CN117527177A - Block chain-based data processing method, device, equipment and storage medium - Google Patents

Block chain-based data processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN117527177A
CN117527177A CN202311438361.XA CN202311438361A CN117527177A CN 117527177 A CN117527177 A CN 117527177A CN 202311438361 A CN202311438361 A CN 202311438361A CN 117527177 A CN117527177 A CN 117527177A
Authority
CN
China
Prior art keywords
target object
network
target
access
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311438361.XA
Other languages
Chinese (zh)
Inventor
黄杨峻
王宗友
朱耿良
刘区城
聂凯轩
时一防
廖志勇
刘汉卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202311438361.XA priority Critical patent/CN117527177A/en
Publication of CN117527177A publication Critical patent/CN117527177A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a data processing method, a device, equipment and a storage medium based on a blockchain technology, wherein the method comprises the following steps: receiving a network access request sent by a target object; the network access request is used for requesting to access the target network, and the network access request carries an object identifier of the target object; responding to a network access request, and acquiring a digital identity identifier of a target object in a blockchain according to an object identifier of the target object; under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object according to the digital identity identifier of the target object; providing data interaction service for the target object according to the authorized access information corresponding to the target object; the security of the target network can be improved.

Description

Block chain-based data processing method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of blockchain technologies, and in particular, to a blockchain-based data processing method, apparatus, device, and storage medium.
Background
In the existing communication scenario, when a user wants to access a communication service network through a terminal device used by the user to use a communication service provided by the communication service network, for example, wants to access a communication service network provided by a place such as a mall, a train station, a school, etc., a password configured for the communication service network is generally required to be input in the terminal device. The communication service network allows the corresponding user to access the communication service network through the terminal equipment under the condition that the password submitted by the user through the terminal equipment is verified to be consistent with the configured password. Under the access mode, because the user accesses the communication service network by submitting the password configured for the communication service network, when the user generates abnormal behavior in the communication service network, the communication service network cannot timely trace back to the corresponding user, which leads to the security of the communication service network being threatened.
Disclosure of Invention
The embodiment of the application provides a data processing method, device, equipment and storage medium based on a blockchain, which can improve the security of a target network.
In one aspect, an embodiment of the present application provides a data processing method based on a blockchain, where the method includes:
receiving a network access request sent by a target object; the network access request is used for requesting to access a target network, and the network access request carries an object identifier of the target object;
responding to the network access request, and acquiring a digital identity identifier of the target object in the blockchain according to the object identifier of the target object;
under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object according to the digital identity identifier of the target object;
and providing data interaction service for the target object according to the authorized access information corresponding to the target object.
In one aspect, an embodiment of the present application provides a data processing method based on a blockchain, where the method includes:
displaying a network information page; the network information page includes: node information of each scanned wireless access node;
Responding to the selection operation of the node information of the target wireless access node in the network information page, and displaying the network access mode supported by the target wireless access node;
if the network access mode selected from the displayed network access modes is an access mode for performing network access based on the digital identity identifier of the target object in the blockchain, generating a network access request aiming at the digital identity identifier of the target object, and sending the network access request to a network management node of a target network to which the target wireless access node belongs;
the network access request is used for requesting the network management node to configure authorization access information for the target object after acquiring the digital identity identifier of the target object so as to control the target wireless access node to provide data interaction service for the target object.
In one aspect, an embodiment of the present application provides a blockchain-based data processing device, including:
the communication unit is used for carrying out communication interaction;
the processing unit is used for receiving a network access request sent by the target object; the network access request is used for requesting to access a target network, and the network access request carries an object identifier of the target object; responding to the network access request, and acquiring a digital identity identifier of the target object in the blockchain according to the object identifier of the target object; under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object according to the digital identity identifier of the target object; and providing data interaction service for the target object according to the authorized access information corresponding to the target object.
In one aspect, an embodiment of the present application provides a blockchain-based data processing device, including:
the communication unit is used for carrying out communication interaction;
the processing unit is used for displaying a network information page; the network information page includes: node information of each scanned wireless access node; responding to the selection operation of the node information of the target wireless access node in the network information page, and displaying the network access mode supported by the target wireless access node; if the network access mode selected from the displayed network access modes is an access mode for performing network access based on the digital identity identifier of the target object in the blockchain, generating a network access request aiming at the digital identity identifier of the target object, and sending the network access request to a network management node of a target network to which the target wireless access node belongs;
the network access request is used for requesting the network management node to configure authorization access information for the target object after acquiring the digital identity identifier of the target object so as to control the target wireless access node to provide data interaction service for the target object.
In one aspect, embodiments of the present application provide a computer device, the computer device including an input interface and an output interface, the computer device further including:
a processor and a computer storage medium;
the computer storage medium is used for storing a computer program;
the processor is used for running the computer program to realize the data processing method based on the block chain.
In one aspect, embodiments of the present application provide a computer storage medium storing a computer program adapted to be loaded by a processor and to perform the above-described blockchain-based data processing method.
In one aspect, embodiments of the present application provide a computer program product comprising a computer program stored in a computer storage medium; the processor of the computer device reads the computer program from the computer storage medium, and the processor executes the computer program to cause the computer device to execute the block chain based data processing method described above.
In this embodiment of the present invention, when receiving a network access request sent by a target object (i.e., a target terminal) and used for requesting access to the target network, a network management node of the target network may acquire a digital identifier of the target object in a blockchain, and when acquiring the digital identifier of the target object, configure authorized access information for the target object according to the digital identifier of the target object, and provide a data interaction service for the target object according to the authorized access information corresponding to the target object. The digital identity identifier of the target object can uniquely identify the user identity, the authorized access information is configured for the target object according to the digital identity identifier of the target object, and the data interaction service is provided, when the user uses the target object (namely the target terminal) to generate abnormal behaviors in the target network, the target network can trace back to the corresponding user in time according to the digital identity identifier of the target object, so that the safety of the target network is improved; moreover, the digital identity identifier of the target object is in the blockchain, is transparent in disclosure, and can ensure the safety of user data; in addition, in the process of accessing the target network, the user does not need to know the password configured for the target network offline, so that convenience is high, and user experience can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1a is a schematic diagram of a data processing system according to an embodiment of the present application;
fig. 1b is a schematic diagram of a target network accessing the internet according to an embodiment of the present application;
FIG. 1c is a schematic diagram of another data processing system according to an embodiment of the present application;
FIG. 1d is a schematic diagram illustrating interactions when implementing a data processing scheme according to an embodiment of the present application;
FIG. 2 is a flow chart of a data processing method based on a blockchain according to an embodiment of the present application;
FIG. 3 is a flow chart of another method for processing data based on blockchain according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a structure of recording data according to an embodiment of the present application;
FIG. 5 is a flow chart of yet another data processing method based on blockchain provided in an embodiment of the present application;
Fig. 6 is a schematic diagram of an access trigger page according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a block chain based data processing apparatus according to an embodiment of the present application;
FIG. 8 is a schematic diagram of another block chain based data processing apparatus according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Blockchain (Blockchain) is a novel application mode of computer technologies such as distributed data storage, peer-to-Peer transmission (Peer-to-Peer transmission), consensus mechanism, encryption algorithm and the like; essentially, the data base is a decentralized database, which is a series of data blocks (i.e., blocks) generated by the association of cryptography; each data block (block) contains information (i.e. data) of a batch of network transactions, which is used for verifying the validity (i.e. anti-counterfeiting) of the information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The blockchain underlying platform may include processing modules such as object management, basic services, smart contracts, and operational administration. The object management module is responsible for identity information management of all blockchain participants, including maintenance of public and private key generation (account management), key management, maintenance of corresponding relation between real identities of objects and blockchain addresses (authority management), etc., and under the condition of authorization, supervision and audit of transaction conditions of certain real identities, and provision of rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain link point equipment (also called node equipment or nodes) for maintaining a block chain, is used for verifying the validity of a service request, recording the service request on a storage after the valid request is identified, and for a new service request, the basic service module firstly analyzes interface adaptation and performs authentication processing (interface adaptation), encrypts service information (identification management) through an identification algorithm, and transmits the encrypted service information to a shared account book (network communication) in a complete and consistent manner and records and stores the service information; the intelligent contract module is responsible for registering and issuing contracts, triggering contracts and executing contracts, a developer can define contract logic through a certain programming language, issue the contract logic to a blockchain (contract registering), invoke keys or other event triggering execution according to the logic of contract clauses to complete the contract logic, and simultaneously provide a function of registering contract upgrading; the operation supervision module is mainly responsible for deployment in the product release process, modification of configuration, contract setting, cloud adaptation and visual output of real-time states in product operation, for example: alarming, monitoring network conditions, monitoring node equipment health status, etc. The platform product service layer provides basic capabilities and implementation frameworks of typical applications, and developers can complete the blockchain implementation of business logic based on the basic capabilities and the characteristics of the superposition business. The application service layer provides the application service based on the block chain scheme to the business participants for use.
Based on the foregoing description, embodiments of the present application provide a blockchain-based data processing scheme that may be executed by a network management node in a target network, where the scheme, when executed by the network management node in the target network, generally includes the following procedures: the network management node responds to the network access request under the condition that the network management node receives the network access request sent by the target object and used for requesting to access the target network, and obtains a digital identity identifier of the target object in the blockchain according to the object identifier of the target object carried by the network access request; under the condition that the network management node acquires the digital identity identifier of the target object, configuring authorized access information for the target object according to the digital identity identifier of the target object; and providing data interaction service for the target object according to the authorized access information corresponding to the target object.
The target object may be a terminal device (for convenience of explanation, also referred to as a target terminal) requesting to join the target network, and the target terminal may be a terminal device supporting wireless communication, for example, may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., which is not limited in this embodiment. In one possible implementation, the target object (i.e., the target terminal) may download and install a resource client, where the resource client may be used to implement a resource management service function, and based on the resource management service function, implement a communication connection with an decentralized application (including a smart contract) deployed in the blockchain, where the resource client is a tool for managing and storing digital resources (i.e., digital assets), for example, may transfer digital resources to other accounts based on the resource client, and may also, for example, receive digital resources transferred to other accounts based on the resource client; the resource client supports the generation of an on-chain address for a user of the target terminal (referred to as the target user for ease of illustration) for receiving and transmitting digital assets, and the resource client can be used to generate a digital identity for an object, where the object can be any entity, such as a person, organization, device, etc. Wherein the digital identity identifier is an identifier that may be used to identify and verify identities in blockchain and distributed systems, which may be used to uniquely identify an entity (e.g., a person, organization, device, etc.) and to verify identities of the respective entities, e.g., the digital identity identifier may be an off-center identity identifier DID (Decentralized Identifier), and the DID may be used to uniquely identify an entity and to verify off-center identities of the respective entities.
The target user can apply for a digital identity identifier through the resource client installed by the target terminal, in other words, the target user can apply for a digital identity identifier which can be used for uniquely identifying the target user through the resource client installed by the target terminal, so as to provide the applied digital identity identifier under the condition that the identity information of the target user needs to be provided; the digital identifier applied by the target user can be stored in the blockchain, and is disclosed and transparent, for example, the digital identifier applied by the target user can be stored in the blockchain based on the on-chain address of the target user, then when the digital identifier applied by the target user needs to be searched from the blockchain, the digital identifier can be searched based on the on-chain address of the target user, for example, the mapping relationship between the digital identifier applied by the target user and the on-chain address of the target user can be stored in the blockchain, and then the digital identifier can be searched based on the mapping relationship. Based on this, the digital identifier of the target object mentioned in the embodiments of the present application specifically refers to: the digital identifier obtained by the target user through the resource client application is used for uniquely identifying the target user, and correspondingly, the object identification of the target object can be: the resource client generates an on-chain address for the target user, i.e., the on-chain address of the target user.
The target network may be a communication service network capable of providing a communication service (i.e., a data interaction service), and the target network may at least include a network management node and a plurality of radio Access nodes, where a radio Access node (AP) is also referred to as a radio Access Point or a radio Access node, which is a network device, and may be used to implement related functions such as data transmission, radio network coverage, and the like, and the network management node is a network device, and may be used to implement related functions such as management of the radio Access node and network Access management, and the like.
Based on the foregoing description, the embodiments of the present application provide a data processing system, referring to fig. 1a, which is a schematic structural diagram of a data processing system provided in the embodiments of the present application, where the data processing system may include a target network 10, a target object 11 (i.e. a target terminal 11), and a blockchain 12. The target network 10 may include at least a network management node 101 and a plurality of wireless access nodes 102, and may further include a network transmission node 103, where the network transmission node 103 is a network device that may be used to connect terminal devices or other network devices to implement data transmission and sharing, and may be, for example, a switch.
In a possible implementation manner, the target network 10 may be a Mesh network (i.e. a WIreless Mesh network), where Mesh is a distributed network topology structure, each node in the Mesh network may be connected to other nodes, the Mesh network is an ad hoc network, unlike a traditional star or bus network, the nodes in the Mesh network may directly communicate with each other, without going through a central node or a hub, and the Mesh network is often used in the fields of internet of things, WIFI (WIreless-Fidelity) communication in a large-scale location, etc., which is currently relatively common in a large-scale location (such as a school campus network, a corporate network, a mall, and a high-speed rail station), where (communication) connection exists in the target network 10 may be connected based on a wired or WIreless manner.
Any wireless access node 102 may provide wireless network coverage and support connection with the target object 11 in a wireless-based manner, and the target object 11 may access the target network 10 by connecting with any wireless access node 102 to use a communication service provided by the target network 10, for example, the target object 11 may use network resources of the target network 10 and access the internet via the target network 10, for example, the target object 11 may send traffic data to other terminal devices accessing the internet via the target network 10, and for example, the target object 11 may receive traffic data sent by other terminal devices accessing the internet via the target network 10; it will be appreciated that the target object 11 also supports direct access to the internet, for example, traffic data in a blockchain may be obtained via the internet. When the target object 11 performs data transmission via the target network 10, the data transmission may be implemented based on the wireless access node 102 and the network transmission node 103 to which the target object 11 is connected; for example, in the process that the target object 11 sends traffic data to other terminal devices accessing the internet via the target network 10, the target object 11 may send the traffic data to be sent to the wireless access node 102 to which the target object is accessed, the wireless access node 102 may send corresponding traffic data to the network transmission node 103, and the network transmission node 103 sends corresponding traffic data to other terminal devices accessing the internet via the internet; in another example, in the process that the target object 11 receives traffic data sent by other terminal devices accessing the internet through the target network 10, after the network transmission node 103 receives the traffic data to be sent to the target object 11, the corresponding traffic data may be sent to the wireless access node 102 to which the target object accesses, and the wireless access node 102 sends the corresponding traffic data to the target object 11.
Optionally, the network transmission node 103 may access the internet in a direct or indirect manner, which is not limited in this embodiment of the present application, for example, when the network transmission node 103 is a switch, the network may be indirectly accessed based on a cat, see fig. 1b, which is a schematic diagram of accessing the internet to a target network provided in the embodiment of the present application; a light cat is a network device used for connecting to a home or enterprise network, and can convert optical fiber signals into electrical signals used for connecting to computers, routers or other network devices.
The blockchain-based data processing scheme provided in the embodiment of the present application, when cooperatively executed by each device in the data processing system shown in fig. 1a, generally includes the following procedures: the target object 11 may send a network access request to the network management node 101 in the target network 10; the network access request is used for requesting to access the target network 10, and the network access request carries the object identifier of the target object; the network management node 101 may receive a network access request sent by the target object 11; in response to the network access request, acquiring a digital identity identifier of the target object in the blockchain 12 according to the object identifier of the target object; under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object 11 according to the digital identity identifier of the target object; and providing data interaction service for the target object 11 according to the authorized access information corresponding to the target object.
Alternatively, the process performed by the network management node 101 may be cooperatively performed by a plurality of network management sub-nodes, referring to fig. 1c, which is a schematic structural diagram of another data processing system provided in this embodiment of the present application, where the process performed by the network management node 101 is cooperatively performed by a first network management sub-node 1011 and a second network management sub-node 1012, where the first network management sub-node 1011 is a network device and may be used to implement functions related to management of a wireless Access node and network Access management, for example, may be an Access controller (Access Control, AC), and the second network management sub-node 1012 is a network device and may be used to implement a process related to obtaining a digital identity identifier of a target object. Referring to fig. 1d, an interaction schematic diagram when implementing a data processing scheme provided in an embodiment of the present application may include the following flows: s101, the target object 11 may send a network access request to the second network management sub-node 1012 in the target network 10; s102, the second network management sub-node 1012 can receive a network access request sent by the target object 11, and respond to the network access request to acquire the digital identity identifier of the target object in the blockchain 12 according to the object identifier of the target object; s103, the second network management sub-node 1012 transmits the digital identifier of the target object to the first network management sub-node 1011 when acquiring the digital identifier of the target object. S104, the first network management sub-node 1011 configures authorized access information for the target object 11 according to the digital identity identifier of the target object; s105, providing data interaction service for the target object 11 according to the authorized access information corresponding to the target object.
Based on the above description, the digital identifier of the target object can uniquely identify the user identity, and according to the digital identifier of the target object, the target object is configured with authorized access information and provides data interaction service, and when the user uses the target object (i.e. the target terminal) to generate abnormal behavior in the target network, the target network can trace back to the corresponding user in time according to the digital identifier of the target object, thereby improving the security of the target network.
It should be noted that, in the present application, the collection and processing of related data (such as the object identifier of the target object, the digital identifier of the target object, etc.) should be strictly according to the requirements of legal regulations during the application of the example, obtain the informed consent or independent consent of the personal information body, and develop the subsequent data use and processing behavior within the legal regulations and the authorized range of the personal information body.
Based on the above description, the embodiment of the present application provides a data processing method based on a blockchain, referring to fig. 2, which is a schematic flow diagram of the data processing method based on the blockchain provided in the embodiment of the present application; the blockchain-based data processing method is performed by a network management node in the target network, for example, by the network management node 101 shown in fig. 1a, and may include the following steps S201 to S204:
S201, receiving a network access request sent by a target object; the network access request is used for requesting to access the target network, and the network access request carries the object identification of the target object.
Wherein, the target object may be a terminal device (for convenience of explanation, also referred to as a target terminal) requesting to join the target network, and the object identifier of the target object may be identification information of a digital identity identifier for searching the target object from the blockchain; wherein a digital identity identifier is an identifier that may be used to identify and verify identity in blockchain and distributed systems, which may be used to uniquely identify an entity (e.g., a person, organization, or device, etc.) and to verify the identity of the corresponding entity, e.g., the digital identity identifier may be an off-center identity identifier DID (Decentralized Identifier).
In one possible implementation, the target object (i.e., target terminal) may download and install a resource client that supports the generation of an on-chain address for the user of the target terminal (referred to as the target user for ease of illustration) for receiving and transmitting digital assets, and the resource client may be used to generate a digital identity identifier for the object, i.e., the resource client supports the target user to apply for the digital identity identifier for providing the digital identity identifier to which it applies in the event that it is required to provide its identity information; the digital identifier applied by the target user may be stored in the blockchain, publicly transparent, e.g., the digital identifier applied by the target user may be stored in the blockchain based on the on-chain address of the target user. Based on this, the digital identifier of the target object mentioned in the embodiments of the present application specifically refers to: the digital identifier obtained by the target user through the resource client application is used for uniquely identifying the target user, and correspondingly, the object identification of the target object can be: the resource client generates an on-chain address for the target user, i.e., the on-chain address of the target user. Of course, if the digital identifier applied by the target user is not stored in the blockchain based on the address on the chain of the target user, but is stored in the blockchain based on other identification information, then the object identifier of the target object should be the identification information that can be used to find the digital identifier applied by the target user from the blockchain, for example, the storage index of the digital identifier when stored in the blockchain, the block height of the corresponding block when stored in the blockchain, and so on, and the embodiments of the present application will be described later by taking the address on the chain of the target user as an example.
S202, responding to a network access request, and acquiring a digital identity identifier of a target object in a blockchain according to an object identifier of the target object.
In a possible implementation manner, when the network management node obtains the digital identifier of the target object in the blockchain according to the object identifier of the target object, the digital identifier of the target object may be obtained from the blockchain according to the object identifier of the target object, and specifically may be obtained by requesting the blockchain with the object identifier of the target object.
S203, under the condition that the digital identity identifier of the target object is acquired, configuring authorized access information for the target object according to the digital identity identifier of the target object.
Wherein the authorized access information configured for the target object may be used to indicate: allowing the target object to access the target network and allowing the target object to access the target network through which wireless access node. In one possible implementation, the authorized access information configured for the target object may include: identity information of a target object and node identification of a wireless access node required to be used by the target object to access a target network; based on the above, when the network management node configures the authorized access information for the target object according to the digital identity identifier of the target object, the network management node can construct and obtain the authorized access information corresponding to the target object based on the digital identity identifier of the target object and the node identifier of the target wireless access node, wherein the digital identity identifier of the target object is used as the identity information of the target object, and the node identifier of the target wireless access node is used as the node identifier of the wireless access node required by the target object to access the target network; the node identifier of the target wireless access node may be identification information that may be used to uniquely identify the target wireless access node.
In another possible implementation, the authorized access information configured for the target object may further include: traffic forwarding policies for the target object, wherein the traffic forwarding policies for the target object may be used to indicate: a strategy which is required to be adopted when the flow data of the target object is transmitted through the target network; based on the above, when the network management node configures the authorized access information for the target object according to the digital identifier of the target object, the network management node can determine the traffic forwarding policy for the target object, and based on the digital identifier of the target object, the node identifier of the target wireless access node and the traffic forwarding policy, the authorized access information corresponding to the target object is constructed. In one possible implementation, when determining the traffic forwarding policy for the target object, the network management node may determine a default traffic forwarding policy as the traffic forwarding policy for the target object, where the default traffic forwarding policy may be configured according to specific requirements.
In another possible implementation, the authorized access information configured for the target object may further include: the address information of the target object may include, for example, a media access control address (i.e., MAC address) of the target object.
S204, providing data interaction service for the target object according to the authorized access information corresponding to the target object.
After the authorized access information is configured for the target object, the target object is allowed to access the target network, and specifically is allowed to connect with the wireless access node indicated by the node identifier in the authorized access information corresponding to the target object, so as to access the target network. In a possible implementation manner, a process that the network management node provides a data interaction service for a target object according to authorized access information corresponding to the target object may include: searching a node identifier from the authorized access information corresponding to the target object, and triggering the connection between the wireless access node indicated by the searched node identifier and the target object to control the corresponding wireless access node to provide data interaction service for the target object. In a possible implementation manner, the network management node triggers to establish a connection between the wireless access node indicated by the found node identifier and the target object, and can inform the wireless access node indicated by the found node identifier to establish a connection with the target object, for example, authorization access information corresponding to the target object can be issued to the wireless access node indicated by the found node identifier, so that the corresponding wireless access node provides data interaction service for the target object. In one possible implementation manner, if the authorized access information corresponding to the target object includes a traffic forwarding policy for the target object, and the wireless access node to which the target object is accessed receives the authorized access information corresponding to the target object issued by the network management node, the wireless access node to which the target object is accessed may provide a data interaction service for the target object according to the traffic forwarding policy for the target object.
In a possible implementation manner, after the connection between the wireless access node indicated by the found node identifier and the target object is established, the network management node may send an access success notification to the target object to notify the target user that the access to the target network is successful, where the content and format of the access success notification may be set according to specific requirements, for example, may be a text format, an image format, a voice format, and the embodiment of the present application is not limited.
In one possible implementation, the data interaction services provided by the wireless access node to which the target object accesses for the target object include at least services for transmitting traffic data for the target object. For example, if the traffic data for the target object is: the target object can send the flow data to be sent to the wireless access node to which the target object is connected, the wireless access node can send the corresponding flow data to the network transmission node, and the network transmission node sends the corresponding flow data out through the internet, for example, to other terminal equipment connected to the internet; as another example, if the traffic data for the target object is: and after receiving the flow data to be sent to the target object, the network transmission node can send the corresponding flow data to a wireless access node accessed by the target object, and the wireless access node sends the corresponding flow data to the target object. The network transmission node may also provide a data interaction service for the target object based on the authorized access information corresponding to the target object, when the network transmission node receives the traffic data to be sent by the target object, the network transmission node may search the authorized access information corresponding to the target object, if the traffic data to be sent by the target object can be searched, the network transmission node may search the authorized access information corresponding to the target object after receiving the traffic data to be sent to the target object, and determine the wireless access node (i.e., the wireless access node indicated by the node identifier included in the authorized access information corresponding to the target object) to which the target object is connected from the searched authorized access information corresponding to the target object, and send the corresponding traffic data to the wireless access node to which the target object is connected.
In this embodiment of the present invention, when receiving a network access request sent by a target object (i.e., a target terminal) and used for requesting access to the target network, a network management node of the target network may acquire a digital identifier of the target object in a blockchain, and when acquiring the digital identifier of the target object, configure authorized access information for the target object according to the digital identifier of the target object, and provide a data interaction service for the target object according to the authorized access information corresponding to the target object. The digital identity identifier of the target object can uniquely identify the user identity, the authorized access information is configured for the target object according to the digital identity identifier of the target object, and the data interaction service is provided, when the user uses the target object (namely the target terminal) to generate abnormal behaviors in the target network, the target network can trace back to the corresponding user in time according to the digital identity identifier of the target object, so that the safety of the target network is improved; moreover, the digital identity identifier of the target object is in the blockchain, is transparent in disclosure, and can ensure the safety of user data; in addition, in the process of accessing the target network, the user does not need to know the password configured for the target network offline, so that convenience is high, and user experience can be improved.
Based on the above description, the embodiment of the present application provides another data processing method based on a blockchain, referring to fig. 3, which is a schematic flow diagram of another data processing method based on a blockchain provided by the embodiment of the present application; the blockchain-based data processing method may be performed by a network management node in the target network, for example, by the network management node 101 shown in fig. 1a, and may include the following steps S301-S306:
s301, receiving a network access request sent by a target object; the network access request is used for requesting to access the target network, and the network access request carries the object identification of the target object.
The related process of step S301 is similar to the related process of step S201, and the target object may be a terminal device (for convenience of explanation, also referred to as a target terminal) that requests to join the target network, and the object identifier of the target object may be identification information of a digital identifier for searching the target object from the blockchain, where the digital identifier of the target object specifically refers to: the digital identifier obtained by the target user through the resource client application, namely the object identifier used for uniquely identifying the target user, the object identifier of the target object may be: the resource client generates an on-chain address for the target user, i.e., the on-chain address of the target user.
In a possible implementation manner, the target network comprises a plurality of wireless access nodes, and the network access request is specifically used for requesting to access the target network through a target wireless access node in the plurality of wireless access nodes, wherein the target wireless access node is a wireless access node of which the target object requests to access; for example, the target object may display node information of the wireless access nodes that it scans, and the target user may select one of the wireless access nodes to request access according to the displayed node information of the wireless access nodes.
S302, responding to a network access request, and acquiring a digital identity identifier of a target object in a blockchain according to an object identifier of the target object.
In a possible implementation manner, when the network management node obtains the digital identifier of the target object in the blockchain according to the object identifier of the target object, the digital identifier of the target object may be obtained from the blockchain according to the object identifier of the target object, and specifically may be obtained by requesting the blockchain with the object identifier of the target object.
In another possible implementation manner, the network access request may further carry a digital identifier of the target object, and signature information obtained by signing the digital identifier of the target object with a private key of the target object, where the digital identifier of the target object carried by the network access request is obtained by the target object from the blockchain according to the object identifier of the target object; based on the above, when the network management node obtains the digital identity identifier of the target object in the blockchain according to the object identifier of the target object, the public key of the target object can be obtained according to the object identifier of the target object; and carrying out signature verification processing on signature information carried by the network access request by adopting a public key of the target object, and taking the digital identity identifier obtained by the signature verification processing as the digital identity identifier of the target object after the signature verification is passed.
In a possible implementation, when the target object obtains the digital identifier of the target object from the blockchain according to the object identifier of the target object, the target object may be obtained by requesting the blockchain with the object identifier of the target object. The private key of the target object refers to: the private key possessed by the target user managed by the resource client, the public key of the target object means: a public key corresponding to a private key possessed by a target user managed by the resource client; the public key possessed by the target user may be stored in the blockchain such that devices that need to use the public key possessed by the target user may be obtained from the blockchain and the public key possessed by the target user may be stored in the blockchain based on the on-chain address of the target user; based on this, when the network management node obtains the public key of the target object according to the object identifier of the target object, the public key of the target object may be obtained from the blockchain according to the object identifier of the target object, and specifically may be obtained by requesting the blockchain with the object identifier of the target object.
In a possible implementation manner, when the target object signs the digital identity identifier of the target object by using the private key of the target object to obtain signature information, a specified hash function may be used to hash the digital identity identifier of the target object to obtain a hash result, and the hash result is encrypted by using the private key of the target object to obtain signature information. Based on the above, when the network management node adopts the public key of the target object to carry out signature verification processing on the signature information carried by the network access request, the public key of the target object can be adopted to decrypt the signature information carried by the network access request to obtain a decryption result, the designated hash function is adopted to carry out hash processing on the digital identity identifier carried by the network access request, the hash result obtained by the hash processing is compared with the decryption result, and if the comparison is consistent, the signature verification is confirmed to pass; the network management node adopts a public key of the target object to decrypt the signature information carried by the network access request, when a decryption result is obtained, the network access request can be indicated to be sent by a target user operation target object, and when the comparison of the network management node is consistent, the network management node can indicate that the digital identity identifier carried by the network access request is not tampered, so that when the network management node determines that the verification passes, the network management node can indicate that the digital identity identifier carried by the network access request is credible and is of the target user; based on the above, the network management node can use the digital identity identifier obtained by the label verification processing after the label verification is passed as the digital identity identifier of the target object, and the digital identity identifier obtained by the label verification processing is the digital identity identifier carried by the label verification after the label verification is passed through the network access request.
In a possible implementation manner, the signature information carried by the network access request may also be signature information obtained by signing the information carried by the network access request with a private key of the target object, for example, when the information carried by the network access request includes an object identifier of the target object and a digital identity identifier of the target object, the corresponding signature information may be obtained by signing the object identifier of the target object and the digital identity identifier of the target object; when the signature information carried by the network access request is the signature information obtained by signing the information carried by the network access request, the relevant processing procedure of the target object and the network management node is similar to the relevant processing procedure when the signature information carried by the network access request is the signature information obtained by signing the digital identity identifier of the target object, and details are not repeated here.
In another possible implementation manner, the network access request may carry an object identifier of the target object and signature information obtained by signing a digital identifier of the target object with a private key of the target object, where the signature information may be obtained by directly encrypting the digital identifier of the target object with the private key of the target object by the target object; based on the above, when the network management node obtains the digital identity identifier of the target object in the blockchain according to the object identifier of the target object, after obtaining the public key of the target object according to the object identifier of the target object, the public key of the target object is adopted to perform signature verification processing on the signature information carried by the network access request, when the signature information carried by the network access request can be decrypted by adopting the public key of the target object to obtain the digital identity identifier, the signature verification passing can be determined, and the digital identity identifier obtained by the signature verification processing is used as the digital identity identifier of the target object after the signature verification passing.
S303, under the condition that the digital identity identifier of the target object is acquired, according to the object identifier of the target object, acquiring record data maintained based on the object identifier of the target object from the blockchain.
In one possible implementation, the network management node may carry the object identification of the target object, and request to the blockchain to acquire record data maintained based on the object identification of the target object.
In one possible implementation, the record data maintained based on the object identification of the target object may be used for recording: after the target object is historically accessed into the communication service network, the target user carries out related information of digital asset transfer at a place served by the corresponding communication service network, the target object can count the related information of digital asset transfer when detecting the digital asset transfer and record the related information in recorded data, and it can be known that the collection processing of the related information of digital asset transfer should strictly acquire the informed consent or independent consent of the personal information main body according to the requirements of laws and regulations when the example is applied, and develop subsequent data use and processing behaviors within the authorized range of the laws and regulations and the personal information main body. That is, the record data is derived from transfer information generated by the target object upon detection of the digital asset transfer; the record data includes a plurality of asset record fields, each asset record field for recording location information when the digital asset transfer occurs and resource index information of the digital asset transfer when the digital asset transfer occurs; based on this, when the record data is generated by the target object, the target object may be used to perform the steps of: responding to the detected digital asset transfer event, and acquiring transfer information corresponding to the digital asset transfer event; extracting transfer receiver information from the transfer information, and determining position information when digital asset transfer occurs according to the transfer receiver information; determining a transfer amount from the transfer information, and determining the transfer amount as resource index information; and recording the determined position information and resource index information when the digital asset transfer occurs into the record data corresponding to the object identification of the target object. When the target object records the determined position information and resource index information when the digital asset transfer occurs into the record data corresponding to the object identifier of the target object, the target object can record the corresponding data request blockchain to be recorded into the record data corresponding to the object identifier of the target object in the blockchain.
The transfer information corresponding to the digital asset transfer event may be: information that may be used to indicate asset transfer conditions for a respective digital asset transfer event, the transfer information corresponding to the digital asset transfer event may include, but is not limited to: transfer recipient information, transfer amount, transfer time, wherein the transfer recipient information is related information that may be used to indicate the transfer recipient, for example, may include, but is not limited to: a name of the transfer receiver and a location identifier of a location where the transfer receiver is located; the place where the transfer receiver is located may be a place served by a communication service network to which the transfer receiver is connected. When the network management node determines the position information when the digital asset transfer occurs according to the transfer receiver information, the location identifier of the location where the transfer receiver is located, which is included in the transfer receiver information, can be determined as the position information when the digital asset transfer occurs. For example, if the location served by the target network is location a, after the target object accesses the target network, the target user performs digital asset transfer at location a, specifically, transfers 5 digital assets to the organization A1 accessing the target network, and then the transfer receiver of this asset transfer is organization A1, and the location information and the resource index information recorded in the record data of this asset transfer are respectively: sites a, 5. Referring to fig. 4, a schematic structural diagram of record data provided in this embodiment of the present application is maintained according to an address on a chain of a target user (i.e. an object identifier of a target object), where information recorded in one asset recording field may be indicated by a 401 mark, resource index information recorded in another asset recording field may be indicated by a 402 mark, information recorded in another asset recording field may be indicated by a 403 mark, information recorded in another asset recording field may be indicated by a 30 resource index, and it may indicate that the target user has performed two digital asset transfers at the a location a, respectively transferred 5 digital assets and 10 digital assets, and performed one digital asset transfer at the location B, and transferred 30 digital assets.
In another possible embodiment, the record data may include an access record field: the access record field can be used for recording the historical access times of the target object to the target network and the flow consumed by each historical access, and further can be used for recording the historical access times of the target object to the communication service network and the flow consumed by each historical access; for example, if the target object historically accesses the communication service network 1 and the communication service network 2, the access record field may be used to record the number of accesses of the target object to the communication service network 1 and the traffic consumed by each access, and may be used to record the number of accesses of the target object to the communication service network 2 and the traffic consumed by each access. The information to be recorded in the access record field may be carried by the target object and request the blockchain to record in record data corresponding to the object identifier of the target object in the blockchain, or may be carried by a network management node of the communication service network to which the history of the target object is accessed each time and request the blockchain to record in record data corresponding to the object identifier of the target object in the blockchain, which is not limited in the embodiment of the present application.
In another possible embodiment, the record data may also be stored under the blockchain, for example, the record data may be generated by the target object and stored in a local storage space or a remote storage space of the target object, based on which acquisition may be requested from the corresponding storage space when acquisition of the record data is required. In another possible embodiment, the record data may be stored in the blockchain in an encrypted manner, and after the encrypted record data is obtained, the corresponding fields of the record may be decrypted.
S304, determining a flow forwarding strategy for the target object according to the acquired record data.
Wherein the traffic forwarding policy for the target object may be used to indicate: the policy to be adopted when the traffic data of the target object is transmitted through the target network may be specified in the traffic forwarding policy of the target object, for example, how much bandwidth is allocated to the target object, and the permission range allocated to the target object may be specified in the traffic forwarding policy of the target object, for example, the number of wireless access nodes to which the target object is allowed to access, which wireless access nodes in the target network to which the target object is allowed to access, which websites to which the target object is allowed to access using the target network, and so on.
In one possible embodiment, the record data is derived from transfer information generated by the target object upon detection of the digital asset transfer; the record data includes a plurality of asset record fields, each asset record field for recording location information when the digital asset transfer occurs and resource index information of the digital asset transfer when the digital asset transfer occurs; when the network management node determines a flow forwarding strategy for a target object according to the acquired record data, the network management node can determine the position identifier of the position to which the target wireless access node belongs; and determining resource index information corresponding to the position of the target wireless access node from the recorded data according to the position identification, and determining a flow forwarding strategy aiming at the target object according to the acquired resource index information. The location identifier of the location to which the target wireless access node belongs, namely the location identifier of the location served by the target network to which the target wireless access node belongs; based on this, taking the record data shown in fig. 4 as an example, if the communication service network 1 provides the service for the location a and the communication service network 2 provides the service for the location B, if the target network is the communication service network 1, the obtained resource index information may include the resource index information corresponding to the location a recorded in the asset record field shown as 401 being 5, and the resource index information corresponding to the location a recorded in the asset record field shown as 402 being 10, and if the target network is the communication service network 2, the obtained resource index information may include the resource index information corresponding to the location B recorded in the asset record field shown as 403 being 30.
In a possible implementation manner, when the network management node determines the traffic forwarding policy for the target object according to the obtained resource index information, the network management node may count the obtained resource index information and determine the traffic forwarding policy for the target object according to the counted result; correspondingly, the resource quantity of the network resource allocated for the target object and specified in the determined flow forwarding strategy is positively correlated with the statistical result, and the authority range allocated for the target object and specified in the determined flow forwarding strategy is positively correlated with the statistical result; that is, the network management node may provide more network resources, and a greater scope of rights, for users who historically transfer more digital assets in the locale served by the target network. In another possible implementation manner, the target object may record the transfer time when the digital asset transfer occurs in the record data, based on which, the network management node may further determine, from the record data, the transfer time corresponding to the location to which the target wireless access node belongs according to the location identifier of the location to which the target wireless access node belongs, and determine the traffic forwarding policy for the target object according to the obtained resource index information and the obtained transfer time; for example, the network management node may count the resource index information acquired in the target historical period according to the acquired transfer time, and determine the traffic forwarding policy for the target object according to the statistics result corresponding to the target historical period; accordingly, the determined resource amount of the network resource allocated to the target object and specified in the flow forwarding policy is positively correlated with the statistics result corresponding to the target historical time period, the determined authority range allocated to the target object and specified in the flow forwarding policy is positively correlated with the statistics result corresponding to the target historical time period, and the target historical time period can be set according to specific requirements, for example, the start-stop time of the target historical time period can be set according to specific requirements.
In one possible embodiment, the record data includes an access record field: the access record field is used for recording the historical access times of the target object to the target network and the flow consumed by each time of historical access; when the network management node determines the flow forwarding strategy for the target object according to the acquired record data, the network management node can determine the average flow consumed by the historical single access of the target object according to the access times of the target object and the flow consumed by the historical single access; determining a flow forwarding strategy for the target object according to the average flow consumed by the historical single access of the target object; the resource amount of the network resource allocated to the target object specified in the traffic forwarding policy is positively correlated with the average traffic, and the authority range allocated to the target object specified in the determined traffic forwarding policy is positively correlated with the average traffic.
In a possible implementation manner, if the record data includes both an asset record field and an access record field, the network management node may determine, according to the asset record field and the access record field, a traffic forwarding policy for the target object, for example, the resource amount of the network resource allocated to the target object determined according to the asset record field and the resource amount of the network resource allocated to the target object determined according to the access record field, set a corresponding weight, and integrate the resource amounts of the network resources determined respectively based on the weight correspondence, to obtain the resource amount specified in the traffic forwarding policy. Of course, the traffic forwarding policy for the target object may also be determined based on the asset record field alone, or based on the access record field alone.
In a possible implementation manner, if the network management node does not acquire the record data maintained based on the object identifier of the target object according to the object identifier of the target object under the condition that the digital identity identifier of the target object is acquired, the default traffic forwarding policy may be determined as the traffic forwarding policy for the target object; the default traffic forwarding policy may be configured according to specific requirements.
S305, based on the digital identity identifier of the target object, the node identifier of the target wireless access node and the flow forwarding strategy, the authorized access information corresponding to the target object is constructed.
The process of step S305 is similar to the process related to step S203, and will not be described herein.
S306, providing data interaction service for the target object according to the authorized access information corresponding to the target object.
The correlation process of step S306 is similar to that of step S204.
In a possible implementation manner, the target network includes a plurality of wireless access nodes, and the authorized access information corresponding to the target object includes: the method comprises the steps of accessing a node identifier of a wireless access node required to be used by a target object to a target network, and determining a flow forwarding strategy aiming at the target object according to the object identifier of the target object; the process that the network management node provides the data interaction service for the target object according to the authorized access information corresponding to the target object may further include: when receiving the flow data aiming at the target object, searching a node identifier and a flow forwarding strategy from the authorized access information corresponding to the target object; and according to the searched flow forwarding strategy, performing flow control on the wireless access node indicated by the searched node identifier to control the corresponding wireless access node to send the flow data of the target object to the target object, or controlling the corresponding wireless access node to receive the flow data of the target object and send the flow data of the target object to the network transmission node.
In a possible implementation manner, the target network includes a plurality of wireless access nodes, and the authorized access information corresponding to the target object includes: node identification of a wireless access node required to be used by a target object to access a target network; the network management node may also be used to perform the following procedure: receiving signal detection information sent by a plurality of reference wireless access nodes; reference to a radio access node means: a wireless access node capable of detecting a target object from a plurality of wireless access nodes, wherein signal detection information is used for indicating: signal strength between the corresponding reference wireless access node and the target object; selecting a wireless access node to be accessed from a plurality of reference wireless access nodes according to the signal strength indicated by the signal detection information of each reference wireless access node; updating the node identification in the authorized access information corresponding to the target object into the node identification of the wireless access node to be accessed, and triggering the establishment of the connection between the wireless access node to be accessed and the target object, so that data interaction service is provided for the target object according to the updated authorized access information; that is, the network management node supports the handover of the radio access node connected to the target object according to the signal strengths indicated by the signal probe information of the respective reference radio access nodes. The related process of triggering and establishing the connection between the wireless access node to be accessed and the target object is similar to the related process of triggering and establishing the connection between the wireless access node indicated by the searched node identifier by the network management node in the step S204, and is not described herein.
When the network management node selects a wireless access node to be accessed from a plurality of reference wireless access nodes according to the signal intensity indicated by the signal detection information of each reference wireless access node; in an optional implementation manner, a reference wireless access node with the strongest signal strength indicated by the signal detection information may be selected as a wireless access node to be accessed; in another optional implementation manner, reference wireless access nodes with signal strength greater than a signal strength threshold indicated by the signal detection information may be screened, and one reference wireless access node (for example, may be selected randomly) may be selected from the screened reference wireless access nodes, and used as a wireless access node to be accessed; in another optional implementation manner, the network management node may further obtain a node performance index of each reference wireless access node, and further may select, according to the signal strength indicated by the signal detection information of each reference wireless access node and the node performance index of each reference wireless access node, a wireless access node to be accessed from multiple reference wireless access nodes, so as to balance between the node performance and the signal strength, for example, preferably select, under the same signal strength, a reference wireless access node with better node performance as the wireless access node to be accessed, and preferably select, under the same node performance, a reference wireless access node with high signal strength as the wireless access node to be accessed; optionally, the node performance index of the wireless access node includes an index for measuring node performance of the wireless access node, which may include, but is not limited to: the total number of supported accesses by the wireless access node, the number of accessed wireless access nodes, and the ratio of the number of accessed wireless access nodes to the total number of supported accesses.
In one possible implementation, the network management node may also be used to perform the following procedure: and under the condition that the digital identity identifier of the target object is not acquired, sending an access failure notification to the target object to notify the target user of failure in accessing the target network, wherein the content and the format of the access failure notification can be set according to specific requirements, for example, the content and the format can be a text format, an image format, a voice format and the like, and the embodiment of the application is not limited.
In one possible implementation, the network management node may also be used to perform the following procedure: requesting to acquire the communication identification of the target object under the condition that the digital identity identifier of the target object is not acquired; if the communication identification of the target object is obtained, issuing a network access credential to the target object based on the communication identification of the target object, so that the target object generates a network access request carrying the communication identification of the target object and the network access credential; if a network access request fed back by the network access credential and carrying the communication identifier of the target object is received, configuring authorization access information for the target object according to the carried communication identifier and the network access credential.
The communication identifier of the target object may be information for indicating a communication address of the target user, for example, may be a phone number of the target user, an email address of the target user, etc., which is described by taking the phone number of the target user as an example in the embodiment of the present application; the network access credential issued to the target object may include, for example, a verification code, a verification picture, a verification text, and other network access credentials, which are described in the embodiment of the present application in the form of the verification code. When configuring authorized access information for a target object according to the carried communication identifier and the network access credential, the network management node can perform consistency check on the network access credential carried by the received network access request and the network access credential issued by the network management node, and after the consistency check passes, the authorized access information is configured for the target object; when configuring the authorized access information for the target object, the authorized access information may be configured for the target object according to the carried communication identifier (i.e., the communication identifier of the target object), which is similar to the above-mentioned process of configuring the authorized access information for the target object according to the digital identifier of the target object in step S203, which is not described herein, where the identity information of the target object in the authorized access information configured for the target object is the communication identifier of the target object.
Based on the above description, the network management node may provide a network access manner based on the communication identifier, and the network management node may be further configured to perform the following procedures: if the network management node receives an application request about access credentials sent by a target object, wherein the application request carries a communication identifier of the target object, the network management node issues network access credentials to the target object based on the communication identifier of the target object, so that the target object generates a network access request carrying the communication identifier of the target object and the network access credentials; if a network access request fed back by the network access credential and carrying the communication identifier of the target object is received, configuring authorization access information for the target object according to the carried communication identifier and the network access credential.
In this embodiment of the present invention, when receiving a network access request sent by a target object (i.e., a target terminal) and used for requesting access to the target network, a network management node of the target network may acquire a digital identifier of the target object in a blockchain, and when acquiring the digital identifier of the target object, configure authorized access information for the target object according to the digital identifier of the target object, and provide a data interaction service for the target object according to the authorized access information corresponding to the target object. The digital identity identifier of the target object can uniquely identify the user identity, the authorized access information is configured for the target object according to the digital identity identifier of the target object, and the data interaction service is provided, when the user uses the target object (namely the target terminal) to generate abnormal behaviors in the target network, the target network can trace back to the corresponding user in time according to the digital identity identifier of the target object, so that the safety of the target network is improved; in addition, the network management node of the target network also supports processing logic for accessing the target network based on the communication identifier of the user, so that the user can access the target network through the communication identifier of the user under the condition that the user does not have the digital identity identifier, and the user experience can be improved; in addition, in the process of accessing the target network, the user does not need to know the password configured for the target network offline, so that convenience is high, and user experience can be improved.
Based on the above description, the embodiment of the present application provides a further data processing method based on a blockchain, referring to fig. 5, which is a schematic flow diagram of the further data processing method based on a blockchain provided by the embodiment of the present application; the blockchain-based data processing method may be performed by a terminal device, for example, by a target terminal (i.e., a target object) as shown in fig. 1a, and may include the following steps S501-S503:
s501, displaying a network information page.
In one possible implementation, the network information page may include: node information of each scanned wireless access node, namely node information of each wireless access node scanned by the target object; for example, the target object may perform a network scanning operation after detecting a trigger event requesting to scan the network, and display a network information page to display node information of each wireless access node scanned by the target object. The node information of the wireless access node is information capable of indicating the corresponding wireless access node, for example, the information can include the name of the wireless access node, optionally, the signal strength of the wireless access node, the network state of the wireless access node and the like; for example, the network state of the wireless access node may include an online state and an offline state, where the offline state indicates that the corresponding wireless access node cannot access the internet (i.e., cannot access the internet through the network transmission node).
The display mode of the scanned node information of each wireless access node may be designed according to specific requirements, and the embodiment of the present application is not limited, and a network information page shown by 511 is only an exemplary page. In an alternative display mode, the node information of each wireless access node may be displayed based on a list display mode, and when the node information of each wireless access node is displayed based on a list display mode, the node information may be displayed based on a random order, or may be displayed in a descending order according to the signal intensity of each wireless access node. In another optional display mode, the node information of the wireless access nodes supporting the same network access mode can be displayed in a partitioned manner according to the network access mode supported by each wireless access node, wherein the node information of the wireless access nodes supporting the same network access mode is displayed in the same display area; alternatively, node information of wireless access nodes included in the same display area may be displayed in descending order according to signal strengths of the corresponding wireless access nodes. The network access mode supported by any wireless access node may include one or more of the following: an access mode for network access based on the digital identity identifier of the target object in the blockchain and an access mode for network access based on the communication identifier of the target object.
In a possible implementation manner, when the blockchain-based data processing method shown in fig. 5 is executed by the target object, the blockchain-based data processing method may be executed by a network management client running in the target object, where the network management client may be a resource client or another client different from the resource client; in a possible implementation manner, when the node information of each scanned wireless access node is a different client from the resource client, the display manner of the node information of each scanned wireless access node may be: the target object detects whether a resource client based on the digital identity identifier exists; if yes, carrying out area division according to a network access mode supported by each wireless access node, and carrying out area division display on the scanned wireless access nodes according to different divided areas; the method comprises the steps that node information of wireless access nodes supporting the same network access mode is displayed in the same display area; the area obtained by dividing the area comprises the following steps: the resource client is used for generating the digital identity identifier for the object based on a display area corresponding to an access mode of the digital identity identifier of the target object for network access; otherwise, displaying the wireless access node supporting the access mode of network access based on the communication identification of the target object. That is, the target object may display the wireless access node supporting the access mode of network access based on the digital identifier of the target object in the same display area when detecting the presence of the resource client, or otherwise, display the wireless access node supporting the access mode of network access based on the communication identifier of the target object.
S502, responding to the selection operation of the node information of the target wireless access node in the network information page, and displaying the network access mode supported by the target wireless access node.
In a possible implementation manner, the target user may select one wireless access node in the network information page to request to access the corresponding wireless access node, and the selected wireless access node is the target wireless access node; the selecting operation of the node information of the target wireless access node may include, but is not limited to: the embodiment of the present application is not limited by the click operation, double click operation, long press operation, etc. of the node information of the target wireless access node. The display mode of the network access mode supported by the target wireless access node can be designed according to specific requirements, and the embodiment of the application is not limited; in an alternative display mode, the network access mode supported by the target wireless access node may be displayed based on a popup window display mode; in another alternative display manner, the network access manner supported by the target wireless access node may be displayed by jumping from the network information page to a new page, and an exemplary display manner shown by a reference numeral 512 is a network access manner supported by the target wireless access node, specifically, a manner based on a popup window display, where the network access manner supported by the target wireless access node includes: the method comprises the steps of carrying out network access based on a digital identity identifier of a target object in a blockchain, and carrying out network access based on a communication identifier of the target object, wherein the network access based on the digital identity identifier of the target object in the blockchain is specifically shown as a component marked with 'adopting digital identity identifier connection', and the network access based on the communication identifier of the target object is specifically shown as a component marked with 'adopting telephone number connection'.
In a possible implementation manner, when displaying the network access mode supported by the target wireless access node, a cancellation component may also be displayed, where the cancellation component may be used to cancel the display of the network access mode supported by the target wireless access node; alternatively, if the cancel component is triggered, the target object may be rolled back to the web information page.
In a possible implementation manner, when the network access mode supported by the target wireless access node is displayed, the network information of the target wireless access node may also be displayed, which may include, for example, the signal strength, the encryption type, and the like of the target wireless access node, and may be used to prompt the target user of the network condition of the target wireless access node, for example, to know the security, the signal how, and the like of the target wireless access node when the target wireless access node accesses the target network.
If the access mode for performing network access based on the digital identifier of the target object in the blockchain is selected from the displayed network access modes, S503, a network access request for the digital identifier of the target object is generated, and the network access request is sent to a network management node of the target network to which the target wireless access node belongs.
The network access request is used for requesting the network management node to configure authorized access information for the target object after acquiring the digital identity identifier of the target object so as to control the target wireless access node to provide data interaction service for the target object; the related process of the network management node based on the acquisition of the digital identifier of the target object and configuring the authorized access information for the target object is described in detail in the method embodiments shown in fig. 2 and fig. 3, which are not described herein.
In a possible embodiment, the network access request for the digital identifier of the target object corresponds to the network access request carrying the object identifier of the target object mentioned in the above step S201 and step S301, and the network management node triggers the execution of the related process of the above step S202 after receiving the network access request.
In a possible implementation manner, the network access request of the digital identity identifier for the target object may further carry the digital identity identifier of the target object on the basis of carrying the object identifier of the target object, and when the target object generates the network access request of the digital identity identifier for the target object based on the network access request of the digital identity identifier of the target object, the network access request of the digital identity identifier for the target object may: acquiring an object identifier of a target object, and acquiring a digital identity identifier of the target object from a blockchain according to the object identifier of the target object; signing the digital identity identifier of the target object by adopting the private key of the target object, and carrying the obtained signature information in a network access request; the network access request is used for triggering the network management node to carry out signature verification processing on signature information carried by the network access request by adopting a public key of the target object, and the digital identity identifier obtained by the signature verification processing is used as the digital identity identifier of the target object after the signature verification is passed; the generated network access request may include, among other things, an object identification of the target object, a digital identity identifier of the target object, and signature information. Optionally, the signature information carried by the generated network access request may be obtained by signing the digital identifier of the target object by using the private key of the target object, or may be obtained by signing the information carried by the network access request by using the private key of the target object; the related process of generating the network access request for the digital identifier of the target object by the target object is described in the above embodiments, which are not described in detail in this embodiment of the present application, for example, the encryption process of the target object is described in the related process of step S302.
In one possible implementation manner, after the target object sends the network access request to the network management node of the target network to which the target wireless access node belongs, the target wireless access node may be accessed to access the target network under the condition that the network management node configures authorization access information for the target object and triggers establishment of connection between the target wireless access node and the target object.
In a possible implementation manner, the target object may further receive a feedback notification sent by the network management node, where the feedback notification of the primary network access request may include one of an access failure notification and an access success notification, where the access failure notification may notify the target user that the access to the target network fails, and the access success notification may notify the target user that the access to the target network is successful; the network management node responds to the condition that the failure indication network management node does not allow the target object to access the target network through the target wireless access node, and the network management node responds to the condition that the success indication network management node allows the target object to access the target network through the target wireless access node. The display mode of the feedback notification in the target object can be designed according to specific requirements, for example, the feedback notification can be displayed in a network information page based on a popup window display mode, and the feedback notification can also be displayed in a new page; optionally, when the target object detects an event of canceling the popup window, the popup window may be canceled, where the event of canceling the popup window may include: the feedback notification is based on the manner of the pop-up display reaching a specified duration (the specified duration may be set according to the requirements), detecting a trigger operation to cancel the pop-up display, and so on.
In one possible implementation, the target object may also be used to perform the following process: displaying an access trigger page of the communication identification access network based on the target object; responding to the communication identification input on the access trigger page, generating a network access request aiming at the communication identification of the target object, wherein the corresponding network access request is used for requesting a network management node to configure authorized access information for the target object according to the communication identification of the target object so as to control the target wireless access node to provide data interaction service for the target object; the network access mode supported by the target wireless access node is displayed based on a popup window display mode, the access trigger page is triggered and displayed when the operation of canceling the popup window display is detected, or the access trigger page is displayed after an access failure notification returned by the network management node is received, the access failure notification is sent by the network management node after a response to a network access request aiming at a digital identity identifier of a target object fails, or the access trigger page is triggered and displayed when an access mode for performing network access based on a communication identifier of the target object is selected from the displayed network access modes.
In a possible implementation manner, referring to fig. 6, for a schematic diagram of an exemplary access trigger page provided in this embodiment of the present application, the access trigger page may include: a first input area (indicated by reference numeral 601 in the figure) for entering a communication identity, a first trigger component (indicated by reference numeral 602 in the figure) for requesting acquisition of network access credentials, a second input area (indicated by reference numeral 603 in the figure) for entering network access credentials, and a second trigger component (indicated by reference numeral 604 in the figure) for requesting access to the network. The process of generating a network access request for the communication identifier of the target object in response to the communication identifier input on the access trigger page may include the steps of: if the first trigger component is triggered, carrying a communication identifier of a target object input in a first input area, and requesting a network management node to issue a network access credential; if the second triggering component is triggered, constructing a network access request aiming at the communication identification of the target object based on the communication identification of the target object input in the first input area and the network access credential issued by the network management node input in the second input area, and sending the network access request aiming at the communication identification of the target object to the network management node. The target object requests the network management node to issue the network access credential, which may be requested by sending an application request about the access credential to the network management node, where the application request carries a communication identifier of the target object, and the network access request for the communication identifier of the target object is the network access request carrying the communication identifier of the target object and the network access credential mentioned in the foregoing embodiment; based on the above, if the network management node receives an application request about the access credential sent by the target object, where the application request carries the communication identifier of the target object, the network management node issues the network access credential to the target object based on the communication identifier of the target object, so that the target object generates a network access request carrying the communication identifier of the target object and the network access credential (i.e., a network access request for the communication identifier of the target object generated by the target object); if a network access request fed back by the network access credential and carrying the communication identifier of the target object is received, configuring authorization access information for the target object according to the carried communication identifier and the network access credential; the related process is described in detail in the method embodiment shown in fig. 3, and is not described in detail herein.
In the embodiment of the present application, the target object (i.e., the target terminal) may display the scanned node information of each wireless access node, and after the node information of the target wireless access node is selected, display the network access mode supported by the target wireless access node, and when the selected network access mode is an access mode for performing network access based on the digital identifier of the target object in the blockchain, may generate a network access request for the digital identifier of the target object, and send the network access request to the network management node of the target network to which the target wireless access node belongs, so as to request the access to the target network based on the digital identifier of the target object; in the process of accessing the target network, the user does not need to know the password configured for the target network offline, so that convenience is high, and user experience can be improved.
Based on the description of the method embodiment, the embodiment of the application also discloses a data processing device based on the blockchain; the blockchain-based data processing device may be a computer program running in a computer apparatus, which may be the network management node mentioned above, and which blockchain-based data processing device may perform the steps of the method flow shown in fig. 2 or fig. 3. Referring to FIG. 7, the blockchain-based data processing device may operate as follows:
A communication unit 701 for performing communication interaction;
a processing unit 702, configured to receive a network access request sent by a target object; the network access request is used for requesting to access a target network, and the network access request carries an object identifier of the target object; responding to the network access request, and acquiring a digital identity identifier of the target object in the blockchain according to the object identifier of the target object; under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object according to the digital identity identifier of the target object; and providing data interaction service for the target object according to the authorized access information corresponding to the target object.
In one embodiment, the target network comprises a plurality of wireless access nodes, the network access request being for requesting access to the target network through a target wireless access node of the plurality of wireless access nodes;
the processing unit 702, when configured to configure the authorized access information for the target object according to the digital identifier of the target object, may be specifically configured to:
acquiring record data maintained based on the object identification of the target object from the blockchain according to the object identification of the target object;
Determining a flow forwarding strategy for the target object according to the acquired record data;
and constructing and obtaining authorized access information corresponding to the target object based on the digital identity identifier of the target object, the node identifier of the target wireless access node and the flow forwarding strategy.
In another embodiment, the record data is derived from transfer information generated by the target object upon detection of a digital asset transfer; the record data comprises a plurality of asset record fields, wherein each asset record field is used for recording position information when digital asset transfer occurs and resource index information of digital asset transfer when digital asset transfer occurs;
the processing unit 702, when configured to determine a traffic forwarding policy for the target object according to the acquired record data, may be specifically configured to:
determining a position identifier of a position to which the target wireless access node belongs;
and determining resource index information corresponding to the position of the target wireless access node from the recorded data according to the position identification, and determining a flow forwarding strategy aiming at the target object according to the obtained resource index information.
In another embodiment, when the record data is generated by the target object, the target object is configured to perform the following steps:
responding to the detected digital asset transfer event, and acquiring transfer information corresponding to the digital asset transfer event;
extracting transfer receiver information from the transfer information, and determining position information when digital asset transfer occurs according to the transfer receiver information;
determining a transfer amount from the transfer information, and determining the transfer amount as resource index information;
and recording the determined position information and resource index information when the digital asset transfer occurs into the record data corresponding to the object identification of the target object.
In another embodiment, the record data includes an access record field: the access record field is used for recording the access times of the target object in the history of accessing the target network and the flow consumed by each time of history access;
the processing unit 702, when configured to determine a traffic forwarding policy for the target object according to the acquired record data, may be specifically configured to:
determining the average flow consumed by the historical single access of the target object according to the access times of the target object and the flow consumed by each historical access;
Determining a flow forwarding strategy for the target object according to the average flow consumed by the historical single access of the target object;
and the resource quantity of the network resource allocated to the target object, which is specified in the flow forwarding strategy, is positively correlated with the average flow.
In another embodiment, the target network includes a plurality of wireless access nodes, and the authorized access information corresponding to the target object includes: the node identification of the wireless access node required by the target object to access the target network and the flow forwarding strategy for the target object determined according to the object identification of the target object;
the processing unit 702, when configured to provide a data interaction service for the target object according to the authorized access information corresponding to the target object, may be specifically configured to:
when receiving the flow data aiming at the target object, searching a node identifier and a flow forwarding strategy from the authorized access information corresponding to the target object;
and according to the searched flow forwarding strategy, performing flow control on the wireless access node indicated by the searched node identifier to control the corresponding wireless access node to send the flow data aiming at the target object to the target object.
In another embodiment, the network access request further carries a digital identifier of the target object and signature information obtained by signing the digital identifier of the target object by using a private key of the target object, where the digital identifier of the target object carried by the network access request is obtained by the target object from the blockchain according to an object identifier of the target object;
the processing unit 702, when configured to obtain the digital identifier of the target object in the blockchain according to the object identifier of the target object, may be specifically configured to:
acquiring a public key of the target object according to the object identifier of the target object;
and carrying out signature verification processing on signature information carried by the network access request by adopting the public key of the target object, and taking the digital identity identifier obtained by the signature verification processing as the digital identity identifier of the target object after the signature verification is passed.
In another embodiment, the target network includes a plurality of wireless access nodes, and the authorized access information corresponding to the target object includes: the node identification of the wireless access node required by the target object to access the target network; the processing unit 702 is further configured to:
Receiving signal detection information sent by a plurality of reference wireless access nodes; reference to a radio access node means: the wireless access nodes capable of detecting the target object in the plurality of wireless access nodes, and signal detection information is used for indicating: signal strength between the respective reference wireless access node and the target object;
selecting a wireless access node to be accessed from the plurality of reference wireless access nodes according to the signal strength indicated by the signal detection information of each reference wireless access node;
updating the node identification in the authorized access information corresponding to the target object to the node identification of the wireless access node to be accessed, and triggering the establishment of the connection between the wireless access node to be accessed and the target object, so that the data interaction service is provided for the target object according to the updated authorized access information.
In another embodiment, the processing unit 702 is further configured to:
requesting to acquire the communication identifier of the target object under the condition that the digital identity identifier of the target object is not acquired;
if the communication identification of the target object is obtained, issuing a network access credential to the target object based on the communication identification of the target object, so that the target object generates a network access request carrying the communication identification of the target object and the network access credential;
If a network access request fed back by the network access credential and carrying the communication identifier of the target object is received, configuring authorization access information for the target object according to the carried communication identifier and the network access credential.
According to another embodiment of the present application, each unit in the blockchain-based data processing device shown in fig. 7 may be separately or completely combined into one or several additional units, or some unit(s) thereof may be further split into a plurality of units with smaller functions, which may achieve the same operation without affecting the implementation of the technical effects of the embodiments of the present application. The above units are divided based on logic functions, and in practical applications, the functions of one unit may be implemented by a plurality of units, or the functions of a plurality of units may be implemented by one unit. In other embodiments of the present application, the blockchain-based data processing device may also include other units, and in actual practice, these functions may also be facilitated by other units and may be cooperatively implemented by multiple units.
According to another embodiment of the present application, a blockchain-based data processing apparatus as shown in fig. 7 may be constructed by running a computer program capable of executing the steps involved in the respective methods as shown in fig. 2 or 3 on a general-purpose computing device such as a computer including a Central Processing Unit (CPU), a random access storage medium (RAM), a read-only storage medium (ROM), etc., processing elements and storage elements, and implementing the blockchain-based data processing method of the embodiments of the present application. The computer program may be recorded on, for example, a computer readable storage medium, and loaded into and executed by the computing device described above.
In this embodiment of the present application, when a network access request sent by a target object (i.e., a target terminal) and used for requesting access to a target network is received, a digital identifier of the target object in a blockchain may be obtained, and when the digital identifier of the target object is obtained, authorization access information is configured for the target object according to the digital identifier of the target object, and a data interaction service is provided for the target object according to the authorization access information corresponding to the target object. The digital identity identifier of the target object can uniquely identify the user identity, the authorized access information is configured for the target object according to the digital identity identifier of the target object, and the data interaction service is provided, when the user uses the target object (namely the target terminal) to generate abnormal behaviors in the target network, the target network can trace back to the corresponding user in time according to the digital identity identifier of the target object, so that the safety of the target network is improved; moreover, the digital identity identifier of the target object is in the blockchain, is transparent in disclosure, and can ensure the safety of user data; in addition, in the process of accessing the target network, the user does not need to know the password configured for the target network offline, so that convenience is high, and user experience can be improved.
Based on the description of the method embodiment, the embodiment of the application also discloses another data processing device based on the blockchain; the blockchain-based data processing device may be a computer program running in a computer apparatus, which may be the target terminal mentioned above, and which can perform the steps of the method flow shown in fig. 5. Referring to FIG. 8, the blockchain-based data processing device may operate as follows:
a communication unit 801 for performing communication interaction;
a processing unit 802, configured to display a network information page; the network information page includes: node information of each scanned wireless access node; responding to the selection operation of the node information of the target wireless access node in the network information page, and displaying the network access mode supported by the target wireless access node; if the network access mode selected from the displayed network access modes is an access mode for performing network access based on the digital identity identifier of the target object in the blockchain, generating a network access request aiming at the digital identity identifier of the target object, and sending the network access request to a network management node of a target network to which the target wireless access node belongs;
The network access request is used for requesting the network management node to configure authorization access information for the target object after acquiring the digital identity identifier of the target object so as to control the target wireless access node to provide data interaction service for the target object.
In one embodiment, the processing unit 802, when configured to generate a network access request for a digital identifier of the target object, may be specifically configured to:
acquiring an object identifier of the target object, and acquiring a digital identity identifier of the target object from the blockchain according to the object identifier of the target object;
signing the digital identity identifier of the target object by adopting the private key of the target object, and carrying the obtained signature information in a network access request;
the network access request is used for triggering the network management node to adopt the public key of the target object to carry out signature verification processing on signature information carried by the network access request, and a digital identity identifier obtained through the signature verification processing is used as the digital identity identifier of the target object after the signature verification is passed.
In another embodiment, the processing unit 802 is further configured to:
Displaying an access trigger page of the access network based on the communication identification of the target object;
responding to the communication identification input on the access trigger page, generating a network access request aiming at the communication identification of the target object, wherein the corresponding network access request is used for requesting the network management node to configure authorized access information for the target object according to the communication identification of the target object so as to control the target wireless access node to provide data interaction service for the target object;
the network access mode supported by the target wireless access node is displayed based on a popup window display mode, the access trigger page is triggered to be displayed when an operation of canceling the popup window display is detected, or the access trigger page is displayed after an access failure notification returned by the network management node is received, and the access failure notification is sent by the network management node after a response to the network access request of the digital identity identifier of the target object fails.
In another embodiment, the processing unit 802, when configured to display the scanned node information of each wireless access node, may be specifically configured to:
Detecting whether a resource client based on the digital identity identifier exists;
if yes, carrying out area division according to the network access mode supported by each wireless access node, and carrying out partition display on the scanned wireless access nodes according to different divided areas; the method comprises the steps that node information of wireless access nodes supporting the same network access mode is displayed in the same display area;
the area obtained by dividing the area comprises the following steps: and the resource client is used for generating the digital identity identifier for the object based on a display area corresponding to an access mode of the digital identity identifier of the target object for network access.
According to another embodiment of the present application, each unit in the blockchain-based data processing device shown in fig. 8 may be separately or completely combined into one or several additional units, or some unit(s) thereof may be further split into a plurality of units with smaller functions, which may achieve the same operation without affecting the implementation of the technical effects of the embodiments of the present application. The above units are divided based on logic functions, and in practical applications, the functions of one unit may be implemented by a plurality of units, or the functions of a plurality of units may be implemented by one unit. In other embodiments of the present application, the blockchain-based data processing device may also include other units, and in actual practice, these functions may also be facilitated by other units and may be cooperatively implemented by multiple units.
According to another embodiment of the present application, a blockchain-based data processing apparatus as shown in fig. 8 may be constructed by running a computer program capable of executing the steps involved in the respective methods as shown in fig. 5 on a general-purpose computing device such as a computer including a Central Processing Unit (CPU), a random access storage medium (RAM), a read only storage medium (ROM), etc., and a storage element, and implementing the blockchain-based data processing method of the embodiments of the present application. The computer program may be recorded on, for example, a computer readable storage medium, and loaded into and executed by the computing device described above.
In the embodiment of the present application, the scanned node information of each wireless access node may be displayed, and after the node information of the target wireless access node is selected, the network access mode supported by the target wireless access node is displayed, and when the selected network access mode is an access mode for performing network access based on the digital identifier of the target object in the blockchain, a network access request for the digital identifier of the target object may be generated, and the network access request is sent to a network management node of the target network to which the target wireless access node belongs, so as to request the access to the target network based on the digital identifier of the target object; in the process of accessing the target network, the user does not need to know the password configured for the target network offline, so that convenience is high, and user experience can be improved.
Based on the description of the method embodiment and the apparatus embodiment, the embodiment of the application further provides a computer device, which may be the network management node or the target terminal. Referring to fig. 9, the computer device includes at least a processor 901, an input interface 902, an output interface 903, and a computer storage medium 904. Wherein the processor 901, input interface 902, output interface 903, and computer storage medium 904 within the computer device may be connected by bus or other means. The computer storage medium 904 may be stored in a memory of a computer device, the computer storage medium 904 is used for storing a computer program, and the processor 901 is used for executing the computer program stored in the computer storage medium 904. The processor 901 (or CPU (Central Processing Unit, central processing unit)) is a computing core and a control core of the computer device for running a computer program to implement the respective method flows or the respective functions.
In one embodiment, the processor 901 in the embodiment of the present application may be configured to implement a related flow of network access, which specifically includes: receiving a network access request sent by a target object; the network access request is used for requesting to access a target network, and the network access request carries an object identifier of the target object; responding to the network access request, and acquiring a digital identity identifier of the target object in the blockchain according to the object identifier of the target object; under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object according to the digital identity identifier of the target object; and providing data interaction service for the target object according to the authorized access information corresponding to the target object, and the like.
In another embodiment, the processor 901 in the embodiment of the present application may be configured to implement a related procedure of requesting to access a network, specifically including: displaying a network information page; the network information page includes: node information of each scanned wireless access node; responding to the selection operation of the node information of the target wireless access node in the network information page, and displaying the network access mode supported by the target wireless access node; if the network access mode selected from the displayed network access modes is an access mode for performing network access based on the digital identity identifier of the target object in the blockchain, generating a network access request aiming at the digital identity identifier of the target object, and sending the network access request to a network management node of a target network to which the target wireless access node belongs; the network access request is used for requesting the network management node to configure authorized access information for the target object after acquiring the digital identity identifier of the target object, so as to control the target wireless access node to provide data interaction service for the target object, and the like.
The embodiment of the application also provides a computer storage medium (Memory), which is a Memory device in a computer device, and is used for storing computer programs and data. It is understood that the computer storage media herein may include both built-in storage media in a computer device and extended storage media supported by the computer device. The computer storage media provides storage space that stores an operating system of the computer device. The storage space stores a computer program. The computer storage medium herein may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one magnetic disk memory; alternatively, it may be at least one computer storage medium located remotely from the aforementioned processor.
In one embodiment, when the computer device is a network management node, a computer program stored in a computer storage medium may be loaded and executed by a processor to implement the corresponding steps in the method embodiments described above with respect to fig. 2 or 3; in a specific implementation, a computer program in a computer storage medium may be loaded by a processor and execute the following steps:
receiving a network access request sent by a target object; the network access request is used for requesting to access a target network, and the network access request carries an object identifier of the target object;
responding to the network access request, and acquiring a digital identity identifier of the target object in the blockchain according to the object identifier of the target object;
under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object according to the digital identity identifier of the target object;
and providing data interaction service for the target object according to the authorized access information corresponding to the target object.
In one embodiment, the target network comprises a plurality of wireless access nodes, the network access request being for requesting access to the target network through a target wireless access node of the plurality of wireless access nodes;
Processor 901, when configured to configure authorized access information for the target object according to the digital identifier of the target object, may be specifically configured to:
acquiring record data maintained based on the object identification of the target object from the blockchain according to the object identification of the target object;
determining a flow forwarding strategy for the target object according to the acquired record data;
and constructing and obtaining authorized access information corresponding to the target object based on the digital identity identifier of the target object, the node identifier of the target wireless access node and the flow forwarding strategy.
In another embodiment, the record data is derived from transfer information generated by the target object upon detection of a digital asset transfer; the record data comprises a plurality of asset record fields, wherein each asset record field is used for recording position information when digital asset transfer occurs and resource index information of digital asset transfer when digital asset transfer occurs;
the processor 901, when configured to determine a traffic forwarding policy for the target object according to the acquired record data, may be specifically configured to:
Determining a position identifier of a position to which the target wireless access node belongs;
and determining resource index information corresponding to the position of the target wireless access node from the recorded data according to the position identification, and determining a flow forwarding strategy aiming at the target object according to the obtained resource index information.
In another embodiment, when the record data is generated by the target object, the target object is configured to perform the following steps:
responding to the detected digital asset transfer event, and acquiring transfer information corresponding to the digital asset transfer event;
extracting transfer receiver information from the transfer information, and determining position information when digital asset transfer occurs according to the transfer receiver information;
determining a transfer amount from the transfer information, and determining the transfer amount as resource index information;
and recording the determined position information and resource index information when the digital asset transfer occurs into the record data corresponding to the object identification of the target object.
In another embodiment, the record data includes an access record field: the access record field is used for recording the access times of the target object in the history of accessing the target network and the flow consumed by each time of history access;
The processor 901, when configured to determine a traffic forwarding policy for the target object according to the acquired record data, may be specifically configured to:
determining the average flow consumed by the historical single access of the target object according to the access times of the target object and the flow consumed by each historical access;
determining a flow forwarding strategy for the target object according to the average flow consumed by the historical single access of the target object;
and the resource quantity of the network resource allocated to the target object, which is specified in the flow forwarding strategy, is positively correlated with the average flow.
In another embodiment, the target network includes a plurality of wireless access nodes, and the authorized access information corresponding to the target object includes: the node identification of the wireless access node required by the target object to access the target network and the flow forwarding strategy for the target object determined according to the object identification of the target object;
the processor 901, when configured to provide a data interaction service for the target object according to the authorized access information corresponding to the target object, may be specifically configured to:
when receiving the flow data aiming at the target object, searching a node identifier and a flow forwarding strategy from the authorized access information corresponding to the target object;
And according to the searched flow forwarding strategy, performing flow control on the wireless access node indicated by the searched node identifier to control the corresponding wireless access node to send the flow data aiming at the target object to the target object.
In another embodiment, the network access request further carries a digital identifier of the target object and signature information obtained by signing the digital identifier of the target object by using a private key of the target object, where the digital identifier of the target object carried by the network access request is obtained by the target object from the blockchain according to an object identifier of the target object;
processor 901, when configured to obtain a digital identifier of the target object in the blockchain according to an object identifier of the target object, may be specifically configured to:
acquiring a public key of the target object according to the object identifier of the target object;
and carrying out signature verification processing on signature information carried by the network access request by adopting the public key of the target object, and taking the digital identity identifier obtained by the signature verification processing as the digital identity identifier of the target object after the signature verification is passed.
In another embodiment, the target network includes a plurality of wireless access nodes, and the authorized access information corresponding to the target object includes: the node identification of the wireless access node required by the target object to access the target network; the processor 901 is also for:
receiving signal detection information sent by a plurality of reference wireless access nodes; reference to a radio access node means: the wireless access nodes capable of detecting the target object in the plurality of wireless access nodes, and signal detection information is used for indicating: signal strength between the respective reference wireless access node and the target object;
selecting a wireless access node to be accessed from the plurality of reference wireless access nodes according to the signal strength indicated by the signal detection information of each reference wireless access node;
updating the node identification in the authorized access information corresponding to the target object to the node identification of the wireless access node to be accessed, and triggering the establishment of the connection between the wireless access node to be accessed and the target object, so that the data interaction service is provided for the target object according to the updated authorized access information.
In another embodiment, the processor 901 is further configured to:
Requesting to acquire the communication identifier of the target object under the condition that the digital identity identifier of the target object is not acquired;
if the communication identification of the target object is obtained, issuing a network access credential to the target object based on the communication identification of the target object, so that the target object generates a network access request carrying the communication identification of the target object and the network access credential;
if a network access request fed back by the network access credential and carrying the communication identifier of the target object is received, configuring authorization access information for the target object according to the carried communication identifier and the network access credential.
In this embodiment of the present application, when a network access request sent by a target object (i.e., a target terminal) and used for requesting access to a target network is received, a digital identifier of the target object in a blockchain may be obtained, and when the digital identifier of the target object is obtained, authorization access information is configured for the target object according to the digital identifier of the target object, and a data interaction service is provided for the target object according to the authorization access information corresponding to the target object. The digital identity identifier of the target object can uniquely identify the user identity, the authorized access information is configured for the target object according to the digital identity identifier of the target object, and the data interaction service is provided, when the user uses the target object (namely the target terminal) to generate abnormal behaviors in the target network, the target network can trace back to the corresponding user in time according to the digital identity identifier of the target object, so that the safety of the target network is improved; moreover, the digital identity identifier of the target object is in the blockchain, is transparent in disclosure, and can ensure the safety of user data; in addition, in the process of accessing the target network, the user does not need to know the password configured for the target network offline, so that convenience is high, and user experience can be improved.
In one embodiment, when the computer device is a target terminal, the processor may load and execute a computer program stored in a computer storage medium to implement the corresponding steps in the method embodiment described above with respect to fig. 5; in a specific implementation, a computer program in a computer storage medium may be loaded by a processor and execute the following steps:
displaying a network information page; the network information page includes: node information of each scanned wireless access node;
responding to the selection operation of the node information of the target wireless access node in the network information page, and displaying the network access mode supported by the target wireless access node;
if the network access mode selected from the displayed network access modes is an access mode for performing network access based on the digital identity identifier of the target object in the blockchain, generating a network access request aiming at the digital identity identifier of the target object, and sending the network access request to a network management node of a target network to which the target wireless access node belongs;
the network access request is used for requesting the network management node to configure authorization access information for the target object after acquiring the digital identity identifier of the target object so as to control the target wireless access node to provide data interaction service for the target object.
In one embodiment, the processor 901, when configured to generate a network access request for a digital identity identifier of the target object, may be specifically configured to:
acquiring an object identifier of the target object, and acquiring a digital identity identifier of the target object from the blockchain according to the object identifier of the target object;
signing the digital identity identifier of the target object by adopting the private key of the target object, and carrying the obtained signature information in a network access request;
the network access request is used for triggering the network management node to adopt the public key of the target object to carry out signature verification processing on signature information carried by the network access request, and a digital identity identifier obtained through the signature verification processing is used as the digital identity identifier of the target object after the signature verification is passed.
In another embodiment, the processor 901 is further configured to:
displaying an access trigger page of the access network based on the communication identification of the target object;
responding to the communication identification input on the access trigger page, generating a network access request aiming at the communication identification of the target object, wherein the corresponding network access request is used for requesting the network management node to configure authorized access information for the target object according to the communication identification of the target object so as to control the target wireless access node to provide data interaction service for the target object;
The network access mode supported by the target wireless access node is displayed based on a popup window display mode, the access trigger page is triggered to be displayed when an operation of canceling the popup window display is detected, or the access trigger page is displayed after an access failure notification returned by the network management node is received, and the access failure notification is sent by the network management node after a response to the network access request of the digital identity identifier of the target object fails.
In another embodiment, the processor 901, when configured to display the scanned node information of each wireless access node, may be specifically configured to:
detecting whether a resource client based on the digital identity identifier exists;
if yes, carrying out area division according to the network access mode supported by each wireless access node, and carrying out partition display on the scanned wireless access nodes according to different divided areas; the method comprises the steps that node information of wireless access nodes supporting the same network access mode is displayed in the same display area;
the area obtained by dividing the area comprises the following steps: and the resource client is used for generating the digital identity identifier for the object based on a display area corresponding to an access mode of the digital identity identifier of the target object for network access.
In the embodiment of the present application, the scanned node information of each wireless access node may be displayed, and after the node information of the target wireless access node is selected, the network access mode supported by the target wireless access node is displayed, and when the selected network access mode is an access mode for performing network access based on the digital identifier of the target object in the blockchain, a network access request for the digital identifier of the target object may be generated, and the network access request is sent to a network management node of the target network to which the target wireless access node belongs, so as to request the access to the target network based on the digital identifier of the target object; in the process of accessing the target network, the user does not need to know the password configured for the target network offline, so that convenience is high, and user experience can be improved.
The embodiments of the present application provide a computer program product comprising a computer program stored in a computer storage medium; the processor of the computer device reads the computer program from the computer storage medium, and the processor executes the computer program, so that the computer device performs the method embodiment shown in fig. 2 or fig. 3, or the processor of the computer device reads the computer program from the computer storage medium, and the processor executes the computer program, so that the computer device performs the method embodiment shown in fig. 5, as described above. It is to be understood that the foregoing disclosure is only of the preferred embodiments of the present application and is not, of course, intended to limit the scope of the claims hereof, as defined by the appended claims.

Claims (17)

1. A blockchain-based data processing method, comprising:
receiving a network access request sent by a target object; the network access request is used for requesting to access a target network, and the network access request carries an object identifier of the target object;
responding to the network access request, and acquiring a digital identity identifier of the target object in the blockchain according to the object identifier of the target object;
under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object according to the digital identity identifier of the target object;
and providing data interaction service for the target object according to the authorized access information corresponding to the target object.
2. The method of claim 1, wherein the target network comprises a plurality of wireless access nodes, the network access request to request access to the target network through a target wireless access node of the plurality of wireless access nodes;
the configuring the authorized access information for the target object according to the digital identity identifier of the target object comprises the following steps:
acquiring record data maintained based on the object identification of the target object from the blockchain according to the object identification of the target object;
Determining a flow forwarding strategy for the target object according to the acquired record data;
and constructing and obtaining authorized access information corresponding to the target object based on the digital identity identifier of the target object, the node identifier of the target wireless access node and the flow forwarding strategy.
3. The method of claim 2, wherein the recorded data is derived from transfer information generated by the target object upon detection of a digital asset transfer; the record data comprises a plurality of asset record fields, wherein each asset record field is used for recording position information when digital asset transfer occurs and resource index information of digital asset transfer when digital asset transfer occurs;
the determining a traffic forwarding policy for the target object according to the acquired record data includes:
determining a position identifier of a position to which the target wireless access node belongs;
and determining resource index information corresponding to the position of the target wireless access node from the recorded data according to the position identification, and determining a flow forwarding strategy aiming at the target object according to the obtained resource index information.
4. A method as claimed in claim 3, wherein the target object is arranged to perform the following steps when the logging data is generated by the target object:
responding to the detected digital asset transfer event, and acquiring transfer information corresponding to the digital asset transfer event;
extracting transfer receiver information from the transfer information, and determining position information when digital asset transfer occurs according to the transfer receiver information;
determining a transfer amount from the transfer information, and determining the transfer amount as resource index information;
and recording the determined position information and resource index information when the digital asset transfer occurs into the record data corresponding to the object identification of the target object.
5. The method of claim 2, wherein the record data comprises an access record field: the access record field is used for recording the access times of the target object in the history of accessing the target network and the flow consumed by each time of history access;
the determining a traffic forwarding policy for the target object according to the acquired record data includes:
determining the average flow consumed by the historical single access of the target object according to the access times of the target object and the flow consumed by each historical access;
Determining a flow forwarding strategy for the target object according to the average flow consumed by the historical single access of the target object;
and the resource quantity of the network resource allocated to the target object, which is specified in the flow forwarding strategy, is positively correlated with the average flow.
6. The method of claim 1, wherein the target network comprises a plurality of wireless access nodes, and the authorized access information corresponding to the target object comprises: the node identification of the wireless access node required by the target object to access the target network and the flow forwarding strategy for the target object determined according to the object identification of the target object;
the providing the data interaction service for the target object according to the authorized access information corresponding to the target object includes:
when receiving the flow data aiming at the target object, searching a node identifier and a flow forwarding strategy from the authorized access information corresponding to the target object;
and according to the searched flow forwarding strategy, performing flow control on the wireless access node indicated by the searched node identifier to control the corresponding wireless access node to send the flow data aiming at the target object to the target object.
7. The method of claim 1, wherein the network access request further carries a digital identifier of the target object, and signature information obtained by signing the digital identifier of the target object with a private key of the target object, and the digital identifier of the target object carried by the network access request is obtained by the target object from the blockchain according to an object identifier of the target object;
the obtaining the digital identifier of the target object in the blockchain according to the object identifier of the target object includes:
acquiring a public key of the target object according to the object identifier of the target object;
and carrying out signature verification processing on signature information carried by the network access request by adopting the public key of the target object, and taking the digital identity identifier obtained by the signature verification processing as the digital identity identifier of the target object after the signature verification is passed.
8. The method of claim 1, wherein the target network comprises a plurality of wireless access nodes, and the authorized access information corresponding to the target object comprises: the node identification of the wireless access node required by the target object to access the target network; the method further comprises the steps of:
Receiving signal detection information sent by a plurality of reference wireless access nodes; reference to a radio access node means: the wireless access nodes capable of detecting the target object in the plurality of wireless access nodes, and signal detection information is used for indicating: signal strength between the respective reference wireless access node and the target object;
selecting a wireless access node to be accessed from the plurality of reference wireless access nodes according to the signal strength indicated by the signal detection information of each reference wireless access node;
updating the node identification in the authorized access information corresponding to the target object to the node identification of the wireless access node to be accessed, and triggering the establishment of the connection between the wireless access node to be accessed and the target object, so that the data interaction service is provided for the target object according to the updated authorized access information.
9. The method of claim 1, wherein the method further comprises:
requesting to acquire the communication identifier of the target object under the condition that the digital identity identifier of the target object is not acquired;
if the communication identification of the target object is obtained, issuing a network access credential to the target object based on the communication identification of the target object, so that the target object generates a network access request carrying the communication identification of the target object and the network access credential;
If a network access request fed back by the network access credential and carrying the communication identifier of the target object is received, configuring authorization access information for the target object according to the carried communication identifier and the network access credential.
10. A blockchain-based data processing method, comprising:
displaying a network information page; the network information page includes: node information of each scanned wireless access node;
responding to the selection operation of the node information of the target wireless access node in the network information page, and displaying the network access mode supported by the target wireless access node;
if the network access mode selected from the displayed network access modes is an access mode for performing network access based on the digital identity identifier of the target object in the blockchain, generating a network access request aiming at the digital identity identifier of the target object, and sending the network access request to a network management node of a target network to which the target wireless access node belongs;
the network access request is used for requesting the network management node to configure authorization access information for the target object after acquiring the digital identity identifier of the target object so as to control the target wireless access node to provide data interaction service for the target object.
11. The method of claim 10, wherein the generating a network access request for a digital identity identifier of the target object comprises:
acquiring an object identifier of the target object, and acquiring a digital identity identifier of the target object from the blockchain according to the object identifier of the target object;
signing the digital identity identifier of the target object by adopting the private key of the target object, and carrying the obtained signature information in a network access request;
the network access request is used for triggering the network management node to adopt the public key of the target object to carry out signature verification processing on signature information carried by the network access request, and a digital identity identifier obtained through the signature verification processing is used as the digital identity identifier of the target object after the signature verification is passed.
12. The method of claim 10, wherein the method further comprises:
displaying an access trigger page of the access network based on the communication identification of the target object;
responding to the communication identification input on the access trigger page, generating a network access request aiming at the communication identification of the target object, wherein the corresponding network access request is used for requesting the network management node to configure authorized access information for the target object according to the communication identification of the target object so as to control the target wireless access node to provide data interaction service for the target object;
The network access mode supported by the target wireless access node is displayed based on a popup window display mode, the access trigger page is triggered to be displayed when an operation of canceling the popup window display is detected, or the access trigger page is displayed after an access failure notification returned by the network management node is received, and the access failure notification is sent by the network management node after a response to the network access request of the digital identity identifier of the target object fails.
13. The method of claim 10, wherein the scanned node information for each wireless access node is displayed in a manner comprising:
detecting whether a resource client based on the digital identity identifier exists;
if yes, carrying out area division according to the network access mode supported by each wireless access node, and carrying out partition display on the scanned wireless access nodes according to different divided areas; the method comprises the steps that node information of wireless access nodes supporting the same network access mode is displayed in the same display area;
the area obtained by dividing the area comprises the following steps: and the resource client is used for generating the digital identity identifier for the object based on a display area corresponding to an access mode of the digital identity identifier of the target object for network access.
14. A blockchain-based data processing device, comprising:
the communication unit is used for carrying out communication interaction;
the processing unit is used for receiving a network access request sent by the target object; the network access request is used for requesting to access a target network, and the network access request carries an object identifier of the target object; responding to the network access request, and acquiring a digital identity identifier of the target object in the blockchain according to the object identifier of the target object; under the condition that the digital identity identifier of the target object is obtained, configuring authorized access information for the target object according to the digital identity identifier of the target object; and providing data interaction service for the target object according to the authorized access information corresponding to the target object.
15. A blockchain-based data processing device, comprising:
the communication unit is used for carrying out communication interaction;
the processing unit is used for displaying a network information page; the network information page includes: node information of each scanned wireless access node; responding to the selection operation of the node information of the target wireless access node in the network information page, and displaying the network access mode supported by the target wireless access node; if the network access mode selected from the displayed network access modes is an access mode for performing network access based on the digital identity identifier of the target object in the blockchain, generating a network access request aiming at the digital identity identifier of the target object, and sending the network access request to a network management node of a target network to which the target wireless access node belongs;
The network access request is used for requesting the network management node to configure authorization access information for the target object after acquiring the digital identity identifier of the target object so as to control the target wireless access node to provide data interaction service for the target object.
16. A computer device comprising an input interface and an output interface, further comprising: a processor and a computer storage medium;
the computer storage medium is used for storing a computer program;
the processor is configured to run the computer program to implement the blockchain-based data processing method of any of claims 1-10 or to implement the blockchain-based data processing method of any of claims 10-13.
17. A computer storage medium, characterized in that the computer storage medium stores a computer program adapted to be loaded by a processor and to perform the blockchain-based data processing method of any of claims 1-10 or adapted to be loaded by the processor and to perform the blockchain-based data processing method of any of claims 10-13.
CN202311438361.XA 2023-10-31 2023-10-31 Block chain-based data processing method, device, equipment and storage medium Pending CN117527177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311438361.XA CN117527177A (en) 2023-10-31 2023-10-31 Block chain-based data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311438361.XA CN117527177A (en) 2023-10-31 2023-10-31 Block chain-based data processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117527177A true CN117527177A (en) 2024-02-06

Family

ID=89748683

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311438361.XA Pending CN117527177A (en) 2023-10-31 2023-10-31 Block chain-based data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117527177A (en)

Similar Documents

Publication Publication Date Title
US11347833B2 (en) Method and apparatus for optimized access of security credentials via mobile edge-computing systems
CN109302415B (en) A kind of authentication method, block chain node and storage medium
CN102870093B (en) Utilize the virtual system and method with proving multiple client in remote maintenance electric network
US11425133B2 (en) System and method for network device security and trust score determinations
CN102947797B (en) The online service using directory feature extending transversely accesses and controls
US8495377B2 (en) Enabling secure access to sensor network infrastructure using multiple interfaces and application-based group key selection
US20230161898A1 (en) Accessing information based on privileges
CN101895442B (en) Network quality active monitoring method and system in credible Internet
TW201513688A (en) Managing sharing of wireless network login passwords
CN105450750A (en) Secure interaction method for intelligent terminal
CN108966216B (en) Mobile communication method and system applied to power distribution network
CN110825776B (en) Air quality detection report processing method and device, computing equipment and storage medium
Sicari et al. Securing the smart home: A real case study
CN112995357B (en) Domain name management method, device, medium and electronic equipment based on cloud hosting service
CN111866993B (en) Wireless local area network connection management method, device, software program and storage medium
CN111327602B (en) Equipment access processing method, equipment and storage medium
US10542569B2 (en) Community-based communication network services
CN102404114A (en) Monitoring method and system both for Web service
AU2021102086A4 (en) Secure Long range device to communication method for IOT devices using low power Wide Area Network (LPWAN)
CN117527177A (en) Block chain-based data processing method, device, equipment and storage medium
Sicari et al. Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security
CN105556926B (en) Match the method and system of the first and second internetwork data exchange access rules
US11140001B2 (en) Method for providing data packets from a CAN bus, control device and system having a CAN bus
US10789336B2 (en) Access management for digital content
KR101752064B1 (en) System and method for unificated management of wireless beacon devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication