authentication request of sub- management end identity information, to be managed permission to root management end
Application.Wherein, the user which can be including sub- management end address location information, sub- management end
The information such as the device identification of true identity information, sub- management end of (sub- manager), certain sub- management end identity information may be used also
To include other contents;And for the son management private key of sub- management unsymmetrical key centering, then it is stored not by sub- management end secret
Show outside.
Further, for the management qualification authentication ask, including son management identity information may be related to son
The privacy of manager;Therefore it in order to ensure the safety of information, in generation management qualification authentication request, will also carry out relevant
Encryption, the request is avoided, which to be intercepted in transmission process by disabled user, leads to information leakage.In the present embodiment, it is contemplated that root pipe
End is managed when being managed to block platform chain and by a pair of of unsymmetrical key to being managed, therefore using root
The unsymmetrical key of management end is to being encrypted.Specifically, the unsymmetrical key of root management end is non-to can be described as root management
Symmetric key pair;Root management unsymmetrical key centering root management public key be often publicity in block platform chain, which represent
The identity of root management end, root management private key, which is then that the storage of root management end secret is not outer, to be shown;Other ends in block platform chain to
Private information is sent to root management end, can be managed after information is encrypted in public key by the root of publicity will be transmitted, root pipe
The root management private key that reason end is stored when receiving the private information by secret again carries out parsing deciphering to it;On the other hand,
Even if third party acquires the private information, private key is managed due to the third party and without root necessary to decryption, also
The private information can not be decrypted and read content therein, so as to ensure that the safety of information.Based on this principle,
The root for obtaining root management end is also managed public key by the sub- management end in the present embodiment in generation son management unsymmetrical key pair,
And pass through root management public key antithetical phrase management public key and sub- management end identity information is encrypted, obtaining management qualification authentication please
It asks.
It further walks, can inquire to obtain in block platform chain when sub- management end obtains root management public key;Certainly it is right
For the sub- management end having, when not passing through administrative authentication, it is understood that there may be the feelings that block platform chain is inquired can not be accessed
Condition;Therefore, sub- management end can also send relevant Pubic-Key search information or greeting class message (Say_ to root management end
Hello packet) so that root management end replys corresponding management public key;Public key is managed in the root for receiving the reply of root management end
When, then public key is managed by the root and is encrypted.
The management qualification authentication request is sent to root management end, so that described management end is to the son by step S20
The management identity of management end carries out audit certification;
In the present embodiment, sub- management end is in generation management qualification authentication request, you can proposes management money to root management end
Lattice application obtains the administration authority of block platform chain.At this point, the management qualification authentication can be sent to root management by sub- management end
End so that root management end is managed qualification examination authentication procedure according to management qualification authentication request, judges whether antithetical phrase pipe
Authorize administration authority in reason end.
Step S30, when the administrative authentication for receiving described management end return passes through information, according to the administrative authentication
Block platform chain is managed by information and son management public key.
In the present embodiment, root management end is after the management qualification authentication of sub- management end request is audited, if thinking pipe
Reason end and its identity of user (sub- manager) meet management condition, then can ratify sub- manager by sub- management end, with son
Identity representated by management public key is participated in the management of block platform chain, and relevant administration authority is authorized to sub- management end, and
It is written in block platform chain after signing to sub- management end identity information and carries out publicity;It will also be returned simultaneously to sub- management end
Corresponding administrative authentication passes through information.Sub- management end just obtains management and participates in when receiving the administrative authentication and passing through information
Person enters the permission of block platform chain, becomes the two level manager in participant's management system, as shown in figure 3, Fig. 3 is this reality
Apply the block chain management framework schematic diagram of example.In figure 3, root management end is one-level management person, and sub- management end is (including sub- management end
A, sub- management end b, sub- management end c) become two level manager in the mandate for obtaining root management end.The ginseng of transaction participant at this time
It can both select to carry out access application to root management end with person end, access application can also be carried out to sub- management end, joined for transaction
It is provided a convenient with person.
