CN109271802A - A kind of user information management method, system, equipment and computer storage medium - Google Patents
A kind of user information management method, system, equipment and computer storage medium Download PDFInfo
- Publication number
- CN109271802A CN109271802A CN201811114994.4A CN201811114994A CN109271802A CN 109271802 A CN109271802 A CN 109271802A CN 201811114994 A CN201811114994 A CN 201811114994A CN 109271802 A CN109271802 A CN 109271802A
- Authority
- CN
- China
- Prior art keywords
- information
- management
- client
- identity
- user information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
This application discloses a kind of user information management method, system, equipment and computer storage mediums, are applied in block chain node device, wherein requesting this method comprises: receiving client the management of user information, management request includes manager's identity;Extract the subscriber identity information in user information;Judge whether manager's identity matches with subscriber identity information;It is requested according to matching result response management and assigns client corresponding administration authority;Corresponding management is carried out to user information according to the management operation instruction of client to operate.In a kind of user information management method disclosed in the present application, user information is stored in block chain, due to block chain can not tamper, being stored in user information in block chain can not be light easily modified, compared with prior art, it is ensured that the safety of user information.A kind of customer information control system, equipment and computer readable storage medium disclosed in the present application also solve the problems, such as relevant art.
Description
Technical field
This application involves block chain technical fields, more specifically to a kind of user information management method, system, set
Standby and computer storage medium.
Background technique
In Internet application in service, the user information of user, such as identity information, contact method are stored in data
In library, carry out managing user information by database.
However, coming in the technical solution of managing user information by database, attacker is easy to store in altered data library
User information, and not noticeable attacker distorts user information, so that carrying out the skill of managing user information by database
The safety of art scheme is lower.
It is asked in conclusion the storage security for how improving user information is that current those skilled in the art are urgently to be resolved
Topic.
Summary of the invention
The purpose of the application is to provide a kind of user information management method, can solve how to improve use to a certain extent
The technical issues of storage security of family information.Present invention also provides a kind of customer information control system, block chain nodes to set
Standby and computer readable storage medium.
To achieve the goals above, the application provides the following technical solutions:
A kind of user information management method is applied in block chain node device, which comprises
It receives client to request the management of user information, the management request includes manager's identity;
Extract the subscriber identity information in the user information;
Judge whether manager's identity matches with the subscriber identity information;
The management request is responded according to matching result and assigns the client corresponding administration authority;
Corresponding management is carried out to the user information according to the management operation instruction of the client to operate.
Preferably, described that the management request is responded according to matching result and assigns the client corresponding administrative power
Limit, specifically includes:
When manager's identity is matched with the subscriber identity information, it is determined that manager's identity is the use
The corresponding user identity of family information, and respond the management request and assign the client authority at the highest level.
Preferably, described according to when the management operation instruction is edit instruction or privacy information inquiry instruction
The management operation instruction of client carries out corresponding management to the user information and operates, and specifically includes:
User identity authentication request is initiated to the client;
Obtain the authentication information that the request of user identity authentication described in the client end response is sent;
Judge whether that certification passes through according to the authentication information;
If so, being edited according to the edit instruction of the client to the user information, or according to the privacy
Information inquiry instruction inquires corresponding user privacy information.
Preferably, described that the management request is responded according to matching result and assigns the client corresponding administrative power
Limit, specifically includes:
When manager's identity and the subscriber identity information mismatch, it is determined that manager's identity is not institute
The corresponding user identity of user information is stated, and responds the management request and assigns the client query administration authority.
Preferably, described to be referred to according to the management of client operation when the management operation instruction is inquiry instruction
It enables and corresponding management operation is carried out to the user information, specifically include:
Corresponding manager's security level is determined according to manager's identity;
The user information of corresponding grade is inquired according to manager's security level and feeds back to the client.
Preferably, described according to when the management operation instruction is edit instruction or privacy information inquiry instruction
The management operation instruction of client carries out corresponding management to the user information and operates, and specifically includes:
Refusal carries out editor to the user information or privacy information is inquired, and records manager's identity information, and
Marking the management operation instruction is potential danger operational order.
Preferably, the method also includes:
Operation warning is sent to the client, and adjusts the credit etc. of corresponding manager according to manager's identity
Grade.
A kind of customer information control system is applied in block chain node device, comprising:
First receiving module requests the management of user information for receiving client, and the management request includes management
Person's identity;
First extraction module, for extracting the subscriber identity information in the user information;
First judgment module, for judging whether manager's identity matches with the subscriber identity information;
First respond module, for responding the management request according to matching result and assigning the client corresponding pipe
Manage permission;
First operation module carries out the user information for the management operation instruction according to the client corresponding
Management operation.
Preferably, first respond module, specifically includes:
First response unit, for when manager's identity is matched with the subscriber identity information, it is determined that
Manager's identity is the corresponding user identity of the user information, and responds the management request and assign the client maximum tube
Manage permission.
Preferably, when the management operation instruction is edit instruction or privacy information inquiry instruction, first operation
Module specifically includes:
First transmission unit, for initiating user identity authentication request to the client;
First acquisition unit, the certification letter sent for obtaining the request of user identity authentication described in the client end response
Breath;
First judging unit, for judging whether that certification passes through according to the authentication information;
First execution unit, when determining that certification passes through for first judging unit, according to the editor of the client
The user information is edited in instruction, or inquires corresponding user privacy information according to the privacy information inquiry instruction.
Preferably, first respond module, specifically includes:
Second response unit is used for when manager's identity and subscriber identity information mismatch, then really
Determining manager's identity not is the corresponding user identity of the user information, and responds the management request imparting client and look into
Ask administration authority.
Preferably, when the management operation instruction is inquiry instruction, first operation module is specifically included:
First determination unit, for determining corresponding manager's security level according to manager's identity;
First query unit, for inquiring the user information of corresponding grade according to manager's security level and feeding back to
The client.
Preferably, when the management operation instruction is edit instruction or privacy information inquiry instruction, first operation
Module specifically includes:
First marking unit carries out editor or privacy information inquiry to the user information for refusing, and described in record
Manager's identity information, and marking the management operation instruction is potential danger operational order.
Preferably, further includes:
Module is adjusted, for sending operation warning to the client, and respective tube is adjusted according to manager's identity
The credit grade of reason person.
A kind of block chain node device, comprising:
Memory, for storing computer program;
Processor realizes the step of as above any user information management method when for executing the computer program
Suddenly.
A kind of computer readable storage medium is stored with computer program in the computer readable storage medium, described
The step of as above any described user information management method is realized when computer program is executed by processor.
A kind of user information management method provided by the present application is applied in block chain node device, receives client pair
The management of user information is requested, and management request includes manager's identity;Extract the subscriber identity information in user information;Sentence
Whether disconnected manager's identity matches with subscriber identity information;It is requested according to matching result response management and assigns client pair
The administration authority answered;Corresponding management is carried out to user information according to the management operation instruction of client to operate.The application provides
A kind of user information management method in, user information is stored in block chain, due to block chain can not tamper, be stored in
User information in block chain can not be light easily modified, compared with prior art, it is ensured that the safety of user information, this
Outside, block chain node device determines client to user according to whether manager's identity and subscriber identity information match
The administration authority of information can further avoid user information by criminal by administration authority of the client to user information
It obtains, is further ensured that the safety of user information.A kind of customer information control system, equipment and computer provided by the present application
Readable storage medium storing program for executing also solves the problems, such as relevant art.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of first pass figure of user information management method provided by the embodiments of the present application;
Fig. 2 is a kind of second flow chart of user information management method provided by the embodiments of the present application;
Fig. 3 is a kind of third flow chart of user information management method provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of customer information control system provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of block chain node device provided by the embodiments of the present application;
Fig. 6 is a kind of another structural schematic diagram of block chain node device provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
This application involves block chain technologies, in order to make it easy to understand, below will be to block chain in the embodiment of the present application
(Block Chain) is simply introduced, and block chain is distribution disclosed in all block chain nodes to access server
The data structure of storage includes several blocks (Block).User terminal comprising client can be registered as an area
Block chain node forms P2P network with other block chain nodes of access block chain server, and block chain data can be stored in
P2P network, any one or more block chain nodes of P2P network paralysis, will not result in the loss of block chain data, such area
Block chain data just have very strong safety, it is ensured that the persistence of data and can not distort.When a block is persisted to area
When in block chain data, the block chain node of access server can add the block;Block is according to persistence time sequencing
Singly it is added in block chain data, each block other than first block in block chain data will chain
It is connected to its previous block, such block chain data just form a block and link this block, just as a chain one
Sample, as soon as the block can not be modified after a block is persisted to block chain data.
In Internet application in service, the user information of user, such as identity information, contact method are stored in data
In library, carry out managing user information by database.However, coming in the technical solution of managing user information by database, attack
The user information stored in Fang Rongyi altered data library, and not noticeable attacker distorts user information, so that by number
The safety for carrying out the technical solution of managing user information according to library is lower.A kind of user information management method provided by the present application can be with
The storage security of user information is improved to a certain extent.
Referring to Fig. 1, Fig. 1 is a kind of first pass figure of user information management method provided by the embodiments of the present application.
A kind of user information management method provided by the embodiments of the present application is applied in block chain node device, can wrap
Include following steps:
Step S101: it receives client and the management of user information is requested, management request includes manager's identity.
In practical application, block chain node device can first receive client and request the management of user information.Management is asked
The manager's identity for including in asking can determine according to actual needs, for example it can be login account, the visitor of manager
Family end identification information etc..
Step S102: the subscriber identity information in user information is extracted.
In practical application, after block chain node device receives management request, it can request to determine according to the management
Corresponding user information is requested in the management, and then extracts the subscriber identity information in user information.The class of subscriber identity information
Type can also determines according to actual conditions, for example it can be identity information, the user account information of user, and user information is initial
Correspondence client identification etc. when being submitted to block chain by client.The particular content of user information can according to actual needs really
It is fixed, for example it can be identity information, occupational information, the consumption information etc. of user.
Step S103: judge whether manager's identity matches with subscriber identity information.
In practical application, manager's identity can flexibly be set with the matched condition of subscriber identity information.Such as
Manager's identity is the login account of manager, when subscriber identity information is user account information, manager's identity
It can be consistent with user account information for the login account of manager with the matched condition of subscriber identity information;In manager's identity
It is identified as client identification, subscriber identity information is corresponding visitor when user account information is initially submitted to block chain by client
When family end identifies, manager's identity and the matched condition of subscriber identity information can be the client mark of initiation management request
Corresponding client identification is consistent when knowledge is initially submitted to block chain with user information.
Step S104: requesting according to matching result response management and assigns client corresponding administration authority.
In practical application, block chain node device can be according to the matching knot of manager's identity and subscriber identity information
Fruit, which carrys out response management, requests and assigns client corresponding administration authority.In concrete application scene, block chain node device can be with
The ability response management request when manager's identity and subscriber identity information match, and assign client corresponding administrative power
Limit.Certainly, the mode of the corresponding administration authority of client is requested and assigned according to matching result response management there are also other, this Shen
Please it is not specifically limited herein.It can be appreciated that client can be limited to the pipe of user information by assigning the administration authority of client
Reason operation, prevent client can protect the safety of user information from random managing user information to a certain extent.
In concrete application scene, the step of the corresponding administration authority of client is requested and assigned according to matching result response management
It suddenly can be with specifically: when manager's identity is matched with subscriber identity information, it is determined that manager's identity is user information
Corresponding user identity, and response management request assigns client authority at the highest level.Authority at the highest level namely permission client
It holds to user information execution any one operation, such as searching user's information, modification user information, increase user information, deletion
User information etc..Specifically, the administration authority that can be carried out grade classification, and limit each grade administration authority allows to hold
The capable management to user information operates, and the administration authority that client is assigned according to it executes user information corresponding
Management operation.
In concrete application scene, the step of the corresponding administration authority of client is requested and assigned according to matching result response management
It suddenly can be with specifically: when manager's identity and subscriber identity information mismatch, it is determined that manager's identity is not user
The corresponding user identity of information, and response management request assigns client query administration authority.In manager's identity and use
When family identity information mismatches, block chain node device can directly assign client query administration authority, make client can only
Searching user's information.
Step S105: corresponding management is carried out to user information according to the management operation instruction of client and is operated.
In practical application, block chain node device corresponds to user information according to the management operation instruction of client
Management operation after, can also will management operation note feed back to client, after client confirmation it is errorless after, will management operation note
Record is registered in block chain, so that the management operation note that subsequent basis is registered in block chain traces user information
Deng.It, can also be by the matching result and imparting client of manager's identity and subscriber identity information in concrete application scene
Administration authority be registered in block chain.
In concrete application scene, when manager's identity is matched with subscriber identity information, manager's identity is determined to use
The corresponding user identity of family information, and when response management request imparting client authority at the highest level, when management operation instruction is
When edit instruction or privacy information inquiry instruction, corresponding management is carried out to user information according to the management operation instruction of client
The step of operation, can be with specifically: initiates user identity authentication request to client;Obtain client end response user identity authentication
Request the authentication information sent;Judge whether that certification passes through according to authentication information;If so, according to the edit instruction pair of client
User information is edited, or inquires corresponding user privacy information according to privacy information inquiry instruction.Volume referred to herein
It collects and refers to the instruction for making user information change such as modifying to user information, increase and delete;Privacy information
Inquiry instruction refers to the instruction of the corresponding information in searching user's information.Specifically, the body to user can be carried out by private key
Part information is authenticated, for example block chain node device sends ID authentication request to client;Receive client with itself
Authentication information after private key encryption;Encrypted authentication information is decrypted based on the corresponding public key of client, is judged whether
Successful decryption, if so, determining that client is legitimate user, if it is not, then determining that client is illegal user.Client is corresponding
Public key can according to block chain node save user information and client public key between corresponding relationship determine, due to client
The public key at end is generated by client, solely belongs to some client, and the public key of each client is different, so
The public key for the client that it is belonged to can be determined by user information, with the public key of user client A be C, user client B
Public key be D for, if block chain node device save user information belong to user client A, can be determined that out and use
The public key of client belonging to the information of family be C, at this point, block chain node device need to public key C to encrypted authentication information into
Row decryption.
In concrete application scene, when manager's identity and subscriber identity information mismatch, manager's identity is determined
It is not the corresponding user identity of user information, and when response management request imparting client query administration authority, when management operates
When instruction is inquiry instruction, carrying out the step of corresponding management operates to user information according to the management operation instruction of client can
With specifically: corresponding manager's security level is determined according to manager's identity;It is corresponding etc. according to the inquiry of manager's security level
The user information of grade simultaneously feeds back to client.With manager's security level be high credible and secure grade, general credible and secure grade,
Low credible and secure grade, by user information be the information of full disclosure, for information, privacy information disclosed in part, Ke Yishe
Fixed high credible and secure grade can inquire every a kind of user information;And general credible and secure grade can inquire the letter of full disclosure
Information disclosed in breath and part, can not inquire privacy information;Low credible and secure grade can only inquire the information of full disclosure.
In concrete application scene, when manager's identity and subscriber identity information mismatch, manager's identity is determined not
For the corresponding user identity of user information, and when response management request assigns client query administration authority, when management operation refers to
When order is edit instruction or privacy information inquiry instruction, user information is carried out according to the management operation instruction of client corresponding
The step of management operation, can be with specifically: refusal carries out editor to user information or privacy information is inquired, and records manager body
Part information, and annotation management operational order is potential danger operational order;Operation warning is sent to client, and according to manager
Identity adjusts the credit grade of corresponding manager.Specifically, determining manager's identity and subscriber identity information mismatch,
And management operation instruction be edit instruction or privacy information inquiry instruction when, can directly determine client for dangerous client,
Correspondingly, directly refusal carries out editor to user information or privacy information is inquired, and records manager identity information, annotation management
Operational order is potential danger operational order.In addition, for using technological means to attack or attempt to tamper with the client of user information
End, can navigate to the client, lower the credit rating grade of the client;In addition, if the dangerous operation of the client,
It can also be given a warning;If there are high-risk operations for the client, the client can also be carried out whithin a period of time
It closes, and issues the high-risk early warning for being directed to the client to other blocks chain user.
A kind of user information management method provided by the present application is applied in block chain node device, receives client pair
The management of user information is requested, and management request includes manager's identity;Extract the subscriber identity information in user information;Sentence
Whether disconnected manager's identity matches with subscriber identity information;It is requested according to matching result response management and assigns client pair
The administration authority answered;Corresponding management is carried out to user information according to the management operation instruction of client to operate.The application provides
A kind of user information management method in, user information is stored in block chain, due to block chain can not tamper, be stored in
User information in block chain can not be light easily modified, compared with prior art, it is ensured that the safety of user information, this
Outside, block chain node device determines client to user according to whether manager's identity and subscriber identity information match
The administration authority of information can further avoid user information by criminal by administration authority of the client to user information
It obtains, is further ensured that the safety of user information.
Referring to Fig. 2, Fig. 2 is a kind of second flow chart of user information management method provided by the embodiments of the present application.
A kind of user information management method provided by the embodiments of the present application can specifically include following steps:
Step S201: it receives client and the management of user information is requested, management request includes manager's identity.
Step S202: the subscriber identity information in user information is extracted.
Step S203: judging whether manager's identity matches with subscriber identity information, if so, executing step S204.
Step S204: determine that manager's identity is the corresponding user identity of user information, and response management request assigns visitor
Family end authority at the highest level.
Step S205: it when management operation instruction is edit instruction or privacy information inquiry instruction, initiates to use to client
Family ID authentication request.
Step S206: the authentication information that the request of client end response user identity authentication is sent is obtained.
Step S207: judge whether that certification passes through according to authentication information, if so, thening follow the steps S208.
Step S208: editing user information according to the edit instruction of client, or is referred to according to privacy information inquiry
It enables and inquires corresponding user privacy information.
Referring to Fig. 3, Fig. 3 is a kind of third flow chart of user information management method provided by the embodiments of the present application.
A kind of user information management method provided by the embodiments of the present application can specifically comprise the following steps:
Step S301: it receives client and the management of user information is requested, management request includes manager's identity.
Step S302: the subscriber identity information in user information is extracted.
Step S303: judging whether manager's identity matches with subscriber identity information, if it is not, executing step S304.
Step S304: determining manager's identity not is the corresponding user identity of user information, and response management request assigns
Client query administration authority.
Step S305: when management operation instruction is inquiry instruction, determine that corresponding manager pacifies according to manager's identity
Congruent grade;The user information of corresponding grade is inquired according to manager's security level and feeds back to client.
Step S306: when management operation instruction is edit instruction or privacy information inquiry instruction, refuse to user information
Editor or privacy information inquiry, and records manager identity information are carried out, and annotation management operational order is potential danger operation
Instruction.
Step S307: operation warning is sent to client, and adjusts the credit etc. of corresponding manager according to manager's identity
Grade.
Present invention also provides a kind of customer information control systems, with a kind of user's letter provided by the embodiments of the present application
The correspondence effect that breath management method has.Referring to Fig. 4, Fig. 4 is a kind of subscriber information management system provided by the embodiments of the present application
The structural schematic diagram of system.
A kind of customer information control system provided by the embodiments of the present application is applied in block chain node device, can wrap
It includes:
First receiving module 401 requests the management of user information for receiving client, and management request includes manager
Identity;
First extraction module 402, for extracting the subscriber identity information in user information;
First judgment module 403, for judging whether manager's identity matches with subscriber identity information;
First respond module 404, for being requested and being assigned client corresponding administrative power according to matching result response management
Limit;
First operation module 405, for carrying out corresponding management to user information according to the management operation instruction of client
Operation.
In a kind of customer information control system provided by the embodiments of the present application, the first respond module be can specifically include:
First response unit, for when manager's identity is matched with subscriber identity information, it is determined that manager's body
Part is the corresponding user identity of user information, and response management request assigns client authority at the highest level.
In a kind of customer information control system provided by the embodiments of the present application, when management operation instruction is edit instruction or hidden
When personal letter ceases inquiry instruction, the first operation module be can specifically include:
First transmission unit, for initiating user identity authentication request to client;
First acquisition unit, the authentication information sent for obtaining the request of client end response user identity authentication;
First judging unit, for judging whether that certification passes through according to authentication information;
First execution unit, for the first judging unit determine certification pass through when, according to the edit instruction of client to
Family information is edited, or inquires corresponding user privacy information according to privacy information inquiry instruction.
In a kind of customer information control system provided by the embodiments of the present application, the first respond module be can specifically include:
Second response unit, for when manager's identity and subscriber identity information mismatch, it is determined that manager
Identity is not the corresponding user identity of user information, and response management request assigns client query administration authority.
In a kind of customer information control system provided by the embodiments of the present application, when management operation instruction is inquiry instruction,
First operation module can specifically include:
First determination unit, for determining corresponding manager's security level according to manager's identity;
First query unit, for inquiring the user information of corresponding grade according to manager's security level and feeding back to client
End.
In a kind of customer information control system provided by the embodiments of the present application, when management operation instruction is edit instruction or hidden
When personal letter ceases inquiry instruction, the first operation module be can specifically include:
First marking unit carries out editor or privacy information inquiry to user information for refusing, and records manager body
Part information, and annotation management operational order is potential danger operational order.
In a kind of customer information control system provided by the embodiments of the present application, can also include:
Module is adjusted, for sending operation warning to client, and adjusts the letter of corresponding manager according to manager's identity
Use grade.
Present invention also provides a kind of block chain node device and computer readable storage mediums, all have the application reality
Effect is corresponded to possessed by a kind of user information management method that example offer is provided.Referring to Fig. 5, Fig. 5 mentions for the embodiment of the present application
A kind of structural schematic diagram of the block chain node device supplied.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory
Computer program is stored in 501, processor 502 realizes following steps when executing the computer program stored in memory 501:
It receives client to request the management of user information, management request includes manager's identity;
Extract the subscriber identity information in user information;
Judge whether manager's identity matches with subscriber identity information;
It is requested according to matching result response management and assigns client corresponding administration authority;
Corresponding management is carried out to user information according to the management operation instruction of client to operate.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory
Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501
Following steps: when manager's identity is matched with the subscriber identity information, it is determined that manager's identity is described
The corresponding user identity of user information, and respond the management request and assign the client authority at the highest level.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory
Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501
Following steps: when management operation instruction is edit instruction or privacy information inquiry instruction, user identity is initiated to client and is recognized
Card request;Obtain the authentication information that the request of client end response user identity authentication is sent;Judge whether to authenticate according to authentication information
Pass through;If so, the edit instruction according to client edits user information, or inquired according to privacy information inquiry instruction
Corresponding user privacy information.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory
Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501
Following steps: when manager's identity and subscriber identity information mismatch, it is determined that manager's identity is not user information
Corresponding user identity, and response management request assigns client query administration authority.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory
Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501
Following steps: when management operation instruction is inquiry instruction, corresponding manager's security level is determined according to manager's identity;Root
The user information of corresponding grade is inquired according to manager's security level and feeds back to client.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory
Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501
Following steps: when management operation instruction is edit instruction or privacy information inquiry instruction, refusal edits user information
Or privacy information inquiry, and records manager identity information, and annotation management operational order is potential danger operational order.
A kind of block chain node device provided by the embodiments of the present application, including memory 501 and processor 502, memory
Computer subprogram, specific implementation when processor 502 executes the computer subprogram stored in memory 501 are stored in 501
Following steps: operation warning is sent to client, and adjusts the credit grade of corresponding manager according to manager's identity.
Referring to Fig. 6, can also include: in another kind block chain node device provided by the embodiments of the present application and processor
The input port 503 of 502 connections is used for transmission the extraneous order inputted to processor 502;The display being connect with processor 502
Unit 504, the processing result for video-stream processor 502 is to the external world;The communication module 505 being connect with processor 502, for real
Existing block chain node device and extraneous communication.Display unit 504 can make display etc. for display panel, laser scanning;It is logical
Believe that communication mode used by module 505 includes but is not limited to mobile high definition chained technology (HML), universal serial bus
(USB), high-definition media interface (HDMI), wireless connection: adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption are blue
The tooth communication technology, the communication technology based on IEEE802.11s.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates
It is stored with computer program in machine readable storage medium storing program for executing, following steps are realized when computer program is executed by processor:
It receives client to request the management of user information, management request includes manager's identity;
Extract the subscriber identity information in user information;
Judge whether manager's identity matches with subscriber identity information;
It is requested according to matching result response management and assigns client corresponding administration authority;
Corresponding management is carried out to user information according to the management operation instruction of client to operate.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates
Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor
It is rapid: when manager's identity is matched with the subscriber identity information, it is determined that manager's identity is user letter
Corresponding user identity is ceased, and responds the management request and assigns the client authority at the highest level.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates
Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor
It is rapid: when management operation instruction is edit instruction or privacy information inquiry instruction, to initiate user identity authentication request to client;
Obtain the authentication information that the request of client end response user identity authentication is sent;Judge whether that certification passes through according to authentication information;If
Be then user information is edited according to the edit instruction of client, or according to privacy information inquiry instruction inquire it is corresponding
User privacy information.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates
Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor
It is rapid: when manager's identity and subscriber identity information mismatch, it is determined that manager's identity is not that user information is corresponding
User identity, and response management request assigns client query administration authority.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates
Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor
It is rapid: when management operation instruction is inquiry instruction, corresponding manager's security level being determined according to manager's identity;According to management
The user information of person's security level inquiry corresponding grade simultaneously feeds back to client.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates
Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor
Rapid: when management operation instruction is edit instruction or privacy information inquiry instruction, refusal carries out editor or privacy to user information
Information inquiry, and records manager identity information, and annotation management operational order is potential danger operational order.
A kind of computer readable storage medium provided by the embodiments of the present application is applied in block chain node device, calculates
Computer subprogram is stored in machine readable storage medium storing program for executing, computer subprogram is implemented as follows step when being executed by processor
It is rapid: to send operation warning to client, and adjust the credit grade of corresponding manager according to manager's identity.
Computer readable storage medium involved in the application includes random access memory (RAM), memory, read-only memory
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
Any other form of storage medium well known to interior.
It is related in a kind of customer information control system provided by the embodiments of the present application, equipment and computer readable storage medium
Partial explanation refers to the detailed description of corresponding part in a kind of user information management method provided by the embodiments of the present application,
This is repeated no more.In addition, in above-mentioned technical proposal provided by the embodiments of the present application with correspond in the prior art technical solution realize
The consistent part of principle is simultaneously unspecified, in order to avoid excessively repeat.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one
Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation
There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain
Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To this
A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can
Without departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limited
It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest
Range.
Claims (10)
1. a kind of user information management method, which is characterized in that be applied in block chain node device, which comprises
It receives client to request the management of user information, the management request includes manager's identity;
Extract the subscriber identity information in the user information;
Judge whether manager's identity matches with the subscriber identity information;
The management request is responded according to matching result and assigns the client corresponding administration authority;
Corresponding management is carried out to the user information according to the management operation instruction of the client to operate.
2. the method according to claim 1, wherein described respond the management request according to matching result and assign
The corresponding administration authority of the client is given, is specifically included:
When manager's identity is matched with the subscriber identity information, it is determined that manager's identity is user letter
Corresponding user identity is ceased, and responds the management request and assigns the client authority at the highest level.
3. according to the method described in claim 2, it is characterized in that, when the management operation instruction is that edit instruction or privacy are believed
When ceasing inquiry instruction, the management operation instruction according to the client carries out corresponding management to the user information and grasps
Make, specifically include:
User identity authentication request is initiated to the client;
Obtain the authentication information that the request of user identity authentication described in the client end response is sent;
Judge whether that certification passes through according to the authentication information;
If so, being edited according to the edit instruction of the client to the user information, or according to the privacy information
Inquiry instruction inquires corresponding user privacy information.
4. the method according to claim 1, wherein described respond the management request according to matching result and assign
The corresponding administration authority of the client is given, is specifically included:
When manager's identity and the subscriber identity information mismatch, it is determined that manager's identity is not the use
The corresponding user identity of family information, and respond the management request and assign the client query administration authority.
5. according to the method described in claim 4, it is characterized in that, when the management operation instruction be inquiry instruction when, it is described
Corresponding management is carried out to the user information according to the management operation instruction of the client to operate, and is specifically included:
Corresponding manager's security level is determined according to manager's identity;
The user information of corresponding grade is inquired according to manager's security level and feeds back to the client.
6. according to the method described in claim 4, it is characterized in that, when the management operation instruction is that edit instruction or privacy are believed
When ceasing inquiry instruction, the management operation instruction according to the client carries out corresponding management to the user information and grasps
Make, specifically include:
Refusal carries out editor to the user information or privacy information is inquired, and records manager's identity information, and mark
The management operation instruction is potential danger operational order.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Operation warning is sent to the client, and adjusts the credit grade of corresponding manager according to manager's identity.
8. a kind of customer information control system, which is characterized in that be applied in block chain node device, comprising:
First receiving module requests the management of user information for receiving client, and the management request includes manager's body
Part mark;
First extraction module, for extracting the subscriber identity information in the user information;
First judgment module, for judging whether manager's identity matches with the subscriber identity information;
First respond module, for responding the management request according to matching result and assigning the client corresponding administrative power
Limit;
First operation module, for carrying out corresponding management to the user information according to the management operation instruction of the client
Operation.
9. a kind of block chain node device characterized by comprising
Memory, for storing computer program;
Processor realizes subscriber information management as described in any one of claim 1 to 7 when for executing the computer program
The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program, the computer program realize subscriber information management side as described in any one of claim 1 to 7 when being executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811114994.4A CN109271802A (en) | 2018-09-25 | 2018-09-25 | A kind of user information management method, system, equipment and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811114994.4A CN109271802A (en) | 2018-09-25 | 2018-09-25 | A kind of user information management method, system, equipment and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109271802A true CN109271802A (en) | 2019-01-25 |
Family
ID=65197407
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811114994.4A Pending CN109271802A (en) | 2018-09-25 | 2018-09-25 | A kind of user information management method, system, equipment and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109271802A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109948351A (en) * | 2019-02-28 | 2019-06-28 | 深圳市元征科技股份有限公司 | A kind of information processing method and device |
CN110135190A (en) * | 2019-04-29 | 2019-08-16 | 深圳市元征科技股份有限公司 | Data managing method, server and computer storage medium |
CN110445775A (en) * | 2019-07-24 | 2019-11-12 | 阿里巴巴集团控股有限公司 | Method and apparatus for account management |
CN110532323A (en) * | 2019-09-02 | 2019-12-03 | 腾讯科技(深圳)有限公司 | Pupilage information processing method, device, electronic equipment and storage medium in block chain network |
CN110598449A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Data processing method and device for performing insurance bond, storage medium and computer equipment |
CN111614669A (en) * | 2020-05-20 | 2020-09-01 | 北京金山云网络技术有限公司 | Method, device and equipment for processing user information operation request and storage medium |
US10798094B2 (en) | 2019-07-24 | 2020-10-06 | Alibaba Group Holding Limited | Blockchain-based account management |
CN111865897A (en) * | 2020-06-01 | 2020-10-30 | 广东职业技术学院 | Cloud service management method and device |
CN113448926A (en) * | 2021-06-29 | 2021-09-28 | 深圳市中科网威科技有限公司 | Block chaining operation and maintenance management system and method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080034411A1 (en) * | 2006-08-03 | 2008-02-07 | Fujitsu Limited | Login administration method and server |
CN106250737A (en) * | 2015-11-09 | 2016-12-21 | 北京智谷睿拓技术服务有限公司 | Access control method, device and user terminal |
CN108234478A (en) * | 2017-12-29 | 2018-06-29 | 重庆小犀智能科技有限公司 | A kind of personal credit information share system and method based on block chain |
WO2018194351A1 (en) * | 2017-04-17 | 2018-10-25 | 주식회사 코인플러그 | Method for managing document on basis of blockchain by using merkle tree structure in utxo-based protocol, and document management server using same |
-
2018
- 2018-09-25 CN CN201811114994.4A patent/CN109271802A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080034411A1 (en) * | 2006-08-03 | 2008-02-07 | Fujitsu Limited | Login administration method and server |
CN106250737A (en) * | 2015-11-09 | 2016-12-21 | 北京智谷睿拓技术服务有限公司 | Access control method, device and user terminal |
WO2018194351A1 (en) * | 2017-04-17 | 2018-10-25 | 주식회사 코인플러그 | Method for managing document on basis of blockchain by using merkle tree structure in utxo-based protocol, and document management server using same |
CN108234478A (en) * | 2017-12-29 | 2018-06-29 | 重庆小犀智能科技有限公司 | A kind of personal credit information share system and method based on block chain |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109948351A (en) * | 2019-02-28 | 2019-06-28 | 深圳市元征科技股份有限公司 | A kind of information processing method and device |
CN109948351B (en) * | 2019-02-28 | 2023-12-05 | 深圳市元征科技股份有限公司 | Information processing method and device |
CN110135190A (en) * | 2019-04-29 | 2019-08-16 | 深圳市元征科技股份有限公司 | Data managing method, server and computer storage medium |
CN110135190B (en) * | 2019-04-29 | 2023-05-05 | 深圳市元征科技股份有限公司 | Data management method, server and computer storage medium |
US11196745B2 (en) | 2019-07-24 | 2021-12-07 | Advanced New Technologies Co., Ltd. | Blockchain-based account management |
US10798094B2 (en) | 2019-07-24 | 2020-10-06 | Alibaba Group Holding Limited | Blockchain-based account management |
WO2021012648A1 (en) * | 2019-07-24 | 2021-01-28 | 创新先进技术有限公司 | Method and apparatus for account management |
CN110445775B (en) * | 2019-07-24 | 2021-08-20 | 创新先进技术有限公司 | Method and apparatus for account management |
CN110445775A (en) * | 2019-07-24 | 2019-11-12 | 阿里巴巴集团控股有限公司 | Method and apparatus for account management |
CN110532323B (en) * | 2019-09-02 | 2021-07-30 | 腾讯科技(深圳)有限公司 | Student identity information processing method and device in block chain network, electronic equipment and storage medium |
CN110532323A (en) * | 2019-09-02 | 2019-12-03 | 腾讯科技(深圳)有限公司 | Pupilage information processing method, device, electronic equipment and storage medium in block chain network |
CN110598449A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Data processing method and device for performing insurance bond, storage medium and computer equipment |
CN110598449B (en) * | 2019-09-19 | 2024-04-02 | 腾讯科技(深圳)有限公司 | Data processing method and device for performing insurance function, storage medium and computer equipment |
CN111614669A (en) * | 2020-05-20 | 2020-09-01 | 北京金山云网络技术有限公司 | Method, device and equipment for processing user information operation request and storage medium |
CN111865897A (en) * | 2020-06-01 | 2020-10-30 | 广东职业技术学院 | Cloud service management method and device |
CN113448926A (en) * | 2021-06-29 | 2021-09-28 | 深圳市中科网威科技有限公司 | Block chaining operation and maintenance management system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109271802A (en) | A kind of user information management method, system, equipment and computer storage medium | |
CN103189872B (en) | Safety in networked environment and the effectively method and apparatus of Content Selection | |
US9781109B2 (en) | Method, terminal device, and network device for improving information security | |
CN109413000B (en) | Anti-stealing-link method and anti-stealing-link network relation system | |
US8856900B2 (en) | Method for authorising a connection between a computer terminal and a source server | |
CN115118419B (en) | Data transmission method of security chip, security chip device, equipment and medium | |
KR20190018869A (en) | System and method for providing storage service based on block chain | |
CN109472130A (en) | Linux cipher management method, middle control machine, readable storage medium storing program for executing | |
CN110138731B (en) | Network anti-attack method based on big data | |
CN104966023A (en) | Data protection system, method and apparatus | |
CN103780609A (en) | Cloud data processing method and device and cloud data security gateway | |
CN108712369B (en) | Multi-attribute constraint access control decision system and method for industrial control network | |
CN103530581A (en) | Hard disk encrypting method and operation system | |
CN111585995A (en) | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium | |
CN110602111A (en) | Interface anti-brushing method and system based on long connection | |
CN105279453A (en) | Separate storage management-supporting file partition hiding system and method thereof | |
CN110955909B (en) | Personal data protection method and block link point | |
WO2021082996A1 (en) | File management method | |
CN106130968B (en) | A kind of identity identifying method and system | |
KR102542213B1 (en) | Real-time encryption/decryption security system and method for data in network based storage | |
KR101630462B1 (en) | Apparatus and Method for Securing a Keyboard | |
WO2016146046A1 (en) | Data access method and device | |
CN101291345A (en) | Controlling method of storage resource access, IP storage system, memory apparatus and host | |
CN105164969A (en) | Instant messaging client recognition method and recognition system | |
US8755521B2 (en) | Security method and system for media playback devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190125 |
|
RJ01 | Rejection of invention patent application after publication |