CN111488596A - Data processing permission verification method and device, electronic equipment and storage medium - Google Patents

Data processing permission verification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111488596A
CN111488596A CN202010238234.5A CN202010238234A CN111488596A CN 111488596 A CN111488596 A CN 111488596A CN 202010238234 A CN202010238234 A CN 202010238234A CN 111488596 A CN111488596 A CN 111488596A
Authority
CN
China
Prior art keywords
user
credit
authorization
application program
distributed application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010238234.5A
Other languages
Chinese (zh)
Inventor
周开班
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010238234.5A priority Critical patent/CN111488596A/en
Publication of CN111488596A publication Critical patent/CN111488596A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The application discloses a data processing permission verification method and device, electronic equipment and a storage medium. The method comprises the following steps: the credit management node receives an authorization request which comprises a credit point threshold value, a user identifier, a distributed application program identifier, a user account of a user in the distributed application program and a digital signature of the user node; acquiring a public key verification digital signature of a user node from a block chain; if the verification is successful, establishing authorization processing items of the authorization request, and distributing serial numbers for the authorization processing items; acquiring a credit score corresponding to the user identifier, and judging whether the credit score is greater than or equal to the credit score threshold value; if so, generating an authorization certificate and authorization success information of the authorization processing items, and generating a target block storage authorization certificate in a block chain, wherein the authorization certificate carries out digital signature by using a private key of a credit management node; and feeding back the successful authorization information to the user side through the distributed application program.

Description

Data processing permission verification method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of block chain technologies, and in particular, to a method and an apparatus for verifying data processing permission, an electronic device, and a storage medium.
Background
With the development of electronic equipment, application programs produced by the user are not generated, and convenience and interest are provided for the user in various aspects.
The block chain is a distributed account book and is also a novel application mode; the block chain technology covers computer technologies such as distributed storage, network, information security, data fault tolerance and the like; the block chain application has the characteristics of center removal, openness, autonomy and the like. Distributed Application program (DApp) is a new software Application mode using the block chain technology as an Application environment. Currently mature software applications typically have one or more central nodes, e.g. server nodes of the smartphone APP, Web, while the DApp, without such central nodes, is an application software that is built and can run in a tiled environment, with the users of the DApp maintaining and managing the lifecycle of the DApp together.
There are some application cases of DApp, such as online games, virtual currency, etc., which mainly provide online services in a Web manner. Popularization and application of DApp also have many technical problems to be solved, for example, there is no central node in DApp application mode, how to verify user identity, and how to ensure reliability of DApp users to provide better service.
Disclosure of Invention
The application provides a data processing permission verification method and device, electronic equipment and a storage medium.
In a first aspect, a data processing permission verification method is provided, including:
the method comprises the steps that a credit management node receives an authorization request, wherein the authorization request comprises a credit point threshold value, a user identification, an identification of a distributed application program, a user account number of a user in the distributed application program and a digital signature of a user node;
acquiring a public key of the user node from a block chain, and verifying the digital signature by using the public key;
if the verification is successful, establishing an authorization processing item of the authorization request, and distributing a serial number to the authorization processing item; acquiring a credit score corresponding to the user identification, and judging whether the credit score corresponding to the user identification is greater than or equal to the credit score threshold value;
if the credit integral corresponding to the user identification is larger than or equal to the credit integral threshold, generating an authorization voucher and authorization success information of the authorization processing item, generating a target block in a block chain according to the identification of the distributed application program, and storing the authorization voucher, wherein the authorization voucher comprises the identification of the distributed application program, a user account number of the user in the distributed application program, an authorization timestamp, and a serial number of the authorization processing item, and the authorization voucher uses a private key of the credit management node to carry out digital signature; and feeding back the authorization success information to a user side through the distributed application program to indicate that the user account has the authority of using the distributed application program.
On the other hand, another data processing permission verification method is provided, which comprises the following steps:
the method comprises the steps that a user side receives a credit inquiry instruction under the condition that the user side enters a distributed application program, wherein the credit inquiry instruction comprises a credit management node and a credit integral threshold value, and the credit integral threshold value is specified by an intelligent contract in a block chain;
generating an authorization request in response to the credit inquiry instruction, and sending the authorization request to the credit management node, wherein the authorization request comprises the credit point threshold, a user identifier, an identifier of the distributed application program, a user account number of a user in the distributed application program and a digital signature of the user node, so that the credit management node authorizes the distributed application program to inquire credit points corresponding to the user identifier, and the user identifier is a user identifier corresponding to the user in the credit management node;
and receiving authorization success information from the distributed application program, wherein the authorization success information is used for prompting that the user account has the authority of using the distributed application program.
In another aspect, there is provided a data processing right verifying apparatus including:
the transmission module is used for the credit management node to receive an authorization request, wherein the authorization request comprises a credit point threshold value, a user identifier, an identifier of a distributed application program, a user account number of a user in the distributed application program and a digital signature of a user node;
the verification module is used for acquiring a public key of the user node from the block chain and verifying the digital signature by using the public key;
the processing module is used for establishing authorization processing items of the authorization request and distributing serial numbers to the authorization processing items if the verification is successful;
the inquiry module is used for acquiring the credit score corresponding to the user identification and judging whether the credit score corresponding to the user identification is greater than or equal to the credit score threshold value;
a generating module, configured to generate a target block in a block chain according to an identifier of the distributed application program and store an authorization credential if a credit score corresponding to the user identifier is greater than or equal to the credit score threshold, where the authorization credential and authorization success information of the authorization processing item include the identifier of the distributed application program and a user account, an authorization timestamp, and a serial number of the authorization processing item of the user in the distributed application program, and the authorization credential uses a private key of the credit management node to perform digital signature;
the transmission module is further configured to feed back the authorization success information to the user side through the distributed application program, so as to indicate that the user account has the right to use the distributed application program.
On the other hand, there is provided another data processing right verifying apparatus including:
a transmission module, configured to receive a credit inquiry command upon entering a distributed application, where the credit inquiry command includes a credit management node and a credit score threshold, and the credit score threshold is specified by an intelligent contract in a block chain;
an authorization module, configured to generate an authorization request in response to the credit query instruction, and send the authorization request to the credit management node, where the authorization request includes the credit score threshold, a user identifier, an identifier of the distributed application program, a user account of a user in the distributed application program, and a digital signature of a user node, so that the credit management node authorizes the distributed application program to query a credit score corresponding to the user identifier, where the user identifier is a user identifier corresponding to the user in the credit management node;
the transmission module is further configured to receive authorization success information from the distributed application program, where the authorization success information is used to prompt that the user account has the right to use the distributed application program.
In another aspect, an electronic device is provided, which includes an input device and an output device, and is characterized by further including: a processor adapted to implement one or more instructions; and a computer storage medium storing one or more instructions adapted to be loaded by the processor and to perform the data processing permission verification method according to any of the preceding aspects.
In another aspect, a computer storage medium is provided, which stores one or more instructions adapted to be loaded by a processor and to perform the steps of the data processing permission verification method according to any one of the above aspects and any possible implementation thereof.
The embodiment of the application receives an authorization request through a credit management node, wherein the authorization request comprises a credit point threshold, a user identifier, an identifier of a distributed application program, a user account number of a user in the distributed application program and a digital signature of the user node, a public key of the user node is obtained from a block chain, the digital signature is verified by using the public key, if the verification is successful, an authorization processing item of the authorization request is established, a serial number is distributed to the authorization processing item, a credit point corresponding to the user identifier is obtained, whether the credit point corresponding to the user identifier is greater than or equal to the credit point threshold is judged, if the credit point corresponding to the user identifier is greater than or equal to the credit point threshold, an authorization certificate and authorization success information of the authorization processing item are generated, a target block is generated in the block chain according to the identifier of the distributed application program, and the authorization certificate is stored, the authorization certificate comprises an identification of a distributed application program, a user account number of a user in the distributed application program, an authorization timestamp and a serial number of the authorization processing item, and the authorization certificate is digitally signed by using a private key of the credit management node; and feeding back the successful authorization information to the user side through the distributed application program to indicate that the user account has the authority of using the distributed application program, so that the user account corresponding to the user identifier can log in to use the distributed application program. The credit point condition of the user is inquired and recorded through the block chain and the credit management node, the authenticity of data is guaranteed, the user is evaluated according to the credit points, the credit degree of the user using the distributed application program is effectively guaranteed, the occurrence of the non-credit behavior of the user is reduced, and the standard operation of each function of the application program is facilitated.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present application, the drawings required to be used in the embodiments or the background art of the present application will be described below.
Fig. 1A is a schematic structural diagram of a data sharing system according to an embodiment of the present application;
fig. 1B is a schematic structural diagram of a block chain according to an embodiment of the present disclosure;
fig. 1C is a schematic diagram of node interaction based on a block chain according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a data processing permission verification method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another data processing permission verification method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a data processing permission verification apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another data processing permission verification apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to the data sharing system shown in fig. 1A, the data sharing system 100 refers to a system for performing data sharing between nodes, the data sharing system may include a plurality of nodes 101, and the plurality of nodes 101 may refer to respective clients in the data sharing system. Each node 101 may receive input information while operating normally and maintain shared data within the data sharing system based on the received input information. In order to ensure information intercommunication in the data sharing system, information connection can exist between each node in the data sharing system, and information transmission can be carried out between the nodes through the information connection. For example, when any node in the data sharing system receives input information, other nodes in the data sharing system may acquire the input information according to a consensus algorithm, and store the input information as data in shared data, so that the data stored on all nodes in the data sharing system are consistent.
Each node in the data sharing system has a node identifier corresponding thereto, and each node in the data sharing system may store a node identifier of another node in the data sharing system, so that the generated block is broadcast to the other node in the data sharing system according to the node identifier of the other node in the following. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address and any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
Node name Node identification
Node 1 117.114.151.174
Node 2 117.116.189.145
Node N 119.123.789.258
Each node in the data sharing system stores one identical blockchain. The block chain is composed of a plurality of blocks, referring to fig. 1B, the block chain is composed of a plurality of blocks, the starting block includes a block header and a block main body, the block header stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured.
The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer. The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
The distributed Application program in the embodiment of the present Application, which may also be referred to as a decentralized Application program, is an internet Application program, and the most important differences are that: the DApp runs on a decentralized network, namely a block chain network, and the DApp can be completely controlled by nodes without centralization in the network; traditional applications are centralized and require a server to obtain data, process data, etc. Blockchain is an underlying environment for application execution relative to DApp, with the advantage of blockchain support.
DApp is decentralized and can run completely automatically. To make good use of these DApp, special etherhouse browsers, such as Augur, are required to further reduce the risk of intrusion by decentralizing the market forecast etherhouse platform.
For better explaining the method in the embodiment of the present application, referring to fig. 1C, fig. 1C is a schematic diagram of node interaction based on a block chain provided in the embodiment of the present application. As shown in fig. 1C, the block chain may be deployed with DApp program code and smart contracts, which may include a credit management node and a plurality of clients, which are only illustrated. In the embodiment of the present application, the user side may be understood as a user node in the blockchain, and is also a client side of the DApp. The credit management node and the user side can interact with the DApp background management side, so that a user can log in a user account on the user side to use the DApp. The credit management node can be any third-party platform and supervises and manages information such as credit points of the user. The DApp can require the user to authorize the inquiry authority of the credit points, apply authorization to the credit management node, if the credit points meet the preset requirement of the DApp, the authorization success information is returned, and the user can use the DApp. The credit management node can also record the credit point change condition of the user through the block chain, and provide credit authorization service for the DApp.
The embodiments of the present application will be described below with reference to the drawings.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating a data processing permission verification method according to an embodiment of the present application, where the method may be applied to a credit management node. The method can comprise the following steps:
201. the credit management node receives an authorization request, wherein the authorization request comprises a credit point threshold value, a user identification, an identification of a distributed application program, a user account number of a user in the distributed application program, and a digital signature of a user node.
The credit management node in the embodiment of the application can be any third-party platform, and supervises and manages information such as credit points of the user. In one embodiment, the credit management node is specifically a server. The credit management node may also pre-join the blockchain network.
The authorization request is sent by the user side, and may be triggered when the user side registers or logs in the DApp through the user account. When detecting that the user side logs in the DApp, the DApp background management end can generate a credit inquiry instruction and send the credit inquiry instruction to the user side if the user side does not perform credit authorization, requests the user side to authorize the credit condition for verification, can acquire a user identifier corresponding to the credit management node of the user at the user side, and generates the authorization request to send to the credit management node.
For example, after the user logs in the DApp using account a (user account), part of the functions may be disabled because the DApp cannot be normally used temporarily without credit authorization. A prompt box can be displayed on the interface of the DApp to indicate that the DApp needs to acquire the credit information of the user on the third-party platform B and request the authorization of the user. And if the user clicks and determines, automatically acquiring a user account (user identification) of the user on the third-party platform B, sending an authorization request to the third-party platform B, and acquiring and inquiring whether the credit score of the user account meets the use standard of the DApp.
The identifier of the distributed application program is an identifier of a DApp to be logged in and operated by the user, and the user account may be an account used by the user to log in the DApp. The credit integration threshold may be preset by the DApp developer. The DApp runs under the support of the blockchain, and running operation logic of the DApp is specified by means of an intelligent contract and is deployed on the blockchain. The credit integration threshold may also be predefined in the associated smart contract.
202. And acquiring the public key of the user node from the block chain, and verifying the digital signature by using the public key.
Specifically, the credit management node may first verify the received authorization request to determine the authenticity of the operation instruction. In a distributed network of a block chain, communication among nodes and trust achievement can depend on a digital signature technology, and digital signatures relate to tools such as public keys, private keys, wallets and the like, and have two functions: firstly, the message is proved to be actually signed and sent out by the message sender; the second is to determine the integrity of the message.
The digital signature technique is to encrypt the digest information with the sender's private key and transmit it to the receiver together with the original text. The receiver can decrypt the encrypted digest information only with the sender's public key, and then generates a digest information for the received original text using a HASH (HASH) function, which is compared with the decrypted digest information. If the information is the same as the received information, the received information is complete and is not modified in the transmission process, otherwise, the information is modified. The digital signature is able to verify the integrity of the information.
Similarly, the authorization request may include a digital signature of the user node. In order to verify whether the authorization request is sent by the corresponding user node, the public key of the user node may be obtained from the blockchain, and then the public key is used to resolve the authorization request.
Specifically, a cipher text corresponding to the authorization request can be decrypted by using a private key of the user, and an abstract is obtained through hash operation; and then acquiring a public key corresponding to the user node, analyzing the corresponding digital signature to obtain an abstract, comparing the abstract of the decrypted ciphertext with the abstract of the decrypted digital signature respectively, and if the abstracts are consistent, determining that the authorization request is matched with the user node, so that the authorization request can be determined to come from the user node, the authorization request is real and effective, and the authorization request can be processed.
If the abstracts are not completely consistent, the authorization request is determined to be not matched with the user node, the authorization request is determined not to be generated by the user node, the subsequent steps can not be executed, the security of using the DApp by the user is improved, and information is prevented from being stolen.
203. If the verification is successful, establishing an authorization processing item of the authorization request, and distributing a serial number to the authorization processing item.
If the authentication is successful, the authorization request can be confirmed to come from the user node, and the authorization request is true and effective, so that corresponding authorization processing items can be established, and a unique serial number is allocated for processing.
In an alternative embodiment, after step 203, the method further comprises:
and generating verification information, signing the verification information by using a private key of the credit management node, and uploading the verification information to the block chain, wherein the verification information indicates that the distributed application program has the inquiry authority of credit points corresponding to the user account.
Optionally, verification information may be generated in the blockchain, and the verification information is signed by using a private key of the credit management node and then uploaded to the blockchain, so as to indicate that the DApp has a query right for credit points corresponding to a user account, and complete authorization, where the user account may be associated with a user identifier of the user at the credit management node, and then the DApp may obtain the credit point information of the user through the credit management node.
Further optionally, when the distributed application program has an inquiry authority for credit points corresponding to the user identifier, the method further includes:
and periodically acquiring credit points corresponding to the user account, and recording the acquired credit points corresponding to the user account in a block corresponding to the distributed application program.
Specifically, under the condition that the credit management node authorizes the DApp to access the credit score of a certain user, the DApp background management end may request the credit management node to acquire the credit score of the user account when needed, specifically, the block chain stores the user account and the user identifier of the user at the credit management node, and the credit score of the user identifier may be periodically acquired from the credit management node according to a preset period of the intelligent contract, so as to determine whether the user account meets the use requirement of the DApp. The credit point change condition is recorded through the block chain, the credit point change condition cannot be tampered, and the query content is reserved, so that the data can be traced.
204. And acquiring a credit score corresponding to the user identifier, and judging whether the credit score corresponding to the user identifier is greater than or equal to the credit score threshold value.
Specifically, the credit management node may determine the credit point of the user according to a given credit point threshold. Other functions can be supported in the third-party application program corresponding to the credit management node, such as functions of a social application or a payment application; the credit management node stores credit points of a plurality of users, manages the credit points by user identifiers, and can run an autonomous point change logic at the credit management node to measure and update the credit points of each user, which is not limited herein.
The credit management node may obtain a credit score corresponding to the user identifier, and then determine whether the credit score corresponding to the user identifier is greater than or equal to the credit score threshold, if so, step 205 may be executed; if not, go to step 207.
205. And if the credit integral corresponding to the user identification is greater than or equal to the credit integral threshold, generating an authorization certificate and authorization success information of the authorization processing item, generating a target block in a block chain according to the identification of the distributed application program, and storing the authorization certificate, wherein the authorization certificate comprises the identification of the distributed application program, a user account number of the user in the distributed application program, an authorization timestamp and a serial number of the authorization processing item, and the authorization certificate is digitally signed by using a private key of the credit management node.
206. And feeding back the successful authorization information to a user side through the distributed application program to indicate that the user account has the authority of using the distributed application program.
When the credit point corresponding to the user identification is inquired to be larger than or equal to the credit point threshold value, the credit condition of the user meets the requirement of DApp, the credit management node acquires the user account number, the user identification, the identification of the DApp, the authorization timestamp and the serial number of the authorization processing item, uses a private key signature to acquire the authorization voucher, and stores the authorization voucher in a block chain, and the DApp background management end opens the normal use permission of the user account number. And determining a stored target block or generating a corresponding target block according to the identifier of the distributed application program in the block chain, and storing the authorization certificate.
Meanwhile, authorization success information can be generated and fed back to the user side through the distributed application program. The user end can receive the fed-back authorization success information through the DApp, so that the user account of the user end can normally use the DApp.
207. And if the credit point corresponding to the user identification is smaller than the credit point threshold value, generating authorization failure information, and feeding the authorization failure information back to the user side through the distributed application program to indicate that the user account does not have the authority of using the distributed application program.
When the credit point corresponding to the user identifier is smaller than the credit point threshold value, the credit of the user is low and does not meet the requirement of the DApp, the credit management node can also acquire the user account number, the user identifier and the DApp identifier to generate authorization failure information, and the DApp background management end prohibits the normal use of the user account number. The user end can receive the fed back authorization failure information through the DApp, and cannot operate at the DApp through the user account.
In one embodiment, the blockchain underlying platform may include processing modules for user management, basic services, intelligent contracts, and operation monitoring. Wherein, the user management module can be undertaken by the supervisory node with part or all of the functions: the system is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, DApp operation and operation conditions of certain real identity nodes are supervised and audited, and rule configuration (wind control audit) of risk control is provided; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering contracts and executing contracts, such as intelligent contracts of DApp in the application, developers can define contract logic through a certain programming language, issue the contract logic to a block chain (contract registration), call keys or other event triggering execution according to the logic of contract terms, complete the contract logic, and simultaneously provide the function of canceling contract upgrading logout; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The embodiment of the application receives an authorization request through a credit management node, wherein the authorization request comprises a credit point threshold, a user identifier, an identifier of a distributed application program, a user account number of a user in the distributed application program and a digital signature of the user node, a public key of the user node is obtained from a block chain, the digital signature is verified by using the public key, if the verification is successful, an authorization processing item of the authorization request is established, a serial number is distributed to the authorization processing item, a credit point corresponding to the user identifier is obtained, whether the credit point corresponding to the user identifier is greater than or equal to the credit point threshold is judged, if the credit point corresponding to the user identifier is greater than or equal to the credit point threshold, an authorization certificate and authorization success information of the authorization processing item are generated, a target block is generated in the block chain according to the identifier of the distributed application program, and the authorization certificate is stored, the authorization certificate comprises an identification of a distributed application program, a user account number of a user in the distributed application program, an authorization timestamp and a serial number of the authorization processing item, and the authorization certificate is digitally signed by using a private key of the credit management node; feeding back the successful authorization information to a user side through the distributed application program to indicate that the user account has the authority of using the distributed application program, so that the user account corresponding to the user identifier can log in to use the distributed application program; and if the credit score corresponding to the user identification is smaller than the credit score threshold value, generating authorization failure information, and feeding the authorization failure information back to the user side through the distributed application program, wherein the authorization failure information indicates that a user account does not have the authority of using the distributed application program, and the user account cannot normally log in to use the distributed application program. The credit point condition of the user is inquired and recorded through the block chain and the credit management node, the authenticity of data is guaranteed, the user is evaluated according to the credit points, the credit degree of the user using the distributed application program is effectively guaranteed, the occurrence of the non-credit behavior of the user is reduced, and the standard operation of each function of the application program is facilitated.
Referring to fig. 3, fig. 3 is a flowchart illustrating another data processing permission verification method according to an embodiment of the present application, where the method can be applied to a user side in a block chain. As shown in fig. 3, the method may include:
301. and the user side receives a credit inquiry instruction under the condition of entering the distributed application program, wherein the credit inquiry instruction comprises a credit management node and a credit point threshold value, and the credit point threshold value is specified by an intelligent contract in the block chain.
The data processing permission verification method related in the embodiment of the application can be realized based on a block chain. In a specific implementation, the user terminal may be understood as a terminal on which the DApp client is installed, which may also be referred to as a terminal device, including but not limited to other portable devices such as mobile phones, laptops or tablets with touch sensitive surfaces (e.g., touch screen displays and/or touch pads), which may implement positioning services and navigation functions through applications. It should also be understood that in some embodiments, the devices described above are not portable communication devices, but rather are desktop computers having touch-sensitive surfaces (e.g., touch screen displays and/or touch pads).
Because some services provided by the DApp generally require that a user has higher credit, such as loan, vote, comment, and lease applications such as a power bank, a shared bicycle, an umbrella, and the like, in order to improve the reliability of the DApp service in various links and avoid malicious use of the DApp, the credit of the user can be verified.
The credit inquiry instruction may be triggered when the user side registers or logs in the DApp through the user account, and when the DApp background management side detects that the user side logs in the DApp, if the user does not perform credit authorization, the credit inquiry instruction may be generated and sent to the user side to request verification of the user credit information.
The credit management node in the embodiment of the application can be any third-party platform, and supervises and manages information such as credit points of the user. In one embodiment, the credit management node is specifically a server. The credit management node may also pre-join the blockchain network. The credit integration threshold may be preset by the DApp developer. The DApp runs under the support of the blockchain, and running operation logic of the DApp is specified by means of an intelligent contract and is deployed on the blockchain. The credit integration threshold may also be predefined in the associated smart contract.
Step 302 may be performed after receiving the credit inquiry command.
302. And generating an authorization request in response to the credit inquiry instruction, and sending the authorization request to the credit management node, wherein the authorization request comprises the credit point threshold, a user identifier, an identifier of the distributed application program, a user account of the user in the distributed application program and a digital signature of the user node, so that the credit management node authorizes the distributed application program to inquire credit points corresponding to the user identifier.
The identifier of the distributed application program is an identifier of a DApp to be logged in and operated by the user, and the user identifier is a user identifier corresponding to the credit management node of the user. The user side can initiate an authorization request to the credit management node after the user triggers the confirmation operation of the credit inquiry request, and requests to authorize the credit information of the user side to the DApp for obtaining and verifying.
The method that can be executed by the credit management node has been specifically described in the embodiment shown in fig. 2, and is not described herein again.
303. And receiving authorization success information from the distributed application program, wherein the authorization success information is used for prompting that the user account has the authority of using the distributed application program.
After the credit management node authorizes the DApp to obtain the credit of the user, if the credit score of the user meets the requirement of the DApp, the user end can receive the fed-back authorization success information through the DApp, and therefore the user account of the user end can normally use the DApp.
In an alternative embodiment, the method comprises:
and receiving authorization failure information from the distributed application program, wherein the authorization failure information is used for prompting that a user does not have the authority of using the distributed application program.
When the credit of the user is inquired to be low and does not meet the requirement of the DApp, the credit management node can also acquire the user account, the user identification and the identification of the DApp, authorization failure information is generated and uploaded to the block chain, and the DApp background management end prohibits the normal use of the user account. The user end can receive the fed back authorization failure information through the DApp, and cannot operate at the DApp through the user account. For example, the user may display on the DApp interface: "because your credit score is below xx, this function cannot be used. "where" xx "is a credit integration threshold set in DApp.
In an optional embodiment, the method further comprises:
displaying user authority information in an interface of the distributed application program, wherein the user authority information comprises the authority of at least one opened application program function; and the user authority information is determined according to the intelligent contract in the block chain and the credit integral corresponding to the user identification.
Specifically, the DApp may provide multiple use functions, different functions may have different requirements for the credit of the user account, and the permissions of the application functions may be preset and may be stored in the blockchain. After the user authorizes the DApp to acquire credit data from the credit management node, the DApp background management end can judge the application program functions available to the user account according to the acquired credit point condition of the user account. Specifically, whether the acquired credit score of the user account meets the authority score threshold of each application program function can be determined through an intelligent contract in the block chain, so as to determine whether the user account can use each application program function. If the authority point threshold value is set for a certain application program function, when the credit point of the user account is greater than or equal to the authority point threshold value of the application program function, the user account can obtain the authority to use the application program function, that is, the function in the DApp can be used.
The DApp may determine at least one application function usable by the user account by the method, and when the right of the user account to use the function is opened, the user right information may be displayed to prompt the user account of the opened at least one application function. Optionally, the application function to be started in DApp may also be displayed to facilitate the user in increasing credit points.
For the service requiring higher user credit in the DApp, the method can quickly acquire the user credit for verification, provide the enjoyable application function for the users with different credit conditions, and ensure that the DApp safely and orderly provides the service for the users.
In the embodiment of the application, when a user enters a distributed application program, a credit inquiry instruction is received, where the credit inquiry instruction includes a credit management node and a credit score threshold, where the credit score threshold is defined by an intelligent contract in a block chain, and in response to the credit inquiry instruction, an authorization request is generated, the authorization request is sent to the credit management node, where the authorization request includes the credit score threshold, a user identifier, an identifier of the distributed application program, a user account of the user in the distributed application program, and a digital signature of the user node, so that the credit management node authorizes the distributed application program to inquire credit scores corresponding to the user identifier, and the user identifier is a user identifier corresponding to the credit management node, and then can receive successful authorization information from the distributed application program, the successful authorization information is used for prompting that the user account number has the authority of using the distributed application program, so that the user side can authorize credit inquiry of the DApp by using an information management node of a third party, rapidly log in and use the DApp, the complex steps of multiple identity information verification are reduced, the DApp can accurately verify the credit condition of the user, and the safety of application program service is ensured.
Based on the description of the data processing permission verification method embodiment, the embodiment of the application also discloses a data processing permission verification device. Referring to fig. 4, the data processing right verification apparatus 400 includes:
a transmission module 410, configured to receive, by a credit management node, an authorization request, where the authorization request includes a credit score threshold, a user identifier, an identifier of a distributed application program, a user account of a user in the distributed application program, and a digital signature of a user node;
a verification module 420, configured to obtain a public key of the user node from a blockchain, and verify the digital signature using the public key;
a processing module 430, configured to establish an authorization processing item of the authorization request and assign a serial number to the authorization processing item if the verification is successful;
the query module 440 is configured to obtain a credit score corresponding to the user identifier, and determine whether the credit score corresponding to the user identifier is greater than or equal to the credit score threshold;
a generating module 450, configured to generate a target block in a block chain according to the identifier of the distributed application program and store the authorization credential if the credit score corresponding to the user identifier is greater than or equal to the credit score threshold, where the authorization credential and the authorization success information of the authorization processing item include the identifier of the distributed application program and a user account, an authorization timestamp, and a serial number of the authorization processing item of the user in the distributed application program, and the authorization credential is digitally signed by using a private key of the credit management node; the transmission module 410 is further configured to feed back the authorization success information to the user side through the distributed application program, so as to indicate that the user account has the right to use the distributed application program.
Optionally, the generating module 450 is further configured to generate authorization failure information if the credit score corresponding to the user identifier is smaller than the credit score threshold; the transmission module 410 is further configured to feed back the authorization failure information to the user side through the distributed application program, where the authorization failure information indicates that the user account does not have the right to use the distributed application program.
Optionally, the generating module 450 is further configured to generate verification information, sign the verification information using a private key of the credit management node, and upload the signed verification information to the block chain, where the verification information indicates that the distributed application program has an inquiry authority for credit points corresponding to the user account.
Optionally, the query module 440 is further configured to, under a condition that the distributed application program has a query authority for credit points corresponding to the user account, periodically obtain credit points corresponding to the user account; the generating module 450 is further configured to record the obtained credit points corresponding to the user account in a block corresponding to the distributed application program.
According to an embodiment of the present application, the steps involved in the method shown in fig. 2 may be performed by the data processing right verification apparatus 400 shown in fig. 4, and are not described herein again.
The data processing right verification apparatus 400 in the embodiment of the present application may receive an authorization request, where the authorization request includes a credit point threshold, a user identifier, an identifier of a distributed application, a user account of a user in the distributed application, and a digital signature of a user node, obtain a public key of the user node from a block chain, verify the digital signature using the public key, if the verification is successful, establish an authorization processing item of the authorization request, assign a serial number to the authorization processing item, and obtain a credit point corresponding to the user identifier, determine whether the credit point corresponding to the user identifier is greater than or equal to the credit point threshold, if the credit point corresponding to the user identifier is greater than or equal to the credit point threshold, generate an authorization credential and authorization success information of the authorization processing item, generating a target block in a block chain according to the identifier of the distributed application program, and storing the authorization voucher, wherein the authorization voucher comprises the identifier of the distributed application program, a user account number of a user in the distributed application program, an authorization timestamp and a serial number of the authorization processing item, and the authorization voucher is digitally signed by using a private key of the credit management node; and feeding back the successful authorization information to a user side through the distributed application program to indicate that the user account has the authority of using the distributed application program. The credit point condition of the user is inquired and recorded through the block chain and the credit management node, the authenticity of data is guaranteed, the user is evaluated according to the credit points, the credit degree of the user using the distributed application program is effectively guaranteed, the occurrence of the non-credit behavior of the user is reduced, and the standard operation of each function of the application program is facilitated.
Based on the description of the above method embodiment and device embodiment, the present application embodiment further provides another data processing permission verification device, as shown in fig. 5, the data processing permission verification device 500 includes:
a transmission module 510, configured to receive a credit inquiry command in case of entering a distributed application, where the credit inquiry command includes a credit management node and a credit score threshold value, and the credit score threshold value is specified by an intelligent contract in a block chain;
an authorization module 520, configured to generate an authorization request in response to the credit inquiry instruction, and send the authorization request to the credit management node, where the authorization request includes the credit point threshold, a user identifier, an identifier of the distributed application program, a user account of the user in the distributed application program, and a digital signature of the user node, so that the credit management node authorizes the distributed application program to inquire a credit point corresponding to the user identifier, where the user identifier is a user identifier corresponding to the user in the credit management node;
the transmission module 510 is further configured to receive authorization success information from the distributed application program, where the authorization success information is used to prompt that the user account has the right to use the distributed application program.
In an embodiment, the data processing permission verification apparatus 500 in the embodiment of the present application may be used to perform a series of processes, including the method in the embodiment shown in fig. 3 and the method executed by the user end in the embodiment shown in fig. 2, which are not described herein again.
Based on the description of the method embodiment and the device embodiment, the embodiment of the application further provides an electronic device. Referring to fig. 6, the electronic device 600 includes at least a processor 601, an input device 602, an output device 603, and a computer storage medium 604. The processor 601, input device 602, output device 603, and computer storage medium 604 within the terminal may be connected by a bus or other means.
A computer storage medium 604 may be stored in the memory of the terminal, said computer storage medium 604 being adapted to store a computer program comprising program instructions, said processor 601 being adapted to execute said program instructions stored by said computer storage medium 604. The processor 601 (or CPU) is a computing core and a control core of the terminal, and is adapted to implement one or more instructions, and in particular, is adapted to load and execute the one or more instructions so as to implement a corresponding method flow or a corresponding function; in one embodiment, the processor 601 of the embodiment of the present application may be configured to perform a series of processes, including the method in the embodiment shown in fig. 2 or fig. 3, and so on.
An embodiment of the present application further provides a computer storage medium (Memory), where the computer storage medium is a Memory device in a terminal and is used to store programs and data. It is understood that the computer storage medium herein may include a built-in storage medium in the terminal, and may also include an extended storage medium supported by the terminal. The computer storage medium provides a storage space that stores an operating system of the terminal. Also stored in this memory space are one or more instructions, which may be one or more computer programs (including program code), suitable for loading and execution by processor 601. The computer storage medium may be a high-speed RAM memory, or may be a non-volatile memory (non-volatile memory), such as at least one disk memory; and optionally at least one computer storage medium located remotely from the processor.
In one embodiment, one or more instructions stored in a computer storage medium may be loaded and executed by the processor 601 to implement the corresponding steps of the method performed by the delivery node in the above embodiments; in particular implementations, one or more instructions in the computer storage medium may be loaded by processor 601 and executed to perform any step of the method in fig. 2 and/or fig. 3, which is not described herein again.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the division of the module is only one logical division, and other divisions may be possible in actual implementation, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not performed. The shown or discussed mutual coupling, direct coupling or communication connection may be an indirect coupling or communication connection of devices or modules through some interfaces, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
The computer instructions may be stored on or transmitted from a website, computer, server, or data center via a wired (e.g., coaxial cable, fiber optic cable, digital subscriber line (DS L)) or wireless (e.g., infrared, wireless, microwave, etc.) manner to another website, computer, server, or data center.

Claims (10)

1. A data processing permission verification method is characterized by comprising the following steps:
the method comprises the steps that a credit management node receives an authorization request, wherein the authorization request comprises a credit point threshold value, a user identification, an identification of a distributed application program, a user account number of a user in the distributed application program and a digital signature of a user node;
acquiring a public key of the user node from a block chain, and verifying the digital signature by using the public key;
if the verification is successful, establishing an authorization processing item of the authorization request, and distributing a serial number to the authorization processing item; acquiring a credit score corresponding to the user identification, and judging whether the credit score corresponding to the user identification is greater than or equal to the credit score threshold value;
if the credit integral corresponding to the user identification is larger than or equal to the credit integral threshold, generating an authorization voucher and authorization success information of the authorization processing item, generating a target block in a block chain according to the identification of the distributed application program, and storing the authorization voucher, wherein the authorization voucher comprises the identification of the distributed application program, a user account number of the user in the distributed application program, an authorization timestamp, and a serial number of the authorization processing item, and the authorization voucher uses a private key of the credit management node to carry out digital signature; and feeding back the authorization success information to a user side through the distributed application program to indicate that the user account has the authority of using the distributed application program.
2. The method of claim 1, wherein the obtaining the public key of the user node from the blockchain, verifying the digital signature using the public key, and if the verification is successful, the method further comprises:
and generating verification information, signing the verification information by using a private key of the credit management node, and uploading the verification information to the block chain, wherein the verification information indicates that the distributed application program has the inquiry authority of credit points corresponding to the user account.
3. The method of claim 2, wherein when the distributed application program has a query right for credit points corresponding to the user account, the method further comprises:
and periodically acquiring credit points corresponding to the user account, and recording the acquired credit points corresponding to the user account in a block corresponding to the distributed application program.
4. A data processing permission verification method is characterized by comprising the following steps:
the method comprises the steps that a user side receives a credit inquiry instruction under the condition that the user side enters a distributed application program, wherein the credit inquiry instruction comprises a credit management node and a credit integral threshold value, and the credit integral threshold value is specified by an intelligent contract in a block chain;
generating an authorization request in response to the credit inquiry instruction, and sending the authorization request to the credit management node, wherein the authorization request comprises the credit point threshold, a user identifier, an identifier of the distributed application program, a user account number of a user in the distributed application program and a digital signature of the user node, so that the credit management node authorizes the distributed application program to inquire credit points corresponding to the user identifier, and the user identifier is a user identifier corresponding to the user in the credit management node;
and receiving authorization success information from the distributed application program, wherein the authorization success information is used for prompting that the user account has the authority of using the distributed application program.
5. The method of claim 4, further comprising:
displaying user permission information in an interface of the distributed application program, wherein the user permission information comprises permission of at least one opened application program function; and the user authority information is determined according to the intelligent contract in the block chain and the credit integral corresponding to the user identification.
6. The method according to claim 4 or 5, characterized in that it comprises:
and receiving authorization failure information from the distributed application program, wherein the authorization failure information is used for prompting that the user account does not have the authority of using the distributed application program.
7. A data processing right verifying apparatus, comprising:
the transmission module is used for the credit management node to receive an authorization request, wherein the authorization request comprises a credit point threshold value, a user identifier, an identifier of a distributed application program, a user account number of a user in the distributed application program and a digital signature of a user node;
the verification module is used for acquiring a public key of the user node from the block chain and verifying the digital signature by using the public key;
the processing module is used for establishing authorization processing items of the authorization request and distributing serial numbers to the authorization processing items if the verification is successful;
the inquiry module is used for acquiring the credit score corresponding to the user identification and judging whether the credit score corresponding to the user identification is greater than or equal to the credit score threshold value;
a generating module, configured to generate a target block in a block chain according to an identifier of the distributed application program and store an authorization credential if a credit score corresponding to the user identifier is greater than or equal to the credit score threshold, where the authorization credential and authorization success information of the authorization processing item include the identifier of the distributed application program and a user account, an authorization timestamp, and a serial number of the authorization processing item of the user in the distributed application program, and the authorization credential uses a private key of the credit management node to perform digital signature;
the transmission module is further configured to feed back the authorization success information to the user side through the distributed application program, so as to indicate that the user account has the right to use the distributed application program.
8. A data processing right verifying apparatus, comprising:
a transmission module, configured to receive a credit inquiry command upon entering a distributed application, where the credit inquiry command includes a credit management node and a credit score threshold, and the credit score threshold is specified by an intelligent contract in a block chain;
an authorization module, configured to generate an authorization request in response to the credit query instruction, and send the authorization request to the credit management node, where the authorization request includes the credit score threshold, a user identifier, an identifier of the distributed application program, a user account of a user in the distributed application program, and a digital signature of a user node, so that the credit management node authorizes the distributed application program to query a credit score corresponding to the user identifier, where the user identifier is a user identifier corresponding to the user in the credit management node;
the transmission module is further configured to receive authorization success information from the distributed application program, where the authorization success information is used to prompt that the user account has the right to use the distributed application program.
9. An electronic device comprising an input device and an output device, further comprising:
a processor adapted to implement one or more instructions; and the number of the first and second groups,
a computer storage medium having stored thereon one or more instructions adapted to be loaded by the processor and to execute the data processing permission verification method according to any one of claims 1-6.
10. A computer-readable storage medium having stored thereon one or more instructions adapted to be loaded by a processor and to perform a method of data processing permission validation according to any of claims 1-6.
CN202010238234.5A 2020-03-30 2020-03-30 Data processing permission verification method and device, electronic equipment and storage medium Pending CN111488596A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010238234.5A CN111488596A (en) 2020-03-30 2020-03-30 Data processing permission verification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010238234.5A CN111488596A (en) 2020-03-30 2020-03-30 Data processing permission verification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111488596A true CN111488596A (en) 2020-08-04

Family

ID=71812486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010238234.5A Pending CN111488596A (en) 2020-03-30 2020-03-30 Data processing permission verification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111488596A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111931160A (en) * 2020-08-13 2020-11-13 苏州朗动网络科技有限公司 Authority verification method, device, terminal and storage medium
CN112100178A (en) * 2020-09-08 2020-12-18 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN112559988A (en) * 2020-12-11 2021-03-26 杭州趣链科技有限公司 Book borrowing method, device and equipment based on block chain and readable storage medium
CN112669135A (en) * 2020-11-30 2021-04-16 泰康保险集团股份有限公司 Data acquisition method and device, computer equipment and computer readable storage medium
CN112910852A (en) * 2021-01-17 2021-06-04 迅鳐成都科技有限公司 Distributed authorization method, device and storage medium based on R tree
CN114124404A (en) * 2021-11-12 2022-03-01 中国联合网络通信集团有限公司 Data processing method, device, server and storage medium
CN115021967A (en) * 2022-05-06 2022-09-06 中国电信股份有限公司 Industrial data authorization method and device, electronic equipment and storage medium
CN115277715A (en) * 2022-06-01 2022-11-01 浪潮软件股份有限公司 Item authorization method and system based on block chain

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111931160B (en) * 2020-08-13 2024-03-29 企查查科技股份有限公司 Authority verification method, authority verification device, terminal and storage medium
CN111931160A (en) * 2020-08-13 2020-11-13 苏州朗动网络科技有限公司 Authority verification method, device, terminal and storage medium
CN112100178B (en) * 2020-09-08 2023-05-12 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN112100178A (en) * 2020-09-08 2020-12-18 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN112669135A (en) * 2020-11-30 2021-04-16 泰康保险集团股份有限公司 Data acquisition method and device, computer equipment and computer readable storage medium
CN112669135B (en) * 2020-11-30 2024-03-08 泰康保险集团股份有限公司 Data acquisition method and device, computer equipment and computer readable storage medium
CN112559988A (en) * 2020-12-11 2021-03-26 杭州趣链科技有限公司 Book borrowing method, device and equipment based on block chain and readable storage medium
CN112910852B (en) * 2021-01-17 2023-03-14 迅鳐成都科技有限公司 Distributed authorization method, device and storage medium based on R tree
CN112910852A (en) * 2021-01-17 2021-06-04 迅鳐成都科技有限公司 Distributed authorization method, device and storage medium based on R tree
CN114124404A (en) * 2021-11-12 2022-03-01 中国联合网络通信集团有限公司 Data processing method, device, server and storage medium
CN114124404B (en) * 2021-11-12 2023-07-07 中国联合网络通信集团有限公司 Data processing method, device, server and storage medium
CN115021967A (en) * 2022-05-06 2022-09-06 中国电信股份有限公司 Industrial data authorization method and device, electronic equipment and storage medium
CN115277715A (en) * 2022-06-01 2022-11-01 浪潮软件股份有限公司 Item authorization method and system based on block chain

Similar Documents

Publication Publication Date Title
CN111488596A (en) Data processing permission verification method and device, electronic equipment and storage medium
US20200389456A1 (en) Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
CN112104665B (en) Block chain-based identity authentication method and device, computer and storage medium
CN111353903B (en) Network identity protection method and device, electronic equipment and storage medium
CN111324672A (en) Block chain safety processing system and method
JP4818664B2 (en) Device information transmission method, device information transmission device, device information transmission program
CN110689332B (en) Resource account binding method, storage medium and electronic device
CN111260398A (en) Advertisement putting control method and device, electronic equipment and storage medium
CN101925910B (en) License authentication system and authentication method
CN107682160B (en) Authentication method and device for production equipment and electronic equipment
CN112187931A (en) Session management method, device, computer equipment and storage medium
CN110601858B (en) Certificate management method and device
CN110719203A (en) Operation control method, device and equipment of intelligent household equipment and storage medium
US8990887B2 (en) Secure mechanisms to enable mobile device communication with a security panel
CN111582876A (en) Operation authentication method, device, storage medium and electronic device
CN112995357A (en) Domain name management method, device, medium and electronic equipment based on cloud hosting service
CN111443976A (en) Application program generation method and device, electronic equipment and storage medium
CN110599211A (en) Ticket information processing method and device and computer equipment
CN113869901B (en) Key generation method, key generation device, computer-readable storage medium and computer equipment
CN110599212A (en) Anti-counterfeiting parameter generation and anti-counterfeiting verification method, device and storage medium
JP4794939B2 (en) Ticket type member authentication apparatus and method
CN113746640A (en) Digital certificate using method and device, computer equipment and storage medium
CN111415174A (en) Authentication information sending method and equipment based on block chain and storage medium
CN111523142B (en) Data processing method, device, electronic equipment and medium
CN116668201B (en) System for allocating production resources, transmission method and equipment for production resources

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200804

WD01 Invention patent application deemed withdrawn after publication