CN108416589A - Connection method, system and the computer readable storage medium of block chain node - Google Patents
Connection method, system and the computer readable storage medium of block chain node Download PDFInfo
- Publication number
- CN108416589A CN108416589A CN201810191230.9A CN201810191230A CN108416589A CN 108416589 A CN108416589 A CN 108416589A CN 201810191230 A CN201810191230 A CN 201810191230A CN 108416589 A CN108416589 A CN 108416589A
- Authority
- CN
- China
- Prior art keywords
- block chain
- accessed
- node
- chain node
- link point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Abstract
The invention discloses a kind of connection method, system and the computer readable storage mediums of block chain node, and the method comprising the steps of:In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, by it is described accessed block chain link point and detected whether there is the public key certificate of the block chain node to be accessed in alliance's chain;If there are the public key certificate in alliance's chain, detect whether the block chain node to be accessed is legitimate node according to the public key certificate;If detecting, the block chain node to be accessed is legitimate node, is connect with the block chain node to be accessed by the block chain link point that accessed.The invention avoids the block chain nodes in illegal block chain malicious behaviors of nodes connection alliance chain, improve the safety of block chain node in alliance's chain.
Description
Technical field
The present invention relates to block chain technical field more particularly to a kind of connection method, system and the calculating of block chain node
Machine readable storage medium storing program for executing.
Background technology
Block chain is the distributed account book database of decentralization.Block chain itself is to be produced using cryptographic algorithm for a string
Raw data block contains multiple block chain network in each data block and merchandises the information effectively confirmed.And alliance's chain is then situated between
Between publicly-owned chain and privately owned chain, a block chain is safeguarded by several tissues together cooperation, the use of the block chain must be had
The management of permission, relevant information can be protected, typical such as financial institution.
Alliance's chain joint connecting method is at present:When some block chain node is wanted and some block in alliance's chain
When chain node connects, as long as after getting the block chain password of alliance's chain, you can with any one block chain node in alliance chain
Connection.If block chain password acquired in some illegal block chain node is consistent with the block chain password of alliance chain by chance, or
The illegal block chain malicious behaviors of nodes repeatedly attempts different block chain passwords, and success connects with the block chain node in alliance's chain
It connects, is connect with the block chain node in alliance chain so as to cause illegal block chain node, reduce block chain node in alliance's chain
Safety.
Invention content
The main purpose of the present invention is to provide a kind of connection method of block chain node, system and computer-readable storages
Medium, it is intended to solve the technical problem that block chain node security is low in existing alliance's chain.
To achieve the above object, the present invention provides a kind of connection method of block chain node, the company of the block chain node
The method of connecing includes step:
In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, by
The block chain link point that accessed detects the public key certificate that whether there is the block chain node to be accessed in alliance's chain;
If there are the public key certificate in alliance's chain, the block chain to be accessed is detected according to the public key certificate
Whether node is legitimate node;
If detect the block chain node to be accessed be legitimate node, by it is described accessed block chain link point with it is described
Block chain node connection to be accessed.
Preferably, if there are the public key certificate in alliance chain, according to public key certificate detection
The step of whether block chain node to be accessed is legitimate node include:
If there are the public key certificate in alliance's chain, random number is sent to institute by the block chain link point that accessed
Block chain node to be accessed is stated, so that the block chain node to be accessed is after receiving the random number, based on described random
Number generates digital signature according to private key corresponding with public key in the public key certificate, and the digital signature is sent to described
Block chain link point is accessed;
When it is described accessed block chain link point and receive the digital signature after, by it is described accessed block chain link point according to
The public key certificate verifies the digital signature;
If the digital signature authentication success confirms that the block chain node to be accessed is legitimate node;
If the digital signature authentication failure confirms that the block chain node to be accessed is illegal node.
Preferably, it is described when it is described accessed block chain link point and receive the digital signature after, by the access area
Block chain node according to the public key certificate verify the digital signature the step of include:
When it is described accessed block chain link point and receive the digital signature after, obtained by the block chain link point that accessed
The Protocol IP address interconnected between the corresponding first network of the handshake request, and obtain the digital signature corresponding second
IP address;
Judge whether first IP address and second IP address are consistent;
If first IP address is consistent with second IP address, signed according to the public key certificate verification number
Name.
Preferably, described to judge that first IP address with after the whether consistent step of second IP address, is also wrapped
It includes:
If first IP address and second IP address are inconsistent, confirm that the block chain node to be accessed is non-
Method node.
Preferably, the block chain link point that accessed when in alliance's chain receives holding for block chain node transmission to be accessed
After hand request, detected in alliance's chain with the presence or absence of the block chain node to be accessed by the block chain link point that accessed
Before the step of public key certificate, further include:
When authority identity Verification System receive the public key certificate that the block chain node institutional affiliation to be accessed is sent and
After mechanism information, the mechanism information is audited by the authority identity Verification System;
Public key certificate is sent to third party trust authority CA by the authority identity Verification System, so that the CA is verified
The public key certificate is verified as a result, and the verification result is returned to the authority identity Verification System;
If the mechanism information audit passes through, and determines that the public key certificate is in described effective according to the verification result
The public key certificate is then synchronized in alliance's chain by the authority identity Verification System, and synchronized result is returned by state
Back to the mechanism belonging to the ingress waiting.
Preferably, if described detect that the block chain node to be accessed is legitimate node, block has been accessed by described
The step of chain node is connect with the block chain node to be accessed include:
If detecting, the block chain node to be accessed is legitimate node, and inspection is sent by the block chain link point that accessed
The notification message passed through is surveyed to the block chain node to be accessed, so that the block chain node to be accessed disappears according to the notice
It has accessed whether block chain link point is legitimate node described in breath detection, and has detected that the block chain link point that accessed is legal
Node, send described in accessed the block chain link successful prompting message of point authentication and accessed block chain link point to described;
When it is described accessed block chain link point and receive the prompting message after, accessed block chain link point and institute by described
State block chain node connection to be accessed.
Preferably, the block chain link point that accessed when in alliance's chain receives holding for block chain node transmission to be accessed
After hand request, detected in alliance's chain with the presence or absence of the block chain node to be accessed by the block chain link point that accessed
After the step of public key certificate, further include:
If there is no the public key certificate in alliance's chain, referred to by the block chain link point triggering refusal that accessed
It enables, to be connect with the block chain node to be accessed according to refusal instruction refusal.
Preferably, if described detect that the block chain node to be accessed is legitimate node, block has been accessed by described
After the step of chain node is connect with the block chain node to be accessed, further include:
If alliance's chain detects that the block chain node to be accessed executes illegal operation, disconnected by alliance's chain
The connection for having accessed block chain link point and the block chain node to be accessed.
In addition, to achieve the above object, the present invention also provides a kind of connection system of block chain node, the block chain links
The connection system of point includes memory, microprocessor and is stored in the area that can be run on the memory and on the processor
It is realized when the linker of the linker of block chain node, the block chain node is executed by the microprocessor as described above
The step of connection method of block chain node.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
The linker of block chain node is stored on storage medium, it is real when the linker of the block chain node is executed by processor
Now the step of connection method of block chain node as described above.
The present invention is by the block of the access chain link point connection procedure in block chain node to be accessed and alliance's chain, first
The public key certificate that whether there is block chain node to be accessed in alliance's chain is detected, then when there are block chains to be accessed in alliance's chain
After the public key certificate of node, detects whether block chain node to be accessed is legitimate node by the public key certificate, only detect
When block chain node to be accessed is legitimate node, the block of the access chain link point in alliance's chain just can be with block chain node to be accessed
Connection avoids the block chain node in illegal block chain malicious behaviors of nodes connection alliance chain, improves block chain link in alliance's chain
The safety of point.
Description of the drawings
Fig. 1 is the structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the connection method first embodiment of block chain node of the present invention;
Fig. 3 is the flow diagram of the connection method second embodiment of block chain node of the present invention;
If Fig. 4 is to detect that the block chain node to be accessed is legitimate node in the embodiment of the present invention, by it is described
A kind of flow diagram that access block chain link point is connect with the block chain node to be accessed;
Fig. 5 is the flow diagram of the connection method fourth embodiment of block chain node of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, the structural schematic diagram for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to.
It should be noted that Fig. 1 can be the structural schematic diagram of the hardware running environment of the connection system of block chain node.
The connection system of block chain node of the embodiment of the present invention can be PC, the terminal devices such as pocket computer.
As shown in Figure 1, the terminal may include:Processor 1001, such as CPU, network interface 1004, user interface
1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components.
User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface
1003 can also include standard wireline interface and wireless interface.Network interface 1004 may include optionally that the wired of standard connects
Mouth, wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory, can also be stable memory
(non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor
1001 storage device.
It will be understood by those skilled in the art that the connection system structure of block chain node shown in Fig. 1 is not constituted pair
The restriction of the connection system of block chain node may include components more more or fewer than diagram, or combine certain components, or
The different component arrangement of person.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage media
The linker of letter module, Subscriber Interface Module SIM and block chain node.Wherein, operating system is management and control block chain link
The program of the connection system hardware and software resource of point supports the linker and other softwares or program of block chain node
Operation.
In the connection system of block chain node shown in Fig. 1, user interface 1003 is mainly used for connecting client (user
End), with client into row data communication;Network interface 1004 is mainly used for connecting alliance's chain, mechanism, CA and authority identity certification
System;And processor 1001 can be used for calling the linker of block chain node stored in memory 1005, and execute with
Lower operation:
In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, by
The block chain link point that accessed detects the public key certificate that whether there is the block chain node to be accessed in alliance's chain;
If there are the public key certificate in alliance's chain, the block chain to be accessed is detected according to the public key certificate
Whether node is legitimate node;
If detect the block chain node to be accessed be legitimate node, by it is described accessed block chain link point with it is described
Block chain node connection to be accessed.
Further, if there are the public key certificate in alliance chain, institute is detected according to the public key certificate
State that the step of whether block chain node to be accessed is legitimate node includes:
If there are the public key certificate in alliance's chain, random number is sent to institute by the block chain link point that accessed
Block chain node to be accessed is stated, so that the block chain node to be accessed is after receiving the random number, based on described random
Number generates digital signature according to private key corresponding with public key in the public key certificate, and the digital signature is sent to described
Block chain link point is accessed;
When it is described accessed block chain link point and receive the digital signature after, by it is described accessed block chain link point according to
The public key certificate verifies the digital signature;
If the digital signature authentication success confirms that the block chain node to be accessed is legitimate node;
If the digital signature authentication failure confirms that the block chain node to be accessed is illegal node.
Further, it is described when it is described accessed block chain link point and receive the digital signature after, accessed by described
Block chain node according to the public key certificate verify the digital signature the step of include:
When it is described accessed block chain link point and receive the digital signature after, obtained by the block chain link point that accessed
The Protocol IP address interconnected between the corresponding first network of the handshake request, and obtain the digital signature corresponding second
IP address;
Judge whether first IP address and second IP address are consistent;
If first IP address is consistent with second IP address, signed according to the public key certificate verification number
Name.
Further, it is described judge first IP address and the whether consistent step of second IP address after, it is micro-
Processor 10 can be also used for calling the linker of the block chain node stored in memory, and execute following steps:
If first IP address and second IP address are inconsistent, confirm that the block chain node to be accessed is non-
Method node.
Further, the block chain link point that accessed when in alliance's chain receives what block chain node to be accessed was sent
After handshake request, detected in alliance's chain with the presence or absence of the block chain node to be accessed by the block chain link point that accessed
Public key certificate the step of before, microprocessor 10 can be also used for calling the connection journey of block chain node stored in memory
Sequence, and execute following steps:
When authority identity Verification System receive the public key certificate that the block chain node institutional affiliation to be accessed is sent and
After mechanism information, the mechanism information is audited by the authority identity Verification System;
Public key certificate is sent to third party trust authority CA by the authority identity Verification System, so that the CA is verified
The public key certificate is verified as a result, and the verification result is returned to the authority identity Verification System;
If the mechanism information audit passes through, and determines that the public key certificate is in described effective according to the verification result
The public key certificate is then synchronized in alliance's chain by the authority identity Verification System, and synchronized result is returned by state
Back to the mechanism belonging to the ingress waiting.
Further, if described detect that the block chain node to be accessed is legitimate node, by the access area
The step of block chain node is connect with the block chain node to be accessed include:
If detecting, the block chain node to be accessed is legitimate node, and inspection is sent by the block chain link point that accessed
The notification message passed through is surveyed to the block chain node to be accessed, so that the block chain node to be accessed disappears according to the notice
It has accessed whether block chain link point is legitimate node described in breath detection, and has detected that the block chain link point that accessed is legal
Node, send described in accessed the block chain link successful prompting message of point authentication and accessed block chain link point to described;
When it is described accessed block chain link point and receive the prompting message after, accessed block chain link point and institute by described
State block chain node connection to be accessed.
Further, the block chain link point that accessed when in alliance's chain receives what block chain node to be accessed was sent
After handshake request, detected in alliance's chain with the presence or absence of the block chain node to be accessed by the block chain link point that accessed
Public key certificate the step of after, microprocessor can be also used for calling the connection journey of block chain node stored in memory
Sequence, and execute following steps:
If there is no the public key certificate in alliance's chain, referred to by the block chain link point triggering refusal that accessed
It enables, to be connect with the block chain node to be accessed according to refusal instruction refusal.
Further, if described detect that the block chain node to be accessed is legitimate node, by the access area
After the step of block chain node is connect with the block chain node to be accessed, microprocessor can be also used for calling and be deposited in memory
The linker of the block chain node of storage, and execute following steps:
If alliance's chain detects that the block chain node to be accessed executes illegal operation, disconnected by alliance's chain
The connection for having accessed block chain link point and the block chain node to be accessed.
Based on above-mentioned structure, each embodiment of the connection method of block chain node is proposed.
It is the flow diagram of the connection method first embodiment of block chain node of the present invention with reference to Fig. 2, Fig. 2.
An embodiment of the present invention provides the embodiments of the connection method of block chain node, it should be noted that although flowing
Logical order is shown in journey figure, but in some cases, it can be with different from shown or described by sequence execution herein
The step of.
The connection method of block chain node includes:
Step S10, when the block chain link point that accessed in alliance's chain receives shaking hands for block chain node transmission to be accessed
After request, by it is described accessed block chain link point detect in alliance's chain whether there is the block chain node to be accessed public affairs
Key certificate.
In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent,
Access the public key certificate that whether there is block chain node to be accessed in the global configuration contract of block chain link point detection alliance chain.Its
In, block chain link point has been accessed as the block chain node in alliance's chain.In the present embodiment, having accessed block chain link point can
For one or two or more.Block chain node to be accessed is not access in alliance's chain, is needed and its in alliance chain
In one or more block chain node connect node.Mechanism refer to the organ of constituted by law, cause, enterprise, corporations and its
The unit of his nomocracy, it is all that the node in alliance's chain is subordinate to mechanism, can be positioned according to alliance's chain interior joint information belonging to
Mechanism.Node refers to participating in block chain network, is traded the network node with data exchange, and each independent agency can be with
It gathers around there are one multiple transaction nodes are arrived, each transaction node is one group of physical network, computer, block chain application software and number
According to the combination in library.Between node and node, pass through TCP/IP (Transmission Control Protocol/Internet
Protocol, transmission control protocol/Internet Protocol) agreement interconnection.
After having accessed block chain link point and receiving handshake request, having accessed block chain link point can be from local profile
It loads in current alliance's chain in the configuration information to memory of whole nodes, in order to establish company with block chain node to be accessed
Detect whether block chain node to be accessed is legitimate node in termination process.It is connect it should be noted that block chain link point ought have been accessed
After receiving the handshake request that block chain node to be accessed is sent, show having connect in the desired chain with alliance of block chain node to be accessed
Enter the connection of block chain node.
Wherein, configuration information is pre-configured in alliance's chain.Configuration information includes having accessed belonging to block chain link point
Mechanism CertPubKey, mechanism certificate and private key, node description, IP address and port numbers of mechanism etc.;Block chain node to be accessed
IP address, port numbers, the public key certificate of institutional affiliation and node description etc..Such as in alliance's chain, the section of some block chain node
The corresponding field of point description is entitled " Nodedesc ", and corresponding field contents are " description of node 1 ";The corresponding field of IP address
Entitled " Perrip ", corresponding field contents are " 127.0.0.1 ";The corresponding field of port numbers is entitled " Port ", corresponding word
Section content is " 30303 ";The corresponding field of mechanism CertPubKey is entitled " publickey ", and corresponding field contents are " --- --
BEGIN CERTIFICATE-----MIICWDCCAcGgAwIBAgIJAOV3EU5rFx4NMAQQIDApTb-----END
CERTIFICATE-----”;The corresponding field of mechanism certificate and private key is entitled " privatekey ", and corresponding field contents are
“-----BEGIN RSA PRIVATE KEY-----MIICXAIBAAKBgQD1dyyZredY6EMNBEdmOuMStw/
bRfYhsT7wPv3JM++FDUxgittP....”。
Further, configuration information may also include identity type, organization names and status information of block chain node etc..Such as
In alliance's chain, the field of some corresponding identity type of block chain node is entitled " Identitytype ", corresponding field content
For " 1 " and " 0 ", wherein " 1 " indicates that the block chain node is the personal part of book keeping operation, and " 0 " indicates that the block chain node is common body
Part, personal part of keeping accounts is a kind of identity for producing the node identities of block and carrying out signature verification to current block, by the body
The node of part generates and confirms the legitimacy of newest block, is then broadcast to other nodes and synchronizes newest block;Organization names
Corresponding field is entitled " Agencyinfo ", and corresponding field contents are " XX banks ";The corresponding field of status information is entitled
" status ", corresponding field contents are " -1 " and " 0 ", wherein " -1 " indicates that the block chain node is in illegal state, " 0 "
Indicate that the block chain node is in normal condition.
Step S20 is detected described waiting if there are the public key certificate in alliance's chain according to the public key certificate
Enter whether block chain node is legitimate node.
If detecting, there are the public key certificate in alliance's chain, and it is waiting according to public key certificate detection to have accessed block chain link point
Enter whether block chain node is legitimate node.Wherein, when detecting that there are the public key of block chain node to be accessed cards in alliance's chain
After book, shows that block chain node to be accessed has been audited and pass through.It is understood that the block chain node by audit, identity
Information is cognizable, therefore when the block chain node executes illegal operation in alliance's chain, can trace the block chain node
Identity information.The identity information of block chain node includes but not limited to authority public key certificate, organization names, IP address and port
Number.
Further, step S20 includes:
Step a is sent at random if there are the public key certificate in alliance's chain by the block chain link point that accessed
Number is to the block chain node to be accessed, so that the block chain node to be accessed is after receiving the random number, is based on institute
Random number is stated, digital signature is generated according to private key corresponding with public key in the public key certificate, and the digital signature is sent
Block chain link point has been accessed to described.
Further, it has accessed block chain link point and has detected whether block chain node to be accessed is legal section according to public key certificate
Point process be:If detecting, there are the public key certificate of block chain node to be accessed in alliance's chain, have accessed block chain link point
Random number is sent to block chain node to be accessed.After block chain node to be accessed receives the random number, block chain to be accessed
Node obtains its private key, and generates digital signature based on the random number received and acquired private key, generates digital signature, i.e.,
Using private key encryption random number, and the digital signature generated is sent to and has accessed block chain link point.Wherein, random number can be
The character string of number, letter or special symbol composition.In private key and public key certificate acquired in block chain node to be accessed
Public key is corresponding.In the present embodiment, it is encrypted using private key, public key decryptions;In other embodiments, public affairs can also be used
Key is encrypted, private key decryption.
Step b, when it is described accessed block chain link point and receive the digital signature after, accessed block chain link by described
Point verifies the digital signature according to the public key certificate.
Step c confirms that the block chain node to be accessed is legitimate node if digital signature authentication success.
Step d confirms that the block chain node to be accessed is illegal node if the digital signature authentication fails.
After having accessed block chain link point and receiving digital signature, having accessed block chain link point should according to public key certificate verification
Data signature.If digital signature authentication success, block chain link point is accessed and has confirmed that block chain node to be accessed is legitimate node;
If digital signature authentication fails, block chain link point is accessed and has confirmed that block chain node to be accessed is illegal node.
Accessed block chain link point is according to the process of public key certificate verification digital signature:The acquisition of block chain link point is accessed
Public key in public key certificate, and by the public key decryptions digital signature, obtain the random number in digital signature.It wherein, will be digital
Random number in signature is denoted as the second random number, will access block chain link point and be sent to the random number of block chain node to be accessed
It is denoted as the first random number.After having accessed block chain link point and getting the second random number, accessed block chain link o'clock by second with
Machine number and the first random number compare.If the second random number is identical as the first random number, digital signature authentication success is confirmed;If the
Two random numbers are different from the first random number, then confirm that digital signature authentication fails.
Step S30, if detecting, the block chain node to be accessed is legitimate node, and block chain link has been accessed by described
Point is connect with the block chain node to be accessed.
If detecting, block chain node to be accessed is legitimate node, has accessed block chain link point and block chain link to be accessed
Point connection.It is understood that after block chain node to be accessed is with having accessed block chain link point and connecting, show block to be accessed
Chain node has become work(and is added in alliance's chain where having accessed block chain link point.Wherein, accessed block chain link point with it is waiting
Enter in block chain node connection procedure, accessed IP address and port numbers that block chain link point obtains block chain node to be accessed,
It is connect with block chain node to be accessed by the IP address and port numbers.
The present embodiment by the block of the access chain link point connection procedure in block chain node to be accessed and alliance's chain,
The public key certificate that whether there is block chain node to be accessed in first detection alliance chain, then when there are blocks to be accessed in alliance's chain
After the public key certificate of chain node, detects whether block chain node to be accessed is legitimate node by the public key certificate, only detect
When to block chain node to be accessed being legitimate node, the block of the access chain link point in alliance's chain just can be with block chain link to be accessed
Point connection avoids the block chain node in illegal block chain malicious behaviors of nodes connection alliance chain, improves block chain in alliance's chain
The safety of node.
Further, step b includes:
Step b1, when it is described accessed block chain link point and receive the digital signature after, accessed block chain by described
Node obtains the Protocol IP address interconnected between the corresponding first network of the handshake request, and obtains the digital signature pair
The second IP address answered.
Step b2 judges whether first IP address and second IP address are consistent.
Step b3 verifies institute if first IP address is consistent with second IP address according to the public key certificate
State digital signature.
Further, it after having accessed block chain link point and receiving digital signature, has accessed the acquisition of block chain link point and has shaken hands and asked
Corresponding first IP (Internet Protocol, the agreement interconnected between network) address is asked, and obtains digital signature and corresponds to
The second IP address, and judge whether the first IP address consistent with the second IP address.If the first IP address and the second IP address one
It causes, has accessed block chain link point and the digital signature is then verified according to the public key certificate.Wherein, the first IP address is block to be accessed
Chain node sends handshake request to IP address used when having accessed block chain link point, and the second IP address is block chain link to be accessed
Point sends digital signature to IP address used when having accessed block chain link point.
Further, the connection method of block chain node further includes:
Step e confirms the block chain link to be accessed if first IP address and second IP address are inconsistent
Point is illegal node.
Further, if the first IP address and the second IP address are inconsistent, accessed block chain link point confirm it is to be accessed
Block chain node is illegal node.After it is illegal node to confirm block chain node to be accessed, block chain link point refusal has been accessed
It is connect with block chain node to be accessed.
The first IP address when the present embodiment sends handshake request by comparing block chain node to be accessed and send number
The second IP address when signature, only when the first IP address is consistent with the second IP address, having accessed block chain link point just can root
Verification digital signature is gone according to public key certificate, further improves the safety of block chain node in alliance's chain.
Further, the connection method second embodiment of block chain node of the present invention is proposed.
The connection method second embodiment of the block chain node and the connection method first of the block chain node are implemented
Difference lies in reference to Fig. 3, the connection method of block chain node further includes example:
Step S40, when authority identity Verification System receives the public affairs that the block chain node institutional affiliation to be accessed is sent
After key certificate and mechanism information, the mechanism information is audited by the authority identity Verification System.
Public key certificate is sent to third party trust authority CA, for institute by step S50 by the authority identity Verification System
It states CA and verifies the public key certificate, be verified as a result, and the verification result is returned to the authority identity Verification System.
When authority identity Verification System receives the public key certificate and mechanism that block chain node institutional affiliation to be accessed is sent
After information, authority identity Verification System audits mechanism information, and public key certificate is sent to CA and (generates and determine digital certificate
Third party's trust authority).After CA receives public key certificate, whether verification public key certificate is in effective status, is verified knot
Fruit, and transmit verification result to authority identity Verification System.
Wherein, mechanism information includes but unlimited organization names, business license and Institution Code.Authority identity Verification System is examined
The process of core mechanism information is:Whether what authority identity Verification System audited the mechanism has business license and Institution Code to be
It is no correct, whether organization names and the organization names on business license consistent etc..If there is business license in the mechanism, Institution Code is just
Really, and organization names are consistent with the organization names on business license etc., authority identity Verification System then confirming mechanism signal auditing
Pass through.
Whether the process in effective status is CA verification public key certificate:CA is demonstrate,proved by the root of the public key certificate of its storage
Book verifies the public key certificate, and the public key certificate is searched in its revocation list.If the public key certificate by the verification of root certificate,
And not finding the public key certificate in revocation list, CA then confirms that public key certificate is in effective status, obtains at public key certificate
In the verification result of effective status;If the public key certificate is not by the verification of root certificate, and/or finds this in revocation list
Public key certificate, CA then confirm that public key certificate is in invalid state, obtain the verification result that public key certificate is in invalid state.
It should be noted that after mechanism information is sent to CA by block chain node to be accessed, CA can audit mechanism letter
Breath.When mechanism information after the approval, CA can generating mechanism certificate, and the mechanism certificate generated is sent to block to be accessed
Chain node.After block chain node to be accessed receives mechanism certificate, its public key certificate is obtained, by mechanism information and public key certificate
It is sent to authority identity Verification System.Further, include the term of validity of public key certificate in public key certificate.If public key certificate is not
Before the deadline, also indicate that public key certificate is in invalid state;Only the public key certificate is by the verification of root certificate, and is revoking
The public key certificate is not found in list and public key certificate is in the term of validity, public key certificate is just in effective status.
Step S60 if mechanism information audit passes through, and determines that the public key certificate is according to the verification result
The public key certificate is then synchronized in alliance's chain by the authority identity Verification System by the effective status, and will be same
Step result returns to the mechanism belonging to the ingress waiting.
If authority identity Verification System confirming mechanism signal auditing passes through, and confirms that public key certificate is according to verification result
Public key certificate is then synchronized in the global configuration contract of alliance's chain by effective status, authority identity Verification System, and is tied synchronous
Fruit returns to the mechanism belonging to ingress waiting.Public key is demonstrate,proved it is understood that synchronized result is authority identity Verification System
Book is synchronized in alliance's chain as a result, by synchronized result, and mechanism can determine that public key certificate is put on record in alliance's chain success.
Wherein, it can be arranged when verification result is " 1 ", indicate that public key certificate is in effective status;When verification result is " 0 ", indicate
Public key certificate is in invalid state." 1 " and " 0 " in the present embodiment is a kind of form for distinguishing verification result, in this implementation
The form of expression of verification result is not limited in example.Further, public key certificate is synchronized in authority identity Verification System
During the global configuration contract of alliance's chain, mechanism information and public key certificate can be synchronized to connection together by authority identity Verification System
In the global configuration contract of alliance's chain, in order to determine that block chain node to be accessed is illegal node or block chain link to be accessed
When point executes illegal operation in alliance's chain network, block chain node institutional affiliation to be accessed can be determined according to mechanism information, with
It calls to account to the mechanism.
The present embodiment is by before mechanism information and public key certificate are synchronized to alliance's chain, first passing through authority identity certification
The validity of system audit mechanism information and verification public key certificate only passes through in mechanism information audit, and public key certificate is in
After effective status, mechanism information and public key certificate can be just synchronized in alliance's chain by authority identity Verification System, with further
The safety for improving the block chain node in access alliance chain, avoids illegal block chain node from being linked into alliance's chain.
Further, the connection method 3rd embodiment of block chain node of the present invention is proposed.
The connection method the first or the of the connection method 3rd embodiment of the block chain node and the block chain node
Difference lies in include two embodiments with reference to Fig. 4, step S30:
Step S31, if detecting, the block chain node to be accessed is legitimate node, and block chain link has been accessed by described
Point sends the notification message for detecting and passing through to the block chain node to be accessed, so that the block chain node to be accessed is according to institute
It states and has accessed whether block chain link point is legitimate node described in notification message detection, and block chain link has been accessed described in detecting
Point is legitimate node, has accessed the block chain link successful prompting message of point authentication described in transmission and has accessed block chain to described
Node.
Step S32, when it is described accessed block chain link point and receive the prompting message after, accessed block chain by described
Node is connect with the block chain node to be accessed.
If having accessed block chain link point detects that block chain node to be accessed is legitimate node, block chain link point has been accessed
Generate block chain nodal test to be accessed by notification message, that is, generate block chain node authentication to be accessed and successfully lead to
Know message, and the notification message is sent to block chain node to be accessed.When block chain node to be accessed receives notification message
Afterwards, block chain nodal test to be accessed has accessed whether block chain link point is legitimate node.If block chain nodal test to be accessed
To accessed block chain link point be legitimate node, block chain node to be accessed then generate accessed the point authentication of block chain link at
The prompting message of work(, and will be prompted to message and be sent to accessed block chain link point.It is carried when having accessed block chain link point and receiving this
After showing information, block chain link point is accessed and has been connect with block chain node to be accessed.Further, if block chain node to be accessed is examined
It is illegal node to measure and accessed block chain link point, and block chain node to be accessed is then refused and accessed block chain link point and connect.
It should be noted that block chain nodal test to be accessed accessed block chain link point whether be legitimate node principle
Detect whether block chain node to be accessed is that the principle of legitimate node is consistent with block chain link point has been accessed, in the present embodiment no longer
It is described in detail.
The present embodiment has accessed whether block chain link point is legitimate node by block chain nodal test to be accessed, only exists
When detecting that it is legitimate node to have accessed block chain link point, block chain node to be accessed can just connect with block chain link point has been accessed
It connects, avoids block chain node to be accessed from connecting into illegal alliance's chain, enter in illegal network, improve area to be accessed
The safety of block chain node.
Further, the connection method fourth embodiment of block chain node of the present invention is proposed.
The connection method first, second of the connection method fourth embodiment of the block chain node and the block chain node
Or difference lies in reference to Fig. 5, the connection method of block chain node further includes 3rd embodiment::
Step S70, if alliance's chain detects that the block chain node to be accessed executes illegal operation, by described
The connection of block chain link point and the block chain node to be accessed has been accessed described in alliance's chain disconnection.
If alliance's chain detects that block chain node to be accessed executes illegal operation in alliance's chain network, alliance's chain disconnects
The connection of block chain link point and block chain node to be accessed is accessed.It should be noted that when public key certificate is expired or is hung
When pin, the operation that block chain node to be accessed executes in alliance's chain belongs to illegal operation.
Further, when alliance's chain disconnects the connection relation accessed between block chain link point and block chain node to be accessed
Afterwards, the local daily record of alliance's chain output, the illegal operation to preserve the block chain node to be accessed records, and preserves and wait for bonding pad
The link information that block chain node is disconnected.It is understood that illegal operation record is performed by block chain node to be accessed
Illegal operation data, link information include IP address and port numbers of block chain link point to be connected etc..
It should be noted that after block chain node to be accessed is disconnected, which will be unable to
It connect, enters in alliance's chain with any one of alliance chain block chain node again.
Further, the connection method of block chain node further includes:
Step f, if there is no the public key certificate in alliance's chain, by it is described accessed block chain link point triggering refuse
Instruction absolutely, to be connect with the block chain node to be accessed according to refusal instruction refusal.
Further, if having accessed block chain link point detects in the global configuration contract of alliance's chain there is no area to be accessed
The public key certificate of block chain node, accessed block chain link point then trigger refusal instruction, and according to the refusal instruction refusal with it is waiting
Enter the connection of block chain node.
The present embodiment is by detecting that the block chain node accessed in alliance's chain executes illegally in alliance's chain network
When operation, the automatic connection for disconnecting the block chain node for executing illegal operation in alliance's chain, to improve the peace of alliance's chain network
Quan Xing.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium
On be stored with the linker of block chain node, the linker of the block chain node realizes institute as above when being executed by processor
The step of connection method for the block chain node stated.
Computer readable storage medium specific implementation mode of the present invention and the connection method of above-mentioned block chain node are respectively implemented
Example is essentially identical, and details are not described herein.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes
Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of connection method of block chain node, which is characterized in that the connection method of the block chain node includes following step
Suddenly:
In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, by described
It has accessed block chain link point and has detected the public key certificate that whether there is the block chain node to be accessed in alliance's chain;
If there are the public key certificate in alliance's chain, the block chain node to be accessed is detected according to the public key certificate
Whether it is legitimate node;
If detect the block chain node to be accessed be legitimate node, by it is described accessed block chain link point with it is described waiting
Enter the connection of block chain node.
2. the connection method of block chain node as described in claim 1, which is characterized in that if existing in alliance chain
The public key certificate then detects that the step of whether the block chain node to be accessed is legitimate node is wrapped according to the public key certificate
It includes:
If there are the public key certificate in alliance's chain, waited for described by the block chain link point transmission random number that accessed
Block chain link point is accessed, so that the block chain node to be accessed is after receiving the random number, is based on the random number, root
Digital signature is generated according to private key corresponding with public key in the public key certificate, and the digital signature is sent to described accessed
Block chain node;
When it is described accessed block chain link point and receive the digital signature after, by the block chain link point that accessed according to
Public key certificate verifies the digital signature;
If the digital signature authentication success confirms that the block chain node to be accessed is legitimate node;
If the digital signature authentication failure confirms that the block chain node to be accessed is illegal node.
3. the connection method of block chain node as claimed in claim 2, which is characterized in that described to have accessed block chain when described
After node receives the digital signature, signed according to the public key certificate verification number by the block chain link point that accessed
Name the step of include:
When it is described accessed block chain link point and receive the digital signature after, accessed described in block chain link point obtains by described
The Protocol IP address interconnected between the corresponding first network of handshake request, and with obtaining corresponding 2nd IP of the digital signature
Location;
Judge whether first IP address and second IP address are consistent;
If first IP address is consistent with second IP address, the digital signature is verified according to the public key certificate.
4. the connection method of block chain node as claimed in claim 3, which is characterized in that described to judge first IP address
With second IP address after whether consistent step, further include:
If first IP address and second IP address are inconsistent, confirm that the block chain node to be accessed is illegal section
Point.
5. the connection method of block chain node as described in claim 1, which is characterized in that the access when in alliance's chain
After block chain node receives the handshake request that block chain node to be accessed is sent, institute is detected by the block chain link point that accessed
Before the step of stating the public key certificate that whether there is the block chain node to be accessed in alliance's chain, further include:
When authority identity Verification System receives the public key certificate and mechanism that the block chain node institutional affiliation to be accessed is sent
After information, the mechanism information is audited by the authority identity Verification System;
Public key certificate is sent to third party trust authority CA by the authority identity Verification System, described in CA verifications
Public key certificate is verified as a result, and the verification result is returned to the authority identity Verification System;
If the mechanism information audit passes through, and determines that the public key certificate is in effective shape according to the verification result
The public key certificate is then synchronized in alliance's chain by the authority identity Verification System, and synchronized result is returned by state
To the mechanism belonging to the ingress waiting.
6. the connection method of block chain node as described in claim 1, which is characterized in that if it is described detect it is described to be accessed
Block chain node is legitimate node, then has accessed the step of block chain link point is connect with the block chain node to be accessed by described
Including:
If detecting, the block chain node to be accessed is legitimate node, has been accessed block chain link point by described to send detection logical
The notification message crossed gives the block chain node to be accessed, so that the block chain node to be accessed is examined according to the notification message
It has accessed whether block chain link point is legitimate node described in surveying, and has detected that the block chain link point that accessed is legal section
Point, send described in accessed the block chain link successful prompting message of point authentication and accessed block chain link point to described;
When it is described accessed block chain link point and receive the prompting message after, waited for described by the block chain link point that accessed
Access the connection of block chain link point.
7. the connection method of block chain node as described in claim 1, which is characterized in that the access when in alliance's chain
After block chain node receives the handshake request that block chain node to be accessed is sent, institute is detected by the block chain link point that accessed
After the step of stating the public key certificate that whether there is the block chain node to be accessed in alliance's chain, further include:
If there is no the public key certificate in alliance's chain, the triggering refusal instruction of block chain link point has been accessed by described, with
It is connect with the block chain node to be accessed according to refusal instruction refusal.
8. the connection method of block chain node as described in any one of claim 1 to 7, which is characterized in that if described detect
The block chain node to be accessed is legitimate node, then has accessed block chain link point and the block chain node to be accessed by described
After the step of connection, further include:
If alliance's chain detects that the block chain node to be accessed executes illegal operation, described in alliance's chain disconnection
The connection of block chain link point and the block chain node to be accessed is accessed.
9. a kind of connection system of block chain node, which is characterized in that the connection system of the block chain node include memory,
Microprocessor and the linker for being stored in the block chain node that can be run on the memory and on the microprocessor, institute
It states to have accessed and be realized such as any one of claim 1 to 8 institute when the linker of block chain link point is executed by the microprocessor
The step of connection method for the block chain node stated.
10. a kind of computer readable storage medium, which is characterized in that be stored with block chain on the computer readable storage medium
The linker of node realizes such as claim 1 to 8 when the linker for having accessed block chain link point is executed by processor
Any one of described in block chain node connection method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810191230.9A CN108416589A (en) | 2018-03-08 | 2018-03-08 | Connection method, system and the computer readable storage medium of block chain node |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810191230.9A CN108416589A (en) | 2018-03-08 | 2018-03-08 | Connection method, system and the computer readable storage medium of block chain node |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108416589A true CN108416589A (en) | 2018-08-17 |
Family
ID=63130549
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810191230.9A Pending CN108416589A (en) | 2018-03-08 | 2018-03-08 | Connection method, system and the computer readable storage medium of block chain node |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108416589A (en) |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108965342A (en) * | 2018-09-28 | 2018-12-07 | 真相网络科技(北京)有限公司 | The method for authenticating and system of request of data side's access data source |
CN109117674A (en) * | 2018-09-25 | 2019-01-01 | 深圳市元征科技股份有限公司 | A kind of client validation encryption method, system, equipment and computer media |
CN109218029A (en) * | 2018-09-27 | 2019-01-15 | 深圳壹账通智能科技有限公司 | The credible querying method of network credentials, device and storage medium based on block chain |
CN109543456A (en) * | 2018-11-06 | 2019-03-29 | 北京新唐思创教育科技有限公司 | Block generation method and computer storage medium |
CN109787987A (en) * | 2019-01-29 | 2019-05-21 | 国网江苏省电力有限公司无锡供电分公司 | Electric power internet-of-things terminal identity identifying method based on block chain |
CN109831418A (en) * | 2018-12-28 | 2019-05-31 | 无锡井通网络科技有限公司 | Credible alliance's chain building method, system and electronic equipment based on certificate |
CN109902210A (en) * | 2019-01-31 | 2019-06-18 | 篱笆墙网络科技有限公司 | The system of file data management |
CN109995791A (en) * | 2019-04-11 | 2019-07-09 | 清华大学 | A kind of data grant method and system |
CN110035059A (en) * | 2019-03-05 | 2019-07-19 | 深圳前海微众银行股份有限公司 | A kind of building of block chain and group partition method and device |
CN110176998A (en) * | 2019-05-17 | 2019-08-27 | 北京众享比特科技有限公司 | A kind of common recognition method, apparatus, equipment and the storage medium of proof of work |
CN110222535A (en) * | 2019-05-06 | 2019-09-10 | 平安科技(深圳)有限公司 | Processing unit, method and the storage medium of block chain configuration file |
CN110266763A (en) * | 2019-05-20 | 2019-09-20 | 深圳壹账通智能科技有限公司 | Block chain network implementation method, system and the storage medium of cross-network segment interconnection |
CN110263582A (en) * | 2019-05-10 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of account checking method based on alliance's chain, device and electronic equipment |
CN110636042A (en) * | 2019-08-14 | 2019-12-31 | 阿里巴巴集团控股有限公司 | Method, device and equipment for updating verified block height of server |
CN110868308A (en) * | 2018-08-28 | 2020-03-06 | 傲为信息技术(江苏)有限公司 | Block chain network access method and system |
CN111159750A (en) * | 2020-04-07 | 2020-05-15 | 南京邮电大学 | Automobile maintenance data storage method based on alliance chain |
WO2020119506A1 (en) * | 2018-12-14 | 2020-06-18 | 深圳壹账通智能科技有限公司 | Identity authentication method based on alliance chain, and terminal device |
CN111327564A (en) * | 2018-12-13 | 2020-06-23 | 航天信息股份有限公司 | Access method and device for alliance chain |
CN111586059A (en) * | 2020-05-09 | 2020-08-25 | 杭州安存网络科技有限公司 | Block chain machine, block chain data access authentication method and computer readable storage medium |
CN111817852A (en) * | 2019-04-10 | 2020-10-23 | 上海旺链信息科技有限公司 | Allocation chain system management method and device |
WO2020233073A1 (en) * | 2019-05-23 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Blockchain environment test method, device and apparatus, and storage medium |
CN112311735A (en) * | 2019-07-30 | 2021-02-02 | 华为技术有限公司 | Credible authentication method, network equipment, system and storage medium |
CN112492006A (en) * | 2018-10-31 | 2021-03-12 | 创新先进技术有限公司 | Node management method and device based on block chain |
CN112765684A (en) * | 2021-04-12 | 2021-05-07 | 腾讯科技(深圳)有限公司 | Block chain node terminal management method, device, equipment and storage medium |
CN112822162A (en) * | 2020-12-29 | 2021-05-18 | 重庆川仪自动化股份有限公司 | Block chain-based equipment verification connection method and system |
CN113301107A (en) * | 2021-03-30 | 2021-08-24 | 数界(深圳)科技有限公司 | Node computing platform, implementation method thereof and trusted cloud platform implementation method |
CN113572617A (en) * | 2021-07-20 | 2021-10-29 | 广州炒米信息科技有限公司 | Distributed inter-node identity authentication method based on alliance chain |
CN113886124A (en) * | 2021-10-04 | 2022-01-04 | 杭州复杂美科技有限公司 | Illegal node identification method, computer device and storage medium |
US11228446B2 (en) | 2019-05-10 | 2022-01-18 | Advanced New Technologies Co., Ltd. | Blockchain-based reconciliation method and apparatus and electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160098730A1 (en) * | 2014-10-01 | 2016-04-07 | The Filing Cabinet, LLC | System and Method for Block-Chain Verification of Goods |
CN107079037A (en) * | 2016-09-18 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Identity identifying method, device, node and system based on block chain |
CN107146087A (en) * | 2017-04-11 | 2017-09-08 | 广东网金控股股份有限公司 | A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain |
CN107426157A (en) * | 2017-04-21 | 2017-12-01 | 杭州趣链科技有限公司 | A kind of alliance's chain authority control method based on digital certificate and ca authentication system |
-
2018
- 2018-03-08 CN CN201810191230.9A patent/CN108416589A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160098730A1 (en) * | 2014-10-01 | 2016-04-07 | The Filing Cabinet, LLC | System and Method for Block-Chain Verification of Goods |
CN107079037A (en) * | 2016-09-18 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Identity identifying method, device, node and system based on block chain |
CN107146087A (en) * | 2017-04-11 | 2017-09-08 | 广东网金控股股份有限公司 | A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain |
CN107426157A (en) * | 2017-04-21 | 2017-12-01 | 杭州趣链科技有限公司 | A kind of alliance's chain authority control method based on digital certificate and ca authentication system |
Cited By (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110868308A (en) * | 2018-08-28 | 2020-03-06 | 傲为信息技术(江苏)有限公司 | Block chain network access method and system |
CN110868308B (en) * | 2018-08-28 | 2022-04-01 | 傲为有限公司 | Block chain network access method and system |
CN109117674A (en) * | 2018-09-25 | 2019-01-01 | 深圳市元征科技股份有限公司 | A kind of client validation encryption method, system, equipment and computer media |
CN109218029A (en) * | 2018-09-27 | 2019-01-15 | 深圳壹账通智能科技有限公司 | The credible querying method of network credentials, device and storage medium based on block chain |
CN109218029B (en) * | 2018-09-27 | 2023-04-21 | 深圳壹账通智能科技有限公司 | Block chain-based network certificate trusted query method, device and storage medium |
CN108965342A (en) * | 2018-09-28 | 2018-12-07 | 真相网络科技(北京)有限公司 | The method for authenticating and system of request of data side's access data source |
CN112492006B (en) * | 2018-10-31 | 2023-12-05 | 创新先进技术有限公司 | Node management method and device based on block chain |
CN112492006A (en) * | 2018-10-31 | 2021-03-12 | 创新先进技术有限公司 | Node management method and device based on block chain |
CN109543456B (en) * | 2018-11-06 | 2021-07-09 | 北京新唐思创教育科技有限公司 | Block generation method and computer storage medium |
CN109543456A (en) * | 2018-11-06 | 2019-03-29 | 北京新唐思创教育科技有限公司 | Block generation method and computer storage medium |
CN111327564B (en) * | 2018-12-13 | 2022-03-08 | 航天信息股份有限公司 | Access method and device for alliance chain |
CN111327564A (en) * | 2018-12-13 | 2020-06-23 | 航天信息股份有限公司 | Access method and device for alliance chain |
WO2020119506A1 (en) * | 2018-12-14 | 2020-06-18 | 深圳壹账通智能科技有限公司 | Identity authentication method based on alliance chain, and terminal device |
CN109831418A (en) * | 2018-12-28 | 2019-05-31 | 无锡井通网络科技有限公司 | Credible alliance's chain building method, system and electronic equipment based on certificate |
CN109787987A (en) * | 2019-01-29 | 2019-05-21 | 国网江苏省电力有限公司无锡供电分公司 | Electric power internet-of-things terminal identity identifying method based on block chain |
CN109902210A (en) * | 2019-01-31 | 2019-06-18 | 篱笆墙网络科技有限公司 | The system of file data management |
CN110035059A (en) * | 2019-03-05 | 2019-07-19 | 深圳前海微众银行股份有限公司 | A kind of building of block chain and group partition method and device |
CN111817852A (en) * | 2019-04-10 | 2020-10-23 | 上海旺链信息科技有限公司 | Allocation chain system management method and device |
CN109995791A (en) * | 2019-04-11 | 2019-07-09 | 清华大学 | A kind of data grant method and system |
CN109995791B (en) * | 2019-04-11 | 2020-11-03 | 清华大学 | Data authorization method and system |
CN110222535A (en) * | 2019-05-06 | 2019-09-10 | 平安科技(深圳)有限公司 | Processing unit, method and the storage medium of block chain configuration file |
CN110222535B (en) * | 2019-05-06 | 2024-03-12 | 平安科技(深圳)有限公司 | Processing device, method and storage medium for block chain configuration file |
US11228446B2 (en) | 2019-05-10 | 2022-01-18 | Advanced New Technologies Co., Ltd. | Blockchain-based reconciliation method and apparatus and electronic device |
CN110263582A (en) * | 2019-05-10 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of account checking method based on alliance's chain, device and electronic equipment |
CN110176998A (en) * | 2019-05-17 | 2019-08-27 | 北京众享比特科技有限公司 | A kind of common recognition method, apparatus, equipment and the storage medium of proof of work |
CN110266763A (en) * | 2019-05-20 | 2019-09-20 | 深圳壹账通智能科技有限公司 | Block chain network implementation method, system and the storage medium of cross-network segment interconnection |
CN110266763B (en) * | 2019-05-20 | 2022-04-12 | 深圳壹账通智能科技有限公司 | Method, system and storage medium for implementing block chain network interconnected across network segments |
WO2020233073A1 (en) * | 2019-05-23 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Blockchain environment test method, device and apparatus, and storage medium |
CN112311735A (en) * | 2019-07-30 | 2021-02-02 | 华为技术有限公司 | Credible authentication method, network equipment, system and storage medium |
WO2021018088A1 (en) * | 2019-07-30 | 2021-02-04 | 华为技术有限公司 | Trusted authentication method, network device, system and storage medium |
CN112311735B (en) * | 2019-07-30 | 2021-11-19 | 华为技术有限公司 | Credible authentication method, network equipment, system and storage medium |
CN110636042A (en) * | 2019-08-14 | 2019-12-31 | 阿里巴巴集团控股有限公司 | Method, device and equipment for updating verified block height of server |
CN111159750A (en) * | 2020-04-07 | 2020-05-15 | 南京邮电大学 | Automobile maintenance data storage method based on alliance chain |
CN111586059A (en) * | 2020-05-09 | 2020-08-25 | 杭州安存网络科技有限公司 | Block chain machine, block chain data access authentication method and computer readable storage medium |
CN112822162A (en) * | 2020-12-29 | 2021-05-18 | 重庆川仪自动化股份有限公司 | Block chain-based equipment verification connection method and system |
CN112822162B (en) * | 2020-12-29 | 2023-05-23 | 重庆川仪自动化股份有限公司 | Equipment verification connection method and system based on block chain |
CN113301107A (en) * | 2021-03-30 | 2021-08-24 | 数界(深圳)科技有限公司 | Node computing platform, implementation method thereof and trusted cloud platform implementation method |
CN112765684A (en) * | 2021-04-12 | 2021-05-07 | 腾讯科技(深圳)有限公司 | Block chain node terminal management method, device, equipment and storage medium |
CN113572617A (en) * | 2021-07-20 | 2021-10-29 | 广州炒米信息科技有限公司 | Distributed inter-node identity authentication method based on alliance chain |
CN113572617B (en) * | 2021-07-20 | 2023-05-26 | 广州炒米信息科技有限公司 | Distributed inter-node identity authentication method based on alliance chain |
CN113886124A (en) * | 2021-10-04 | 2022-01-04 | 杭州复杂美科技有限公司 | Illegal node identification method, computer device and storage medium |
CN113886124B (en) * | 2021-10-04 | 2023-05-30 | 杭州复杂美科技有限公司 | Illegal node identification method, computer device, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108416589A (en) | Connection method, system and the computer readable storage medium of block chain node | |
CN101183932B (en) | Security identification system of wireless application service and login and entry method thereof | |
CN102946384B (en) | User authentication method and equipment | |
CN109509518A (en) | Management method, server and the computer storage medium of electronic health record | |
CN110291757A (en) | For providing the method for simplified account register service, user authentication service and utilizing its certificate server | |
CN109522726A (en) | Method for authenticating, server and the computer readable storage medium of small routine | |
CN108881167A (en) | A kind of intelligent contract of finite field block catenary system | |
CN107306183A (en) | Client, service end, method and authentication system | |
CN110493237A (en) | Identity management method, device, computer equipment and storage medium | |
CN106209383B (en) | A kind of method and device of mobile payment security certification | |
TW200820716A (en) | Method and apparatus for providing trusted single sign-on access to applications and internet-based services | |
CN112733178B (en) | Cross-chain trust method, device, equipment and medium based on digital certificate authentication | |
CN107579991A (en) | A kind of method that high in the clouds protection certification is carried out to client, server and client side | |
CN110149328A (en) | Interface method for authenticating, device, equipment and computer readable storage medium | |
CN104125230B (en) | A kind of short message certification service system and authentication method | |
CN109981287A (en) | A kind of code signature method and its storage medium | |
CN106101160A (en) | A kind of system login method and device | |
CN111460457A (en) | Real estate property registration supervision method, device, electronic equipment and storage medium | |
CN110247758A (en) | The method, apparatus and code management device of Password Management | |
CN109474600A (en) | A kind of account binding method, system, device and its equipment | |
CN103401686B (en) | A kind of user's OTP WEB Authentication System and application process thereof | |
CN108718323A (en) | A kind of identity identifying method and system | |
CN109829722A (en) | A kind of user identity real name identification method of electronic fare payment system | |
US20170104748A1 (en) | System and method for managing network access with a certificate having soft expiration | |
CN104821951B (en) | A kind of method and apparatus of secure communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180817 |
|
RJ01 | Rejection of invention patent application after publication |