CN111784879A - Access control method, device and storage medium - Google Patents

Access control method, device and storage medium Download PDF

Info

Publication number
CN111784879A
CN111784879A CN202010659388.1A CN202010659388A CN111784879A CN 111784879 A CN111784879 A CN 111784879A CN 202010659388 A CN202010659388 A CN 202010659388A CN 111784879 A CN111784879 A CN 111784879A
Authority
CN
China
Prior art keywords
entrance guard
unlocking
transaction
control
integral
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010659388.1A
Other languages
Chinese (zh)
Other versions
CN111784879B (en
Inventor
刘业章
袁海雷
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Benchain Information Technology Co ltd
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Nanjing Benchain Information Technology Co ltd
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Benchain Information Technology Co ltd, Hangzhou Fuzamei Technology Co Ltd filed Critical Nanjing Benchain Information Technology Co ltd
Priority to CN202010659388.1A priority Critical patent/CN111784879B/en
Publication of CN111784879A publication Critical patent/CN111784879A/en
Application granted granted Critical
Publication of CN111784879B publication Critical patent/CN111784879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides an access control method, access control equipment and a storage medium, wherein the method comprises the following steps: when a first entrance guard unlocking transaction is executed through an entrance guard control contract, whether a sending address of the transaction is an authorized address of a first entrance guard recorded in the entrance guard control contract is verified: if not, the first entrance guard unlocking transaction fails to be executed; if so, freezing a first entrance guard unlocking transaction and transferring the first entrance guard integral to an entrance guard control contract, and verifying whether the quantity of the first entrance guard integral is the same as the quantity of unlocking integral required by unlocking the first entrance guard by the sending address recorded in the entrance guard control contract or not: otherwise, unfreezing the first entrance guard integral, and failing to execute the first entrance guard unlocking transaction; and if so, deducting the first entrance guard integral, and successfully executing the first entrance guard unlocking transaction so as to enable the entrance guard control device controlling the first entrance guard to control to unlock the first entrance guard after monitoring that the first entrance guard unlocking transaction is successfully executed. The invention realizes that the door control unlocking times can be conveniently and accurately controlled without reconfiguring an intelligent contract.

Description

Access control method, device and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method, an apparatus, and a storage medium for controlling access.
Background
The current door control application that actually falls to the ground is the centralized door control system still usually, and the door control application that combines together with the block chain still rarely falls to the ground at present because there are some defects. Meanwhile, the centralized access control system has the problems that unlocking depends on a centralized server, electronic unlocking cannot be carried out once the centralized server fails, and the like.
In various block chain access control application schemes proposed at present, the requirement for conveniently and accurately controlling the number of times of door control unlocking in some scenes cannot be met at present.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide a method, a device, and a storage medium for controlling access control, which can conveniently and accurately control the number of times of unlocking an access control without reconfiguring an intelligent contract.
In a first aspect, the present invention provides an access control method suitable for a blockchain node, where an access control contract is configured on a blockchain, and the method includes:
when a first entrance guard unlocking transaction of a first entrance guard is unlocked through an entrance guard control contract execution request, whether the transmission address of the first entrance guard unlocking transaction is the authorization address of the first entrance guard recorded in the entrance guard control contract is verified:
if not, the first entrance guard unlocking transaction fails to be executed;
if so, freezing a first entrance guard unlocking transaction and transferring the first entrance guard integral to an entrance guard control contract, and verifying whether the quantity of the first entrance guard integral is the same as the quantity of unlocking integral required by unlocking the first entrance guard by the sending address recorded in the entrance guard control contract or not:
otherwise, unfreezing the first entrance guard integral, and failing to execute the first entrance guard unlocking transaction;
and if so, deducting the first entrance guard integral, and successfully executing the first entrance guard unlocking transaction so as to enable the entrance guard control device controlling the first entrance guard to control to unlock the first entrance guard after monitoring that the first entrance guard unlocking transaction is successfully executed.
In a second aspect, the present invention provides an access control method suitable for a user side, where an access control contract is configured on a block chain, and the method includes:
receiving authorized unlocking information comprising a first number;
responding to an unlocking instruction for unlocking a first entrance guard input by a current user, generating a first entrance guard integral transferring a first quantity of first entrance guard credits to an entrance guard control contract, requesting to unlock a first entrance guard unlocking transaction and sending the first entrance guard unlocking transaction to a block chain network, executing the block chain node through the entrance guard control contract, and verifying whether a sending address of the first entrance guard unlocking transaction is an authorization address of the first entrance guard recorded in the entrance guard control contract:
if not, the first entrance guard unlocking transaction fails to be executed;
if so, freezing the first entrance guard integral, and verifying whether the first number is the same as the unlocking integral number required by unlocking the first entrance guard by the sending address recorded in the entrance guard control contract:
otherwise, unfreezing the first entrance guard integral, and failing to execute the first entrance guard unlocking transaction;
and if so, deducting the first entrance guard integral, and successfully executing the first entrance guard unlocking transaction so as to enable the entrance guard control device controlling the first entrance guard to control to unlock the first entrance guard after monitoring that the first entrance guard unlocking transaction is successfully executed.
In a third aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a method of access control provided according to embodiments of the present invention.
In a fourth aspect, the present invention further provides a storage medium storing a computer program, where the computer program makes a computer execute the access control method according to the embodiments of the present invention.
The access control method, the access control equipment and the access control medium provided by the embodiments of the invention configure a mechanism for verifying whether a user requesting unlocking is authorized by a sending address of an access unlocking transaction and whether the user has the unlocking authority by the quantity of access points transferred by the access unlocking transaction in an access control contract on a chain, ensure that the authorized user can complete unlocking only under the condition that the authorized user has enough quantity and pays correct quantity of access points, and further realize that an access control party can conveniently and accurately control the access unlocking times of the authorized user by only sending a reasonable quantity of access points to the authorized user.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of an access control method according to an embodiment of the present invention.
Fig. 2 is a flowchart of another access control method according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of an access control method according to an embodiment of the present invention.
As shown in fig. 1, in this embodiment, the present invention provides an access control method suitable for a blockchain node, where a blockchain is configured with an access control contract, and the method includes:
s11: when a first entrance guard unlocking transaction of a first entrance guard is unlocked through an entrance guard control contract execution request, whether the transmission address of the first entrance guard unlocking transaction is the authorization address of the first entrance guard recorded in the entrance guard control contract is verified:
otherwise, step S12 is executed: the first entrance guard unlocking transaction fails to be executed;
if yes, go to step S13: freezing a first door unlock transaction transfers to a first door credit of a door control contract, and,
s14: verifying whether the number of the first entrance guard integration points is the same as the number of unlocking integration points required by unlocking the first entrance guard by the sending address recorded in the entrance guard control contract or not:
otherwise, step S15 is executed: unfreezing the first entrance guard integral, wherein the first entrance guard unlocking transaction fails to be executed;
if yes, go to step S16: and deducting the first entrance guard integral, wherein the first entrance guard unlocking transaction is successfully executed, so that the entrance guard control device for controlling the first entrance guard controls to unlock the first entrance guard after monitoring that the first entrance guard unlocking transaction is successfully executed.
The above scheme is exemplified by the example of a landlord authorizing a broker to enter a property to be rented or sold with a customer in a different place.
In real life, in the above scenario, the landlord can only give the key or password to the intermediary, so that the intermediary can freely enter and exit, and some intermediary with poor occupational literacy may illegally use the property before the property is rented or sold.
In this embodiment, when the middle office rents or sells a house, the client of the house generates a series of addresses (e.g., addr of the first person in the middle office)First of allAnd addr of the address of the middle person BSecond step) Configure the authorized address of the property's door a, and configure the number of unlocking credits (e.g., addr) required to unlock the door a at each authorized addressFirst of all26 unlocking credits, addr are requiredSecond step27 unlock credits required) and sent to the blockchain network.
Block chain link point jointReceiving, broadcasting, packaging and executing tx1, and recording the authorized address addr of the access control a in the access control contractFirst of allAnd addrSecond stepAnd addrFirst of allAnd addrSecond stepThe number of unlocking credits required for unlocking the access control a respectively.
When the agent A needs to visit the real estate with the client C, the agent A informs the landlord in advance, the landlord inputs an instruction for transferring 26 unlocking points to the agent A in the client, and the client of the landlord generates an addr address of the agent A in response to the instructionFirst of allTransfer transactions tx2 of 26 unlock credits are transferred and sent to the blockchain network.
The blockchain node receives, broadcasts, packages, and executes tx2, transferring 26 unlock credits to addrFirst of all
After receiving the unlocking credits, the user side of the first generates access control unlocking transactions tx3 for transferring 26 unlocking credits to an access control contract and requesting to unlock the access control a in response to the unlocking instruction of the first, and transmits tx3 to the block chain network.
In step S11, the block link point verifies the transmission address addr of tx3 when tx3 is executed by the access control contractFirst of allWhether the authorization address of the access control a recorded in the access control contract is:
if the verification fails, tx3 execution fails;
if the verification is successful, executing the step S13, and freezing 26 unlocking credits of the tx3 transfer to the entrance guard control contract in the contract; and the number of the first and second groups,
step S14 is executed to verify that the number of frozen gate inhibition credits (26) is in the gate inhibition control contract with the transmission address addr recorded in the transmission address addrFirst of allWhether the number of unlocking credits (26) required for unlocking the access control a is the same:
if not, go to step S15: unfreezing the frozen 26 entrance guard integrals, and failing to execute tx 3;
if the result is the same, step S16 is executed to deduct the frozen 26 entrance guard credits, and tx3 is executed successfully.
The entrance guard control equipment of entrance guard a monitors whether the latest block on the block chain records entrance guard unlocking transaction for unlocking the entrance guard a, and controls to unlock the entrance guard a when the situation that tx3 is successfully executed is monitored. At this point the nail can enter the property with the customer c.
When the second person needs to take the client to visit the house property, 27 unlocking points are transferred from the east to the second person to unlock the access control a through the same process, and the specific process is not repeated.
The landlord can transfer the unlocking credit for unlocking the entrance guard a for multiple times to the intermediary personnel according to actual requirements, for example, after the first provides evidence that 5 clients have the requirement for visiting the house property in a short period, the landlord can transfer 130 unlocking credits to the first for 5 times, so that the first can complete 5 times of unlocking.
The above embodiment exemplifies the above scheme by taking the example that the landlord authorizes the intermediary personnel to enter the property to be rented or sold with the client in a different place, and in more embodiments, the above scheme can be applied to different scenes in work or life, and the same technical effect can be achieved.
In the above embodiment, the unlocking integral quantities required for unlocking the same door control by each authorized address recorded in the door control contract are different; in other embodiments, the number of unlocking credits required for unlocking the same door lock at each authorized address recorded in the door access control contract may also be configured to be the same number.
According to the embodiment, whether the user requiring unlocking is authorized or not is verified by the sending address of the access unlocking transaction and whether the user has the unlocking authority or not is verified by the access point number transferred by the access unlocking transaction, and the unlocking can be completed only under the condition that the authorized user has enough number and pays the access point number of correct number is guaranteed, so that the access control party can conveniently and accurately control the access unlocking times of the authorized user only by issuing the access point number of reasonable number to the authorized user.
Fig. 2 is a flowchart of another access control method according to an embodiment of the present invention. The method illustrated in fig. 2 may be performed in conjunction with the method illustrated in fig. 1.
As shown in fig. 2, in this embodiment, the present invention further provides an access control method suitable for a user side, where an access control contract is configured on a block chain, and the method includes:
s21: receiving authorized unlocking information comprising a first number;
s23: responding to an unlocking instruction for unlocking a first entrance guard input by a current user, generating a first entrance guard integral transferring a first quantity of first entrance guard credits to an entrance guard control contract, requesting to unlock a first entrance guard unlocking transaction and sending the first entrance guard unlocking transaction to a block chain network, executing the block chain node through the entrance guard control contract, and verifying whether a sending address of the first entrance guard unlocking transaction is an authorization address of the first entrance guard recorded in the entrance guard control contract:
if not, the first entrance guard unlocking transaction fails to be executed;
if so, freezing the first entrance guard integral, and verifying whether the first number is the same as the unlocking integral number required by unlocking the first entrance guard by the sending address recorded in the entrance guard control contract:
otherwise, unfreezing the first entrance guard integral, and failing to execute the first entrance guard unlocking transaction;
and if so, deducting the first entrance guard integral, and successfully executing the first entrance guard unlocking transaction so as to enable the entrance guard control device controlling the first entrance guard to control to unlock the first entrance guard after monitoring that the first entrance guard unlocking transaction is successfully executed.
Preferably, the authorization unlocking information further comprises a transaction hash of the first transfer transaction; the first transfer transaction is a transaction generated by the first user end in response to the first user authorizing the current user to unlock for the second number of times, wherein the first user transfers a first access point to the current user, and the first access point is the product of the second number and the first number.
The access control principle of the method shown in fig. 2 can refer to the method shown in fig. 1, and is not described herein again.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 3, as another aspect, the present application also provides an apparatus 300 including one or more Central Processing Units (CPUs) 301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage section 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data necessary for the operation of the apparatus 300 are also stored. The CPU301, ROM302, and RAM303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
The following components are connected to the I/O interface 305: an input portion 306 including a keyboard, a mouse, and the like; an output section 307 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 308 including a hard disk and the like; and a communication section 309 including a network interface card such as a LAN card, a modem, or the like. The communication section 309 performs communication processing via a network such as the internet. A drive 310 is also connected to the I/O interface 305 as needed. A removable medium 311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 310 as necessary, so that a computer program read out therefrom is mounted into the storage section 308 as necessary.
In particular, according to an embodiment of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing any of the methods described above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 309, and/or installed from the removable medium 311.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (6)

1. An access control method, wherein an access control contract is configured on a blockchain, and the method is applicable to blockchain nodes, and the method comprises:
when a first entrance guard unlocking transaction of a first entrance guard is unlocked through the entrance guard control contract execution request, whether a sending address of the first entrance guard unlocking transaction is the authorization address of the first entrance guard recorded in the entrance guard control contract is verified:
if not, the first entrance guard unlocking transaction fails to be executed;
if so, freezing a first entrance guard integral transferred to the entrance guard control contract by the first entrance guard unlocking transaction, and verifying whether the number of the first entrance guard integral is the same as the number of unlocking integral required by unlocking the first entrance guard by the sending address recorded in the entrance guard control contract or not:
if not, unfreezing the first entrance guard integral, and the first entrance guard unlocking transaction fails to be executed;
and if so, deducting the first entrance guard integral, wherein the first entrance guard unlocking transaction is successfully executed so as to control the entrance guard control device of the first entrance guard to control unlocking of the first entrance guard after monitoring that the first entrance guard unlocking transaction is successfully executed.
2. The method of claim 1, wherein the number of unlocking credits required to unlock the same door entry at each authorized address recorded in the door entry control contract is different.
3. An access control method is characterized in that an access control contract is configured on a block chain, the method is suitable for a user side, and the method comprises the following steps:
receiving authorized unlocking information comprising a first number;
responding to an unlocking instruction for unlocking the first entrance guard input by a current user, generating a first entrance guard point for transferring the first number of first entrance guard points to the entrance guard control contract, requesting to unlock the first entrance guard unlocking transaction of the first entrance guard and sending the first entrance guard unlocking transaction to a block chain network, so that block chain nodes execute through the entrance guard control contract, and verifying whether the sending address of the first entrance guard unlocking transaction is the authorization address of the first entrance guard recorded in the entrance guard control contract:
if not, the first entrance guard unlocking transaction fails to be executed;
if so, freezing the first entrance guard integral, and verifying whether the first number is the same as the number of unlocking integral required by the first entrance guard unlocked by the sending address recorded in the entrance guard control contract or not:
if not, unfreezing the first entrance guard integral, and the first entrance guard unlocking transaction fails to be executed;
and if so, deducting the first entrance guard integral, wherein the first entrance guard unlocking transaction is successfully executed so as to control the entrance guard control device of the first entrance guard to control unlocking of the first entrance guard after monitoring that the first entrance guard unlocking transaction is successfully executed.
4. The method of claim 3, wherein the authorized unlock information further comprises a transaction hash of the first reconciled transaction;
the first transfer transaction is a transaction generated by the first user end in response to the first user authorizing the current user to unlock for a second number of times, wherein the first transfer transaction transfers a first gate inhibition point with the number being the product of the second number and the first number to the current user.
5. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-4.
6. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-4.
CN202010659388.1A 2020-07-09 2020-07-09 Access control method, device and storage medium Active CN111784879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010659388.1A CN111784879B (en) 2020-07-09 2020-07-09 Access control method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010659388.1A CN111784879B (en) 2020-07-09 2020-07-09 Access control method, device and storage medium

Publications (2)

Publication Number Publication Date
CN111784879A true CN111784879A (en) 2020-10-16
CN111784879B CN111784879B (en) 2022-04-05

Family

ID=72759370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010659388.1A Active CN111784879B (en) 2020-07-09 2020-07-09 Access control method, device and storage medium

Country Status (1)

Country Link
CN (1) CN111784879B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593888A (en) * 2012-08-14 2014-02-19 国网电力科学研究院 Intelligent IC card, terminal and intelligent card gray-lock application method
CN105915344A (en) * 2016-04-15 2016-08-31 重庆金瓯科技发展有限责任公司 Electronic key sharing service system for house renting
CN109272606A (en) * 2018-07-19 2019-01-25 天网互联科技(深圳)有限公司 A kind of smart lock monitoring equipment, method and storage medium based on block chain
CN109829767A (en) * 2019-03-29 2019-05-31 山东浪潮云信息技术有限公司 A kind of point reward exchanging system and method based on block chain technology
US10325428B1 (en) * 2018-05-23 2019-06-18 Bank Of America Corporation Access control using device location tracking and blockchains
US20190295026A1 (en) * 2018-03-26 2019-09-26 Carrier Corporation Determining room service times based on lock audit records
CN110599171A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Virtual asset processing method and device based on block chain network
CN110706379A (en) * 2019-09-20 2020-01-17 广州广电运通金融电子股份有限公司 Access control method and device based on block chain
CN110992038A (en) * 2020-03-03 2020-04-10 支付宝(杭州)信息技术有限公司 Transaction processing method, device and equipment
CN111355581A (en) * 2020-02-18 2020-06-30 杭州复杂美科技有限公司 Block chain access control method, equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593888A (en) * 2012-08-14 2014-02-19 国网电力科学研究院 Intelligent IC card, terminal and intelligent card gray-lock application method
CN105915344A (en) * 2016-04-15 2016-08-31 重庆金瓯科技发展有限责任公司 Electronic key sharing service system for house renting
US20190295026A1 (en) * 2018-03-26 2019-09-26 Carrier Corporation Determining room service times based on lock audit records
US10325428B1 (en) * 2018-05-23 2019-06-18 Bank Of America Corporation Access control using device location tracking and blockchains
CN109272606A (en) * 2018-07-19 2019-01-25 天网互联科技(深圳)有限公司 A kind of smart lock monitoring equipment, method and storage medium based on block chain
CN109829767A (en) * 2019-03-29 2019-05-31 山东浪潮云信息技术有限公司 A kind of point reward exchanging system and method based on block chain technology
CN110599171A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Virtual asset processing method and device based on block chain network
CN110706379A (en) * 2019-09-20 2020-01-17 广州广电运通金融电子股份有限公司 Access control method and device based on block chain
CN111355581A (en) * 2020-02-18 2020-06-30 杭州复杂美科技有限公司 Block chain access control method, equipment and storage medium
CN110992038A (en) * 2020-03-03 2020-04-10 支付宝(杭州)信息技术有限公司 Transaction processing method, device and equipment

Also Published As

Publication number Publication date
CN111784879B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN108959621B (en) Method, device, equipment and storage medium for realizing block chain network
US11276131B2 (en) Property management system utilizing a blockchain network
US11630808B2 (en) Proof of lottery (PoL) blockchain
CN108985774B (en) Excitation method, device, equipment and storage medium of block chain network
US11393266B2 (en) Blockchain configuration history for aircraft maintenance, modification, and activity tracking
US10554407B1 (en) Protocols for decentralized networks
DE60130617T2 (en) Private server with proxy for authentication and encryption instead of a subscriber terminal in electronic commerce transactions
CN100444544C (en) Authentication system, server, and authentication method and program
CA3057092C (en) Interlocking blockchains for aircraft part history and current aircraft configuration
CN109584082A (en) Settlement of insurance claim method, electronic device and storage medium based on block chain
EP3491611A1 (en) Blockchain-implemented method and system
CN109063049B (en) Account processing method, device, equipment and storage medium of block chain network
CN109190881A (en) A kind of data assets management method, system and equipment
US11449938B2 (en) Methods and systems for tracking unspent transaction output (UTXO) tokens in a distributed ledger technology-based network
CN108230052A (en) A kind of invoice issuing and method for uploading and system
CN110472391A (en) Data access method and device, storage medium, electronic device
Yang et al. CVEM: A cross-chain value exchange mechanism
CN109801418A (en) User autonomous controllable fining authorization management method and device
CN111784879B (en) Access control method, device and storage medium
US11245528B1 (en) Protocols for decentralized networks
CN115983853A (en) Client side green electricity application service method and system based on block chain and electronic equipment
CN116415955A (en) Cross-chain transaction method and system based on combination of hash locking and notary
CN113918645A (en) Heterogeneous asset transaction system and method based on block chain and computer device
CN112163917A (en) Bill processing method, device, medium and electronic equipment based on block chain
CN111242708A (en) Ethernet-based leasing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant