CN108712423A - Right management method and device - Google Patents

Right management method and device Download PDF

Info

Publication number
CN108712423A
CN108712423A CN201810483370.3A CN201810483370A CN108712423A CN 108712423 A CN108712423 A CN 108712423A CN 201810483370 A CN201810483370 A CN 201810483370A CN 108712423 A CN108712423 A CN 108712423A
Authority
CN
China
Prior art keywords
user
block chain
application
common recognition
added
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810483370.3A
Other languages
Chinese (zh)
Inventor
王剑
于潇豫
张斌
杨树敏
刘巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 3658 Network Technology Co Ltd
Original Assignee
Beijing 3658 Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing 3658 Network Technology Co Ltd filed Critical Beijing 3658 Network Technology Co Ltd
Priority to CN201810483370.3A priority Critical patent/CN108712423A/en
Publication of CN108712423A publication Critical patent/CN108712423A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of right management method and devices.This method includes that the addition request for the first user for meeting entry criteria is sent into default block chain;The operating right of the first user is configured according to the Role Identity of first user being added in block chain;Judge whether the operating right comes into force in block chain according to common recognition mechanism;And if judging that the operating right comes into force in block chain according to common recognition mechanism, first user is executed and presets review operation.Present application addresses the rights management on block chain it is less efficient and excessively centralization the technical issues of.The rights management of decentralization is realized by the application, new user or new node can be added to by common recognition mechanism in block chain, without the operative configuration of system manager, while member on chain also be allowed to know the addition of new node immediately.Greatly improve the rights management efficiency on block chain.

Description

Right management method and device
Technical field
This application involves computer software fields, in particular to a kind of right management method and device, are suitable for dividing Cloth system.
Background technology
Judging whether that when that block chain can be added usually requires to determine whether user identity meets and be added in block chain, And associated user some set scene or under the conditions of whether have relevant operation permission the problem of.
Inventor has found, if it is desired to be typically by possessing administrator's power when increasing a new node in block chain The system manager of limit directly carries out system configuration, and access approval is then usually audited under chain.Further, under chain After the approval, the permission that operation possesses newly added node or user is directly configured by administrator to be determined.
For the less efficient problem of the rights management on block chain in the related technology, effective solution is not yet proposed at present Scheme.
Invention content
The main purpose of the application is to provide a kind of right management method, to solve the rights management efficiency on block chain Relatively low problem.
To achieve the goals above, according to the one side of the application, a kind of right management method is provided, for handling Newly added node in target block chain or user.
Include according to the right management method of the application:Receive the addition application of the first user;According to meeting entry criteria The addition application in Role Identity configure the first user operating right;The operating right is received, and according to institute The corresponding common recognition strategy of target block chain matching is stated, and if is reached in having authorization privilege node by common recognition strategy Common recognition, the then operating right for first user of coming into force.
Further, receive the first user addition application include:Information is added in the application for receiving the first user submission;School It tests the application and information is added;Judge that the application is added whether information meets entry criteria;And it is if it is determined that described Application is added information and meets entry criteria, then request is added in the application is sent in goal-selling block chain.
Further, the operation of the first user is configured according to the Role Identity met in the addition application of entry criteria Permission includes:Judge that the Role Identity of target block chain is added in first user;According to the Role Identity of first user Configure corresponding authority;Wherein, the corresponding authority includes at least:Change permission forbids permission.
Further, the operating right is received, and corresponding common recognition strategy packet is matched according to the target block chain It includes:Corresponding common recognition strategy is selected to judge whether the operating right comes into force in block chain according to current block chain;If logical It crosses the common recognition strategy in having authorization privilege node to reach common understanding, then the operating right for first user of coming into force includes:Such as Fruit judges the operating right in block chain according to current block chain common recognition strategy selected to use, then to first user Execute the review operation in common recognition strategy.
Further, the operating right is received, and corresponding common recognition strategy is matched also according to the target block chain Including:Receive configured second user operating right;Judge whether the second user operating right meets default processing item Part;If it is determined that the second user operating right meets default treatment conditions, then selected in target block chain corresponding total Know strategy;If reached common understanding in having authorization privilege node by common recognition strategy, the behaviour for the second user that comes into force Make permission.
To achieve the goals above, according to the another aspect of the application, a kind of rights management device is provided, for handling Newly added node in target block chain or user.
Include according to the rights management device of the application:Apply for module, the addition application for receiving the first user, and The addition application for meeting entry criteria is sent to authority management module;Authority management module, for according to the addition Role Identity in application configures the operating right of the first user;Common recognition module, carries for receiving from the authority management module The operating right handed over, and corresponding common recognition strategy is matched according to the target block chain, and if by described total Know strategy in having authorization privilege node to reach common understanding, then the operating rights for first user of coming into force in authority management module Limit.
Further, the application module includes:Letter is added in receiving unit, the application for receiving the first user submission Breath;Information is added for verifying the application in verification unit;First judging unit is for judging that information is added in the application It is no to meet entry criteria;And transmission unit, when for judging that the application addition information meets entry criteria, then by institute Application addition request is stated to be sent in goal-selling block chain.
Further, the authority management module includes:Second judgment unit, for judging that mesh is added in first user Mark the Role Identity of block chain;Dispensing unit, for configuring corresponding authority according to the Role Identity of first user;Wherein, The corresponding authority includes at least:Change permission forbids permission.
Further, the common recognition module includes:First selecting unit, for corresponding altogether according to the selection of current block chain Know strategy and judges whether the operating right comes into force in block chain;First examination & approval unit, for being selected according to current block chain The common recognition strategy used judges the operating right in block chain, then the examination & approval in common recognition strategy are executed to first user Operation.
To achieve the goals above, according to the another aspect of the application, a kind of rights management client is provided, including: The rights management device.
In the embodiment of the present application, in such a way that application module receives the addition application of the first user, pass through permission pipe The operating right that module configures the first user according to the Role Identity being added in application is managed, if to realize by described Common recognition strategy is reached common understanding in having authorization privilege node, then the operating rights for first user of coming into force in authority management module The technique effect of limit, and then solve the less efficient technical problem of the rights management on block chain.In addition, on block chain chain It is all there is the node of authorization privilege to reach common understanding after complete examination & approval, after examination & approval pass through, new user or new node can be added Into block chain, without the operative configuration of system manager, while member on chain also being allowed to know the addition of new node immediately.Pole The earth improves the rights management efficiency on block chain.
Description of the drawings
The attached drawing constituted part of this application is used for providing further understanding of the present application so that the application's is other Feature, objects and advantages become more apparent upon.The illustrative examples attached drawing and its explanation of the application is for explaining the application, not Constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the right management method schematic diagram according to the application first embodiment;
Fig. 2 is the right management method schematic diagram according to the application second embodiment;
Fig. 3 is the right management method schematic diagram according to the application 3rd embodiment;
Fig. 4 is the right management method schematic diagram according to the application fourth embodiment;
Fig. 5 is the right management method schematic diagram according to the 5th embodiment of the application;
Fig. 6 is the rights management schematic device according to the application first embodiment;
Fig. 7 is the rights management schematic device according to the application second embodiment;
Fig. 8 is the rights management schematic device according to the application 3rd embodiment;And
Fig. 9 is the rights management schematic device according to the application fourth embodiment.
Specific implementation mode
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, technical solutions in the embodiments of the present application are clearly and completely described, it is clear that described embodiment is only The embodiment of the application part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people The every other embodiment that member is obtained without making creative work should all belong to the model of the application protection It encloses.
It should be noted that term " first " in the description and claims of this application and above-mentioned attached drawing, " Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that using in this way Data can be interchanged in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit Process, method, system, product or equipment those of are not necessarily limited to clearly to list step or unit, but may include without clear It is listing to Chu or for these processes, method, product or equipment intrinsic other steps or unit.
In this application by the way that new user or the application of new node access and approval process to be put on block chain, applicant will Application information is dealt on block chain, on chain it is all there is the node of authorization privilege to reach common understanding after i.e. complete examination & approval, examination & approval pass through after, New user or new node can be added in alliance's chain, without the operative configuration of system manager, while also be allowed on block chain Member/node knows the addition of new node immediately.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Reconciliation is described in detail to the principle of the application using alliance's chain as specific embodiment in embodiments herein It releases.
As shown in Figure 1, this method includes following step S102 to step S108:
Step S102 receives the addition application of the first user;
It can be newly added node application or new addition user application that application, which is added,.
It can be access application that application, which is added, and access application solves that user identity can be added in target block chain Identity problems.It preferably, can be to target block chain for example, applying on alliance's chain.
It can be authority application that application, which is added, authority application be the user that is added in target block chain certain scene/ Under the conditions of the problem of whether allowing some operations/acts.It preferably, can be to target block chain for example, applying on alliance's chain.
Step S104 configures the operation of the first user according to the Role Identity met in the addition application of entry criteria Permission;
Satisfactory addition application is sent in target block chain.
Preferably, several different target block chains can be docked.Specifically, user is by applying for that module 100 can be to not Same target block chain, which is submitted, is added application.
Step S106 receives the operating right, and matches corresponding common recognition strategy according to the target block chain,
The operating right of the first user is configured according to the Role Identity being added in application.For example, when new user's first is thought When being added in target block chain network with certain Role Identity, then related behaviour can be assigned according to the role of newcomer/node Make permission.
Further, additionally it is possible to according to the operating right that Role Identity the first user of configuration has been added.If for example, it is existing at Member's application change permission is prohibited from using certain permissions all by this resume module due to breaking the rules.
In addition, operating right is submitted so that further reaching common understanding with authorization privilege node.
Step S108 comes into force described the if reached common understanding in having authorization privilege node by common recognition strategy The operating right of one user.
Specifically, the judging result of common recognition strategy is exactly to have each of authorization privilege in the target block chain in fact According to the feedback result of specific common recognition strategy in node.
Different common recognition strategies can be selectively used according to target block chain in the embodiment of the present application, and it is selected Common recognition strategy be block chain each node compliance common recognition method, each node is reached common understanding, then to target block chain For i.e. to new node access whether final result reached common recognition.Knowing together to be, permit that common recognition is added or refusal adds Enter common recognition.Specifically then come into force the operating right of first user.
In addition, different common recognition strategies can be selectively used according to target block chain in the embodiment of the present application, and Selected common recognition strategy is the method for each node compliance common recognition of block chain, and wholly or largely node feeding back is consistent Property result is consistent.
In addition, can also be allowed by way of broadcast in the embodiment of the present application member/node on target block chain and The addition of Shi Zhixiao new nodes/user.
In being different from the prior art, it is typically by possessing admin system manager's permissions that a new node, which is added, System manager directly carries out system configuration, and the approval as access is by being audited under chain.Under chain after the approval, it wraps It includes newly added node or permission that user is possessed also determines together, the implementation of operation is directly configured by administrator.
It can be seen from the above description that the application realizes following technique effect:
In the embodiment of the present application, in such a way that application module receives the addition application of the first user, by according to institute The operating right that the Role Identity being added in application configures the first user is stated, if had by common recognition strategy to realize Reach common understanding in authorization privilege node, then the technique effect of the operating right for first user of coming into force, and then solve block The less efficient technical problem of rights management on chain.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in Fig. 2, receiving the addition Shen of the first user Please include:
Step S202 receives the application that the first user submits and information is added;
The information that applicant submits is received, does preliminary verification and limitation, satisfactory application can be sent to target area In block chain.
Step S204 verifies the application and information is added;
Carry out the preliminary check that information is added in application.
Step S206 judges that the application is added whether information meets entry criteria;
Judge that the application is added whether information meets entry criteria, such as, if meet each node in alliance's chain Common recognition mechanism etc..
Step S208 then asks application addition if it is determined that information, which is added, in the application meets entry criteria It asks and is sent in goal-selling block chain.
The application for meeting entry criteria addition information is sent in target block chain.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 3, according to the institute for meeting entry criteria State be added application in Role Identity configure the first user operating right include:
Step S302 judges that the Role Identity of target block chain is added in first user;
Step S304 configures corresponding authority according to the Role Identity of first user;
Wherein, the corresponding authority includes at least:Change permission forbids permission.
When new user wants to be added in block chain network with certain Role Identity, this module can be according to the role of newcomer Assign associated rights.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 4, the operating right is received, and Matching corresponding common recognition strategy according to the target block chain includes:
Whether step S402 selects corresponding common recognition strategy to judge the operating right in block chain according to current block chain In come into force;
After receiving new access application in block chain network, common recognition module can be according to this block chain common recognition selected to use The feedback result of tactful and each node reach whether the common recognition of access.
If reached common understanding in having authorization privilege node by common recognition strategy, the behaviour for first user of coming into force Include as permission:
Step S404, if judging the operating right in block chain according to current block chain common recognition strategy selected to use In, then the review operation in common recognition strategy is executed to first user.
If judging the operating right in block chain according to current block chain common recognition strategy selected to use, then it is assumed that Common recognition comes into force, and the review operation in common recognition strategy is executed to first user.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 5, the operating right is received, and Matching corresponding common recognition strategy according to the target block chain further includes:
Step S502 receives configured second user operating right;
Second user is the existing user in being present in target block chain.
Step S504, judges whether the second user operating right meets default treatment conditions;
Judge whether the existing user in being present in target block chain has altered or by forbidden permission.
Step S506, if it is determined that the second user operating right meets default treatment conditions, then in target block chain The middle corresponding common recognition strategy of selection;
The corresponding common recognition strategy of selection, on block chain chain it is all there is the node of authorization privilege to reach common understanding after i.e. completion Examination & approval, after examination & approval pass through, the existing user in being present in target block chain changes permission or forbids associated rights.
Step S508 comes into force described the if reached common understanding in having authorization privilege node by common recognition strategy The operating right of two users.
If reached common understanding in having authorization privilege node by common recognition strategy, you can with allow member on block chain/ Node knows that the existing user in being present in target block chain changes permission or forbids associated rights immediately.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not The sequence being same as herein executes shown or described step.
According to the embodiment of the present application, a kind of device for implementing above-mentioned right management method is additionally provided, for handling Newly added node in target block chain or user.As shown in fig. 6, the device includes:Apply for module 100, for receiving first The addition application of user, and the addition application for meeting entry criteria is sent to authority management module;Rights management mould Block 200, the operating right for configuring the first user according to the Role Identity being added in application;Common recognition module 300, is used for The operating right submitted from the authority management module is received, and corresponding common recognition is matched according to the target block chain Strategy, if reached common understanding in having authorization privilege node by common recognition strategy, institute of coming into force in authority management module State the operating right of the first user.
In the application module 100 of the embodiment of the present application, the addition application of the first user can be received.Application is added can be with It is newly added node application or new addition user application.
It can be access application that application, which is added, and access application solves that user identity can be added in target block chain Identity problems.It preferably, can be to target block chain for example, applying on alliance's chain.
It can be authority application that application, which is added, authority application be the user that is added in target block chain certain scene/ Under the conditions of the problem of whether allowing some operations/acts.It preferably, can be to target block chain for example, applying on alliance's chain.
Application module 100 can handle application and the request of target block chain is added.And it will be conformed in applying for module 100 The addition application asked is sent in target block chain.
Preferably, application module 100 can dock several different target block chains.Specifically, user is by applying for module 100 can submit addition application to different target block chains.
In addition, application module 100 is additionally operable to the addition application for meeting entry criteria being sent to authority management module 200, i.e., if meeting the entry criteria of verification or limitation, the authority management module 200 that can be added in target block chain Carry out the authority configuration of next step.
According to the Role Identity configuration first being added in application in the authority management module 200 of the embodiment of the present application The operating right of user.For example, when new user's first is wanted to be added in target block chain network with certain Role Identity, permission Management module 200 then can assign relevant operation permission according to the role of newcomer/node.
Further, can also match according to Role Identity has been added in the authority management module of the embodiment of the present application 200 Set the operating right of the first user.If for example, existing member apply change permission or due to break the rules be prohibited from using it is certain Permission all passes through this resume module.
In addition, authority management module 200 is additionally operable to the operating right that the first user is assigned to being committed to common recognition mould Block 300.Operating right is committed in common recognition module 300 so that further reaching common understanding with authorization privilege node.
The operating rights submitted from the authority management module is received in the common recognition module 300 of the embodiment of the present application Limit, and corresponding common recognition strategy is matched according to the target block chain.Specifically, the judging result of common recognition strategy is in fact It is the feedback result of the specific common recognition strategy of basis in each node that the target block chain has authorization privilege.
Different common recognitions can be selectively used in the common recognition module 300 of the embodiment of the present application according to target block chain Strategy, and selected common recognition strategy is the method for each node compliance common recognition of block chain, each node is reached common understanding, then Final result whether being to new node access for target block chain has reached common recognition.Common recognition can permit being added altogether Know or common recognition is added in refusal.Specifically then come into force in module 300 of knowing together the operating right of first user.
In addition, can selectively use difference according to target block chain in the common recognition module 300 of the embodiment of the present application Common recognition strategy, and selected common recognition strategy is the method for block chain each node compliance common recognition, whole or big portion It is consistent that partial node feeds back consistency result.
In addition, can also be allowed by way of broadcast in the common recognition module 300 of the embodiment of the present application on target block chain Member/node know the addition of new node/user in time.
In being different from the prior art, it is typically by possessing admin system manager's permissions that a new node, which is added, System manager directly carries out system configuration, and the approval as access is by being audited under chain.Under chain after the approval, it wraps It includes newly added node or permission that user is possessed also determines together, the implementation of operation is directly configured by administrator. In the embodiment of the present application, in applying for module 100 in such a way that application module receives the addition application of the first user, pass through power The operating right for configuring the first user in management module 200 according to the Role Identity being added in application is limited, to realize such as Fruit is reached common understanding by common recognition strategy in having authorization privilege node, then comes into force described the in authority management module 200 The technique effect of the operating right of one user, and then solve the less efficient technical problem of the rights management on block chain.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in fig. 7, the application module 100 includes: Information is added in receiving unit 1001, the application for receiving the first user submission;Verification unit 1002, for verifying the application Information is added;First judging unit 1003, for judging that the application is added whether information meets entry criteria;And it sends single The application when for judging that the application addition information meets entry criteria, is then added request and is sent to by member 1004 In goal-selling block chain.
The information that applicant submits is received in the receiving unit 1001 of the embodiment of the present application, does preliminary verification and limit System, satisfactory application can be sent in target block chain.
The preliminary check that information is added in application is carried out in the verification unit 1002 of the embodiment of the present application.
Judge that the application is added whether information meets access item in first judging unit 1003 of the embodiment of the present application Part, such as, if meet the common recognition mechanism of each node etc. in alliance's chain.
The application for meeting entry criteria addition information is sent to target in the transmission unit 1004 of the embodiment of the present application In block chain.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 8, the authority management module 200 wraps It includes:Second judgment unit 2001, for judging that the Role Identity of target block chain is added in first user;Dispensing unit 2002, for configuring corresponding authority according to the Role Identity of first user;Wherein, the corresponding authority includes at least:Become More permission forbids permission.
When new user wants to be added in block chain network with certain Role Identity, this module can be according to the role of newcomer Assign associated rights.
When existing member applies for change permission or is prohibited from using certain permissions due to breaking the rules and all passes through rights management Then result is submitted to common recognition module 300 by the processing of module 200, determining after reaching common understanding to come into force.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 9, the common recognition module 300 includes: First selecting unit 3001, for selecting corresponding common recognition strategy to judge the operating right whether in area according to current block chain It comes into force in block chain;First examination & approval unit 3002, for judging the operation according to current block chain common recognition strategy selected to use When permission is in block chain, then the review operation in common recognition strategy is executed to first user.
After receiving new access application in block chain network in the first selecting unit 3001 of the embodiment of the present application, altogether Know module can be reached according to the feedback result of this block chain common recognition strategy selected to use and each node whether the common recognition of access.
If according to current block chain common recognition plan selected to use in the first examination & approval unit 3002 of the embodiment of the present application Slightly judge the operating right in block chain, then it is assumed that common recognition comes into force, and examining in common recognition strategy is executed to first user Batch operation.
Preferably, the common recognition module 300 can support a variety of common recognition strategies, be selected according to different target block chain It selects.
Obviously, those skilled in the art should be understood that each module of above-mentioned the application or each step can be with general Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored Be performed by computing device in the storage device, either they are fabricated to each integrated circuit modules or by they In multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the application be not limited to it is any specific Hardware and software combines.
The foregoing is merely the preferred embodiments of the application, are not intended to limit this application, for the skill of this field For art personnel, the application can have various modifications and variations.Within the spirit and principles of this application, any made by repair Change, equivalent replacement, improvement etc., should be included within the protection domain of the application.

Claims (10)

1. a kind of right management method, which is characterized in that it is used for the newly added node in processing target block chain or user, it is described Method includes:
Receive the addition application of the first user;
The operating right of the first user is configured according to the Role Identity met in the addition application of entry criteria;
The operating right is received, and corresponding common recognition strategy is matched according to the target block chain, and if passes through institute It states common recognition strategy in having authorization privilege node to reach common understanding, then the operating right for first user of coming into force.
2. right management method according to claim 1, which is characterized in that receive the first user addition application include:
Information is added in the application for receiving the first user submission;
It verifies the application and information is added;
Judge that the application is added whether information meets entry criteria;And
If it is determined that information, which is added, in the application meets entry criteria, then request is added in the application is sent to goal-selling area In block chain.
3. right management method according to claim 1, which is characterized in that according to the addition Shen for meeting entry criteria Please in Role Identity configure the first user operating right include:
Judge that the Role Identity of target block chain is added in first user;
Corresponding authority is configured according to the Role Identity of first user;
Wherein, the corresponding authority includes at least:Change permission forbids permission.
4. right management method according to claim 1, which is characterized in that
The operating right is received, and corresponding common recognition strategy is matched according to the target block chain and includes:
Corresponding common recognition strategy is selected to judge whether the operating right comes into force in block chain according to current block chain;
If reached common understanding in having authorization privilege node by common recognition strategy, the operating rights for first user of coming into force Limit includes:
If judging the operating right in block chain according to current block chain common recognition selected to use strategy, to described the One user executes the review operation in common recognition strategy.
5. right management method according to claim 1, which is characterized in that receive the operating right, and according to institute Stating the corresponding common recognition strategy of target block chain matching further includes:
Receive configured second user operating right;
Judge whether the second user operating right meets default treatment conditions;
If it is determined that the second user operating right meets default treatment conditions, then selected in target block chain corresponding total Know strategy;
If reached common understanding in having authorization privilege node by common recognition strategy, the operating rights for the second user that comes into force Limit.
6. a kind of rights management device, which is characterized in that it is used for the newly added node in processing target block chain or user, it is described Device includes:
Apply for module, the addition application for receiving the first user, and the addition application for meeting entry criteria is sent To authority management module;
Authority management module, the operating right for configuring the first user according to the Role Identity being added in application;
Common recognition module, for receiving the operating right submitted from the authority management module, and according to the target area The corresponding common recognition strategy of block chain matching, and
If reached common understanding in having authorization privilege node by common recognition strategy, come into force in authority management module described The operating right of first user.
7. rights management device according to claim 6, which is characterized in that the application module includes:
Information is added in receiving unit, the application for receiving the first user submission;
Information is added for verifying the application in verification unit;
First judging unit, for judging that the application is added whether information meets entry criteria;And
The application is then added and asks when for judging that the application addition information meets entry criteria by transmission unit It is sent in goal-selling block chain.
8. rights management device according to claim 6, which is characterized in that the authority management module includes:
Second judgment unit, for judging that the Role Identity of target block chain is added in first user;
Dispensing unit, for configuring corresponding authority according to the Role Identity of first user;
Wherein, the corresponding authority includes at least:Change permission forbids permission.
9. rights management device according to claim 6, which is characterized in that the common recognition module includes:
First selecting unit, for selecting corresponding common recognition strategy to judge the operating right whether in area according to current block chain It comes into force in block chain;
First examination & approval unit, for judging the operating right in block chain according to current block chain common recognition strategy selected to use In, then the review operation in common recognition strategy is executed to first user.
10. a kind of rights management client, which is characterized in that including:Such as claim 6 to 7 any one of them rights management Device.
CN201810483370.3A 2018-05-18 2018-05-18 Right management method and device Pending CN108712423A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810483370.3A CN108712423A (en) 2018-05-18 2018-05-18 Right management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810483370.3A CN108712423A (en) 2018-05-18 2018-05-18 Right management method and device

Publications (1)

Publication Number Publication Date
CN108712423A true CN108712423A (en) 2018-10-26

Family

ID=63869135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810483370.3A Pending CN108712423A (en) 2018-05-18 2018-05-18 Right management method and device

Country Status (1)

Country Link
CN (1) CN108712423A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474584A (en) * 2018-10-29 2019-03-15 中化能源科技有限公司 A kind of rule-based block chain network permits Adding Way automatically
CN109493063A (en) * 2018-12-29 2019-03-19 杭州趣链科技有限公司 The method of permission control is carried out in a kind of alliance's block chain
CN109714348A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Permission processing method, device, equipment and the medium realized based on block chain
CN109964452A (en) * 2018-11-29 2019-07-02 区链通网络有限公司 A kind of node administration method, device and the storage device of block catenary system
CN110572262A (en) * 2019-09-20 2019-12-13 中国银行股份有限公司 Block chain alliance chain construction method, device and system
CN110598394A (en) * 2019-03-28 2019-12-20 腾讯科技(深圳)有限公司 Authority verification method and device and storage medium
CN110611647A (en) * 2019-03-06 2019-12-24 张超 Node joining method and device on block chain system
CN110769274A (en) * 2019-10-18 2020-02-07 腾讯科技(深圳)有限公司 Live broadcast information processing method and device based on block chain network, electronic equipment and storage medium
CN111262825A (en) * 2018-12-03 2020-06-09 富士通株式会社 Apparatus and method for processing user public key in communication system including plurality of nodes
CN111385103A (en) * 2020-05-29 2020-07-07 腾讯科技(深圳)有限公司 Authority processing method, system and device and electronic equipment
WO2020035094A3 (en) * 2019-11-19 2020-09-10 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for consensus management
CN111897795A (en) * 2020-06-24 2020-11-06 苏宁金融科技(南京)有限公司 Management method, device and system of alliance chain
CN112235251A (en) * 2020-09-21 2021-01-15 建信金融科技有限责任公司 Block chain management method and device, computer equipment and storage medium
CN112398924A (en) * 2020-11-03 2021-02-23 深圳壹账通智能科技有限公司 Block chain node admission control method, block chain node admission control device, computer equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
CN106097101A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain realizes the management method of financial transaction
US20170046709A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Product tracking and control system
CN106796688A (en) * 2016-12-26 2017-05-31 深圳前海达闼云端智能科技有限公司 Permission control method, device and system of block chain and node equipment
CN107332701A (en) * 2017-06-26 2017-11-07 中国人民银行数字货币研究所 The method and system of management node
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system
CN107480555A (en) * 2017-08-01 2017-12-15 中国联合网络通信集团有限公司 Database-access rights control method and equipment based on block chain
CN107911373A (en) * 2017-11-24 2018-04-13 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of block chain right management method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170046709A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Product tracking and control system
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
CN106097101A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain realizes the management method of financial transaction
CN106796688A (en) * 2016-12-26 2017-05-31 深圳前海达闼云端智能科技有限公司 Permission control method, device and system of block chain and node equipment
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system
CN107332701A (en) * 2017-06-26 2017-11-07 中国人民银行数字货币研究所 The method and system of management node
CN107480555A (en) * 2017-08-01 2017-12-15 中国联合网络通信集团有限公司 Database-access rights control method and equipment based on block chain
CN107911373A (en) * 2017-11-24 2018-04-13 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of block chain right management method and system

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474584A (en) * 2018-10-29 2019-03-15 中化能源科技有限公司 A kind of rule-based block chain network permits Adding Way automatically
CN109964452A (en) * 2018-11-29 2019-07-02 区链通网络有限公司 A kind of node administration method, device and the storage device of block catenary system
CN109964452B (en) * 2018-11-29 2021-08-10 区链通网络有限公司 Node management method and device for block chain system and storage device
WO2020107350A1 (en) * 2018-11-29 2020-06-04 区链通网络有限公司 Node management method and apparatus for blockchain system, and storage device
CN111262825B (en) * 2018-12-03 2022-09-09 富士通株式会社 Apparatus and method for processing user public key in communication system including plurality of nodes
CN111262825A (en) * 2018-12-03 2020-06-09 富士通株式会社 Apparatus and method for processing user public key in communication system including plurality of nodes
CN109493063A (en) * 2018-12-29 2019-03-19 杭州趣链科技有限公司 The method of permission control is carried out in a kind of alliance's block chain
CN109714348A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Permission processing method, device, equipment and the medium realized based on block chain
CN109714348B (en) * 2018-12-29 2021-08-06 百度在线网络技术(北京)有限公司 Authority processing method, device, equipment and medium based on block chain
CN110611647A (en) * 2019-03-06 2019-12-24 张超 Node joining method and device on block chain system
CN110598394A (en) * 2019-03-28 2019-12-20 腾讯科技(深圳)有限公司 Authority verification method and device and storage medium
CN110572262A (en) * 2019-09-20 2019-12-13 中国银行股份有限公司 Block chain alliance chain construction method, device and system
CN110769274A (en) * 2019-10-18 2020-02-07 腾讯科技(深圳)有限公司 Live broadcast information processing method and device based on block chain network, electronic equipment and storage medium
CN112513900B (en) * 2019-11-19 2024-03-26 支付宝(杭州)信息技术有限公司 System and method for consensus management
WO2020035094A3 (en) * 2019-11-19 2020-09-10 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for consensus management
US11270030B2 (en) 2019-11-19 2022-03-08 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for consensus management
CN112513900A (en) * 2019-11-19 2021-03-16 支付宝(杭州)信息技术有限公司 Systems and methods for consensus management
CN111385103A (en) * 2020-05-29 2020-07-07 腾讯科技(深圳)有限公司 Authority processing method, system and device and electronic equipment
CN111385103B (en) * 2020-05-29 2020-09-25 腾讯科技(深圳)有限公司 Authority processing method, system and device and electronic equipment
CN111897795A (en) * 2020-06-24 2020-11-06 苏宁金融科技(南京)有限公司 Management method, device and system of alliance chain
CN112235251A (en) * 2020-09-21 2021-01-15 建信金融科技有限责任公司 Block chain management method and device, computer equipment and storage medium
CN112398924A (en) * 2020-11-03 2021-02-23 深圳壹账通智能科技有限公司 Block chain node admission control method, block chain node admission control device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108712423A (en) Right management method and device
DE60205289T2 (en) System and method for secure radio transmission of configuration data
CN105069363B (en) The distribution of intelligent robot account and management method and system based on artificial intelligence
CN108881232A (en) Sign-on access method, apparatus, storage medium and the processor of operation system
DE112005002297T5 (en) A method and system for supporting fast handover of mobile subscriber stations in wireless broadband networks
US10601839B1 (en) Security management application providing proxy for administrative privileges
CN106656547A (en) Method and apparatus for updating network configuration of household electrical appliances
US20080086545A1 (en) Network configuration using configuration parameter inheritance
CN104811415B (en) Distributed Scans system load balancing method and device
CN105933245A (en) Secure and credible access method in software defined network
CN107466067A (en) A kind of group-calling service switching method, system, base station and terminal
CN105162608A (en) Physical address bypass authentication method and device based on software-defined network
CN106534082A (en) User registration method and apparatus
CN108920919A (en) Control method, device and system of interactive intelligent equipment
CN104219094B (en) A kind of method and apparatus of AP packet configurations
CN106453321A (en) Authentication server, system and method, and to-be-authenticated terminal
CN106059802A (en) Terminal access authentication method and device
CN110139274A (en) A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium
CN201690475U (en) Application server access system in enterprise local area network
CN107645570A (en) Client loading method and device
CN105592141A (en) Connection number control method and device
CN105809024A (en) Password setting method and device
CN106773797B (en) A kind of information processing method, system and management platform
CN110532094B (en) Load balancing weight value modification method and processing system
CN104898472B (en) terminal control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181026