CN109241763A - Block generating method based on permission issue - Google Patents

Block generating method based on permission issue Download PDF

Info

Publication number
CN109241763A
CN109241763A CN201810723949.2A CN201810723949A CN109241763A CN 109241763 A CN109241763 A CN 109241763A CN 201810723949 A CN201810723949 A CN 201810723949A CN 109241763 A CN109241763 A CN 109241763A
Authority
CN
China
Prior art keywords
block
node
rule
permission
network address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810723949.2A
Other languages
Chinese (zh)
Other versions
CN109241763B (en
Inventor
钟迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Flashover Information Technology Co Ltd
Original Assignee
Wuhan Kanghuiran Information Technology Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Kanghuiran Information Technology Consulting Co ltd filed Critical Wuhan Kanghuiran Information Technology Consulting Co ltd
Priority to CN201810723949.2A priority Critical patent/CN109241763B/en
Publication of CN109241763A publication Critical patent/CN109241763A/en
Application granted granted Critical
Publication of CN109241763B publication Critical patent/CN109241763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A block generation method based on authority issue comprises the following steps: s1, configuring the initial authority of the founding block server; and configuring a block network protocol; s2, when receiving the block generation request of the node for the first time, judging whether the block generation request of the node conforms to the block network protocol, and if so, generating a candidate block according to the block generation rule; and jumps to step S3; s3, authenticating the candidate blocks according to the authority through the created block server, and jumping to the step S4 after the authentication is passed; s4, the creating block server sends authentication information to the request node; the request node calculates the candidate block according to the authentication information to obtain a block, and jumps to step S5; and S5, adjusting the authority of the created block server according to the authority distribution rule, and distributing the authority to the corresponding nodes of the block.

Description

The block generation method issued based on permission
Technical field
The present invention relates to block chain technical field, in particular to a kind of block generation method issued based on permission.
Background technique
Block chain technology is decentralization as a kind of anonymous, decentralization technology, essence, however in reality such as Bit coin, the calculation power for digging mine are excessively concentrated, and the mine factory of ranking several former has concentrated the one third or so of whole calculation power, this existing Shape has violated the original idea of block chain technology.
Also, in block chain generating process, early stage number of blocks is more not enough, and decentralization degree is not also high In the case of, block is obtained there is also not scientific according to calculating power and dig pit completely, so that the block that early stage generates is tested in block chain The safety of card is not high.
Summary of the invention
In view of this, the present invention provides a kind of block generation method issued based on permission.
A kind of block generation method issued based on permission comprising following steps:
The initial permission of S1, configuration wound generation block server;And configure block network protocol;
S2, receiving node for the first time block generate request when, judge node block generate request whether meet block Network protocol generates candidate block according to block create-rule when meeting;And jump to step S3;
S3, candidate block is authenticated according to permission by wound generation block server, step is jumped to after certification passes through Rapid S4;
S4, wound generation block server send authentication information to requesting node;Requesting node is according to authentication information to candidate regions Block, which calculate, obtains block, and jumps to step S5;
S5, according to authority distribution rule to wound generation block server permission be adjusted, and to block corresponding node into Row authority distribution.
In the block generation method of the present invention issued based on permission,
After the step S5 further include:
S6, receiving node again block generate request when, judge node block generate request whether meet block Network protocol generates candidate block according to block create-rule when meeting;And jump to step S7;
S7, the node requested again send candidate block information in block network by block network protocol, obtain The authentication information of generation block server, all block corresponding nodes is created in block network;Meet in the authentication information received pre- Step S8 is jumped to when setting authentication condition;
S8, judge whether permission wound generation block server adjusted meets escape mechanism;The jump when meeting escape mechanism Go to step S10;Otherwise it is adjusted according to permission of the authority distribution rule to wound generation block server, and jumps to step S9;
S9, wound generation block server send authentication information to requesting node;Requesting node is according to authentication information to candidate regions Block, which calculate, obtains block, and the corresponding node of block generated to this carries out authority distribution, terminates;
Candidate block calculate to candidate block by S10, requesting node according to default authentication information obtains block, and right This corresponding node of block generated carries out authority distribution, terminates.
In the block generation method of the present invention issued based on permission,
Generating candidate block according to block create-rule in the step S6 includes:
Block generates allocation rule, calculates power recognition rule in S01, configuration candidate block generating process;
S02, block sum in allocation rule generation block chain is generated by block, and by block sum according to network address Section is allocated each network address section of acquisition and corresponds to block pond;
Network address section where the node that S03, judgement are requested, and judge that corresponding to block pond in the network address section of place is It is no to reach the upper limit, step S06 is jumped to when reaching the upper limit, otherwise jumps to step S04;
S04, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped when occurring and calculating power exception Step S06 is gone to, step S05 is otherwise jumped to;
S05, candidate block is generated according to default block create-rule information, and executes the step of jumping to step S7;
S06, the block for refusing node generate request, and terminate.
In the block generation method of the present invention issued based on permission,
Judge whether the node of request occurs calculating power including: extremely by calculating power recognition rule in the step S04
S41, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S42, judge whether the node of request occurs calculating power exception according to calculation power test result.
In the block generation method of the present invention issued based on permission,
Before the step S41 further include:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule;
Correspondingly, the step S42 includes:
S421, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S5;It is no Then jump to step S422;
S422, the calculation power that the node entry that power adjustment rule adjustment is requested is calculated according to node influence coefficient;
S423, the calculation power that coefficient obtains the node of request adjusted is influenced by calculating power, and judges request adjusted Node calculation power whether calculate power exception.
In the block generation method of the present invention issued based on permission,
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to area Block pond includes:
Network address is divided into the network address section of different levels;
It is corresponding that each hierarchical network address field of division acquisition is carried out to block sum according to the network address section of different levels Block pond.
In the block generation method of the present invention issued based on permission,
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
In the block generation method of the present invention issued based on permission,
The step S41 includes:
S411, it is sent to node and calculates power test program, the calculation power test program includes floating-point operation, node unique identification Code obtains program;
The calculation power test result of the feedback of S422, receiving node, the calculation power test result include floating-point operation result, section Point unique identifier.
In the block generation method of the present invention issued based on permission,
The step S05 includes:
Using the calculation power of the node of request adjusted as contribution margin according to generation candidate block.
Advantageous effects: the block generation method of the invention issued based on permission compared with the existing technology, Neng Goushi It is existing: candidate block to be authenticated according to permission by wound generation block server, and according to authority distribution rule to wound generation block The permission of server is adjusted, and carries out authority distribution to block corresponding node, so that the block that early stage generates is in block chain The safety of middle verifying is higher;And allocation rule is generated by block and generates block sum in block chain, and block sum is pressed The each network address section of acquisition is allocated according to network address section and corresponds to block pond, and block can be carried out forcing to divide according to region Cloth distribution avoids because the calculation power for digging mine is excessively concentrated, and the mine factory of ranking several former monopolizes the generation of most of block.
Detailed description of the invention
Fig. 1 is the block generation method flow chart provided in an embodiment of the present invention issued based on permission.
Specific embodiment
As shown in Figure 1, in embodiments of the present invention, a kind of block generation method issued based on permission comprising as follows Step:
The initial permission of S1, configuration wound generation block server;And configure block network protocol;
By setting create generation block server so that early stage generate candidate block need by wound generation block server into Row certification, so that the safety that the block of early stage generation is verified in block chain is higher.The block network protocol of configuration is Wound generation block server, block corresponding node, request node between communicated required for satisfaction condition.The present invention for The concrete form of block network protocol and with no restrictions.
S2, receiving node for the first time block generate request when, judge node block generate request whether meet block Network protocol generates candidate block according to block create-rule when meeting;And jump to step S3;
Solve specific mathematical problem It can be with.
S3, candidate block is authenticated according to permission by wound generation block server, step is jumped to after certification passes through Rapid S4;
This step is the significant difference that the present embodiment is different from the prior art, in the prior art, as long as being suitble to meet pre- If condition can generate corresponding block.But in the present embodiment, generation is candidate block, and candidate block has to By the certification for creating generation block server.Specific, the present embodiment and without limitation of certification.
S4, wound generation block server send authentication information to requesting node;Requesting node is according to authentication information to candidate regions Block, which calculate, obtains block, and jumps to step S5;
Optionally, requesting node carries out calculating acquisition block being certification letter according to authentication information to candidate block The random number sent in breath comprising wound generation block server carries out candidate block by parsing the random number in authentication information SHA512 is calculated.
S5, according to authority distribution rule to wound generation block server permission be adjusted, and to block corresponding node into Row authority distribution.
The permission of wound generation block server is adjusted in step s 5, specially reduces the power of wound generation block server The weighted value of limit, and authority distribution, the weighted value of the object of distribution to permission are carried out to the corresponding node of the block of generation.Adjustment The weighted value of the permission of wound generation block server afterwards and the object of distribution are wound generation block clothes to the sum of weighted value of permission The weighted value for the initial permission of device of being engaged in.
Optionally, successively decrease to the weighted value of the permission of wound generation block server, and can be according to the block of generation The total amount of quantity the amplitude that weighted value successively decreases is set.
The purpose of this step is in the permission accounting for gradually decreasing wound generation block server, and the power that will create generation block server Limit is gradually issued among the block of generation.
Through this embodiment, the block for enabling to early stage to generate passes through the certification of wound generation block server, in block chain The safety of middle verifying is higher.
In the present embodiment, wound generation block server can be common server, its object is to according to permission to time Constituency block is authenticated, and sends authentication information to requesting node.
In the block generation method of the present invention issued based on permission,
After the step S5 further include:
S6, receiving node again block generate request when, judge node block generate request whether meet block Network protocol generates candidate block according to block create-rule when meeting;And jump to step S7;
S7, the node requested again send candidate block information in block network by block network protocol, obtain The authentication information of generation block server, all block corresponding nodes is created in block network;Meet in the authentication information received pre- Step S8 is jumped to when setting authentication condition;
Default authentication condition herein can create generation block server, Suo Youqu in the block network to send authentication information The sum of weighted value of the corresponding permission of block corresponding node is more than or equal to default weight threshold.
S8, judge whether permission wound generation block server adjusted meets escape mechanism;The jump when meeting escape mechanism Go to step S10;Otherwise it is adjusted according to permission of the authority distribution rule to wound generation block server, and jumps to step S9;
By the way that escape mechanism is arranged, may be implemented when the block of generation reaches certain quantity, so that wound generation block clothes Business device exits certification, so that balancing the safety guarantee when decentralization and very little early stage number of blocks of block chain.
Optionally, the escape mechanism is the weighted value of the weight of permission wound generation block server adjusted less than default Threshold value.
S9, wound generation block server send authentication information to requesting node;Requesting node is according to authentication information to candidate regions Block, which calculate, obtains block, and the corresponding node of block generated to this carries out authority distribution, terminates;
Candidate block calculate to candidate block by S10, requesting node according to default authentication information obtains block, and right This corresponding node of block generated carries out authority distribution, terminates.
Optionally default authentication information is timestamp numerical value when candidate block generates, by default authentication information to candidate Block carries out SHA512 calculating.
In the block generation method of the present invention issued based on permission,
Generating candidate block according to block create-rule in the step S6 includes:
Block generates allocation rule, calculates power recognition rule in S01, configuration candidate block generating process;
In the prior art, the allocation rule generated without block is gone yuan often by power size is calculated to determine generation Node contribution margin, although the determination of contribution margin there are many mode, does not have distribution mechanism;And simple passes through calculation power Size determines contribution margin, so that large-scale mortar businesses concentrate a large amount of high-performance computers or server to be far longer than The calculation power of common computer is to obtain more blocks.This step, can be right by generating allocation rule, calculating power recognition rule It distinguishes to generate and be allocated, and the mine factory running that profession digs mine can be limited to a certain extent, improve its operating cost.
S02, block sum in allocation rule generation block chain is generated by block, and by block sum according to network address Section is allocated each network address section of acquisition and corresponds to block pond;
Optionally, block sum is allocated according to network address section and can carries out segmentation division by IP address with 1., Can also in such a way that 2. are combined by IP address with MAC Address or 3. by backbone network, IP Address in LAN distribution rule Then determine.
Optionally,
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to area Block pond includes:
Network address is divided into the network address section of different levels;
It is corresponding that each hierarchical network address field of division acquisition is carried out to block sum according to the network address section of different levels Block pond.
In a preferred embodiment of the invention, by the way that network address to be divided into the network address section of different levels, and it is final Divide and obtain each hierarchical network address field and correspond to block pond, for example allocation rule is as follows:
First level network address section A, B, C, and limit the upper limit of the number that A, B, C correspond to block in block pond.
Further, in the second level network address section, A is divided into a1, a2, a3, and it is corresponding to limit a1, a2, a3 The upper limit of the number of block in block pond, and can connect and be finely divided.
Preferred embodiment through the invention not only needs to meet the requirement in block pond in this hierarchical network address field, also needs The hierarchical network address field for meeting this hierarchical network address field or more corresponds to the requirement in block pond so that block generate when pair In limitation more the having levels property of quantity.
Optionally,
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
In a preferred embodiment of the invention, standard request rate is that the node requested in the hierarchical network address field accounts for all sections The ratio value of point, standard request rate are the mutual exclusion rule for generating block chain.
Network address section where the node that S03, judgement are requested, and judge that corresponding to block pond in the network address section of place is It is no to reach the upper limit, step S06 is jumped to when reaching the upper limit, otherwise jumps to step S04;
S04, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped when occurring and calculating power exception Step S06 is gone to, step S05 is otherwise jumped to;
S05, candidate block is generated according to default block create-rule information, and executes the step of jumping to step S7;
S06, the block for refusing node generate request, and terminate.
In the block generation method of the present invention issued based on permission,
Judge whether the node of request occurs calculating power including: extremely by calculating power recognition rule in the step S04
S41, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S42, judge whether the node of request occurs calculating power exception according to calculation power test result.
Optionally,
Before the step S41 further include:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule.
Optionally, configuring corresponding node calculation power adjustment rule according to mutual exclusion rule includes:
θ=δ12*...δn, wherein θ is that node calculates power Tuning function, δ1For node this level network address section Standard request rate, δ2For node the network address section of a upper level standard request rate, and so on, n be node where Total level of network address section.
In the block generation method of the present invention issued based on permission,
Before the step S41 further include:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule;
Correspondingly, the step S42 includes:
S421, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S5;It is no Then jump to step S422;
S422, the calculation power that the node entry that power adjustment rule adjustment is requested is calculated according to node influence coefficient;
Optionally, the value of θ is that the calculation power for the node entry requested influences coefficient.
S423, the calculation power that coefficient obtains the node of request adjusted is influenced by calculating power, and judges request adjusted Node calculation power whether calculate power exception.
Calculation power of the product of the calculation power of calculation power influence coefficient and the node of request as the node of request adjusted.
Optionally, power outlier threshold is calculated in setting, by the calculation power of the node of request adjusted and calculates the progress of power outlier threshold Comparison then confirms that the calculation power of the node of request adjusted is abnormal if it is greater than power outlier threshold is calculated.
In the block generation method of the present invention issued based on permission,
The step S41 includes:
S411, it is sent to node and calculates power test program, the calculation power test program includes floating-point operation, node unique identification Code obtains program;
The calculation power test result of the feedback of S422, receiving node, the calculation power test result include floating-point operation result, section Point unique identifier.
In the block generation method of the present invention issued based on permission,
The step S05 includes:
Using the calculation power of the node of request adjusted as contribution margin according to generation candidate block.
Advantageous effects: the block generation method of the invention issued based on permission compared with the existing technology, Neng Goushi It is existing: by being authenticated according to permission to candidate block by wound generation block server, and according to authority distribution rule to wound generation The permission of block server is adjusted, and carries out authority distribution to block corresponding node, so that the block that early stage generates is in area The safety verified in block chain is higher;And allocation rule is generated by block and generates block sum in block chain, and block is total Number is allocated each network address section of acquisition according to network address section and corresponds to block pond, can carry out to block according to region strong System distribution distribution avoids because the calculation power for digging mine is excessively concentrated, and the mine factory of ranking several former monopolizes the generation of most of block.
It is understood that for those of ordinary skill in the art, can do in accordance with the technical idea of the present invention Various other changes and modifications out, and all these changes and deformation all should belong to the protection model of the claims in the present invention It encloses.

Claims (9)

1. a kind of block generation method issued based on permission, which is characterized in that it includes the following steps:
The initial permission of S1, configuration wound generation block server;And configure block network protocol;
S2, receiving node for the first time block generate request when, judge node block generate request whether meet block network Agreement generates candidate block according to block create-rule when meeting;And jump to step S3;
S3, candidate block is authenticated according to permission by wound generation block server, step S4 is jumped to after certification passes through;
S4, wound generation block server send authentication information to requesting node;Requesting node according to authentication information to candidate block into Row, which calculates, obtains block, and jumps to step S5;
S5, it is adjusted according to permission of the authority distribution rule to wound generation server, and permission point is carried out to block corresponding node Match.
2. the block generation method issued as described in claim 1 based on permission, which is characterized in that
After the step S5 further include:
S6, receiving node again block generate request when, judge node block generate request whether meet block network Agreement generates candidate block according to block create-rule when meeting;And jump to step S7;
S7, the node requested again send candidate block information in block network by block network protocol, obtain block The authentication information of generation server, all block corresponding nodes is created in network;Meet pre- setting authentication item in the authentication information received Step S8 is jumped to when part;
S8, judge whether permission wound generation server adjusted meets escape mechanism;Step is jumped to when meeting escape mechanism S10;Otherwise it is adjusted according to permission of the authority distribution rule to wound generation block server, and jumps to step S9;
S9, wound generation block server send authentication information to requesting node;Requesting node according to authentication information to candidate block into Row, which calculates, obtains block, and the corresponding node of block generated to this carries out authority distribution, terminates;
Candidate block calculate to candidate block by S10, requesting node according to default authentication information obtains block, and to this The corresponding node of the block of generation carries out authority distribution, terminates.
3. the block generation method issued as claimed in claim 2 based on permission, which is characterized in that
Generating candidate block according to block create-rule in the step S6 includes:
S01, configuration wait block in block generating process and generate allocation rule, calculate power recognition rule;
S02, by block generate allocation rule generate block chain in block sum, and by block sum according to network address section into Row distribution obtains each network address section and corresponds to block pond;
Network address section where the node that S03, judgement are requested, and judge to correspond to whether block pond reaches in the network address section of place To the upper limit, step S06 is jumped to when reaching the upper limit, otherwise jumps to step S04;
S04, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped to when occurring and calculating power exception Otherwise step S06 jumps to step S05;
S05, candidate block is generated according to default block create-rule information, and executes the step of jumping to step S7;
S06, the block for refusing node generate request, and terminate.
4. the block generation method issued as claimed in claim 3 based on permission, which is characterized in that
Judge whether the node of request occurs calculating power including: extremely by calculating power recognition rule in the step S04
S41, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S42, judge whether the node of request occurs calculating power exception according to calculation power test result.
5. the block generation method issued as claimed in claim 4 based on permission, which is characterized in that
Before the step S41 further include:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule;
Correspondingly, the step S42 includes:
S421, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S5;Otherwise it jumps Go to step S422;
S422, the calculation power that the node entry that power adjustment rule adjustment is requested is calculated according to node influence coefficient;
S423, the calculation power that coefficient obtains the node of request adjusted is influenced by calculating power, and judges the section of request adjusted Whether the calculation power of point calculates power exception.
6. the block generation method issued as claimed in claim 5 based on permission, which is characterized in that
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to block pond Include:
Network address is divided into the network address section of different levels;
The each hierarchical network address field of division acquisition is carried out to block sum according to the network address section of different levels and corresponds to block Pond.
7. the block generation method issued as claimed in claim 6 based on permission, which is characterized in that
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
8. the block generation method issued as claimed in claim 4 based on permission, which is characterized in that
The step S41 includes:
S411, it is sent to node and calculates power test program, the calculation power test program includes that floating-point operation, nodes unique identifier obtain Program fetch;
The calculation power test result of the feedback of S422, receiving node, the calculation power test result include floating-point operation result, node only One identification code.
9. the block generation method issued as claimed in claim 5 based on permission, which is characterized in that
The step S05 includes:
Using the calculation power of the node of request adjusted as contribution margin according to generation candidate block.
CN201810723949.2A 2018-07-04 2018-07-04 Block generating method based on permission issue Active CN109241763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810723949.2A CN109241763B (en) 2018-07-04 2018-07-04 Block generating method based on permission issue

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810723949.2A CN109241763B (en) 2018-07-04 2018-07-04 Block generating method based on permission issue

Publications (2)

Publication Number Publication Date
CN109241763A true CN109241763A (en) 2019-01-18
CN109241763B CN109241763B (en) 2020-03-24

Family

ID=65071856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810723949.2A Active CN109241763B (en) 2018-07-04 2018-07-04 Block generating method based on permission issue

Country Status (1)

Country Link
CN (1) CN109241763B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2762365A1 (en) * 2013-02-01 2014-08-06 Alcatel Lucent A method and device for authenticating a license plate number for the purpose of authenticating a vehicle operation permission
US20160132665A1 (en) * 2011-07-13 2016-05-12 Salesforce.Com, Inc. Mechanism for facilitating management of data in an on-demand services environment
CN106203178A (en) * 2016-08-26 2016-12-07 杨鹏 The write authority distributing method of a kind of block chain and system
CN106796685A (en) * 2016-12-30 2017-05-31 深圳前海达闼云端智能科技有限公司 Block chain authority control method and device and node equipment
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN107426250A (en) * 2017-09-12 2017-12-01 大唐广电科技(武汉)有限公司 A kind of industrial digital information network platform based on block chain
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN107508812A (en) * 2017-08-29 2017-12-22 广东工业大学 A kind of industry control network date storage method, call method and system
CN107730277A (en) * 2017-10-18 2018-02-23 上海唯链信息科技有限公司 A kind of product based on block chain technology is traced to the source verification method
CN108055138A (en) * 2018-02-01 2018-05-18 国家计算机网络与信息安全管理中心 Distributed recorder method and system is applied based on block chain
CN108154243A (en) * 2017-12-27 2018-06-12 上海唯链信息科技有限公司 A kind of vehicle maintenance information system based on block chain technology
CN108229962A (en) * 2018-01-04 2018-06-29 众安信息技术服务有限公司 Right management method and system based on block chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107103480A (en) * 2017-05-18 2017-08-29 电子科技大学 Supply chain management method based on block chain with sovereign right
CN107277000B (en) * 2017-06-09 2019-10-25 北京明朝万达科技股份有限公司 A kind of electronic certificate method for managing security and system
CN108243182B (en) * 2017-10-26 2020-08-18 招商银行股份有限公司 Block chain management authorization method, sub-management end, root management end and storage medium
CN108023894B (en) * 2017-12-18 2020-09-11 苏州优千网络科技有限公司 Visa information system based on block chain and processing method thereof
CN108234515B (en) * 2018-01-25 2020-07-24 中国科学院合肥物质科学研究院 Self-authentication digital identity management system and method based on intelligent contract

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160132665A1 (en) * 2011-07-13 2016-05-12 Salesforce.Com, Inc. Mechanism for facilitating management of data in an on-demand services environment
EP2762365A1 (en) * 2013-02-01 2014-08-06 Alcatel Lucent A method and device for authenticating a license plate number for the purpose of authenticating a vehicle operation permission
CN106203178A (en) * 2016-08-26 2016-12-07 杨鹏 The write authority distributing method of a kind of block chain and system
CN106796685A (en) * 2016-12-30 2017-05-31 深圳前海达闼云端智能科技有限公司 Block chain authority control method and device and node equipment
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN107508812A (en) * 2017-08-29 2017-12-22 广东工业大学 A kind of industry control network date storage method, call method and system
CN107426250A (en) * 2017-09-12 2017-12-01 大唐广电科技(武汉)有限公司 A kind of industrial digital information network platform based on block chain
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN107730277A (en) * 2017-10-18 2018-02-23 上海唯链信息科技有限公司 A kind of product based on block chain technology is traced to the source verification method
CN108154243A (en) * 2017-12-27 2018-06-12 上海唯链信息科技有限公司 A kind of vehicle maintenance information system based on block chain technology
CN108229962A (en) * 2018-01-04 2018-06-29 众安信息技术服务有限公司 Right management method and system based on block chain
CN108055138A (en) * 2018-02-01 2018-05-18 国家计算机网络与信息安全管理中心 Distributed recorder method and system is applied based on block chain

Also Published As

Publication number Publication date
CN109241763B (en) 2020-03-24

Similar Documents

Publication Publication Date Title
CN106470184B (en) Security authentication method, device and system
CN108900559B (en) Login certificate management method and device, computer equipment and storage medium
US9485255B1 (en) Authentication using remote device locking
CN112799636A (en) Random number generation method, device, equipment and storage medium
CN101202631A (en) System and method for identification authentication based on cipher key and timestamp
CN108307000A (en) Block chain generation method based on time scheduling
CN107147634B (en) WEB service layered authentication method supporting platform multi-application
CN105282166A (en) Identity authentication method and system for linux operating system
CN111181728A (en) Data processing method and device
CN108241716A (en) A kind of resource introduction method and device
CN109241763A (en) Block generating method based on permission issue
CN117909952A (en) Terminal identity credibility assessment method and device
CN105763569B (en) To the method for account authentication, client, service platform and management platform
US10354243B2 (en) Authentication method and a server
CN111008835B (en) Method, apparatus, computer readable storage medium and computer program product for determining a transaction verification node of a blockchain
CN114389821B (en) Signature supervision method, device, equipment and storage medium based on block chain
CN106027523B (en) The collecting method and distributed data system of distributed data system
CN107154930B (en) Method and system for testing vulnerability
CN109639695A (en) Dynamic identity authentication method, electronic equipment and storage medium based on mutual trust framework
CN109005143B (en) Method and device for adjusting website load
CN115373641A (en) Software development system based on encryption algorithm
CN105592031A (en) User login method and system based on identity authentication
CN107045613B (en) Information monitoring control method and device
CN112751675B (en) Information monitoring method, system, equipment and storage medium based on block chain
CN113824732A (en) Zero trust-based multi-factor authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200131

Address after: Room 308-121, block C, No. 100, Torch Road, high tech Zone, Qingdao, Shandong Province

Applicant after: Qingdao Zhi tiger Mdt InfoTech Ltd

Address before: 430014 Layer 9, Unit 21, Phase I, Modern International Design City, Guannan Science and Technology Industrial Park, Donghu New Technology Development Zone, Wuhan City, Hubei Province (Admitted to Wuhan Chuangyijia Business Secretary Service Co., Ltd; Trusteeship No. 000348)

Applicant before: Wuhan Kang Huiran Information Technology Consulting Co., Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200226

Address after: Room 1101-1102, block B, platinum Plaza, No. 5, Wenling Road, Laoshan District, Qingdao, Shandong Province

Applicant after: Qingdao flashover Information Technology Co., Ltd.

Address before: Room 308-121, block C, No. 100, Torch Road, high tech Zone, Qingdao, Shandong Province

Applicant before: Qingdao Zhi tiger Mdt InfoTech Ltd

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant