CN108416589A - Connection method, system and the computer readable storage medium of block chain node - Google Patents

Connection method, system and the computer readable storage medium of block chain node Download PDF

Info

Publication number
CN108416589A
CN108416589A CN201810191230.9A CN201810191230A CN108416589A CN 108416589 A CN108416589 A CN 108416589A CN 201810191230 A CN201810191230 A CN 201810191230A CN 108416589 A CN108416589 A CN 108416589A
Authority
CN
China
Prior art keywords
block chain
accessed
node
chain node
link point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810191230.9A
Other languages
Chinese (zh)
Inventor
陈贯策
苏裕辉
张开翔
范瑞彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN201810191230.9A priority Critical patent/CN108416589A/en
Publication of CN108416589A publication Critical patent/CN108416589A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The invention discloses a kind of connection method, system and the computer readable storage mediums of block chain node, and the method comprising the steps of:In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, by it is described accessed block chain link point and detected whether there is the public key certificate of the block chain node to be accessed in alliance's chain;If there are the public key certificate in alliance's chain, detect whether the block chain node to be accessed is legitimate node according to the public key certificate;If detecting, the block chain node to be accessed is legitimate node, is connect with the block chain node to be accessed by the block chain link point that accessed.The invention avoids the block chain nodes in illegal block chain malicious behaviors of nodes connection alliance chain, improve the safety of block chain node in alliance's chain.

Description

Connection method, system and the computer readable storage medium of block chain node
Technical field
The present invention relates to block chain technical field more particularly to a kind of connection method, system and the calculating of block chain node Machine readable storage medium storing program for executing.
Background technology
Block chain is the distributed account book database of decentralization.Block chain itself is to be produced using cryptographic algorithm for a string Raw data block contains multiple block chain network in each data block and merchandises the information effectively confirmed.And alliance's chain is then situated between Between publicly-owned chain and privately owned chain, a block chain is safeguarded by several tissues together cooperation, the use of the block chain must be had The management of permission, relevant information can be protected, typical such as financial institution.
Alliance's chain joint connecting method is at present:When some block chain node is wanted and some block in alliance's chain When chain node connects, as long as after getting the block chain password of alliance's chain, you can with any one block chain node in alliance chain Connection.If block chain password acquired in some illegal block chain node is consistent with the block chain password of alliance chain by chance, or The illegal block chain malicious behaviors of nodes repeatedly attempts different block chain passwords, and success connects with the block chain node in alliance's chain It connects, is connect with the block chain node in alliance chain so as to cause illegal block chain node, reduce block chain node in alliance's chain Safety.
Invention content
The main purpose of the present invention is to provide a kind of connection method of block chain node, system and computer-readable storages Medium, it is intended to solve the technical problem that block chain node security is low in existing alliance's chain.
To achieve the above object, the present invention provides a kind of connection method of block chain node, the company of the block chain node The method of connecing includes step:
In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, by The block chain link point that accessed detects the public key certificate that whether there is the block chain node to be accessed in alliance's chain;
If there are the public key certificate in alliance's chain, the block chain to be accessed is detected according to the public key certificate Whether node is legitimate node;
If detect the block chain node to be accessed be legitimate node, by it is described accessed block chain link point with it is described Block chain node connection to be accessed.
Preferably, if there are the public key certificate in alliance chain, according to public key certificate detection The step of whether block chain node to be accessed is legitimate node include:
If there are the public key certificate in alliance's chain, random number is sent to institute by the block chain link point that accessed Block chain node to be accessed is stated, so that the block chain node to be accessed is after receiving the random number, based on described random Number generates digital signature according to private key corresponding with public key in the public key certificate, and the digital signature is sent to described Block chain link point is accessed;
When it is described accessed block chain link point and receive the digital signature after, by it is described accessed block chain link point according to The public key certificate verifies the digital signature;
If the digital signature authentication success confirms that the block chain node to be accessed is legitimate node;
If the digital signature authentication failure confirms that the block chain node to be accessed is illegal node.
Preferably, it is described when it is described accessed block chain link point and receive the digital signature after, by the access area Block chain node according to the public key certificate verify the digital signature the step of include:
When it is described accessed block chain link point and receive the digital signature after, obtained by the block chain link point that accessed The Protocol IP address interconnected between the corresponding first network of the handshake request, and obtain the digital signature corresponding second IP address;
Judge whether first IP address and second IP address are consistent;
If first IP address is consistent with second IP address, signed according to the public key certificate verification number Name.
Preferably, described to judge that first IP address with after the whether consistent step of second IP address, is also wrapped It includes:
If first IP address and second IP address are inconsistent, confirm that the block chain node to be accessed is non- Method node.
Preferably, the block chain link point that accessed when in alliance's chain receives holding for block chain node transmission to be accessed After hand request, detected in alliance's chain with the presence or absence of the block chain node to be accessed by the block chain link point that accessed Before the step of public key certificate, further include:
When authority identity Verification System receive the public key certificate that the block chain node institutional affiliation to be accessed is sent and After mechanism information, the mechanism information is audited by the authority identity Verification System;
Public key certificate is sent to third party trust authority CA by the authority identity Verification System, so that the CA is verified The public key certificate is verified as a result, and the verification result is returned to the authority identity Verification System;
If the mechanism information audit passes through, and determines that the public key certificate is in described effective according to the verification result The public key certificate is then synchronized in alliance's chain by the authority identity Verification System, and synchronized result is returned by state Back to the mechanism belonging to the ingress waiting.
Preferably, if described detect that the block chain node to be accessed is legitimate node, block has been accessed by described The step of chain node is connect with the block chain node to be accessed include:
If detecting, the block chain node to be accessed is legitimate node, and inspection is sent by the block chain link point that accessed The notification message passed through is surveyed to the block chain node to be accessed, so that the block chain node to be accessed disappears according to the notice It has accessed whether block chain link point is legitimate node described in breath detection, and has detected that the block chain link point that accessed is legal Node, send described in accessed the block chain link successful prompting message of point authentication and accessed block chain link point to described;
When it is described accessed block chain link point and receive the prompting message after, accessed block chain link point and institute by described State block chain node connection to be accessed.
Preferably, the block chain link point that accessed when in alliance's chain receives holding for block chain node transmission to be accessed After hand request, detected in alliance's chain with the presence or absence of the block chain node to be accessed by the block chain link point that accessed After the step of public key certificate, further include:
If there is no the public key certificate in alliance's chain, referred to by the block chain link point triggering refusal that accessed It enables, to be connect with the block chain node to be accessed according to refusal instruction refusal.
Preferably, if described detect that the block chain node to be accessed is legitimate node, block has been accessed by described After the step of chain node is connect with the block chain node to be accessed, further include:
If alliance's chain detects that the block chain node to be accessed executes illegal operation, disconnected by alliance's chain The connection for having accessed block chain link point and the block chain node to be accessed.
In addition, to achieve the above object, the present invention also provides a kind of connection system of block chain node, the block chain links The connection system of point includes memory, microprocessor and is stored in the area that can be run on the memory and on the processor It is realized when the linker of the linker of block chain node, the block chain node is executed by the microprocessor as described above The step of connection method of block chain node.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium The linker of block chain node is stored on storage medium, it is real when the linker of the block chain node is executed by processor Now the step of connection method of block chain node as described above.
The present invention is by the block of the access chain link point connection procedure in block chain node to be accessed and alliance's chain, first The public key certificate that whether there is block chain node to be accessed in alliance's chain is detected, then when there are block chains to be accessed in alliance's chain After the public key certificate of node, detects whether block chain node to be accessed is legitimate node by the public key certificate, only detect When block chain node to be accessed is legitimate node, the block of the access chain link point in alliance's chain just can be with block chain node to be accessed Connection avoids the block chain node in illegal block chain malicious behaviors of nodes connection alliance chain, improves block chain link in alliance's chain The safety of point.
Description of the drawings
Fig. 1 is the structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the connection method first embodiment of block chain node of the present invention;
Fig. 3 is the flow diagram of the connection method second embodiment of block chain node of the present invention;
If Fig. 4 is to detect that the block chain node to be accessed is legitimate node in the embodiment of the present invention, by it is described A kind of flow diagram that access block chain link point is connect with the block chain node to be accessed;
Fig. 5 is the flow diagram of the connection method fourth embodiment of block chain node of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, the structural schematic diagram for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to.
It should be noted that Fig. 1 can be the structural schematic diagram of the hardware running environment of the connection system of block chain node. The connection system of block chain node of the embodiment of the present invention can be PC, the terminal devices such as pocket computer.
As shown in Figure 1, the terminal may include:Processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 may include optionally that the wired of standard connects Mouth, wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory, can also be stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
It will be understood by those skilled in the art that the connection system structure of block chain node shown in Fig. 1 is not constituted pair The restriction of the connection system of block chain node may include components more more or fewer than diagram, or combine certain components, or The different component arrangement of person.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage media The linker of letter module, Subscriber Interface Module SIM and block chain node.Wherein, operating system is management and control block chain link The program of the connection system hardware and software resource of point supports the linker and other softwares or program of block chain node Operation.
In the connection system of block chain node shown in Fig. 1, user interface 1003 is mainly used for connecting client (user End), with client into row data communication;Network interface 1004 is mainly used for connecting alliance's chain, mechanism, CA and authority identity certification System;And processor 1001 can be used for calling the linker of block chain node stored in memory 1005, and execute with Lower operation:
In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, by The block chain link point that accessed detects the public key certificate that whether there is the block chain node to be accessed in alliance's chain;
If there are the public key certificate in alliance's chain, the block chain to be accessed is detected according to the public key certificate Whether node is legitimate node;
If detect the block chain node to be accessed be legitimate node, by it is described accessed block chain link point with it is described Block chain node connection to be accessed.
Further, if there are the public key certificate in alliance chain, institute is detected according to the public key certificate State that the step of whether block chain node to be accessed is legitimate node includes:
If there are the public key certificate in alliance's chain, random number is sent to institute by the block chain link point that accessed Block chain node to be accessed is stated, so that the block chain node to be accessed is after receiving the random number, based on described random Number generates digital signature according to private key corresponding with public key in the public key certificate, and the digital signature is sent to described Block chain link point is accessed;
When it is described accessed block chain link point and receive the digital signature after, by it is described accessed block chain link point according to The public key certificate verifies the digital signature;
If the digital signature authentication success confirms that the block chain node to be accessed is legitimate node;
If the digital signature authentication failure confirms that the block chain node to be accessed is illegal node.
Further, it is described when it is described accessed block chain link point and receive the digital signature after, accessed by described Block chain node according to the public key certificate verify the digital signature the step of include:
When it is described accessed block chain link point and receive the digital signature after, obtained by the block chain link point that accessed The Protocol IP address interconnected between the corresponding first network of the handshake request, and obtain the digital signature corresponding second IP address;
Judge whether first IP address and second IP address are consistent;
If first IP address is consistent with second IP address, signed according to the public key certificate verification number Name.
Further, it is described judge first IP address and the whether consistent step of second IP address after, it is micro- Processor 10 can be also used for calling the linker of the block chain node stored in memory, and execute following steps:
If first IP address and second IP address are inconsistent, confirm that the block chain node to be accessed is non- Method node.
Further, the block chain link point that accessed when in alliance's chain receives what block chain node to be accessed was sent After handshake request, detected in alliance's chain with the presence or absence of the block chain node to be accessed by the block chain link point that accessed Public key certificate the step of before, microprocessor 10 can be also used for calling the connection journey of block chain node stored in memory Sequence, and execute following steps:
When authority identity Verification System receive the public key certificate that the block chain node institutional affiliation to be accessed is sent and After mechanism information, the mechanism information is audited by the authority identity Verification System;
Public key certificate is sent to third party trust authority CA by the authority identity Verification System, so that the CA is verified The public key certificate is verified as a result, and the verification result is returned to the authority identity Verification System;
If the mechanism information audit passes through, and determines that the public key certificate is in described effective according to the verification result The public key certificate is then synchronized in alliance's chain by the authority identity Verification System, and synchronized result is returned by state Back to the mechanism belonging to the ingress waiting.
Further, if described detect that the block chain node to be accessed is legitimate node, by the access area The step of block chain node is connect with the block chain node to be accessed include:
If detecting, the block chain node to be accessed is legitimate node, and inspection is sent by the block chain link point that accessed The notification message passed through is surveyed to the block chain node to be accessed, so that the block chain node to be accessed disappears according to the notice It has accessed whether block chain link point is legitimate node described in breath detection, and has detected that the block chain link point that accessed is legal Node, send described in accessed the block chain link successful prompting message of point authentication and accessed block chain link point to described;
When it is described accessed block chain link point and receive the prompting message after, accessed block chain link point and institute by described State block chain node connection to be accessed.
Further, the block chain link point that accessed when in alliance's chain receives what block chain node to be accessed was sent After handshake request, detected in alliance's chain with the presence or absence of the block chain node to be accessed by the block chain link point that accessed Public key certificate the step of after, microprocessor can be also used for calling the connection journey of block chain node stored in memory Sequence, and execute following steps:
If there is no the public key certificate in alliance's chain, referred to by the block chain link point triggering refusal that accessed It enables, to be connect with the block chain node to be accessed according to refusal instruction refusal.
Further, if described detect that the block chain node to be accessed is legitimate node, by the access area After the step of block chain node is connect with the block chain node to be accessed, microprocessor can be also used for calling and be deposited in memory The linker of the block chain node of storage, and execute following steps:
If alliance's chain detects that the block chain node to be accessed executes illegal operation, disconnected by alliance's chain The connection for having accessed block chain link point and the block chain node to be accessed.
Based on above-mentioned structure, each embodiment of the connection method of block chain node is proposed.
It is the flow diagram of the connection method first embodiment of block chain node of the present invention with reference to Fig. 2, Fig. 2.
An embodiment of the present invention provides the embodiments of the connection method of block chain node, it should be noted that although flowing Logical order is shown in journey figure, but in some cases, it can be with different from shown or described by sequence execution herein The step of.
The connection method of block chain node includes:
Step S10, when the block chain link point that accessed in alliance's chain receives shaking hands for block chain node transmission to be accessed After request, by it is described accessed block chain link point detect in alliance's chain whether there is the block chain node to be accessed public affairs Key certificate.
In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, Access the public key certificate that whether there is block chain node to be accessed in the global configuration contract of block chain link point detection alliance chain.Its In, block chain link point has been accessed as the block chain node in alliance's chain.In the present embodiment, having accessed block chain link point can For one or two or more.Block chain node to be accessed is not access in alliance's chain, is needed and its in alliance chain In one or more block chain node connect node.Mechanism refer to the organ of constituted by law, cause, enterprise, corporations and its The unit of his nomocracy, it is all that the node in alliance's chain is subordinate to mechanism, can be positioned according to alliance's chain interior joint information belonging to Mechanism.Node refers to participating in block chain network, is traded the network node with data exchange, and each independent agency can be with It gathers around there are one multiple transaction nodes are arrived, each transaction node is one group of physical network, computer, block chain application software and number According to the combination in library.Between node and node, pass through TCP/IP (Transmission Control Protocol/Internet Protocol, transmission control protocol/Internet Protocol) agreement interconnection.
After having accessed block chain link point and receiving handshake request, having accessed block chain link point can be from local profile It loads in current alliance's chain in the configuration information to memory of whole nodes, in order to establish company with block chain node to be accessed Detect whether block chain node to be accessed is legitimate node in termination process.It is connect it should be noted that block chain link point ought have been accessed After receiving the handshake request that block chain node to be accessed is sent, show having connect in the desired chain with alliance of block chain node to be accessed Enter the connection of block chain node.
Wherein, configuration information is pre-configured in alliance's chain.Configuration information includes having accessed belonging to block chain link point Mechanism CertPubKey, mechanism certificate and private key, node description, IP address and port numbers of mechanism etc.;Block chain node to be accessed IP address, port numbers, the public key certificate of institutional affiliation and node description etc..Such as in alliance's chain, the section of some block chain node The corresponding field of point description is entitled " Nodedesc ", and corresponding field contents are " description of node 1 ";The corresponding field of IP address Entitled " Perrip ", corresponding field contents are " 127.0.0.1 ";The corresponding field of port numbers is entitled " Port ", corresponding word Section content is " 30303 ";The corresponding field of mechanism CertPubKey is entitled " publickey ", and corresponding field contents are " --- -- BEGIN CERTIFICATE-----MIICWDCCAcGgAwIBAgIJAOV3EU5rFx4NMAQQIDApTb-----END CERTIFICATE-----”;The corresponding field of mechanism certificate and private key is entitled " privatekey ", and corresponding field contents are “-----BEGIN RSA PRIVATE KEY-----MIICXAIBAAKBgQD1dyyZredY6EMNBEdmOuMStw/ bRfYhsT7wPv3JM++FDUxgittP....”。
Further, configuration information may also include identity type, organization names and status information of block chain node etc..Such as In alliance's chain, the field of some corresponding identity type of block chain node is entitled " Identitytype ", corresponding field content For " 1 " and " 0 ", wherein " 1 " indicates that the block chain node is the personal part of book keeping operation, and " 0 " indicates that the block chain node is common body Part, personal part of keeping accounts is a kind of identity for producing the node identities of block and carrying out signature verification to current block, by the body The node of part generates and confirms the legitimacy of newest block, is then broadcast to other nodes and synchronizes newest block;Organization names Corresponding field is entitled " Agencyinfo ", and corresponding field contents are " XX banks ";The corresponding field of status information is entitled " status ", corresponding field contents are " -1 " and " 0 ", wherein " -1 " indicates that the block chain node is in illegal state, " 0 " Indicate that the block chain node is in normal condition.
Step S20 is detected described waiting if there are the public key certificate in alliance's chain according to the public key certificate Enter whether block chain node is legitimate node.
If detecting, there are the public key certificate in alliance's chain, and it is waiting according to public key certificate detection to have accessed block chain link point Enter whether block chain node is legitimate node.Wherein, when detecting that there are the public key of block chain node to be accessed cards in alliance's chain After book, shows that block chain node to be accessed has been audited and pass through.It is understood that the block chain node by audit, identity Information is cognizable, therefore when the block chain node executes illegal operation in alliance's chain, can trace the block chain node Identity information.The identity information of block chain node includes but not limited to authority public key certificate, organization names, IP address and port Number.
Further, step S20 includes:
Step a is sent at random if there are the public key certificate in alliance's chain by the block chain link point that accessed Number is to the block chain node to be accessed, so that the block chain node to be accessed is after receiving the random number, is based on institute Random number is stated, digital signature is generated according to private key corresponding with public key in the public key certificate, and the digital signature is sent Block chain link point has been accessed to described.
Further, it has accessed block chain link point and has detected whether block chain node to be accessed is legal section according to public key certificate Point process be:If detecting, there are the public key certificate of block chain node to be accessed in alliance's chain, have accessed block chain link point Random number is sent to block chain node to be accessed.After block chain node to be accessed receives the random number, block chain to be accessed Node obtains its private key, and generates digital signature based on the random number received and acquired private key, generates digital signature, i.e., Using private key encryption random number, and the digital signature generated is sent to and has accessed block chain link point.Wherein, random number can be The character string of number, letter or special symbol composition.In private key and public key certificate acquired in block chain node to be accessed Public key is corresponding.In the present embodiment, it is encrypted using private key, public key decryptions;In other embodiments, public affairs can also be used Key is encrypted, private key decryption.
Step b, when it is described accessed block chain link point and receive the digital signature after, accessed block chain link by described Point verifies the digital signature according to the public key certificate.
Step c confirms that the block chain node to be accessed is legitimate node if digital signature authentication success.
Step d confirms that the block chain node to be accessed is illegal node if the digital signature authentication fails.
After having accessed block chain link point and receiving digital signature, having accessed block chain link point should according to public key certificate verification Data signature.If digital signature authentication success, block chain link point is accessed and has confirmed that block chain node to be accessed is legitimate node; If digital signature authentication fails, block chain link point is accessed and has confirmed that block chain node to be accessed is illegal node.
Accessed block chain link point is according to the process of public key certificate verification digital signature:The acquisition of block chain link point is accessed Public key in public key certificate, and by the public key decryptions digital signature, obtain the random number in digital signature.It wherein, will be digital Random number in signature is denoted as the second random number, will access block chain link point and be sent to the random number of block chain node to be accessed It is denoted as the first random number.After having accessed block chain link point and getting the second random number, accessed block chain link o'clock by second with Machine number and the first random number compare.If the second random number is identical as the first random number, digital signature authentication success is confirmed;If the Two random numbers are different from the first random number, then confirm that digital signature authentication fails.
Step S30, if detecting, the block chain node to be accessed is legitimate node, and block chain link has been accessed by described Point is connect with the block chain node to be accessed.
If detecting, block chain node to be accessed is legitimate node, has accessed block chain link point and block chain link to be accessed Point connection.It is understood that after block chain node to be accessed is with having accessed block chain link point and connecting, show block to be accessed Chain node has become work(and is added in alliance's chain where having accessed block chain link point.Wherein, accessed block chain link point with it is waiting Enter in block chain node connection procedure, accessed IP address and port numbers that block chain link point obtains block chain node to be accessed, It is connect with block chain node to be accessed by the IP address and port numbers.
The present embodiment by the block of the access chain link point connection procedure in block chain node to be accessed and alliance's chain, The public key certificate that whether there is block chain node to be accessed in first detection alliance chain, then when there are blocks to be accessed in alliance's chain After the public key certificate of chain node, detects whether block chain node to be accessed is legitimate node by the public key certificate, only detect When to block chain node to be accessed being legitimate node, the block of the access chain link point in alliance's chain just can be with block chain link to be accessed Point connection avoids the block chain node in illegal block chain malicious behaviors of nodes connection alliance chain, improves block chain in alliance's chain The safety of node.
Further, step b includes:
Step b1, when it is described accessed block chain link point and receive the digital signature after, accessed block chain by described Node obtains the Protocol IP address interconnected between the corresponding first network of the handshake request, and obtains the digital signature pair The second IP address answered.
Step b2 judges whether first IP address and second IP address are consistent.
Step b3 verifies institute if first IP address is consistent with second IP address according to the public key certificate State digital signature.
Further, it after having accessed block chain link point and receiving digital signature, has accessed the acquisition of block chain link point and has shaken hands and asked Corresponding first IP (Internet Protocol, the agreement interconnected between network) address is asked, and obtains digital signature and corresponds to The second IP address, and judge whether the first IP address consistent with the second IP address.If the first IP address and the second IP address one It causes, has accessed block chain link point and the digital signature is then verified according to the public key certificate.Wherein, the first IP address is block to be accessed Chain node sends handshake request to IP address used when having accessed block chain link point, and the second IP address is block chain link to be accessed Point sends digital signature to IP address used when having accessed block chain link point.
Further, the connection method of block chain node further includes:
Step e confirms the block chain link to be accessed if first IP address and second IP address are inconsistent Point is illegal node.
Further, if the first IP address and the second IP address are inconsistent, accessed block chain link point confirm it is to be accessed Block chain node is illegal node.After it is illegal node to confirm block chain node to be accessed, block chain link point refusal has been accessed It is connect with block chain node to be accessed.
The first IP address when the present embodiment sends handshake request by comparing block chain node to be accessed and send number The second IP address when signature, only when the first IP address is consistent with the second IP address, having accessed block chain link point just can root Verification digital signature is gone according to public key certificate, further improves the safety of block chain node in alliance's chain.
Further, the connection method second embodiment of block chain node of the present invention is proposed.
The connection method second embodiment of the block chain node and the connection method first of the block chain node are implemented Difference lies in reference to Fig. 3, the connection method of block chain node further includes example:
Step S40, when authority identity Verification System receives the public affairs that the block chain node institutional affiliation to be accessed is sent After key certificate and mechanism information, the mechanism information is audited by the authority identity Verification System.
Public key certificate is sent to third party trust authority CA, for institute by step S50 by the authority identity Verification System It states CA and verifies the public key certificate, be verified as a result, and the verification result is returned to the authority identity Verification System.
When authority identity Verification System receives the public key certificate and mechanism that block chain node institutional affiliation to be accessed is sent After information, authority identity Verification System audits mechanism information, and public key certificate is sent to CA and (generates and determine digital certificate Third party's trust authority).After CA receives public key certificate, whether verification public key certificate is in effective status, is verified knot Fruit, and transmit verification result to authority identity Verification System.
Wherein, mechanism information includes but unlimited organization names, business license and Institution Code.Authority identity Verification System is examined The process of core mechanism information is:Whether what authority identity Verification System audited the mechanism has business license and Institution Code to be It is no correct, whether organization names and the organization names on business license consistent etc..If there is business license in the mechanism, Institution Code is just Really, and organization names are consistent with the organization names on business license etc., authority identity Verification System then confirming mechanism signal auditing Pass through.
Whether the process in effective status is CA verification public key certificate:CA is demonstrate,proved by the root of the public key certificate of its storage Book verifies the public key certificate, and the public key certificate is searched in its revocation list.If the public key certificate by the verification of root certificate, And not finding the public key certificate in revocation list, CA then confirms that public key certificate is in effective status, obtains at public key certificate In the verification result of effective status;If the public key certificate is not by the verification of root certificate, and/or finds this in revocation list Public key certificate, CA then confirm that public key certificate is in invalid state, obtain the verification result that public key certificate is in invalid state.
It should be noted that after mechanism information is sent to CA by block chain node to be accessed, CA can audit mechanism letter Breath.When mechanism information after the approval, CA can generating mechanism certificate, and the mechanism certificate generated is sent to block to be accessed Chain node.After block chain node to be accessed receives mechanism certificate, its public key certificate is obtained, by mechanism information and public key certificate It is sent to authority identity Verification System.Further, include the term of validity of public key certificate in public key certificate.If public key certificate is not Before the deadline, also indicate that public key certificate is in invalid state;Only the public key certificate is by the verification of root certificate, and is revoking The public key certificate is not found in list and public key certificate is in the term of validity, public key certificate is just in effective status.
Step S60 if mechanism information audit passes through, and determines that the public key certificate is according to the verification result The public key certificate is then synchronized in alliance's chain by the authority identity Verification System by the effective status, and will be same Step result returns to the mechanism belonging to the ingress waiting.
If authority identity Verification System confirming mechanism signal auditing passes through, and confirms that public key certificate is according to verification result Public key certificate is then synchronized in the global configuration contract of alliance's chain by effective status, authority identity Verification System, and is tied synchronous Fruit returns to the mechanism belonging to ingress waiting.Public key is demonstrate,proved it is understood that synchronized result is authority identity Verification System Book is synchronized in alliance's chain as a result, by synchronized result, and mechanism can determine that public key certificate is put on record in alliance's chain success. Wherein, it can be arranged when verification result is " 1 ", indicate that public key certificate is in effective status;When verification result is " 0 ", indicate Public key certificate is in invalid state." 1 " and " 0 " in the present embodiment is a kind of form for distinguishing verification result, in this implementation The form of expression of verification result is not limited in example.Further, public key certificate is synchronized in authority identity Verification System During the global configuration contract of alliance's chain, mechanism information and public key certificate can be synchronized to connection together by authority identity Verification System In the global configuration contract of alliance's chain, in order to determine that block chain node to be accessed is illegal node or block chain link to be accessed When point executes illegal operation in alliance's chain network, block chain node institutional affiliation to be accessed can be determined according to mechanism information, with It calls to account to the mechanism.
The present embodiment is by before mechanism information and public key certificate are synchronized to alliance's chain, first passing through authority identity certification The validity of system audit mechanism information and verification public key certificate only passes through in mechanism information audit, and public key certificate is in After effective status, mechanism information and public key certificate can be just synchronized in alliance's chain by authority identity Verification System, with further The safety for improving the block chain node in access alliance chain, avoids illegal block chain node from being linked into alliance's chain.
Further, the connection method 3rd embodiment of block chain node of the present invention is proposed.
The connection method the first or the of the connection method 3rd embodiment of the block chain node and the block chain node Difference lies in include two embodiments with reference to Fig. 4, step S30:
Step S31, if detecting, the block chain node to be accessed is legitimate node, and block chain link has been accessed by described Point sends the notification message for detecting and passing through to the block chain node to be accessed, so that the block chain node to be accessed is according to institute It states and has accessed whether block chain link point is legitimate node described in notification message detection, and block chain link has been accessed described in detecting Point is legitimate node, has accessed the block chain link successful prompting message of point authentication described in transmission and has accessed block chain to described Node.
Step S32, when it is described accessed block chain link point and receive the prompting message after, accessed block chain by described Node is connect with the block chain node to be accessed.
If having accessed block chain link point detects that block chain node to be accessed is legitimate node, block chain link point has been accessed Generate block chain nodal test to be accessed by notification message, that is, generate block chain node authentication to be accessed and successfully lead to Know message, and the notification message is sent to block chain node to be accessed.When block chain node to be accessed receives notification message Afterwards, block chain nodal test to be accessed has accessed whether block chain link point is legitimate node.If block chain nodal test to be accessed To accessed block chain link point be legitimate node, block chain node to be accessed then generate accessed the point authentication of block chain link at The prompting message of work(, and will be prompted to message and be sent to accessed block chain link point.It is carried when having accessed block chain link point and receiving this After showing information, block chain link point is accessed and has been connect with block chain node to be accessed.Further, if block chain node to be accessed is examined It is illegal node to measure and accessed block chain link point, and block chain node to be accessed is then refused and accessed block chain link point and connect.
It should be noted that block chain nodal test to be accessed accessed block chain link point whether be legitimate node principle Detect whether block chain node to be accessed is that the principle of legitimate node is consistent with block chain link point has been accessed, in the present embodiment no longer It is described in detail.
The present embodiment has accessed whether block chain link point is legitimate node by block chain nodal test to be accessed, only exists When detecting that it is legitimate node to have accessed block chain link point, block chain node to be accessed can just connect with block chain link point has been accessed It connects, avoids block chain node to be accessed from connecting into illegal alliance's chain, enter in illegal network, improve area to be accessed The safety of block chain node.
Further, the connection method fourth embodiment of block chain node of the present invention is proposed.
The connection method first, second of the connection method fourth embodiment of the block chain node and the block chain node Or difference lies in reference to Fig. 5, the connection method of block chain node further includes 3rd embodiment::
Step S70, if alliance's chain detects that the block chain node to be accessed executes illegal operation, by described The connection of block chain link point and the block chain node to be accessed has been accessed described in alliance's chain disconnection.
If alliance's chain detects that block chain node to be accessed executes illegal operation in alliance's chain network, alliance's chain disconnects The connection of block chain link point and block chain node to be accessed is accessed.It should be noted that when public key certificate is expired or is hung When pin, the operation that block chain node to be accessed executes in alliance's chain belongs to illegal operation.
Further, when alliance's chain disconnects the connection relation accessed between block chain link point and block chain node to be accessed Afterwards, the local daily record of alliance's chain output, the illegal operation to preserve the block chain node to be accessed records, and preserves and wait for bonding pad The link information that block chain node is disconnected.It is understood that illegal operation record is performed by block chain node to be accessed Illegal operation data, link information include IP address and port numbers of block chain link point to be connected etc..
It should be noted that after block chain node to be accessed is disconnected, which will be unable to It connect, enters in alliance's chain with any one of alliance chain block chain node again.
Further, the connection method of block chain node further includes:
Step f, if there is no the public key certificate in alliance's chain, by it is described accessed block chain link point triggering refuse Instruction absolutely, to be connect with the block chain node to be accessed according to refusal instruction refusal.
Further, if having accessed block chain link point detects in the global configuration contract of alliance's chain there is no area to be accessed The public key certificate of block chain node, accessed block chain link point then trigger refusal instruction, and according to the refusal instruction refusal with it is waiting Enter the connection of block chain node.
The present embodiment is by detecting that the block chain node accessed in alliance's chain executes illegally in alliance's chain network When operation, the automatic connection for disconnecting the block chain node for executing illegal operation in alliance's chain, to improve the peace of alliance's chain network Quan Xing.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium On be stored with the linker of block chain node, the linker of the block chain node realizes institute as above when being executed by processor The step of connection method for the block chain node stated.
Computer readable storage medium specific implementation mode of the present invention and the connection method of above-mentioned block chain node are respectively implemented Example is essentially identical, and details are not described herein.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of connection method of block chain node, which is characterized in that the connection method of the block chain node includes following step Suddenly:
In alliance's chain after having accessed block chain link point and receive the handshake request that block chain node to be accessed is sent, by described It has accessed block chain link point and has detected the public key certificate that whether there is the block chain node to be accessed in alliance's chain;
If there are the public key certificate in alliance's chain, the block chain node to be accessed is detected according to the public key certificate Whether it is legitimate node;
If detect the block chain node to be accessed be legitimate node, by it is described accessed block chain link point with it is described waiting Enter the connection of block chain node.
2. the connection method of block chain node as described in claim 1, which is characterized in that if existing in alliance chain The public key certificate then detects that the step of whether the block chain node to be accessed is legitimate node is wrapped according to the public key certificate It includes:
If there are the public key certificate in alliance's chain, waited for described by the block chain link point transmission random number that accessed Block chain link point is accessed, so that the block chain node to be accessed is after receiving the random number, is based on the random number, root Digital signature is generated according to private key corresponding with public key in the public key certificate, and the digital signature is sent to described accessed Block chain node;
When it is described accessed block chain link point and receive the digital signature after, by the block chain link point that accessed according to Public key certificate verifies the digital signature;
If the digital signature authentication success confirms that the block chain node to be accessed is legitimate node;
If the digital signature authentication failure confirms that the block chain node to be accessed is illegal node.
3. the connection method of block chain node as claimed in claim 2, which is characterized in that described to have accessed block chain when described After node receives the digital signature, signed according to the public key certificate verification number by the block chain link point that accessed Name the step of include:
When it is described accessed block chain link point and receive the digital signature after, accessed described in block chain link point obtains by described The Protocol IP address interconnected between the corresponding first network of handshake request, and with obtaining corresponding 2nd IP of the digital signature Location;
Judge whether first IP address and second IP address are consistent;
If first IP address is consistent with second IP address, the digital signature is verified according to the public key certificate.
4. the connection method of block chain node as claimed in claim 3, which is characterized in that described to judge first IP address With second IP address after whether consistent step, further include:
If first IP address and second IP address are inconsistent, confirm that the block chain node to be accessed is illegal section Point.
5. the connection method of block chain node as described in claim 1, which is characterized in that the access when in alliance's chain After block chain node receives the handshake request that block chain node to be accessed is sent, institute is detected by the block chain link point that accessed Before the step of stating the public key certificate that whether there is the block chain node to be accessed in alliance's chain, further include:
When authority identity Verification System receives the public key certificate and mechanism that the block chain node institutional affiliation to be accessed is sent After information, the mechanism information is audited by the authority identity Verification System;
Public key certificate is sent to third party trust authority CA by the authority identity Verification System, described in CA verifications Public key certificate is verified as a result, and the verification result is returned to the authority identity Verification System;
If the mechanism information audit passes through, and determines that the public key certificate is in effective shape according to the verification result The public key certificate is then synchronized in alliance's chain by the authority identity Verification System, and synchronized result is returned by state To the mechanism belonging to the ingress waiting.
6. the connection method of block chain node as described in claim 1, which is characterized in that if it is described detect it is described to be accessed Block chain node is legitimate node, then has accessed the step of block chain link point is connect with the block chain node to be accessed by described Including:
If detecting, the block chain node to be accessed is legitimate node, has been accessed block chain link point by described to send detection logical The notification message crossed gives the block chain node to be accessed, so that the block chain node to be accessed is examined according to the notification message It has accessed whether block chain link point is legitimate node described in surveying, and has detected that the block chain link point that accessed is legal section Point, send described in accessed the block chain link successful prompting message of point authentication and accessed block chain link point to described;
When it is described accessed block chain link point and receive the prompting message after, waited for described by the block chain link point that accessed Access the connection of block chain link point.
7. the connection method of block chain node as described in claim 1, which is characterized in that the access when in alliance's chain After block chain node receives the handshake request that block chain node to be accessed is sent, institute is detected by the block chain link point that accessed After the step of stating the public key certificate that whether there is the block chain node to be accessed in alliance's chain, further include:
If there is no the public key certificate in alliance's chain, the triggering refusal instruction of block chain link point has been accessed by described, with It is connect with the block chain node to be accessed according to refusal instruction refusal.
8. the connection method of block chain node as described in any one of claim 1 to 7, which is characterized in that if described detect The block chain node to be accessed is legitimate node, then has accessed block chain link point and the block chain node to be accessed by described After the step of connection, further include:
If alliance's chain detects that the block chain node to be accessed executes illegal operation, described in alliance's chain disconnection The connection of block chain link point and the block chain node to be accessed is accessed.
9. a kind of connection system of block chain node, which is characterized in that the connection system of the block chain node include memory, Microprocessor and the linker for being stored in the block chain node that can be run on the memory and on the microprocessor, institute It states to have accessed and be realized such as any one of claim 1 to 8 institute when the linker of block chain link point is executed by the microprocessor The step of connection method for the block chain node stated.
10. a kind of computer readable storage medium, which is characterized in that be stored with block chain on the computer readable storage medium The linker of node realizes such as claim 1 to 8 when the linker for having accessed block chain link point is executed by processor Any one of described in block chain node connection method the step of.
CN201810191230.9A 2018-03-08 2018-03-08 Connection method, system and the computer readable storage medium of block chain node Pending CN108416589A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810191230.9A CN108416589A (en) 2018-03-08 2018-03-08 Connection method, system and the computer readable storage medium of block chain node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810191230.9A CN108416589A (en) 2018-03-08 2018-03-08 Connection method, system and the computer readable storage medium of block chain node

Publications (1)

Publication Number Publication Date
CN108416589A true CN108416589A (en) 2018-08-17

Family

ID=63130549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810191230.9A Pending CN108416589A (en) 2018-03-08 2018-03-08 Connection method, system and the computer readable storage medium of block chain node

Country Status (1)

Country Link
CN (1) CN108416589A (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965342A (en) * 2018-09-28 2018-12-07 真相网络科技(北京)有限公司 The method for authenticating and system of request of data side's access data source
CN109117674A (en) * 2018-09-25 2019-01-01 深圳市元征科技股份有限公司 A kind of client validation encryption method, system, equipment and computer media
CN109218029A (en) * 2018-09-27 2019-01-15 深圳壹账通智能科技有限公司 The credible querying method of network credentials, device and storage medium based on block chain
CN109543456A (en) * 2018-11-06 2019-03-29 北京新唐思创教育科技有限公司 Block generation method and computer storage medium
CN109787987A (en) * 2019-01-29 2019-05-21 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal identity identifying method based on block chain
CN109831418A (en) * 2018-12-28 2019-05-31 无锡井通网络科技有限公司 Credible alliance's chain building method, system and electronic equipment based on certificate
CN109902210A (en) * 2019-01-31 2019-06-18 篱笆墙网络科技有限公司 The system of file data management
CN109995791A (en) * 2019-04-11 2019-07-09 清华大学 A kind of data grant method and system
CN110035059A (en) * 2019-03-05 2019-07-19 深圳前海微众银行股份有限公司 A kind of building of block chain and group partition method and device
CN110176998A (en) * 2019-05-17 2019-08-27 北京众享比特科技有限公司 A kind of common recognition method, apparatus, equipment and the storage medium of proof of work
CN110222535A (en) * 2019-05-06 2019-09-10 平安科技(深圳)有限公司 Processing unit, method and the storage medium of block chain configuration file
CN110266763A (en) * 2019-05-20 2019-09-20 深圳壹账通智能科技有限公司 Block chain network implementation method, system and the storage medium of cross-network segment interconnection
CN110263582A (en) * 2019-05-10 2019-09-20 阿里巴巴集团控股有限公司 A kind of account checking method based on alliance's chain, device and electronic equipment
CN110636042A (en) * 2019-08-14 2019-12-31 阿里巴巴集团控股有限公司 Method, device and equipment for updating verified block height of server
CN110868308A (en) * 2018-08-28 2020-03-06 傲为信息技术(江苏)有限公司 Block chain network access method and system
CN111159750A (en) * 2020-04-07 2020-05-15 南京邮电大学 Automobile maintenance data storage method based on alliance chain
WO2020119506A1 (en) * 2018-12-14 2020-06-18 深圳壹账通智能科技有限公司 Identity authentication method based on alliance chain, and terminal device
CN111327564A (en) * 2018-12-13 2020-06-23 航天信息股份有限公司 Access method and device for alliance chain
CN111586059A (en) * 2020-05-09 2020-08-25 杭州安存网络科技有限公司 Block chain machine, block chain data access authentication method and computer readable storage medium
CN111817852A (en) * 2019-04-10 2020-10-23 上海旺链信息科技有限公司 Allocation chain system management method and device
WO2020233073A1 (en) * 2019-05-23 2020-11-26 深圳壹账通智能科技有限公司 Blockchain environment test method, device and apparatus, and storage medium
CN112311735A (en) * 2019-07-30 2021-02-02 华为技术有限公司 Credible authentication method, network equipment, system and storage medium
CN112492006A (en) * 2018-10-31 2021-03-12 创新先进技术有限公司 Node management method and device based on block chain
CN112765684A (en) * 2021-04-12 2021-05-07 腾讯科技(深圳)有限公司 Block chain node terminal management method, device, equipment and storage medium
CN112822162A (en) * 2020-12-29 2021-05-18 重庆川仪自动化股份有限公司 Block chain-based equipment verification connection method and system
CN113301107A (en) * 2021-03-30 2021-08-24 数界(深圳)科技有限公司 Node computing platform, implementation method thereof and trusted cloud platform implementation method
CN113572617A (en) * 2021-07-20 2021-10-29 广州炒米信息科技有限公司 Distributed inter-node identity authentication method based on alliance chain
CN113886124A (en) * 2021-10-04 2022-01-04 杭州复杂美科技有限公司 Illegal node identification method, computer device and storage medium
US11228446B2 (en) 2019-05-10 2022-01-18 Advanced New Technologies Co., Ltd. Blockchain-based reconciliation method and apparatus and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
CN107079037A (en) * 2016-09-18 2017-08-18 深圳前海达闼云端智能科技有限公司 Identity identifying method, device, node and system based on block chain
CN107146087A (en) * 2017-04-11 2017-09-08 广东网金控股股份有限公司 A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
CN107079037A (en) * 2016-09-18 2017-08-18 深圳前海达闼云端智能科技有限公司 Identity identifying method, device, node and system based on block chain
CN107146087A (en) * 2017-04-11 2017-09-08 广东网金控股股份有限公司 A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110868308A (en) * 2018-08-28 2020-03-06 傲为信息技术(江苏)有限公司 Block chain network access method and system
CN110868308B (en) * 2018-08-28 2022-04-01 傲为有限公司 Block chain network access method and system
CN109117674A (en) * 2018-09-25 2019-01-01 深圳市元征科技股份有限公司 A kind of client validation encryption method, system, equipment and computer media
CN109218029A (en) * 2018-09-27 2019-01-15 深圳壹账通智能科技有限公司 The credible querying method of network credentials, device and storage medium based on block chain
CN109218029B (en) * 2018-09-27 2023-04-21 深圳壹账通智能科技有限公司 Block chain-based network certificate trusted query method, device and storage medium
CN108965342A (en) * 2018-09-28 2018-12-07 真相网络科技(北京)有限公司 The method for authenticating and system of request of data side's access data source
CN112492006B (en) * 2018-10-31 2023-12-05 创新先进技术有限公司 Node management method and device based on block chain
CN112492006A (en) * 2018-10-31 2021-03-12 创新先进技术有限公司 Node management method and device based on block chain
CN109543456B (en) * 2018-11-06 2021-07-09 北京新唐思创教育科技有限公司 Block generation method and computer storage medium
CN109543456A (en) * 2018-11-06 2019-03-29 北京新唐思创教育科技有限公司 Block generation method and computer storage medium
CN111327564B (en) * 2018-12-13 2022-03-08 航天信息股份有限公司 Access method and device for alliance chain
CN111327564A (en) * 2018-12-13 2020-06-23 航天信息股份有限公司 Access method and device for alliance chain
WO2020119506A1 (en) * 2018-12-14 2020-06-18 深圳壹账通智能科技有限公司 Identity authentication method based on alliance chain, and terminal device
CN109831418A (en) * 2018-12-28 2019-05-31 无锡井通网络科技有限公司 Credible alliance's chain building method, system and electronic equipment based on certificate
CN109787987A (en) * 2019-01-29 2019-05-21 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal identity identifying method based on block chain
CN109902210A (en) * 2019-01-31 2019-06-18 篱笆墙网络科技有限公司 The system of file data management
CN110035059A (en) * 2019-03-05 2019-07-19 深圳前海微众银行股份有限公司 A kind of building of block chain and group partition method and device
CN111817852A (en) * 2019-04-10 2020-10-23 上海旺链信息科技有限公司 Allocation chain system management method and device
CN109995791A (en) * 2019-04-11 2019-07-09 清华大学 A kind of data grant method and system
CN109995791B (en) * 2019-04-11 2020-11-03 清华大学 Data authorization method and system
CN110222535A (en) * 2019-05-06 2019-09-10 平安科技(深圳)有限公司 Processing unit, method and the storage medium of block chain configuration file
CN110222535B (en) * 2019-05-06 2024-03-12 平安科技(深圳)有限公司 Processing device, method and storage medium for block chain configuration file
US11228446B2 (en) 2019-05-10 2022-01-18 Advanced New Technologies Co., Ltd. Blockchain-based reconciliation method and apparatus and electronic device
CN110263582A (en) * 2019-05-10 2019-09-20 阿里巴巴集团控股有限公司 A kind of account checking method based on alliance's chain, device and electronic equipment
CN110176998A (en) * 2019-05-17 2019-08-27 北京众享比特科技有限公司 A kind of common recognition method, apparatus, equipment and the storage medium of proof of work
CN110266763A (en) * 2019-05-20 2019-09-20 深圳壹账通智能科技有限公司 Block chain network implementation method, system and the storage medium of cross-network segment interconnection
CN110266763B (en) * 2019-05-20 2022-04-12 深圳壹账通智能科技有限公司 Method, system and storage medium for implementing block chain network interconnected across network segments
WO2020233073A1 (en) * 2019-05-23 2020-11-26 深圳壹账通智能科技有限公司 Blockchain environment test method, device and apparatus, and storage medium
CN112311735A (en) * 2019-07-30 2021-02-02 华为技术有限公司 Credible authentication method, network equipment, system and storage medium
WO2021018088A1 (en) * 2019-07-30 2021-02-04 华为技术有限公司 Trusted authentication method, network device, system and storage medium
CN112311735B (en) * 2019-07-30 2021-11-19 华为技术有限公司 Credible authentication method, network equipment, system and storage medium
CN110636042A (en) * 2019-08-14 2019-12-31 阿里巴巴集团控股有限公司 Method, device and equipment for updating verified block height of server
CN111159750A (en) * 2020-04-07 2020-05-15 南京邮电大学 Automobile maintenance data storage method based on alliance chain
CN111586059A (en) * 2020-05-09 2020-08-25 杭州安存网络科技有限公司 Block chain machine, block chain data access authentication method and computer readable storage medium
CN112822162A (en) * 2020-12-29 2021-05-18 重庆川仪自动化股份有限公司 Block chain-based equipment verification connection method and system
CN112822162B (en) * 2020-12-29 2023-05-23 重庆川仪自动化股份有限公司 Equipment verification connection method and system based on block chain
CN113301107A (en) * 2021-03-30 2021-08-24 数界(深圳)科技有限公司 Node computing platform, implementation method thereof and trusted cloud platform implementation method
CN112765684A (en) * 2021-04-12 2021-05-07 腾讯科技(深圳)有限公司 Block chain node terminal management method, device, equipment and storage medium
CN113572617A (en) * 2021-07-20 2021-10-29 广州炒米信息科技有限公司 Distributed inter-node identity authentication method based on alliance chain
CN113572617B (en) * 2021-07-20 2023-05-26 广州炒米信息科技有限公司 Distributed inter-node identity authentication method based on alliance chain
CN113886124A (en) * 2021-10-04 2022-01-04 杭州复杂美科技有限公司 Illegal node identification method, computer device and storage medium
CN113886124B (en) * 2021-10-04 2023-05-30 杭州复杂美科技有限公司 Illegal node identification method, computer device, and storage medium

Similar Documents

Publication Publication Date Title
CN108416589A (en) Connection method, system and the computer readable storage medium of block chain node
CN101183932B (en) Security identification system of wireless application service and login and entry method thereof
CN102946384B (en) User authentication method and equipment
CN109509518A (en) Management method, server and the computer storage medium of electronic health record
CN110291757A (en) For providing the method for simplified account register service, user authentication service and utilizing its certificate server
CN109522726A (en) Method for authenticating, server and the computer readable storage medium of small routine
CN108881167A (en) A kind of intelligent contract of finite field block catenary system
CN107306183A (en) Client, service end, method and authentication system
CN110493237A (en) Identity management method, device, computer equipment and storage medium
CN106209383B (en) A kind of method and device of mobile payment security certification
TW200820716A (en) Method and apparatus for providing trusted single sign-on access to applications and internet-based services
CN112733178B (en) Cross-chain trust method, device, equipment and medium based on digital certificate authentication
CN107579991A (en) A kind of method that high in the clouds protection certification is carried out to client, server and client side
CN110149328A (en) Interface method for authenticating, device, equipment and computer readable storage medium
CN104125230B (en) A kind of short message certification service system and authentication method
CN109981287A (en) A kind of code signature method and its storage medium
CN106101160A (en) A kind of system login method and device
CN111460457A (en) Real estate property registration supervision method, device, electronic equipment and storage medium
CN110247758A (en) The method, apparatus and code management device of Password Management
CN109474600A (en) A kind of account binding method, system, device and its equipment
CN103401686B (en) A kind of user's OTP WEB Authentication System and application process thereof
CN108718323A (en) A kind of identity identifying method and system
CN109829722A (en) A kind of user identity real name identification method of electronic fare payment system
US20170104748A1 (en) System and method for managing network access with a certificate having soft expiration
CN104821951B (en) A kind of method and apparatus of secure communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180817

RJ01 Rejection of invention patent application after publication