CN109271802A - A kind of user information management method, system, equipment and computer storage medium - Google Patents

A kind of user information management method, system, equipment and computer storage medium Download PDF

Info

Publication number
CN109271802A
CN109271802A CN201811114994.4A CN201811114994A CN109271802A CN 109271802 A CN109271802 A CN 109271802A CN 201811114994 A CN201811114994 A CN 201811114994A CN 109271802 A CN109271802 A CN 109271802A
Authority
CN
China
Prior art keywords
information
management
client
identity
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811114994.4A
Other languages
Chinese (zh)
Inventor
刘新
黄庆财
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201811114994.4A priority Critical patent/CN109271802A/en
Publication of CN109271802A publication Critical patent/CN109271802A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

This application discloses a kind of user information management method, system, equipment and computer storage mediums, are applied in block chain node device, wherein requesting this method comprises: receiving client the management of user information, management request includes manager's identity;Extract the subscriber identity information in user information;Judge whether manager's identity matches with subscriber identity information;It is requested according to matching result response management and assigns client corresponding administration authority;Corresponding management is carried out to user information according to the management operation instruction of client to operate.In a kind of user information management method disclosed in the present application, user information is stored in block chain, due to block chain can not tamper, being stored in user information in block chain can not be light easily modified, compared with prior art, it is ensured that the safety of user information.A kind of customer information control system, equipment and computer readable storage medium disclosed in the present application also solve the problems, such as relevant art.

Description

A kind of user information management method, system, equipment and computer storage medium
Technical field
This application involves block chain technical fields, more specifically to a kind of user information management method, system, set Standby and computer storage medium.
Background technique
In Internet application in service, the user information of user, such as identity information, contact method are stored in data In library, carry out managing user information by database.
However, coming in the technical solution of managing user information by database, attacker is easy to store in altered data library User information, and not noticeable attacker distorts user information, so that carrying out the skill of managing user information by database The safety of art scheme is lower.
It is asked in conclusion the storage security for how improving user information is that current those skilled in the art are urgently to be resolved Topic.
Summary of the invention
The purpose of the application is to provide a kind of user information management method, can solve how to improve use to a certain extent The technical issues of storage security of family information.Present invention also provides a kind of customer information control system, block chain nodes to set Standby and computer readable storage medium.
To achieve the goals above, the application provides the following technical solutions:
A kind of user information management method is applied in block chain node device, which comprises
It receives client to request the management of user information, the management request includes manager's identity;
Extract the subscriber identity information in the user information;
Judge whether manager's identity matches with the subscriber identity information;
The management request is responded according to matching result and assigns the client corresponding administration authority;
Corresponding management is carried out to the user information according to the management operation instruction of the client to operate.
Preferably, described that the management request is responded according to matching result and assigns the client corresponding administrative power Limit, specifically includes:
When manager's identity is matched with the subscriber identity information, it is determined that manager's identity is the use The corresponding user identity of family information, and respond the management request and assign the client authority at the highest level.
Preferably, described according to when the management operation instruction is edit instruction or privacy information inquiry instruction The management operation instruction of client carries out corresponding management to the user information and operates, and specifically includes:
User identity authentication request is initiated to the client;
Obtain the authentication information that the request of user identity authentication described in the client end response is sent;
Judge whether that certification passes through according to the authentication information;
If so, being edited according to the edit instruction of the client to the user information, or according to the privacy Information inquiry instruction inquires corresponding user privacy information.
Preferably, described that the management request is responded according to matching result and assigns the client corresponding administrative power Limit, specifically includes:
When manager's identity and the subscriber identity information mismatch, it is determined that manager's identity is not institute The corresponding user identity of user information is stated, and responds the management request and assigns the client query administration authority.
Preferably, described to be referred to according to the management of client operation when the management operation instruction is inquiry instruction It enables and corresponding management operation is carried out to the user information, specifically include:
Corresponding manager's security level is determined according to manager's identity;
The user information of corresponding grade is inquired according to manager's security level and feeds back to the client.
Preferably, described according to when the management operation instruction is edit instruction or privacy information inquiry instruction The management operation instruction of client carries out corresponding management to the user information and operates, and specifically includes:
Refusal carries out editor to the user information or privacy information is inquired, and records manager's identity information, and Marking the management operation instruction is potential danger operational order.
Preferably, the method also includes:
Operation warning is sent to the client, and adjusts the credit etc. of corresponding manager according to manager's identity Grade.
A kind of customer information control system is applied in block chain node device, comprising:
First receiving module requests the management of user information for receiving client, and the management request includes management Person's identity;
First extraction module, for extracting the subscriber identity information in the user information;
First judgment module, for judging whether manager's identity matches with the subscriber identity information;
First respond module, for responding the management request according to matching result and assigning the client corresponding pipe Manage permission;
First operation module carries out the user information for the management operation instruction according to the client corresponding Management operation.
Preferably, first respond module, specifically includes:
First response unit, for when manager's identity is matched with the subscriber identity information, it is determined that Manager's identity is the corresponding user identity of the user information, and responds the management request and assign the client maximum tube Manage permission.
Preferably, when the management operation instruction is edit instruction or privacy information inquiry instruction, first operation Module specifically includes:
First transmission unit, for initiating user identity authentication request to the client;
First acquisition unit, the certification letter sent for obtaining the request of user identity authentication described in the client end response Breath;
First judging unit, for judging whether that certification passes through according to the authentication information;
First execution unit, when determining that certification passes through for first judging unit, according to the editor of the client The user information is edited in instruction, or inquires corresponding user privacy information according to the privacy information inquiry instruction.
Preferably, first respond module, specifically includes:
Second response unit is used for when manager's identity and subscriber identity information mismatch, then really Determining manager's identity not is the corresponding user identity of the user information, and responds the management request imparting client and look into Ask administration authority.
Preferably, when the management operation instruction is inquiry instruction, first operation module is specifically included:
First determination unit, for determining corresponding manager's security level according to manager's identity;
First query unit, for inquiring the user information of corresponding grade according to manager's security level and feeding back to The client.
Preferably, when the management operation instruction is edit instruction or privacy information inquiry instruction, first operation Module specifically includes:
First marking unit carries out editor or privacy information inquiry to the user information for refusing, and described in record Manager's identity information, and marking the management operation instruction is potential danger operational order.
Preferably, further includes:
Module is adjusted, for sending operation warning to the client, and respective tube is adjusted according to manager's identity The credit grade of reason person.
A kind of block chain node device, comprising:
Memory, for storing computer program;
Processor realizes the step of as above any user information management method when for executing the computer program Suddenly.
A kind of computer readable storage medium is stored with computer program in the computer readable storage medium, described The step of as above any described user information management method is realized when computer program is executed by processor.
A kind of user information management method provided by the present application is applied in block chain node device, receives client pair The management of user information is requested, and management request includes manager's identity;Extract the subscriber identity information in user information;Sentence Whether disconnected manager's identity matches with subscriber identity information;It is requested according to matching result response management and assigns client pair The administration authority answered;Corresponding management is carried out to user information according to the management operation instruction of client to operate.The application provides A kind of user information management method in, user information is stored in block chain, due to block chain can not tamper, be stored in User information in block chain can not be light easily modified, compared with prior art, it is ensured that the safety of user information, this Outside, block chain node device determines client to user according to whether manager's identity and subscriber identity information match The administration authority of information can further avoid user information by criminal by administration authority of the client to user information It obtains, is further ensured that the safety of user information.A kind of customer information control system, equipment and computer provided by the present application Readable storage medium storing program for executing also solves the problems, such as relevant art.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of first pass figure of user information management method provided by the embodiments of the present application;
Fig. 2 is a kind of second flow chart of user information management method provided by the embodiments of the present application;
Fig. 3 is a kind of third flow chart of user information management method provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of customer information control system provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of block chain node device provided by the embodiments of the present application;
Fig. 6 is a kind of another structural schematic diagram of block chain node device provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
This application involves block chain technologies, in order to make it easy to understand, below will be to block chain in the embodiment of the present application (Block Chain) is simply introduced, and block chain is distribution disclosed in all block chain nodes to access server The data structure of storage includes several blocks (Block).User terminal comprising client can be registered as an area Block chain node forms P2P network with other block chain nodes of access block chain server, and block chain data can be stored in P2P network, any one or more block chain nodes of P2P network paralysis, will not result in the loss of block chain data, such area Block chain data just have very strong safety, it is ensured that the persistence of data and can not distort.When a block is persisted to area When in block chain data, the block chain node of access server can add the block;Block is according to persistence time sequencing Singly it is added in block chain data, each block other than first block in block chain data will chain It is connected to its previous block, such block chain data just form a block and link this block, just as a chain one Sample, as soon as the block can not be modified after a block is persisted to block chain data.
In Internet application in service, the user information of user, such as identity information, contact method are stored in data In library, carry out managing user information by database.However, coming in the technical solution of managing user information by database, attack The user information stored in Fang Rongyi altered data library, and not noticeable attacker distorts user information, so that by number The safety for carrying out the technical solution of managing user information according to library is lower.A kind of user information management method provided by the present application can be with The storage security of user information is improved to a certain extent.
Referring to Fig. 1, Fig. 1 is a kind of first pass figure of user information management method provided by the embodiments of the present application.
A kind of user information management method provided by the embodiments of the present application is applied in block chain node device, can wrap Include following steps:
Step S101: it receives client and the management of user information is requested, management request includes manager's identity.
In practical application, block chain node device can first receive client and request the management of user information.Management is asked The manager's identity for including in asking can determine according to actual needs, for example it can be login account, the visitor of manager Family end identification information etc..
Step S102: the subscriber identity information in user information is extracted.
In practical application, after block chain node device receives management request, it can request to determine according to the management Corresponding user information is requested in the management, and then extracts the subscriber identity information in user information.The class of subscriber identity information Type can also determines according to actual conditions, for example it can be identity information, the user account information of user, and user information is initial Correspondence client identification etc. when being submitted to block chain by client.The particular content of user information can according to actual needs really It is fixed, for example it can be identity information, occupational information, the consumption information etc. of user.
Step S103: judge whether manager's identity matches with subscriber identity information.
In practical application, manager's identity can flexibly be set with the matched condition of subscriber identity information.Such as Manager's identity is the login account of manager, when subscriber identity information is user account information, manager's identity It can be consistent with user account information for the login account of manager with the matched condition of subscriber identity information;In manager's identity It is identified as client identification, subscriber identity information is corresponding visitor when user account information is initially submitted to block chain by client When family end identifies, manager's identity and the matched condition of subscriber identity information can be the client mark of initiation management request Corresponding client identification is consistent when knowledge is initially submitted to block chain with user information.
Step S104: requesting according to matching result response management and assigns client corresponding administration authority.
In practical application, block chain node device can be according to the matching knot of manager's identity and subscriber identity information Fruit, which carrys out response management, requests and assigns client corresponding administration authority.In concrete application scene, block chain node device can be with The ability response management request when manager's identity and subscriber identity information match, and assign client corresponding administrative power Limit.Certainly, the mode of the corresponding administration authority of client is requested and assigned according to matching result response management there are also other, this Shen Please it is not specifically limited herein.It can be appreciated that client can be limited to the pipe of user information by assigning the administration authority of client Reason operation, prevent client can protect the safety of user information from random managing user information to a certain extent.
In concrete application scene, the step of the corresponding administration authority of client is requested and assigned according to matching result response management It suddenly can be with specifically: when manager's identity is matched with subscriber identity information, it is determined that manager's identity is user information Corresponding user identity, and response management request assigns client authority at the highest level.Authority at the highest level namely permission client It holds to user information execution any one operation, such as searching user's information, modification user information, increase user information, deletion User information etc..Specifically, the administration authority that can be carried out grade classification, and limit each grade administration authority allows to hold The capable management to user information operates, and the administration authority that client is assigned according to it executes user information corresponding Management operation.
In concrete application scene, the step of the corresponding administration authority of client is requested and assigned according to matching result response management It suddenly can be with specifically: when manager's identity and subscriber identity information mismatch, it is determined that manager's identity is not user The corresponding user identity of information, and response management request assigns client query administration authority.In manager's identity and use When family identity information mismatches, block chain node device can directly assign client query administration authority, make client can only Searching user's information.
Step S105: corresponding management is carried out to user information according to the management operation instruction of client and is operated.
In practical application, block chain node device corresponds to user information according to the management operation instruction of client Management operation after, can also will management operation note feed back to client, after client confirmation it is errorless after, will management operation note Record is registered in block chain, so that the management operation note that subsequent basis is registered in block chain traces user information Deng.It, can also be by the matching result and imparting client of manager's identity and subscriber identity information in concrete application scene Administration authority be registered in block chain.
In concrete application scene, when manager's identity is matched with subscriber identity information, manager's identity is determined to use The corresponding user identity of family information, and when response management request imparting client authority at the highest level, when management operation instruction is When edit instruction or privacy information inquiry instruction, corresponding management is carried out to user information according to the management operation instruction of client The step of operation, can be with specifically: initiates user identity authentication request to client;Obtain client end response user identity authentication Request the authentication information sent;Judge whether that certification passes through according to authentication information;If so, according to the edit instruction pair of client User information is edited, or inquires corresponding user privacy information according to privacy information inquiry instruction.Volume referred to herein It collects and refers to the instruction for making user information change such as modifying to user information, increase and delete;Privacy information Inquiry instruction refers to the instruction of the corresponding information in searching user's information.Specifically, the body to user can be carried out by private key Part information is authenticated, for example block chain node device sends ID authentication request to client;Receive client with itself Authentication information after private key encryption;Encrypted authentication information is decrypted based on the corresponding public key of client, is judged whether Successful decryption, if so, determining that client is legitimate user, if it is not, then determining that client is illegal user.Client is corresponding Public key can according to block chain node save user information and client public key between corresponding relationship determine, due to client The public key at end is generated by client, solely belongs to some client, and the public key of each client is different, so The public key for the client that it is belonged to can be determined by user information, with the public key of user client A be C, user client B Public key be D for, if block chain node device save user information belong to user client A, can be determined that out and use The public key of client belonging to the information of family be C, at this point, block chain node device need to public key C to encrypted authentication information into Row decryption.
In concrete application scene, when manager's identity and subscriber identity information mismatch, manager's identity is determined It is not the corresponding user identity of user information, and when response management request imparting client query administration authority, when management operates When instruction is inquiry instruction, carrying out the step of corresponding management operates to user information according to the management operation instruction of client can With specifically: corresponding manager's security level is determined according to manager's identity;It is corresponding etc. according to the inquiry of manager's security level The user information of grade simultaneously feeds back to client.With manager's security level be high credible and secure grade, general credible and secure grade, Low credible and secure grade, by user information be the information of full disclosure, for information, privacy information disclosed in part, Ke Yishe Fixed high credible and secure grade can inquire every a kind of user information;And general credible and secure grade can inquire the letter of full disclosure Information disclosed in breath and part, can not inquire privacy information;Low credible and secure grade can only inquire the information of full disclosure.
In concrete application scene, when manager's identity and subscriber identity information mismatch, manager's identity is determined not For the corresponding user identity of user information, and when response management request assigns client query administration authority, when management operation refers to When order is edit instruction or privacy information inquiry instruction, user information is carried out according to the management operation instruction of client corresponding The step of management operation, can be with specifically: refusal carries out editor to user information or privacy information is inquired, and records manager body Part information, and annotation management operational order is potential danger operational order;Operation warning is sent to client, and according to manager Identity adjusts the credit grade of corresponding manager.Specifically, determining manager's identity and subscriber identity information mismatch, And management operation instruction be edit instruction or privacy information inquiry instruction when, can directly determine client for dangerous client, Correspondingly, directly refusal carries out editor to user information or privacy information is inquired, and records manager identity information, annotation management Operational order is potential danger operational order.In addition, for using technological means to attack or attempt to tamper with the client of user information End, can navigate to the client, lower the credit rating grade of the client;In addition, if the dangerous operation of the client, It can also be given a warning;If there are high-risk operations for the client, the client can also be carried out whithin a period of time It closes, and issues the high-risk early warning for being directed to the client to other blocks chain user.
A kind of user information management method provided by the present application is applied in block chain node device, receives client pair The management of user information is requested, and management request includes manager's identity;Extract the subscriber identity information in user information;Sentence Whether disconnected manager's identity matches with subscriber identity information;It is requested according to matching result response management and assigns client pair The administration authority answered;Corresponding management is carried out to user information according to the management operation instruction of client to operate.The application provides A kind of user information management method in, user information is stored in block chain, due to block chain can not tamper, be stored in User information in block chain can not be light easily modified, compared with prior art, it is ensured that the safety of user information, this Outside, block chain node device determines client to user according to whether manager's identity and subscriber identity information match The administration authority of information can further avoid user information by criminal by administration authority of the client to user information It obtains, is further ensured that the safety of user information.
Referring to Fig. 2, Fig. 2 is a kind of second flow chart of user information management method provided by the embodiments of the present application.
A kind of user information management method provided by the embodiments of the present application can specifically include following steps:
Step S201: it receives client and the management of user information is requested, management request includes manager's identity.
Step S202: the subscriber identity information in user information is extracted.
Step S203: judging whether manager's identity matches with subscriber identity information, if so, executing step S204.
Step S204: determine that manager's identity is the corresponding user identity of user information, and response management request assigns visitor Family end authority at the highest level.
Step S205: it when management operation instruction is edit instruction or privacy information inquiry instruction, initiates to use to client Family ID authentication request.
Step S206: the authentication information that the request of client end response user identity authentication is sent is obtained.
Step S207: judge whether that certification passes through according to authentication information, if so, thening follow the steps S208.
Step S208: editing user information according to the edit instruction of client, or is referred to according to privacy information inquiry It enables and inquires corresponding user privacy information.
Referring to Fig. 3, Fig. 3 is a kind of third flow chart of user information management method provided by the embodiments of the present application.
A kind of user information management method provided by the embodiments of the present application can specifically comprise the following steps:
Step S301: it receives client and the management of user information is requested, management request includes manager's identity.
Step S302: the subscriber identity information in user information is extracted.
Step S303: judging whether manager's identity matches with subscriber identity information, if it is not, executing step S304.
Step S304: determining manager's identity not is the corresponding user identity of user information, and response management request assigns Client query administration authority.
Step S305: when management operation instruction is inquiry instruction, determine that corresponding manager pacifies according to manager's identity Congruent grade;The user information of corresponding grade is inquired according to manager's security level and feeds back to client.
Step S306: when management operation instruction is edit instruction or privacy information inquiry instruction, refuse to user information Editor or privacy information inquiry, and records manager identity information are carried out, and annotation management operational order is potential danger operation Instruction.
Step S307: operation warning is sent to client, and adjusts the credit etc. of corresponding manager according to manager's identity Grade.
Present invention also provides a kind of customer information control systems, with a kind of user's letter provided by the embodiments of the present application The correspondence effect that breath management method has.Referring to Fig. 4, Fig. 4 is a kind of subscriber information management system provided by the embodiments of the present application The structural schematic diagram of system.
A kind of customer information control system provided by the embodiments of the present application is applied in block chain node device, can wrap It includes:
First receiving module 401 requests the management of user information for receiving client, and management request includes manager Identity;
First extraction module 402, for extracting the subscriber identity information in user information;
First judgment module 403, for judging whether manager's identity matches with subscriber identity information;
First respond module 404, for being requested and being assigned client corresponding administrative power according to matching result response management Limit;
First operation module 405, for carrying out corresponding management to user information according to the management operation instruction of client Operation.
In a kind of customer information control system provided by the embodiments of the present application, the first respond module be can specifically include:
First response unit, for when manager's identity is matched with subscriber identity information, it is determined that manager's body Part is the corresponding user identity of user information, and response management request assigns client authority at the highest level.
In a kind of customer information control system provided by the embodiments of the present application, when management operation instruction is edit instruction or hidden When personal letter ceases inquiry instruction, the first operation module be can specifically include:
First transmission unit, for initiating user identity authentication request to client;
First acquisition unit, the authentication information sent for obtaining the request of client end response user identity authentication;
First judging unit, for judging whether that certification passes through according to authentication information;
First execution unit, for the first judging unit determine certification pass through when, according to the edit instruction of client to Family information is edited, or inquires corresponding user privacy information according to privacy information inquiry instruction.
In a kind of customer information control system provided by the embodiments of the present application, the first respond module be can specifically include:
Second response unit, for when manager's identity and subscriber identity information mismatch, it is determined that manager Identity is not the corresponding user identity of user information, and response management request assigns client query administration authority.
In a kind of customer information control system provided by the embodiments of the present application, when management operation instruction is inquiry instruction, First operation module can specifically include:
First determination unit, for determining corresponding manager's security level according to manager's identity;
First query unit, for inquiring the user information of corresponding grade according to manager's security level and feeding back to client End.
In a kind of customer information control system provided by the embodiments of the present application, when management operation instruction is edit instruction or hidden When personal letter ceases inquiry instruction, the first operation module be can specifically include:
First marking unit carries out editor or privacy information inquiry to user information for refusing, and records manager body Part information, and annotation management operational order is potential danger operational order.
In a kind of customer information control system provided by the embodiments of the present application, can also include:
Module is adjusted, for sending operation warning to client, and adjusts the letter of corresponding manager according to manager's identity Use grade.
Present invention also provides a kind of block chain node device and computer readable storage mediums, all have the application reality Effect is corresponded to possessed by a kind of user information management method that example offer is provided.Referring to Fig. 5, Fig. 5 mentions for the embodiment of the present application A kind of structural schematic diagram of the block chain node device supplied.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory Computer program is stored in 501, processor 502 realizes following steps when executing the computer program stored in memory 501:
It receives client to request the management of user information, management request includes manager's identity;
Extract the subscriber identity information in user information;
Judge whether manager's identity matches with subscriber identity information;
It is requested according to matching result response management and assigns client corresponding administration authority;
Corresponding management is carried out to user information according to the management operation instruction of client to operate.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501 Following steps: when manager's identity is matched with the subscriber identity information, it is determined that manager's identity is described The corresponding user identity of user information, and respond the management request and assign the client authority at the highest level.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501 Following steps: when management operation instruction is edit instruction or privacy information inquiry instruction, user identity is initiated to client and is recognized Card request;Obtain the authentication information that the request of client end response user identity authentication is sent;Judge whether to authenticate according to authentication information Pass through;If so, the edit instruction according to client edits user information, or inquired according to privacy information inquiry instruction Corresponding user privacy information.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501 Following steps: when manager's identity and subscriber identity information mismatch, it is determined that manager's identity is not user information Corresponding user identity, and response management request assigns client query administration authority.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501 Following steps: when management operation instruction is inquiry instruction, corresponding manager's security level is determined according to manager's identity;Root The user information of corresponding grade is inquired according to manager's security level and feeds back to client.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501 Following steps: when management operation instruction is edit instruction or privacy information inquiry instruction, refusal edits user information Or privacy information inquiry, and records manager identity information, and annotation management operational order is potential danger operational order.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501 Following steps: operation warning is sent to client, and adjusts the credit grade of corresponding manager according to manager's identity.
Referring to Fig. 6, can also include: in another kind block chain node device provided by the embodiments of the present application and processor The input port 503 of 502 connections is used for transmission the extraneous order inputted to processor 502;The display being connect with processor 502 Unit 504, the processing result for video-stream processor 502 is to the external world;The communication module 505 being connect with processor 502, for real Existing block chain node device and extraneous communication.Display unit 504 can make display etc. for display panel, laser scanning;It is logical Believe that communication mode used by module 505 includes but is not limited to mobile high definition chained technology (HML), universal serial bus (USB), high-definition media interface (HDMI), wireless connection: adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption are blue The tooth communication technology, the communication technology based on IEEE802.11s.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates It is stored with computer program in machine readable storage medium storing program for executing, following steps are realized when computer program is executed by processor:
It receives client to request the management of user information, management request includes manager's identity;
Extract the subscriber identity information in user information;
Judge whether manager's identity matches with subscriber identity information;
It is requested according to matching result response management and assigns client corresponding administration authority;
Corresponding management is carried out to user information according to the management operation instruction of client to operate.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor It is rapid: when manager's identity is matched with the subscriber identity information, it is determined that manager's identity is user letter Corresponding user identity is ceased, and responds the management request and assigns the client authority at the highest level.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor It is rapid: when management operation instruction is edit instruction or privacy information inquiry instruction, to initiate user identity authentication request to client; Obtain the authentication information that the request of client end response user identity authentication is sent;Judge whether that certification passes through according to authentication information;If Be then user information is edited according to the edit instruction of client, or according to privacy information inquiry instruction inquire it is corresponding User privacy information.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor It is rapid: when manager's identity and subscriber identity information mismatch, it is determined that manager's identity is not that user information is corresponding User identity, and response management request assigns client query administration authority.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor It is rapid: when management operation instruction is inquiry instruction, corresponding manager's security level being determined according to manager's identity;According to management The user information of person's security level inquiry corresponding grade simultaneously feeds back to client.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor Rapid: when management operation instruction is edit instruction or privacy information inquiry instruction, refusal carries out editor or privacy to user information Information inquiry, and records manager identity information, and annotation management operational order is potential danger operational order.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor It is rapid: to send operation warning to client, and adjust the credit grade of corresponding manager according to manager's identity.
Computer readable storage medium involved in the application includes random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field Any other form of storage medium well known to interior.
It is related in a kind of customer information control system provided by the embodiments of the present application, equipment and computer readable storage medium Partial explanation refers to the detailed description of corresponding part in a kind of user information management method provided by the embodiments of the present application, This is repeated no more.In addition, in above-mentioned technical proposal provided by the embodiments of the present application with correspond in the prior art technical solution realize The consistent part of principle is simultaneously unspecified, in order to avoid excessively repeat.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can Without departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest Range.

Claims (10)

1. a kind of user information management method, which is characterized in that be applied in block chain node device, which comprises
It receives client to request the management of user information, the management request includes manager's identity;
Extract the subscriber identity information in the user information;
Judge whether manager's identity matches with the subscriber identity information;
The management request is responded according to matching result and assigns the client corresponding administration authority;
Corresponding management is carried out to the user information according to the management operation instruction of the client to operate.
2. the method according to claim 1, wherein described respond the management request according to matching result and assign The corresponding administration authority of the client is given, is specifically included:
When manager's identity is matched with the subscriber identity information, it is determined that manager's identity is user letter Corresponding user identity is ceased, and responds the management request and assigns the client authority at the highest level.
3. according to the method described in claim 2, it is characterized in that, when the management operation instruction is that edit instruction or privacy are believed When ceasing inquiry instruction, the management operation instruction according to the client carries out corresponding management to the user information and grasps Make, specifically include:
User identity authentication request is initiated to the client;
Obtain the authentication information that the request of user identity authentication described in the client end response is sent;
Judge whether that certification passes through according to the authentication information;
If so, being edited according to the edit instruction of the client to the user information, or according to the privacy information Inquiry instruction inquires corresponding user privacy information.
4. the method according to claim 1, wherein described respond the management request according to matching result and assign The corresponding administration authority of the client is given, is specifically included:
When manager's identity and the subscriber identity information mismatch, it is determined that manager's identity is not the use The corresponding user identity of family information, and respond the management request and assign the client query administration authority.
5. according to the method described in claim 4, it is characterized in that, when the management operation instruction be inquiry instruction when, it is described Corresponding management is carried out to the user information according to the management operation instruction of the client to operate, and is specifically included:
Corresponding manager's security level is determined according to manager's identity;
The user information of corresponding grade is inquired according to manager's security level and feeds back to the client.
6. according to the method described in claim 4, it is characterized in that, when the management operation instruction is that edit instruction or privacy are believed When ceasing inquiry instruction, the management operation instruction according to the client carries out corresponding management to the user information and grasps Make, specifically include:
Refusal carries out editor to the user information or privacy information is inquired, and records manager's identity information, and mark The management operation instruction is potential danger operational order.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Operation warning is sent to the client, and adjusts the credit grade of corresponding manager according to manager's identity.
8. a kind of customer information control system, which is characterized in that be applied in block chain node device, comprising:
First receiving module requests the management of user information for receiving client, and the management request includes manager's body Part mark;
First extraction module, for extracting the subscriber identity information in the user information;
First judgment module, for judging whether manager's identity matches with the subscriber identity information;
First respond module, for responding the management request according to matching result and assigning the client corresponding administrative power Limit;
First operation module, for carrying out corresponding management to the user information according to the management operation instruction of the client Operation.
9. a kind of block chain node device characterized by comprising
Memory, for storing computer program;
Processor realizes subscriber information management as described in any one of claim 1 to 7 when for executing the computer program The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program, the computer program realize subscriber information management side as described in any one of claim 1 to 7 when being executed by processor The step of method.
CN201811114994.4A 2018-09-25 2018-09-25 A kind of user information management method, system, equipment and computer storage medium Pending CN109271802A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811114994.4A CN109271802A (en) 2018-09-25 2018-09-25 A kind of user information management method, system, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811114994.4A CN109271802A (en) 2018-09-25 2018-09-25 A kind of user information management method, system, equipment and computer storage medium

Publications (1)

Publication Number Publication Date
CN109271802A true CN109271802A (en) 2019-01-25

Family

ID=65197407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811114994.4A Pending CN109271802A (en) 2018-09-25 2018-09-25 A kind of user information management method, system, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN109271802A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948351A (en) * 2019-02-28 2019-06-28 深圳市元征科技股份有限公司 A kind of information processing method and device
CN110135190A (en) * 2019-04-29 2019-08-16 深圳市元征科技股份有限公司 Data managing method, server and computer storage medium
CN110445775A (en) * 2019-07-24 2019-11-12 阿里巴巴集团控股有限公司 Method and apparatus for account management
CN110532323A (en) * 2019-09-02 2019-12-03 腾讯科技(深圳)有限公司 Pupilage information processing method, device, electronic equipment and storage medium in block chain network
CN110598449A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Data processing method and device for performing insurance bond, storage medium and computer equipment
CN111614669A (en) * 2020-05-20 2020-09-01 北京金山云网络技术有限公司 Method, device and equipment for processing user information operation request and storage medium
US10798094B2 (en) 2019-07-24 2020-10-06 Alibaba Group Holding Limited Blockchain-based account management
CN111865897A (en) * 2020-06-01 2020-10-30 广东职业技术学院 Cloud service management method and device
CN113448926A (en) * 2021-06-29 2021-09-28 深圳市中科网威科技有限公司 Block chaining operation and maintenance management system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034411A1 (en) * 2006-08-03 2008-02-07 Fujitsu Limited Login administration method and server
CN106250737A (en) * 2015-11-09 2016-12-21 北京智谷睿拓技术服务有限公司 Access control method, device and user terminal
CN108234478A (en) * 2017-12-29 2018-06-29 重庆小犀智能科技有限公司 A kind of personal credit information share system and method based on block chain
WO2018194351A1 (en) * 2017-04-17 2018-10-25 주식회사 코인플러그 Method for managing document on basis of blockchain by using merkle tree structure in utxo-based protocol, and document management server using same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034411A1 (en) * 2006-08-03 2008-02-07 Fujitsu Limited Login administration method and server
CN106250737A (en) * 2015-11-09 2016-12-21 北京智谷睿拓技术服务有限公司 Access control method, device and user terminal
WO2018194351A1 (en) * 2017-04-17 2018-10-25 주식회사 코인플러그 Method for managing document on basis of blockchain by using merkle tree structure in utxo-based protocol, and document management server using same
CN108234478A (en) * 2017-12-29 2018-06-29 重庆小犀智能科技有限公司 A kind of personal credit information share system and method based on block chain

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948351A (en) * 2019-02-28 2019-06-28 深圳市元征科技股份有限公司 A kind of information processing method and device
CN109948351B (en) * 2019-02-28 2023-12-05 深圳市元征科技股份有限公司 Information processing method and device
CN110135190A (en) * 2019-04-29 2019-08-16 深圳市元征科技股份有限公司 Data managing method, server and computer storage medium
CN110135190B (en) * 2019-04-29 2023-05-05 深圳市元征科技股份有限公司 Data management method, server and computer storage medium
US11196745B2 (en) 2019-07-24 2021-12-07 Advanced New Technologies Co., Ltd. Blockchain-based account management
US10798094B2 (en) 2019-07-24 2020-10-06 Alibaba Group Holding Limited Blockchain-based account management
WO2021012648A1 (en) * 2019-07-24 2021-01-28 创新先进技术有限公司 Method and apparatus for account management
CN110445775B (en) * 2019-07-24 2021-08-20 创新先进技术有限公司 Method and apparatus for account management
CN110445775A (en) * 2019-07-24 2019-11-12 阿里巴巴集团控股有限公司 Method and apparatus for account management
CN110532323B (en) * 2019-09-02 2021-07-30 腾讯科技(深圳)有限公司 Student identity information processing method and device in block chain network, electronic equipment and storage medium
CN110532323A (en) * 2019-09-02 2019-12-03 腾讯科技(深圳)有限公司 Pupilage information processing method, device, electronic equipment and storage medium in block chain network
CN110598449A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Data processing method and device for performing insurance bond, storage medium and computer equipment
CN110598449B (en) * 2019-09-19 2024-04-02 腾讯科技(深圳)有限公司 Data processing method and device for performing insurance function, storage medium and computer equipment
CN111614669A (en) * 2020-05-20 2020-09-01 北京金山云网络技术有限公司 Method, device and equipment for processing user information operation request and storage medium
CN111865897A (en) * 2020-06-01 2020-10-30 广东职业技术学院 Cloud service management method and device
CN113448926A (en) * 2021-06-29 2021-09-28 深圳市中科网威科技有限公司 Block chaining operation and maintenance management system and method

Similar Documents

Publication Publication Date Title
CN109271802A (en) A kind of user information management method, system, equipment and computer storage medium
CN103189872B (en) Safety in networked environment and the effectively method and apparatus of Content Selection
US9781109B2 (en) Method, terminal device, and network device for improving information security
CN109413000B (en) Anti-stealing-link method and anti-stealing-link network relation system
US8856900B2 (en) Method for authorising a connection between a computer terminal and a source server
CN115118419B (en) Data transmission method of security chip, security chip device, equipment and medium
KR20190018869A (en) System and method for providing storage service based on block chain
CN109472130A (en) Linux cipher management method, middle control machine, readable storage medium storing program for executing
CN110138731B (en) Network anti-attack method based on big data
CN104966023A (en) Data protection system, method and apparatus
CN103780609A (en) Cloud data processing method and device and cloud data security gateway
CN108712369B (en) Multi-attribute constraint access control decision system and method for industrial control network
CN103530581A (en) Hard disk encrypting method and operation system
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN110602111A (en) Interface anti-brushing method and system based on long connection
CN105279453A (en) Separate storage management-supporting file partition hiding system and method thereof
CN110955909B (en) Personal data protection method and block link point
WO2021082996A1 (en) File management method
CN106130968B (en) A kind of identity identifying method and system
KR102542213B1 (en) Real-time encryption/decryption security system and method for data in network based storage
KR101630462B1 (en) Apparatus and Method for Securing a Keyboard
WO2016146046A1 (en) Data access method and device
CN101291345A (en) Controlling method of storage resource access, IP storage system, memory apparatus and host
CN105164969A (en) Instant messaging client recognition method and recognition system
US8755521B2 (en) Security method and system for media playback devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190125

RJ01 Rejection of invention patent application after publication