CN109617929A - Node and user's interactive authentication method and system under block chain network mode - Google Patents

Node and user's interactive authentication method and system under block chain network mode Download PDF

Info

Publication number
CN109617929A
CN109617929A CN201910111491.XA CN201910111491A CN109617929A CN 109617929 A CN109617929 A CN 109617929A CN 201910111491 A CN201910111491 A CN 201910111491A CN 109617929 A CN109617929 A CN 109617929A
Authority
CN
China
Prior art keywords
node
chain
certification
authentication
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910111491.XA
Other languages
Chinese (zh)
Other versions
CN109617929B (en
Inventor
柯桓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur General Software Co Ltd
Original Assignee
Inspur General Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur General Software Co Ltd filed Critical Inspur General Software Co Ltd
Priority to CN201910111491.XA priority Critical patent/CN109617929B/en
Publication of CN109617929A publication Critical patent/CN109617929A/en
Application granted granted Critical
Publication of CN109617929B publication Critical patent/CN109617929B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of nodes under block chain network mode and user's interactive authentication method and system, belong to technical field of the computer network, the technical problem to be solved in the present invention is how to utilize block chain technology realization node and user's interactive authentication, the multisystem combined exploitation of dependence when simplifying to(for) customer center, the technical solution of use are as follows: steps are as follows: S1, certification chain start node system establish initial authentication code and set up cipher mode and encryption parameter content;When S2, addition new node system, selects certification chain any node as father node, and create new node authentication code according to father node authentication code and specified cipher mode, be considered as new node after creating successfully and be added in the certification chain;After certification chain is added in S3, new node, then it is credible in certification chain to be considered as new node identity information.The invention also discloses a kind of nodes under block chain network mode and user's mutual authentication system.

Description

Node and user's interactive authentication method and system under block chain network mode
Technical field
The present invention relates to technical field of the computer network, specifically a kind of node under block chain network mode with User's interactive authentication method and system.
Background technique
Block chain technology is gradually matured at present and starts to push away in fields such as internet, financial transaction, digital cash It is wide to use.Wherein sharpest edges are to ensure that the safety of information on fundamental mechanism, pass through decentralization, encryption of blocks of data Etc. modes, ensure that the validity of each information.
Since each block needs to record a large amount of Transaction Informations, the operand to block node, amount of storage is caused to require more Height causes the technology that can not carry out wide popularization and application.Therefore how block chain technology to be utilized to realize node and user's interactive authentication, The multisystem combined exploitation of dependence when simplifying to(for) customer center, avoids same subscriber identity weight caused by being incorporated to external system It is multiple, make project when docking extension can rapid abutting joint create system also can the old project system of compatible processing (in generation, refers to architecture mode Outmoded aging, the numerous systems of outmoded redundant data) and how using block chain technology realize same certification chain on respectively save Point absolute information certification and each intra-node user other nodes be also able to achieve direct debarkation authentication identity without registration, It realizes by a group chaining, again by information radiation and realizes that intercommunication certification is current technical problem urgently to be solved.
The patent document of Patent No. CN108833081A discloses a kind of equipment network authentication method based on block chain, Technical solution is that deployment includes client, the block chain network for submitting node and node of knowing together.Utilize can not distorting for block chain Property, equipment is first registered on block chain before accessing to a network, and when equipment A needs to access network, equipment is to having connect The equipment B for entering network sends networking request, stores in the information and block chain that equipment B passes through the equipment A in comparison networking request Equipment A information equipment A identity it is whether legal, intelligent contract is presented to mono- token of equipment A, the timestamp in token Guarantee that equipment A is effective within a certain period of time, after token is expired, equipment A could access net after need to again passing by authentication again Network.But the technical solution solves the problems, such as single point failure existing for current networking authentication method, it cannot be real using block chain technology Show node and user's interactive authentication, the dependence and utilization block chain technology when simplifying multisystem combined exploitation for customer center Realize that each node absolute information certification and each intra-node user are also able to achieve directly in other nodes on same certification chain Debarkation authentication identity is realized by a group chaining, again by information radiation without registration and realizes intercommunication certification.
Summary of the invention
Technical assignment of the invention is to provide a kind of node under block chain network mode and user's interactive authentication method And system, to solve how using block chain technology to realize node and user's interactive authentication, when simplifying multisystem combined exploitation pair In customer center dependence and how using block chain technology realize on same certification chain the certification of each node absolute information with And each intra-node user is also able to achieve direct debarkation authentication identity without registration in other nodes, realizes by a group chaining, again The problem of intercommunication certification is realized by information radiation.
Technical assignment of the invention realizes that the node under block chain network mode is interacted with user in the following manner Authentication method, the method steps are as follows:
S1, certification chain start node system establish initial authentication code and set up cipher mode and encryption parameter content;
S2, addition new node system when, select certification chain any node as father node, and according to father node authentication code with And specified cipher mode creates new node authentication code, is considered as new node after creating successfully and is added in the certification chain;
After certification chain is added in S3, new node, then it is credible in certification chain to be considered as new node identity information, institute in same chain There is node to need to record node access record, and can directly access node opening interface;
After S4, nodal information certification pass through, the direct login authentication chain of the user key which can issue with node Interior all node systems;
S5, judge that node or node users are operated with the presence or absence of safety behavior is violated:
1., if so, then the node father node need at once to all nodes send information pause or cancel the node with Whole authentication informations of node access child node.
Preferably, encryption parameter content includes time, nodename or address in the step S1;
Initial authentication code is the information starting point of entire certification chain.
Preferably, start node is a system or special authentication service in the step S1;Start node needs Establish elemental user message reference interface, i.e., guarantee user is accessible after any Node registers saves on other nodes Relevant user information realizes the safety and high efficiency of certification chain.
More preferably, the cipher mode that new node is set according to the authentication code and start node of father node in the step S2 This node authentication code is created with parameter, and is that user creates proprietary private key in node according to authentication code.
More preferably, all nodes are intended to whole nodes in record certification chain and are switched in or out information in the step S3, and And new node needs to build and guarantee whole nodes and may have access to the basic interface of start node requirement setting, any one node It was found that access exception can be initiated to query and refuse it in certification chain to access any interface of this node.
More preferably, father node is that corresponding node issues entity authentication code and father node notifies certification chain in the step S5 Other interior nodes.
More preferably, when malicious act occurs in the node, father node also needs to give a warning stopping in certification chain The certification code authentication of the node and its all child node.
A kind of node under block chain network mode and user's mutual authentication system, the system include,
Initial authentication code establishes module, and the initial authentication code for certification chain start node system, which is established and set up, initially to be recognized Demonstrate,prove the cipher mode and encryption parameter content of chain start node;
New node initial authentication code establishes module, and the initial authentication code for new node is established, in addition new node system When, select certification chain any node as father node, and create new node according to father node authentication code and specified cipher mode Authentication code is considered as new node and is added in the certification chain after creating successfully;
Certification chain authentication module is added certification chain for new node and authenticates new node identity information, confirms new node body After part information is credible, all nodes records node access record in same chain is notified, and it is external directly to access the node Open interface;
Certification chain node system login module, for be authenticated by identity information node and the node users issue The user key of node and using all node systems in the direct login authentication chain of user key;
Monitoring nodes module is operated for judging node or node users with the presence or absence of safety behavior is violated.
Preferably, if the monitoring nodes mould, which detects that node exists, violates safety behavior operation, the father of the node Node, which needs to send information pause to all nodes at once or cancel whole certifications that the node accesses child node with the node, to be believed Breath.
Node under block chain network mode of the invention has the advantage that with user's interactive authentication method and system
(1), present invention is mainly used for multiple network nodes, such as website, service, terminal on same certification chain etc., into Row authentication, abandons the design of customer center and Project Authorization in traditional network architecture, as long as being changed to project or website quilt Allow to be added in certain specified certification chain, then the node on same certification chain thinks that newly added node identity is credible And node users (including personnel, tissue, enterprise etc.) information is credible, and the specify information of node releasing can be read;
(2), the dependence when present invention simplifies multisystem combined exploitation for customer center, solution are incorporated to external system and make At same subscriber identity replication problem, make project dock extension when can rapid abutting joint create system also can compatible processing it is old Project system (generation refers to the outmoded aging of architecture mode, the numerous systems of outmoded redundant data), while block chain design philosophy is absorbed, Accomplish that each node absolute information certification and each intra-node user are also able to achieve directly in other nodes on same certification chain Debarkation authentication identity is realized by a group chaining, again by information radiation without registration and realizes intercommunication certification;
(3), block chain is directly used for the mode of user authentication relative to current major part, present invention is mainly used for solutions The problem of certainly being mutually authenticated between system environments and system subscriber confirming and duplicate message merge: by making system For the node on certification chain rather than user, the scale of entire certification chain can be greatly reduced;It is credible by establishing system, it uses This mechanism that family is credible ensure that user logs in each node indifference and use, and each node can access other by network Node acquisition user information is specified without all storages to node local, reduces node storage pressure;All nodes connect Entering and cancelling can be recorded in all nodes of certification chain, guarantee the overall security of certification chain.
Detailed description of the invention
The following further describes the present invention with reference to the drawings.
Attached drawing 1 is node and user's interactive authentication method flow block diagram under block chain network mode;
Attached drawing 2 is the structural block diagram of the node and user's mutual authentication system under block chain network mode;
Attached drawing 3 is the structural schematic diagram of embodiment 3.
Specific embodiment
The node of the invention under block chain network mode and user are handed over referring to Figure of description and specific embodiment Mutual authentication method and system is described in detail below.
Embodiment 1:
As shown in Fig. 1, the node of the invention under block chain network mode and user's interactive authentication method, this method Steps are as follows:
S1, certification chain start node system establish initial authentication code and set up cipher mode and encryption parameter content;Add Close content of parameter includes time, nodename or address;Initial authentication code is the information starting point of entire certification chain;Start node is One system or special authentication service;Start node needs to establish elemental user message reference interface, i.e., guarantee user is in office The accessible relevant user information saved on other nodes after one Node registers, realize certification chain safety and efficiently Property.
S2, addition new node system when, select certification chain any node as father node, and according to father node authentication code with And specified cipher mode creates new node authentication code, is considered as new node after creating successfully and is added in the certification chain;New node root The cipher mode and parameter set according to the authentication code and start node of father node creates this node authentication code, and according to authentication code Proprietary private key is created for user in node.
After certification chain is added in S3, new node, then it is credible in certification chain to be considered as new node identity information, institute in same chain There is node to need to record node access record, and can directly access node opening interface;All nodes are intended to record Whole nodes are switched in or out information in certification chain, and new node needs are built and guarantee that whole nodes may have access to and initially save Point requires the basic interface of setting, any one node discovery access exception can be initiated to query in certification chain and refuse its visit Ask this node any interface.
After S4, nodal information certification pass through, the direct login authentication chain of the user key which can issue with node Interior all node systems;
S5, judge that node or node users are operated with the presence or absence of safety behavior is violated:
1., if so, then the node father node need at once to all nodes send information pause or cancel the node with Whole authentication informations of node access child node.Father node is that corresponding node issues entity authentication code and father node notice is recognized Demonstrate,prove other nodes in chain.When malicious act occurs in node, father node, which also needs to give a warning in certification chain, stops the section The certification code authentication of point and its all child node.
Embodiment 2:
As shown in Fig. 2, the node of the invention under block chain network mode and user's mutual authentication system, the system Module is established including initial authentication code, new node initial authentication code establishes module, certification chain authentication module, certification chain node system Login module and monitoring nodes module.Initial authentication code is established initial authentication code of the module for certification chain start node system and is built Found and set up the cipher mode and encryption parameter content of initial authentication chain start node;New node initial authentication code establishes module Initial authentication code for new node is established, and when adding new node system, selects certification chain any node as father node, and New node authentication code is created according to father node authentication code and specified cipher mode, being considered as new node addition after creating successfully should In certification chain;Certification chain authentication module is added certification chain for new node and authenticates new node identity information, confirms new node body After part information is credible, all nodes records node access record in same chain is notified, and it is external directly to access the node Open interface;Certification chain node system login module is used to be that the node authenticated by identity information and the node users are issued The user key of node and using all node systems in the direct login authentication chain of user key;Monitoring nodes module is used for Judge that node or node users are operated with the presence or absence of safety behavior is violated.If monitoring nodes mould detects that node exists and violates safety Behavior operation, then the father node of the node is needed to send information pause to all nodes at once or cancel the node and be connect with the node Enter whole authentication informations of child node.
Embodiment 3:
As shown in Fig. 3, by taking A, B, C, D, E, F, G and H as an example:
(1), start node establishes initial authentication code and sets up cipher mode;
(2), A allows B, C, D node access authentication chain, and builds essential information interface, while node can create specially Data-interface, which is supplied to, other limitation requirements such as accesses and permission can be added in chain;
(3), B node allows E, F access authentication chain, and D allows G access authentication chain, and G allows H access authentication chain;
(4) if, G node there is malicious act, D node needs to notify in addition to whole child nodes (H node) of G, G other All nodes suspend all entity authentication behaviors under the node tree, restore certification until being repaired.
Embodiment 4:
Example context introduction: certain group company, parent company divides into multiple subsidiaries, and subsidiary is still in creation subsidiary Or collection Youth League organization etc..
Application mode:
(1), parent company creates completely new certification chain as start node, and sets up authentication code and build exclusive encryption system System and algorithm;
(2), initial authentication code and encryption method are presented to each level-one subsidiary by parent company, and subsidiary's creation is respective Simultaneously certification chain is added in authentication code, realizes that each subsidiary user can directly log on to each system in group;
(3), existing legacy system is incorporated in certification chain by subsidiary successively, completes the extraction to legacy system information;
(4), when subsequent each subsidiary merges other Corporation systems, Corporation system is directly accessed into company's certification chain, is completed System information merges.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (9)

1. node and user's interactive authentication method under block chain network mode, which is characterized in that the method steps are as follows:
S1, certification chain start node system establish initial authentication code and set up cipher mode and encryption parameter content;
When S2, addition new node system, select certification chain any node as father node, and according to father node authentication code and refer to Determine cipher mode creation new node authentication code, is considered as new node after creating successfully and is added in the certification chain;
After certification chain is added in S3, new node, then it is credible in certification chain to be considered as new node identity information, all sections in same chain Point needs to record node access record, and can directly access node opening interface;
After S4, nodal information certification pass through, in the direct login authentication chain of the user key which can issue with node All node systems;
S5, judge that node or node users are operated with the presence or absence of safety behavior is violated:
1., if so, then the father node of the node needs to send information pause to all nodes at once or cancels the node and the section Whole authentication informations of point access child node.
2. the node according to claim 1 under block chain network mode and user's interactive authentication method, feature exist In encryption parameter content includes time, nodename or address in the step S1;
Initial authentication code is the information starting point of entire certification chain.
3. the node according to claim 1 or 2 under block chain network mode and user's interactive authentication method, feature It is, start node is a system or special authentication service in the step S1;Start node needs to establish elemental user Message reference interface.
4. the node according to claim 3 under block chain network mode and user's interactive authentication method, feature exist In the cipher mode and parameter that new node is set according to the authentication code and start node of father node in the step S2 create this Entity authentication code, and be that user creates proprietary private key in node according to authentication code.
5. the node according to claim 4 under block chain network mode and user's interactive authentication method, feature exist In all nodes are intended to whole nodes in record certification chain and are switched in or out information in the step S3, and new node needs Building and guaranteeing whole nodes may have access to the basic interface of start node requirement setting, any one node finds access exception It can initiate to query and refuse it in certification chain to access any interface of this node.
6. the node according to claim 5 under block chain network mode and user's interactive authentication method, feature exist In father node is that corresponding node issues entity authentication code and father node notifies other nodes in certification chain in the step S5.
7. the node according to claim 6 under block chain network mode and user's interactive authentication method, feature exist In when malicious act occurs in the node, father node, which also needs to give a warning in certification chain, stops the node and its institute There is the certification code authentication of child node.
8. a kind of node under block chain network mode and user's mutual authentication system, which is characterized in that the system includes,
Initial authentication code establishes module, and the initial authentication code for certification chain start node system is established and sets up initial authentication chain The cipher mode and encryption parameter content of start node;
New node initial authentication code establishes module, and the initial authentication code for new node is established, when adding new node system, choosing Certification chain any node is selected as father node, and according to father node authentication code and the creation new node certification of specified cipher mode Code, is considered as new node and is added in the certification chain after creating successfully;
Certification chain authentication module is added certification chain for new node and authenticates new node identity information, confirmation new node identity letter Cease it is credible after, notify same chain in all nodes records node access record, and can directly access the node opening Interface;
Certification chain node system login module, for be authenticated by identity information node and the node users issue node User key and using all node systems in the direct login authentication chain of user key;
Monitoring nodes module is operated for judging node or node users with the presence or absence of safety behavior is violated.
9. the node according to claim 8 under block chain network mode and user's mutual authentication system, feature exist In, if the monitoring nodes mould, which detects that node exists, violates safety behavior operation, the father node of the node need at once to All nodes send information pause or cancel whole authentication informations of the node and node access child node.
CN201910111491.XA 2019-02-12 2019-02-12 Node and user interactive authentication method and system in block chain network mode Active CN109617929B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910111491.XA CN109617929B (en) 2019-02-12 2019-02-12 Node and user interactive authentication method and system in block chain network mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910111491.XA CN109617929B (en) 2019-02-12 2019-02-12 Node and user interactive authentication method and system in block chain network mode

Publications (2)

Publication Number Publication Date
CN109617929A true CN109617929A (en) 2019-04-12
CN109617929B CN109617929B (en) 2021-07-13

Family

ID=66019663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910111491.XA Active CN109617929B (en) 2019-02-12 2019-02-12 Node and user interactive authentication method and system in block chain network mode

Country Status (1)

Country Link
CN (1) CN109617929B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981689A (en) * 2019-04-29 2019-07-05 清华大学 Cross-domain logical is isolated by force and safety access control method and device under scenes of internet of things
CN111163466A (en) * 2019-12-30 2020-05-15 全链通有限公司 Method for 5G user terminal to access block chain, user terminal equipment and medium
CN112989398A (en) * 2021-05-18 2021-06-18 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, computer equipment and medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192928A (en) * 2006-12-01 2008-06-04 华为技术有限公司 Mobile ad hoc authentication method, network and system
CN103401852A (en) * 2013-07-23 2013-11-20 徐华 Two-dimensional code smart business card system based on authentication and design method thereof
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system
CN107862216A (en) * 2017-10-13 2018-03-30 布比(北京)网络技术有限公司 Method for secret protection, device and the storage medium merchandised for anonymity across chain
CN108601001A (en) * 2018-03-09 2018-09-28 天津大学 A kind of RFID groups authentication method that annular segmentation accelerates
CN109117674A (en) * 2018-09-25 2019-01-01 深圳市元征科技股份有限公司 A kind of client validation encryption method, system, equipment and computer media
CN109150972A (en) * 2018-07-17 2019-01-04 湖南宸瀚信息科技有限责任公司 A kind of the common recognition mechanism and its working method of the efficient block chain of bilayer fragment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192928A (en) * 2006-12-01 2008-06-04 华为技术有限公司 Mobile ad hoc authentication method, network and system
CN103401852A (en) * 2013-07-23 2013-11-20 徐华 Two-dimensional code smart business card system based on authentication and design method thereof
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system
CN107862216A (en) * 2017-10-13 2018-03-30 布比(北京)网络技术有限公司 Method for secret protection, device and the storage medium merchandised for anonymity across chain
CN108601001A (en) * 2018-03-09 2018-09-28 天津大学 A kind of RFID groups authentication method that annular segmentation accelerates
CN109150972A (en) * 2018-07-17 2019-01-04 湖南宸瀚信息科技有限责任公司 A kind of the common recognition mechanism and its working method of the efficient block chain of bilayer fragment
CN109117674A (en) * 2018-09-25 2019-01-01 深圳市元征科技股份有限公司 A kind of client validation encryption method, system, equipment and computer media

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HUNG JUI KE等: "《Hash-algorithms Output for Digital Evidence in Computer Forensics》", 《2011 INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS》 *
周致成: "《基于区块链技术的高效跨域认证方案》", 《计算机应用》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981689A (en) * 2019-04-29 2019-07-05 清华大学 Cross-domain logical is isolated by force and safety access control method and device under scenes of internet of things
CN111163466A (en) * 2019-12-30 2020-05-15 全链通有限公司 Method for 5G user terminal to access block chain, user terminal equipment and medium
CN111163466B (en) * 2019-12-30 2022-12-16 全链通有限公司 Method for 5G user terminal to access block chain, user terminal equipment and medium
CN112989398A (en) * 2021-05-18 2021-06-18 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, computer equipment and medium
CN112989398B (en) * 2021-05-18 2021-07-30 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, computer equipment and medium

Also Published As

Publication number Publication date
CN109617929B (en) 2021-07-13

Similar Documents

Publication Publication Date Title
CN107193490B (en) Distributed data storage system and method based on block chain
CN108615148B (en) A kind of preposition method of commerce of secured assets and system based on block chain technology
CN111698322A (en) Medical data safety sharing method based on block chain and federal learning
CN102761551B (en) System and method for multilevel cross-domain access control
CN104364790B (en) System and method for implementing dual factor anthentication
CN104363207B (en) Multiple-factor strengthens safely authorization and identification method
US20180018738A1 (en) Digital asset platform
CN104580395B (en) A kind of cloudy collaboration Storage Middleware Applying system based on existing cloud storage platform
CN109344603A (en) A kind of unified entry system
CN109617929A (en) Node and user's interactive authentication method and system under block chain network mode
CN103095720B (en) A kind of method for managing security of cloud storage system of dialogue-based management server
CN111475831B (en) Data access control method and system based on mimicry defense
CN102546664A (en) User and authority management method and system for distributed file system
CN108959902A (en) A kind of mutli-system integration platform and method, computer readable storage medium
CN112511350B (en) Alliance chain multi-level consensus method, device and storage medium
CN113361937B (en) Integrated quality evaluation method for electronic government system
CN109831529A (en) A kind of integrated architecture of cloud chain number
CN110309197A (en) Project data verification method and its device
CN111327613A (en) Distributed service authority control method and device and computer readable storage medium
CN112118269A (en) Identity authentication method, system, computing equipment and readable storage medium
CN116250210A (en) Methods, apparatus, and computer readable media for authentication and authorization of networked data transactions
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
CN113992406A (en) Authority access control method for alliance chain cross-chain
EP3472779A1 (en) Digital asset platform
CN101408955A (en) Method and system determining obligation base on tactic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zheng Weibo

Inventor after: Ke Huan

Inventor before: Ke Huan

GR01 Patent grant
GR01 Patent grant