What deserves to be explained is the sub- management end in the present embodiment, can be provided in different regions, so as to facilitate difference
The transaction participant in region carries out the access application of block platform chain nearby;Meanwhile the access of the sub- management end for each department
Time can also be different.That is, for entire block chain transaction system and participative management system, with good
Scalability, can under the premise of system overall architecture is not changed, according to the actual business requirement of each department to sub- management end into
Row is correspondingly added and is reduced, and to adapt to the development of economy and business, while also reduces operation cost.For example, for former area
Two regions of A and B that block platform chain node is covered, the originally trading volume of a-quadrant and access applications is less, therefore only in B
Region sets up a sub- management end b, unified that the participant end in two regions of A and B is managed;And with economic hair
Exhibition, the trading volume and access applications of a-quadrant are continuously increased, and the audit pressure of original sub- management end b increases therewith, while
The application operation at the participant end of inconvenient a-quadrant;Therefore, a sub- management end a can be newly set up in a-quadrant, passes through sub- management
End a and sub- management end b is managed jointly, and participant end is facilitated to carry out access application.
In the present embodiment, sub- management end generation management unsymmetrical key pair, and according to the sub- management unsymmetrical key
The son management public key of centering and the generation management qualification authentication request of sub- management end identity information;By the management qualification authentication request
Root management end is sent to, so that described management end carries out audit certification to the management identity of the sub- management end;It is receiving
When the administrative authentication that described management end returns passes through information, according to the administrative authentication by information and son management public key to area
Block platform chain is managed.In the above manner, qualification Shen is managed to root management end on the son management end line of the present embodiment
Please, and when application passes through can be responsible for being managed block platform chain together with root management end, so that different zones
Participant can select suitable management end to carry out block platform chain access application according to actual conditions, avoid administration authority concentration
To inconvenience caused by participant, while the quantity for increasing management end can also reduce the audit amount of access application, improve careful
Core efficiency, so as to improve the efficiency of application;In addition, the way to manage by establishing two-stage multiterminal, also helps holding block
The characteristics of chain decentralization, improves the efficiency of transaction.
With continued reference to Fig. 2, in the step S30 of Fig. 2, the administrative authentication includes described participant end by information
Root authentication signature, described the step of being managed according to the administrative authentication by information and son management public key to block platform chain
Including:
If receiving the application for registration of participant end transmission, return to corresponding administration authority to the participant end and believe
Breath, so that the administration authority of the sub- management end is verified at the participant end, wherein the administration authority information includes described
Authentication signature and son management public key;When receiving the log-on message that the participant end is sent, according to the log-on message pair
The participation identity at the participant end is audited;When participation identity at the participant end passes through audit, by the registration
The block platform chain is written in information, and returns to corresponding participation certification by information to the participant end, for the ginseng
It is participated in business in the block platform chain by information by the participation certification with person end.
In the present embodiment, sub- management end is just obtained when the administrative authentication for receiving the return of root management end passes through information
Management participant enters the permission of block platform chain;At this time sub- management end for the two level management in participant's management system
Person is provided with audit participant's end access application and ratifies its permission into block platform chain.Wherein, root management end is returned
Administrative authentication can be used for proving that it has by information, including the root authentication signature at root participant end, the root authentication signature
Imitate the validity of administration authority;It can also include other contents, such as the time of certification, administration authority in certain authentication signature
Validity, the true identity of the owner of the administration authority, the public key (sub- management public key) of administration authority etc..If at this point, have
Participant wishes at end to carry out access application to sub- management end, then can send relevant application information to management terminal first, for
Sub- management end carries out participating in qualification examination authentication procedure according to this application information.And it considers during application, participant
Include the true identity information of participant end and its user (transaction participant) in the improved data information in end, and these
Information may be related to the privacy of transaction participant;Therefore in order to ensure the safety of information, qualification authentication is managed in generation
During request, relevant encryption will be also carried out, the request is avoided, which to be intercepted in transmission process by disabled user, leads to information leakage.
In the present embodiment, due to the public key of sub- management end be by root management end audit and certification, and the private key of sub- management end be by
Sub- management end secret storage is not outer to be shown, therefore using sub- management unsymmetrical key to being encrypted into application information.
Specifically, in the present embodiment, participant end first sends registration Shen when needing to carry out access application to sub- management end
Please (Say_Hello messages).Sub- management end can return to corresponding administration authority when receiving the application for registration to participant end
Information;Wherein, root management end is included in the administration authority information to the root of sub- management end administration authority certification signature, sub- management
The son management public key at end, can also include other contents, such as sub- management end is to the label of public key certainly in the administration authority information
Name etc..Participant end first can verify the management identity of sub- management end when receiving the administration authority information;It participates in
Therein signature is read out in this section of meeting, and it is verified, judge the root signature whether be root management end actual signature;
If so, illustrating that sub- management end is by root management end certification, sub- management end is believable management end, is then continued at this time to son
The subsequent application operation of management end;If conversely, the root signature it is not validated, illustrate sub- management end be it is incredible, at this time
It will stop carrying out access application to sub- management end.
In the present embodiment, participant end will be managed when determining that sub- management end is credible by the son in the administration authority information
Log-on message is encrypted in reason public key;Wherein log-on message include participant end carrying out the participation of block chain transaction
Public key, the true identity information of participant, the information such as device identification at participant end, certain sub- management end identity information may be used also
To include other contents;When encrypting completion, which can be sent to sub- management end by participant end.Son management
End when receiving the encrypted log-on message, can first pass through the son management private key of sub- management end secret storage to log-on message into
Row decryption obtains participation public key therein and participates in identity information, and according to the participation public key and participates in identity information to participating in
The participation identity of person end and its user (transaction participant) are audited, and judge whether to authorize participation permission to participant end.
Further, in review process of the sub- management end to participating in request, both included judging to hand over according to practical business rule
Whether easy participant there is transaction to participate in qualification, further include the audit to participating in public key uniqueness.Specifically, participant Duan areas
It is into row information (transmission of message), the participation public key generation by its corresponding public key that participates in when being traded in block platform chain
The table identity at participant end, therefore the participation public key must be unique in block platform chain.Sub- management end is being examined
During core, it will the uniqueness of the participation public key is judged, it is ensured that do not have in block platform chain identical with the participation public key
Public key, so as to ensure to participate in the uniqueness of the identity representated by public key, ensure being normally carried out for block platform chain transaction.
In the present embodiment, sub- management end when after being audited to the request at participant end, if think participant end and its
The identity of user's (transaction participant) meets the requirements, then the participant that ratifies to merchandise by participant end, to participate in public key institute's generation
The identity of table is participated in the transaction of block platform chain, and relevant participation permission is authorized, and to participant's identity to participant end
Information, which is written to after being signed in block platform chain, carries out publicity, and is signed to it (sub- signature), to show the participation
The identity of person end and the participant that merchandises are believable;Corresponding participation certification will be also returned to participant end simultaneously and passes through information.
Participant end obtains the permission of read-write block chain at this time, can be signed and merchandised by the public key of oneself, the transaction block of signature
What chain node can be verified.
Further, sub- management end is prescribed a time limit authorizing right to participate in participant end, and also participant end and transaction will be participated in
The identity information of person is recorded.In block chain if any transaction participant by a certain participant end carry out system attack or
Person carries out wash sale, fraud when illegal acts, and the regulator system of block chain transaction system can be sent to sub- management end
Identification information, the information include the participant end identity of the system attack or fraud detected;Sub- management end is receiving
It is non-so as to assist to determine with the participant end identity in the information is compared with the identity information recorded during to the information
The true identity of judicial act person.
What deserves to be explained is although sub- management end is responsible for the access management of transaction participant, it does not simultaneously intervene block chain
Original process of exchange in platform, therefore new center is not formed, still maintain the decentralization of block chain, distributed data
The features such as storage, point-to-point transmission, so as to improve the efficiency of transaction.
In the present embodiment, sub- management end is when obtaining the mandate of root management end, you can the access at complete independently participant end
Application audit and mandate, provide a convenient to transaction participant, improve the efficiency of transaction.
With reference to Fig. 4, Fig. 4 is the flow diagram of the management authorization method second embodiment of block chain of the present invention.
Based on above-mentioned embodiment illustrated in fig. 2, the management authorization method of the present embodiment is applied to root management end, and the management is awarded
Power method includes:
Step S40, please according to the management qualification authentication when receiving sub- management end transmission management qualification authentication request
The son included management public key and sub- management end identity information is asked to audit the management identity of the sub- management end;
In the present embodiment, block platform chain, participant end, participant in block chain transaction system manage the brief of system
It introduces and can be found in shown in step S10, do not repeating herein.
In the present embodiment, root management end is when receiving sub- management end transmission management qualification authentication request, you can according to this
The son that management qualification authentication request includes manages public key and sub- management end identity information, to sub- management end and its user's (son
Manager) management identity audited, judge whether to authorize administration authority to sub- management end.
Root management end both includes judging that sub- manager is according to practical business rule in the review process to management request
It is no that there is block chain to manage qualification, further include the audit of antithetical phrase management public key uniqueness.Specifically, sub- management end is to block chain
It is to be carried out by its corresponding sub- management public key, which represents the body of sub- management end when platform is managed
Part, therefore the sub- management public key must be unique in block platform chain.Root management end is when being audited, it will to the son
The uniqueness of management public key is judged, it is ensured that do not have the public key identical with the sub- management public key in block platform chain, so as to
Ensure the uniqueness of the identity representated by son management public key, ensure the management of block platform chain and being normally carried out for transaction.
When the management identity of the sub- management end passes through audit, the sub- management end identity information is written by step S50
Block platform chain, and administrative authentication is returned by information to the sub- management end, so that the sub- management end is according to the management
Certification is managed the block platform chain by information and son management public key.
In the present embodiment, root management end when after being audited to the request of sub- management end, if think sub- management end and its
The identity of user (sub- manager) meets the requirements, then ratify sub- manager by sub- management end, with representated by sub- management public key
Identity participate in the management of block platform chain, authorize relevant administration authority, and to sub- management end identity to sub- management end
Information, which is written to after being signed in block platform chain, carries out publicity;Also it will return to corresponding administrative authentication to sub- management end simultaneously
Pass through information.Sub- management end just obtains management participant and enters block chain and put down when receiving the administrative authentication and passing through information
The permission of platform.At this time sub- management end for the two level manager in participant's management system, the participant for the participant that merchandises
End can both select to carry out access application to root management end, access application can also be carried out to sub- management end, for the participant that merchandises
It provides a convenient.
Further, for sub- management end send management qualification authentication ask, including son management identity information can
It can be related to the privacy of sub- manager;Therefore in order to ensure the safety of information, in generation management qualification authentication request, also
Relevant encryption will be carried out, the request is avoided, which to be intercepted in transmission process by disabled user, leads to information leakage.The present embodiment
In, it is contemplated that root management end when being managed to block platform chain and by a pair of of unsymmetrical key to being managed,
Therefore using the unsymmetrical key of root management end to being encrypted.Specifically, root management end first can in initialization
First a pair of of unsymmetrical key pair of random generation, the unsymmetrical key is to can be described as root management unsymmetrical key pair;In generation root pipe
Manage unsymmetrical key pair when, root management end can by therein management public key be publicity in block platform chain, which represent roots
The identity of management end, root management private key, which is then that the storage of root management end secret is not outer, to be shown;Other ends in block platform chain to
Root management end sends private information, and can be managed after information is encrypted in public key by the root of publicity will be transmitted, root management
The root stored again by secret when receiving the private information management private key is held to carry out parsing deciphering to it;On the other hand, i.e.,
Third party is made to acquire the private information, due to the third party and without root management private key necessary to decryption, also with regard to nothing
Method is decrypted the private information and reads content therein, so as to ensure that the safety of information.Based on this principle, sheet
The root for obtaining root management end can be managed public key by the sub- management end in embodiment in generation son management unsymmetrical key pair, and
Public key antithetical phrase management public key is managed by the root and sub- management end identity information is encrypted, obtains management qualification authentication request,
Management qualification authentication request is being sent to root management end.Root management end is receiving the encrypted management qualification authentication request
When, the root that unsymmetrical key centering is managed by root is managed into private key, the management qualification authentication request is decrypted, obtained
The sub- management public key and sub- management end identity information, and according to the sub- management public key and sub- management end identity information to described
The management identity of sub- management end is audited.
It further walks, can inquire to obtain in block platform chain when sub- management end obtains root management public key;Certainly it is right
For the sub- management end having, when not passing through administrative authentication, it is understood that there may be the feelings that block platform chain is inquired can not be accessed
Condition, therefore, sub- management end can also send relevant Pubic-Key search information or greeting class message (Say_ to root management end
Hello packet);Root management end then can when receiving the Pubic-Key search information or greeting class message (Say_Hello messages)
Reply corresponding management public key;Receive root management end reply root manage public key when, then by the root manage public key into
Row encryption.
In specific implementation, root management end will also manage sub- management end and son when authorizing administration authority to sub- management end
The identity information of reason person is recorded.In block chain if any transaction participant by a certain participant end carry out system attack,
Or wash sale, fraud are carried out when illegal acts, the regulator system of block chain transaction system can be sent out to root management end
Identification information is sent, which includes the participation permission conferrer at the participant end of the system attack or fraud detected
The identity of (sub- management end);Root management end when receiving the information, with by the sub- management end identity in the information with record
Identity information is compared, so as to assist the true identity for the access person for determining the illegal act person.
In the present embodiment, root management end is when receiving sub- management end transmission management qualification authentication request, according to the pipe
The son management public key and sub- management end identity information that reason qualification authentication request includes to the management identity of the sub- management end into
Row audit;When the management identity of the sub- management end passes through audit, the sub- management end identity information write-in block chain is put down
Platform, and administrative authentication is returned by information to the sub- management end, so that the sub- management end passes through according to the administrative authentication
Information and son management public key are managed the block platform chain.In the above manner, the root management end of the present embodiment can line
On be managed qualification to sub- management end and authorize, be responsible for being managed block platform chain together with sub- management end so that
The participant of different zones can select suitable management end to carry out block platform chain access application according to actual conditions, avoid pipe
It manages to inconvenience caused by participant in authority set, while the quantity for increasing management end can also reduce the audit of access application
Amount, improves review efficiency, so as to improve the efficiency of application;In addition, the way to manage by establishing two-stage multiterminal, also advantageous
In keep block chain decentralization the characteristics of, the efficiency of transaction is improved.
In addition, in order to achieve the above object, the present invention also provides a kind of storage medium, management is stored on the storage medium
Authoring program, the management authoring program is realized when being executed by processor is applied to sub- management end or applied to root management as above-mentioned
The step of management authorization method of the block chain at end.
Wherein, the management authoring program is performed the management mandate that realized method can refer to block chain of the present invention
The each embodiment of method, details are not described herein again.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, computer takes
Be engaged in device, air conditioner or the network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of management authorization method of block chain, which is characterized in that the management authorization method is applied to sub- management end, described
Management authorization method includes the following steps:
Generation son management unsymmetrical key pair, and managed according to the son management public key and son of the sub- management unsymmetrical key centering
Hold identity information generation management qualification authentication request;
The management qualification authentication request is sent to root management end, for management of the described management end to the sub- management end
Identity carries out audit certification;
When the administrative authentication for receiving described management end return passes through information, information and son are passed through according to the administrative authentication
Management public key is managed block platform chain.
2. management authorization method as described in claim 1, which is characterized in that the generation management unsymmetrical key pair, and
It please according to the son management public key of the sub- management unsymmetrical key centering and the generation management qualification authentication of sub- management end identity information
The step of asking includes:
Generation son management unsymmetrical key pair, and obtain the root management public key of described management end;
The sub- management public key and sub- management end identity information are encrypted by described management public key, obtain management qualification
Certification request.
3. management authorization method as described in claim 1, which is characterized in that the administrative authentication includes described by information
The root authentication signature of management end,
Described the step of being managed according to the administrative authentication by information and son management public key to block platform chain, includes:
If receiving the application for registration of participant end transmission, corresponding administration authority information is returned to the participant end, with
The administration authority of the sub- management end is verified for the participant end, wherein the administration authority information includes described certification label
Name and son management public key;
When receiving the log-on message that the participant end is sent, according to participation of the log-on message to the participant end
Identity is audited;
When participation identity at the participant end passes through audit, by the log-on message write-in block platform chain, and to
The participant end returns to corresponding participation certification by information, so that the participant end passes through letter by the participation certification
Breath is participated in business in the block platform chain.
4. management authorization method as claimed in claim 3, which is characterized in that the log-on message is included by the participant end
Participation public key and participate in identity information, the participation public key and participate in identity information by the sub- management public key encryption,
It is described when receiving the log-on message that the participant end is sent, according to the log-on message to the participant end
The step of identity is audited is participated in include:
It is private by the son management of the sub- management unsymmetrical key centering when receiving the log-on message that the participant sends
The log-on message is decrypted in key, obtains the participation public key and participates in identity information;
The participation identity at the participant end is audited according to the participation public key and participation identity information.
5. a kind of management authorization method of block chain, which is characterized in that the management authorization method is applied to root management end, described
Management authorization method includes:
When receiving sub- management end transmission management qualification authentication request, the son included is asked according to the management qualification authentication
Management public key and sub- management end identity information audit the management identity of the sub- management end;
When the management identity of the sub- management end passes through audit, block platform chain is written into the sub- management end identity information,
And administrative authentication is returned by information to the sub- management end, so that the sub- management end passes through information according to the administrative authentication
The block platform chain is managed with sub- management public key.
6. management authorization method as claimed in claim 5, which is characterized in that described to receive sub- management end transmission management money
During lattice certification request, the son management public key and sub- management end identity information included according to the management qualification authentication request is to institute
Before stating the step of the management identity of sub- management end is audited, further include:
Root management unsymmetrical key pair is generated, and the root of described management unsymmetrical key centering is managed into public key publication to described
Block platform chain;
Son management public key and sub- management end identity information in the management qualification authentication request manage public key encryption by described,
The son when receiving sub- management end transmission management qualification authentication request, included according to the management qualification authentication request
The step of management public key and sub- management end identity information audit the management identity of the sub- management end includes:
When receiving the management qualification authentication request that the sub- management end is sent, pass through described management unsymmetrical key centering
Root management private key to it is described management qualification authentication request be decrypted, obtain the sub- management public key and sub- management end identity letter
Breath;
The management identity of the sub- management end is audited according to the sub- management public key and sub- management end identity information.
A 7. seed management end, which is characterized in that the sub- management end includes processor, memory and is stored in the memory
Management authoring program that is upper and being performed by the processor, wherein when the management authoring program is performed by the processor,
The step of realizing the management authorization method of block chain according to any one of claims 1 to 4.
8. a kind of management end, which is characterized in that described management end includes processor, memory and be stored in the memory
Management authoring program that is upper and being performed by the processor, wherein when the management authoring program is performed by the processor,
The step of realizing the management authorization method of the block chain as described in any one of claim 5 to 6.
9. a kind of storage medium, which is characterized in that management authoring program is stored on the storage medium, the management authorizes journey
The step of management authorization method of block chain according to any one of claims 1 to 4 is realized when sequence is executed by processor.
10. a kind of storage medium, which is characterized in that management authoring program is stored on the storage medium, the management authorizes
The step of management authorization method of the block chain as described in any one of claim 5 to 6 is realized when program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711029356.8A CN108243182B (en) | 2017-10-26 | 2017-10-26 | Block chain management authorization method, sub-management end, root management end and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711029356.8A CN108243182B (en) | 2017-10-26 | 2017-10-26 | Block chain management authorization method, sub-management end, root management end and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108243182A true CN108243182A (en) | 2018-07-03 |
CN108243182B CN108243182B (en) | 2020-08-18 |
Family
ID=62700394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711029356.8A Active CN108243182B (en) | 2017-10-26 | 2017-10-26 | Block chain management authorization method, sub-management end, root management end and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108243182B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109754226A (en) * | 2019-01-03 | 2019-05-14 | 中国联合网络通信集团有限公司 | Data managing method, equipment and storage medium |
CN109753769A (en) * | 2018-11-23 | 2019-05-14 | 众安信息技术服务有限公司 | A kind of software authorization method and system based on block chain |
CN110493039A (en) * | 2018-08-06 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Device management method and equipment management system based on block chain |
CN110619526A (en) * | 2019-09-19 | 2019-12-27 | 阿里巴巴集团控股有限公司 | Business service providing method, device, equipment and system based on block chain |
CN109241763B (en) * | 2018-07-04 | 2020-03-24 | 青岛闪收付信息技术有限公司 | Block generating method based on permission issue |
CN111159736A (en) * | 2019-12-25 | 2020-05-15 | 联通(广东)产业互联网有限公司 | Application control method and system of block chain |
CN111614679A (en) * | 2020-05-22 | 2020-09-01 | 深圳前海微众银行股份有限公司 | Federal learning qualification recovery method, device and readable storage medium |
CN113536388A (en) * | 2020-04-16 | 2021-10-22 | 中移物联网有限公司 | Data sharing method and system based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107079036A (en) * | 2016-12-23 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Registration and authorization method, apparatus and system |
CN107079037A (en) * | 2016-09-18 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Identity identifying method, device, node and system based on block chain |
KR101780635B1 (en) * | 2016-04-28 | 2017-09-21 | 주식회사 코인플러그 | Method for creating, registering, revoking certificate information and server using the same |
WO2017171165A1 (en) * | 2015-12-14 | 2017-10-05 | (주)코인플러그 | System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same |
-
2017
- 2017-10-26 CN CN201711029356.8A patent/CN108243182B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017171165A1 (en) * | 2015-12-14 | 2017-10-05 | (주)코인플러그 | System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same |
KR101780635B1 (en) * | 2016-04-28 | 2017-09-21 | 주식회사 코인플러그 | Method for creating, registering, revoking certificate information and server using the same |
CN107079037A (en) * | 2016-09-18 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Identity identifying method, device, node and system based on block chain |
CN107079036A (en) * | 2016-12-23 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Registration and authorization method, apparatus and system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109241763B (en) * | 2018-07-04 | 2020-03-24 | 青岛闪收付信息技术有限公司 | Block generating method based on permission issue |
CN110493039A (en) * | 2018-08-06 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Device management method and equipment management system based on block chain |
CN110493039B (en) * | 2018-08-06 | 2021-06-04 | 腾讯科技(深圳)有限公司 | Block chain-based equipment management method and equipment management system |
CN109753769A (en) * | 2018-11-23 | 2019-05-14 | 众安信息技术服务有限公司 | A kind of software authorization method and system based on block chain |
CN109753769B (en) * | 2018-11-23 | 2021-03-02 | 众安信息技术服务有限公司 | Software authorization method and system based on block chain |
CN109754226A (en) * | 2019-01-03 | 2019-05-14 | 中国联合网络通信集团有限公司 | Data managing method, equipment and storage medium |
CN109754226B (en) * | 2019-01-03 | 2021-01-26 | 中国联合网络通信集团有限公司 | Data management method, device and storage medium |
CN110619526A (en) * | 2019-09-19 | 2019-12-27 | 阿里巴巴集团控股有限公司 | Business service providing method, device, equipment and system based on block chain |
CN111159736A (en) * | 2019-12-25 | 2020-05-15 | 联通(广东)产业互联网有限公司 | Application control method and system of block chain |
CN113536388A (en) * | 2020-04-16 | 2021-10-22 | 中移物联网有限公司 | Data sharing method and system based on block chain |
CN111614679A (en) * | 2020-05-22 | 2020-09-01 | 深圳前海微众银行股份有限公司 | Federal learning qualification recovery method, device and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108243182B (en) | 2020-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108243182A (en) | Management authorization method, sub- management end, root management end and the storage medium of block chain | |
US10171476B2 (en) | System and method for protecting the privacy of identity and financial information of the consumer conducting online business | |
CN108064440A (en) | FIDO authentication method, device and system based on block chain | |
CN103229452B (en) | The identification of mobile hand-held device and communication authentication | |
CN104217327B (en) | A kind of financial IC card internet terminal and its method of commerce | |
CN109840771A (en) | A kind of block chain intimacy protection system and its method based on homomorphic cryptography | |
CN109660485A (en) | A kind of authority control method and system based on the transaction of block chain | |
CN110417750A (en) | File based on block chain technology is read and method, terminal device and the storage medium of storage | |
CN107547514A (en) | Identity identifying method, system and computer-readable recording medium | |
CN107666388A (en) | Block chain information encryption method based on complete homomorphic cryptography method | |
CN110086626A (en) | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair | |
CN106097073A (en) | A kind of block chain gives the method for the numeral exclusive ID of account trading process | |
CN105553654B (en) | Key information processing method and device, key information management system | |
CN104393993B (en) | A kind of safety chip and its implementation for electricity-selling terminal | |
CN105022966B (en) | Database data encryption decryption method and system | |
WO1996007256A1 (en) | Certifying system | |
CN103854180B (en) | Credit voucher generating method and system, and application authorization method and system | |
CN105871923B (en) | Information processing method, information record node and participation node | |
KR100824743B1 (en) | Method for user authentication using mobile phone and system therefor | |
CN110060148A (en) | Assets shared data circulation method, apparatus, equipment and medium based on block chain | |
CN107743067A (en) | Awarding method, system, terminal and the storage medium of digital certificate | |
CN106487765A (en) | Authorize access method and the equipment using the method | |
CN110278180A (en) | Exchange method, device, equipment and the storage medium of Financial Information | |
CN110445840A (en) | A method of file storage and reading based on block chain technology | |
CN109919614A (en) | A kind of method for protecting intelligent contract privacy using zero-knowledge proof in block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |