CN109635559A - It issues resource and obtains method, system, device and the storage medium of authorization - Google Patents

It issues resource and obtains method, system, device and the storage medium of authorization Download PDF

Info

Publication number
CN109635559A
CN109635559A CN201811497226.1A CN201811497226A CN109635559A CN 109635559 A CN109635559 A CN 109635559A CN 201811497226 A CN201811497226 A CN 201811497226A CN 109635559 A CN109635559 A CN 109635559A
Authority
CN
China
Prior art keywords
resource
terminal equipment
user
node
publication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811497226.1A
Other languages
Chinese (zh)
Inventor
王欣
江少明
陈立
潘炳镇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yunge Artificial Intelligence Technology Co Ltd
Original Assignee
Shenzhen Yunge Artificial Intelligence Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yunge Artificial Intelligence Technology Co Ltd filed Critical Shenzhen Yunge Artificial Intelligence Technology Co Ltd
Priority to CN201811497226.1A priority Critical patent/CN109635559A/en
Publication of CN109635559A publication Critical patent/CN109635559A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of publication resource and obtain method, system, device and the storage medium authorized.The method for wherein issuing resource includes: the publication instruction for the publication resource that first terminal equipment receives input, and wherein first terminal equipment is a node in block catenary system;First terminal equipment is instructed in response to publication, issues resource in block catenary system;And first terminal equipment setting intelligent contract relevant to resource, wherein intelligent contract is for authorizing the user of the node of request resource in block catenary system.The method for obtaining authorization includes: the instruction that second terminal equipment receives the request resource of user's input, and wherein resource is issued by the user of first terminal equipment, and first terminal equipment and second terminal equipment are a node in block catenary system;Second terminal equipment is in response to instruction, and according to intelligent contract, starting obtains the operation of authorization relevant to resource.

Description

It issues resource and obtains method, system, device and the storage medium of authorization
Technical field
This application involves block chain fields, more particularly to a kind of publication resource and obtain the method for authorization, system, device And storage medium.
Background technique
In recent years, block chain technology had obtained quick development.Since block chain technology has decentralization, secure and trusted The features such as, so having obtained the great attention of government department, therefore various industries also start to set foot in block chain field.In block In catenary system, user generally requires to obtain the authorization of resource publisher when obtaining resource, but how user is in decentralization In the case of, the authorization for obtaining resource then becomes a new technical problem.
For in above-mentioned decentralization system existing in the prior art, how user obtains the technology of the authorization of resource Problem, currently no effective solution has been proposed.
Summary of the invention
Embodiment of the disclosure provides a kind of method, system, device and storage Jie for issuing resource and obtaining authorization Matter, at least to solve in decentralization system existing in the prior art, the technical issues of how user obtains the authorization of resource.
According to the one aspect of the embodiment of the present disclosure, a kind of method for issuing resource is provided, comprising: first terminal is set The publication instruction of the standby publication resource for receiving input, wherein first terminal equipment is a node in block catenary system;First Terminal device is instructed in response to publication, issues resource in block catenary system;And the setting of first terminal equipment is related to resource Intelligent contract, wherein intelligent contract is for authorizing the user of the node of request resource in block catenary system.
According to the other side of the embodiment of the present disclosure, a kind of method for obtaining authorization is additionally provided, comprising: second terminal Equipment receives the instruction of the request resource of user's input, and wherein resource is issued by the user of first terminal equipment, and the One terminal device and second terminal equipment are the node in block catenary system;Second terminal equipment is in response to instruction, according to intelligence Contract, starting obtain the operation of authorization relevant to resource.
According to the other side of the embodiment of the present disclosure, a kind of storage medium is additionally provided, storage medium includes storage Program, wherein the method as described in processor execution any of the above one in program operation.
According to the other side of the embodiment of the present disclosure, a kind of system for issuing resource is additionally provided, comprising: first receives Module receives the publication instruction of the publication resource of input for first terminal equipment, and wherein first terminal equipment is block linkwork A node in system;First respond module is instructed in response to publication for first terminal equipment, is issued in block catenary system Resource;And setup module, for first terminal equipment setting intelligent contract relevant to resource, wherein intelligent contract is used for pair The user of the node of request resource authorizes in block catenary system.
According to the other side of the embodiment of the present disclosure, a kind of system for obtaining authorization is additionally provided, comprising: second receives Module receives the instruction of the request resource of user's input for second terminal equipment, and wherein resource is by first terminal equipment User's publication, and first terminal equipment and second terminal equipment are the node in block catenary system;And starting module, it uses In second terminal equipment in response to instruction, according to intelligent contract, starting obtains the operation of authorization relevant to resource.
According to the other side of the embodiment of the present disclosure, a kind of device for issuing resource is additionally provided, comprising: the first processing Device;And first memory, it is connect with first processor, for providing the finger for handling following processing step for first processor Enable: first terminal equipment receives the publication instruction of the publication resource of input, and wherein first terminal equipment is in block catenary system One node;First terminal equipment is instructed in response to publication, issues resource in block catenary system;And first terminal equipment is set Intelligent contract relevant to resource is set, wherein intelligent contract is used for the user to the node of request resource in block catenary system It is authorized.
According to the other side of the embodiment of the present disclosure, a kind of device for obtaining authorization is additionally provided, comprising: second processing Device;And second memory, it is connect with second processor, for providing the finger for handling following processing step for second processor Enable: second terminal equipment receive user input request resource instruction, wherein resource by first terminal equipment user Publication, and first terminal equipment and second terminal equipment are the node in block catenary system;Second terminal equipment is in response to referring to It enables, according to intelligent contract, starting obtains the operation of authorization relevant to resource.
In the embodiments of the present disclosure, first terminal equipment receives the instruction that user issues resource, will then in response to instruction The resource is published in block chain and generates intelligent contract corresponding with the resource.Wherein, which is used for block chain The user (for example, user of second terminal equipment) of the node of resource described in request authorizes in system.To solve In decentralization system existing in the prior art, the technical issues of how user is directed to resource acquisition authorization.
Detailed description of the invention
Attached drawing described herein is used to provide further understanding of the disclosure, constitutes part of this application, this public affairs The illustrative embodiments and their description opened do not constitute the improper restriction to the disclosure for explaining the disclosure.In the accompanying drawings:
Fig. 1 is [terminal (or mobile device)] for realizing the method according to the embodiment of the present disclosure 1 Hardware block diagram;
Fig. 2 is the publication resource according to the embodiment of the present disclosure 1 and the schematic diagram for obtaining the system authorized;
Fig. 3 is the flow diagram of the method for publication resource according to the first aspect of the embodiment of the present disclosure 1;
Fig. 4 is the flow diagram of the method for acquisition authorization according to the second aspect of the embodiment of the present disclosure 1;
Fig. 5 is the schematic diagram of the system of publication resource according to the first aspect of the embodiment of the present disclosure 2;
Fig. 6 is the schematic diagram of the system of acquisition authorization according to the second aspect of the embodiment of the present disclosure 2;
Fig. 7 is the schematic diagram of the device of publication resource according to the first aspect of the embodiment of the present disclosure 3;And
Fig. 8 is the schematic diagram of the device of acquisition authorization according to the second aspect of the embodiment of the present disclosure 3.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution of the disclosure, implement below in conjunction with the disclosure Attached drawing in example, is clearly and completely described the technical solution in the embodiment of the present disclosure.Obviously, described embodiment The only embodiment of disclosure a part, instead of all the embodiments.Based on the embodiment in the disclosure, this field is common Disclosure protection all should belong in technical staff's every other embodiment obtained without making creative work Range.
It should be noted that the specification and claims of the disclosure and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiment of the disclosure described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Embodiment 1
According to the present embodiment, the embodiment of the method for a kind of publication resource and acquisition authorization is provided, it should be noted that The step of process of attached drawing illustrates can execute in a computer system such as a set of computer executable instructions, also, It, in some cases, can be to be different from shown in sequence execution herein although logical order is shown in flow charts The step of out or describing.
Embodiment of the method provided by the present embodiment can be in mobile terminal, terminal or similar arithmetic unit Middle execution.Fig. 1 shows a kind of hardware knot of the terminal (or mobile device) of publication resource and the method for obtaining authorization Structure block diagram.As shown in Figure 1, terminal 10 (or mobile device 10) may include it is one or more (in figure using 102a, 102b ... ..., 102n are shown) (processor 102 can include but is not limited to Micro-processor MCV or programmable patrols processor 102 The processing unit of volume device FPGA etc.), memory 104 for storing data and the transmission module for communication function 106.It in addition to this, can also include: display, input/output interface (I/O interface), the port universal serial bus (USB) (a port that can be used as in the port of I/O interface is included), network interface, power supply and/or camera.The common skill in this field Art personnel are appreciated that structure shown in FIG. 1 is only to illustrate, and do not cause to limit to the structure of above-mentioned electronic device.For example, Terminal 10 may also include the more perhaps less component than shown in Fig. 1 or match with different from shown in Fig. 1 It sets.
It is to be noted that said one or multiple processors 102 and/or other data processing circuits lead to herein Can often " data processing circuit " be referred to as.The data processing circuit all or part of can be presented as software, hardware, firmware Or any other combination.In addition, data processing circuit for single independent processing module or all or part of can be integrated to meter In any one in other elements in calculation machine terminal 10 (or mobile device).As involved in the embodiment of the present disclosure, The data processing circuit controls (such as the selection for the variable resistance end path connecting with interface) as a kind of processor.
Memory 104 can be used for storing the software program and module of application software, such as the publication in the embodiment of the present disclosure Resource program instruction/data storage device corresponding with the method for obtaining authorization, processor 102 are stored in memory by operation Software program and module in 104 realize above-mentioned application program thereby executing various function application and data processing Publication resource and obtain authorization method.Memory 104 may include high speed random access memory, may also include non-volatile memories Device, such as one or more magnetic storage device, flash memory or other non-volatile solid state memories.In some instances, it deposits Reservoir 104 can further comprise the memory remotely located relative to processor 102, these remote memories can pass through network It is connected to terminal 10.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, moves and lead to Letter net and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include The wireless network that the communication providers of terminal 10 provide.In an example, transmitting device 106 includes that a network is suitable Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to Internet is communicated.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module, For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), the liquid crystal display aloow user with The user interface of terminal 10 (or mobile device) interacts.
Herein it should be noted that in some optional embodiments, above-mentioned computer equipment shown in FIG. 1 (or movement is set It is standby) it may include hardware element (including circuit), software element (including the computer generation that may be stored on the computer-readable medium Code) or both hardware element and software element combination.It should be pointed out that Fig. 1 is only a reality of particular embodiment Example, and it is intended to show that the type for the component that may be present in above-mentioned computer equipment (or mobile device).
Fig. 2 is the publication resource according to the present embodiment and the schematic diagram for obtaining the system authorized.Referring to shown in Fig. 2, The system can be for issuing video resource, and obtain the block catenary system of video distribution side authorization, such as but unlimited In the system operates on the APP of mobile terminal.The system includes multiple terminal devices, such as first terminal equipment 210 and Two terminal devices 220.Wherein, first terminal equipment 210 and second terminal equipment 220 are to run in the video block catenary system Node, user 230 can issue video resource by first terminal equipment 210.By the user for obtaining first terminal equipment 210 230 authorization, the available resource of the user 240 of second terminal equipment 220.It should be noted that first in system is whole End equipment 210 and the applicable hardware configuration recited above of second terminal equipment 220.
Under above-mentioned running environment, according to the first aspect of the present embodiment, a kind of method for issuing resource is provided, it should Method is realized by first terminal equipment 210 shown in Fig. 2.Fig. 3 shows the flow diagram of this method, refering to what is shown in Fig. 3, This method comprises:
S302: first terminal equipment receives the publication instruction of the publication resource of input, and wherein first terminal equipment is block A node in catenary system;
S304: first terminal equipment is instructed in response to publication, issues resource in block catenary system;And
S306: first terminal equipment setting intelligent contract relevant to resource, wherein intelligent contract is used for block linkwork The user of the node of request resource authorizes in system.
As described in foregoing Background, in recent years, block chain technology has obtained quick development.Due to block chain Technology has the characteristics that decentralization, secure and trusted, so having obtained the great attention of government department, therefore various industries are also opened Beginning sets foot in block chain field.In block catenary system, user generally requires to obtain the authorization of resource publisher when obtaining resource, But user, how in the case where decentralization, the authorization for obtaining resource then becomes a new technical problem.
Refering to what is shown in Fig. 2, in view of the above technical problems, first terminal equipment provided by the technical solution of the present embodiment 210 (block chain nodes) receive the instruction for the publication resource that user 230 inputs.For example, user 230 wants in video block linkwork When issuing a film in system, the instruction for issuing the film is inputted to first terminal equipment 210.To first terminal equipment 210 Receive the instruction for issuing the film that user 230 inputs.Wherein, first terminal equipment 210 is in the video block catenary system One node.
Further, first terminal equipment 210 is sent out in the video block catenary system in response to the instruction of the publication film Cloth film.Then, the setting of first terminal equipment 210 intelligent contract relevant to the film.Also, the intelligence contract can be used for The user of the node of request resource in the video block catenary system is authorized.For example, second terminal equipment 220 (the Two terminal devices 220 be also the block catenary system in a node) user 240 when obtaining the film for the first time branch pay With then obtaining the authorization for watching the film.It, can be in the case where not payment expense when user 240 watches the film again Obtain the authorization of film publisher (that is: the user 230 of first terminal equipment 210).To which user 240 is according to intelligent contract, obtain Obtain the authorization of user 230.
To, in this way, first terminal equipment 210 receives the instruction that user 230 issues resource, then in response to The resource is published in block chain and intelligent contract corresponding with the resource is arranged by instruction.Wherein, the intelligence contract for pair The user (for example, user 240 of second terminal equipment 220) of the node of resource described in request awards in block catenary system Power.So that other node users in the video block chain can watch the video according to pre-set intelligent contract When authorized.It solves in decentralization system existing in the prior art, how user is to the technology of resource acquisition authorization Problem.
Optionally, the operation of the resource is issued in block catenary system, comprising: the first public key of first terminal equipment utilization Resource is encrypted to obtain encryption resource, and the publication encryption resource in block catenary system, wherein the first public key is first whole The public key of the user of end equipment.
Specifically, first terminal equipment 210 using preset first public key (i.e. the public key of user 230) to resource (that is, with Family 230 passes through the film that first terminal equipment 210 is issued) it is encrypted to obtain encryption resource.Then first terminal equipment 210 exists Encryption resource is announced in block catenary system.To since first terminal equipment 210 utilizes the first public key of user 230 to resource Issued again after being encrypted, thus ensure that user publication resource in the case where without permission, will not be by other User uses, to ensure the safety of the resource of publication.
Still optionally further, the operation user of the node of request resource in block catenary system authorized, packet Include: the second public key pair of first terminal equipment utilization the first private key corresponding with the first public key carries out being converted to re-encrypted private key, Wherein the second public key is the public key of the user of the node of resource described in request;And first terminal equipment is by re-encrypted private key It is sent to the node of request resource.
Specifically, first terminal equipment 210 is using the second public key (i.e. the public key of user 240) to corresponding with the first public key First private key is converted, to obtain re-encrypted private key.Wherein the second public key is the user's of the node of request resource Public key.Such as: the second public key is the public key of the user 240 of second terminal equipment 220 (the video block chain node).First private key It is corresponding with the first public key, it is a pair of secret keys pair of user 230.Re-encrypted private key is sent to by final first terminal equipment 210 Second terminal equipment 220.
To in this way, in licensing process of the user 230 to user 240, avoid the private key of user 230 It is transmitted directly to user 240 and bring potential risk (for example, the private key of user 230 may will be leaked).So that awarding The process of power is safer.
In addition, providing a kind of method for obtaining authorization, this method is by Fig. 2 according to the second aspect of the present embodiment Shown in second terminal equipment 220 realize.Fig. 4 shows the flow diagram of this method, refering to what is shown in Fig. 4, this method comprises:
S402: second terminal equipment receives the instruction of the request resource of user's input, and wherein resource is by first terminal The user of equipment issues, and first terminal equipment and second terminal equipment are a node in block catenary system;And
S404: second terminal equipment is in response to instruction, and according to intelligent contract, starting obtains the behaviour of authorization relevant to resource Make.
Specifically, second terminal equipment 220 receives the instruction for the acquisition resource that user 240 inputs.Such as: user 240 thinks A film is obtained in video block catenary system, so second terminal equipment 220 receives the acquisition of the input of user 240 electricity The instruction of shadow.Wherein second terminal equipment 220 is a node in block catenary system.
Further, second terminal equipment 220 is in response to obtaining the instruction of film, according to intelligent contract, starting obtain with The operation of the relevant authorization of the film.For example, second terminal equipment 220 (the video block chain node) should in the viewing of user 240 When film, according to the intelligent contract of the film, obtain the publisher's (that is, user 230 of first terminal equipment 210) of the film Authorization.
To which in this way, second terminal equipment 220 receives the instruction for the acquisition resource that user 240 inputs, then According to the intelligent contract of the film, starting obtains the operation of authorization.To reach the user of the node in the video block chain (i.e. user 240) in the system of decentralization, the problem of obtaining authorization about resource.Center is being gone to be advantageously implemented The popularization and acquisition of resource in change system.
Optionally, the operation of authorization is obtained, comprising: second terminal equipment obtains encryption resource, and receives first terminal The re-encrypted private key that equipment is sent, wherein encryption resource is to be encrypted to obtain using resource of first public key to request , wherein the first public key is the public key of the user of first terminal equipment, re-encrypted private key is the user using second terminal equipment The second public key pair the first private key corresponding with the first public key converted and generated;Second terminal equipment utilization re-encryption is close Key carries out re-encryption to encryption resource, obtains re-encryption resource;And second terminal equipment utilization corresponding with the second public key Re-encryption resource is decrypted in two private keys, obtains the resource of request.
Specifically, the operation for obtaining authorization includes: that second terminal equipment 220 obtains adding for the publication of first terminal equipment 210 Close resource, the encryption resource are that first terminal equipment 210 adds the resource of request using the first public key of user 230 It is close to obtain.Also, second terminal equipment 220 obtains the re-encrypted private key that first terminal equipment 210 is sent.As front institute It states, which is the second public key pair corresponding with the first public key first using the user 240 of second terminal equipment 220 Private key (i.e. the private key of the user 230 of first terminal equipment 210) is converted and is generated.Then, 220 benefit of second terminal equipment With the re-encrypted private key, re-encryption is carried out to the encryption resource, to obtain re-encryption resource.And second terminal equipment 220 Using the second private key corresponding with the second public key (i.e. the private key of the user 240 of second terminal equipment 220) to re-encryption resource into Row decryption, obtains the resource of request.The safety in licensing process is being obtained in this way, ensure.It keeps away The private key for exempting from user 210 is revealed in licensing process.
In the embodiments of the present disclosure, first terminal equipment receives the instruction that user issues resource, will then in response to instruction The resource is published in block chain and intelligent contract corresponding with the resource is arranged.Wherein, which is used for block chain The user (for example, user of second terminal equipment) of the node of resource described in request authorizes in system.To solve In decentralization system existing in the prior art, the technical issues of user's how same resource acquisition authorization.
In addition, refering to what is shown in Fig. 1, providing a kind of storage medium 104 in terms of according to the third of the present embodiment.Storage Medium 104 includes the program of storage, wherein the method as described in processor execution any of the above one in program operation.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
Fig. 5 shows the system 500 of the publication resource according to the first aspect of the present embodiment, the system 500 with It is corresponding according to method described in the first aspect of embodiment 1.Refering to what is shown in Fig. 5, the system 500 includes: the first reception mould Block 510 receives the publication instruction of the publication resource of input for first terminal equipment, and wherein first terminal equipment is block linkwork A node in system;First respond module 520 is instructed for first terminal equipment in response to publication, in block catenary system Issue resource;And setup module 530, for first terminal equipment setting intelligent contract relevant to resource, wherein intelligence is closed About for being authorized to the user of the node of request resource in block catenary system.
Optionally, the first respond module 520, comprising: the first encryption submodule, it is public for first terminal equipment utilization first Key encrypts resource to obtain encryption resource, and encryption resource is announced in block catenary system, wherein the first public key is first The public key of the user of terminal device.
Optionally, the operation user of the node of resource described in request in the block catenary system authorized, It include: to carry out being converted to re-encryption by the second public key pair of first terminal equipment utilization the first private key corresponding with the first public key Key, wherein the second public key is the public key of the user of the node of request resource;And it will be added again by first terminal equipment Key is sent to the node of request resource.
In addition, Fig. 6 shows the system 600 of the acquisition authorization according to the second aspect of the present embodiment, the system 600 is corresponding with the method according to the second aspect of embodiment 1.Refering to what is shown in Fig. 6, the system 600 includes: second to connect Module 610 is received, the instruction of the request resource for receiving user's input by second terminal equipment, wherein resource is by first The user of terminal device issues, and first terminal equipment and second terminal equipment are a node in block catenary system;With And starting module 620, for by second terminal equipment, in response to instruction, according to intelligent contract, starting to obtain related to resource Authorization operation.
Optionally, starting module, comprising: the first acquisition submodule obtains encryption resource for second terminal equipment, and Receive the re-encrypted private key that first terminal equipment is sent, wherein encryption resource be using the first public key to the resource of request into Row encryption obtains, wherein the first public key is the public key of the user of first terminal equipment, re-encrypted private key is to utilize second terminal The second public key pair of the user of equipment the first private key corresponding with the first public key is converted and is generated;Re-encryption submodule, For second terminal equipment utilization re-encrypted private key, re-encryption is carried out to encryption resource, obtains re-encryption resource;And second obtain Submodule is taken, re-encryption resource is decrypted for second terminal equipment utilization the second private key corresponding with the second public key, is obtained To the resource of request.
So that the instruction that user issues resource is received by first terminal equipment, then in response to finger according to the present embodiment The resource is published in block chain and intelligent contract corresponding with the resource is arranged by order.Wherein, which is used for area The user (for example, user of second terminal equipment) of the node of resource described in request authorizes in block catenary system.To It solves in decentralization system existing in the prior art, the technical issues of user's how same resource acquisition authorization.
Embodiment 3
Fig. 7 shows the device 700 of the publication resource according to the first aspect of the present embodiment, the device 700 with It is corresponding according to method described in the first aspect of embodiment 1.Refering to what is shown in Fig. 7, the device 700 includes: first processor 710;And first memory 720, it is connect with first processor 710, for providing processing following processing for first processor 710 The instruction of step: first terminal equipment receives the publication instruction of the publication resource of input, and wherein first terminal equipment is block chain A node in system;First terminal equipment is instructed in response to publication, issues resource in block catenary system;And first eventually End equipment setting intelligent contract relevant to resource, wherein intelligent contract is used for the section to request resource in block catenary system The user of point authorizes.
Optionally, the operation of the resource is issued in block catenary system, comprising: the first public key of first terminal equipment utilization Resource is encrypted to obtain encryption resource, and the publication encryption resource in block catenary system, wherein the first public key is first whole The public key of the user of end equipment.
Still optionally further, the operation user of the node of request resource in block catenary system authorized, packet Include: the second public key pair of first terminal equipment utilization the first private key corresponding with the first public key carries out being converted to re-encrypted private key, Wherein the second public key is the public key of the user of the node of resource described in request;And first terminal equipment is by re-encrypted private key It is sent to the node of request resource.
In addition, Fig. 8 shows the device 800 of the acquisition authorization according to the second aspect of the present embodiment, the device 800 is corresponding with the method according to the second aspect of embodiment 1.Refering to what is shown in Fig. 8, the device 800 includes: at second Manage device 810;And second memory 820, it is connect with second processor 810, it is following for providing processing for second processor 810 The instruction of processing step: second terminal equipment receives the instruction of the request resource of user's input, and wherein resource is whole by first The user of end equipment issues, and first terminal equipment and second terminal equipment are a node in block catenary system;Second Terminal device is in response to instruction, and according to intelligent contract, starting obtains the operation of authorization relevant to resource.
Optionally, the operation of authorization is obtained, comprising: second terminal equipment obtains encryption resource, and receives first terminal The re-encrypted private key that equipment is sent, wherein encryption resource is to be encrypted to obtain using resource of first public key to request , wherein the first public key is the public key of the user of first terminal equipment, re-encrypted private key is the user using second terminal equipment The second public key pair the first private key corresponding with the first public key converted and generated;Second terminal equipment utilization re-encryption is close Key carries out re-encryption to encryption resource, obtains re-encryption resource;And second terminal equipment utilization corresponding with the second public key Re-encryption resource is decrypted in two private keys, obtains the resource of request.
So that the instruction that user issues resource is received by first terminal equipment, then in response to finger according to the present embodiment The resource is published in block chain and intelligent contract corresponding with the resource is arranged by order.Wherein, which is used for area The user (for example, user of second terminal equipment) of the node of resource described in request authorizes in block catenary system.To It solves in decentralization system existing in the prior art, the technical issues of user's how same resource acquisition authorization.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of method for issuing resource characterized by comprising
First terminal equipment receives the publication instruction of the publication resource of input, wherein the first terminal equipment is block catenary system In a node;
The first terminal equipment is instructed in response to the publication, and the resource is issued in block catenary system;And
Intelligent contract relevant to the resource is arranged in the first terminal equipment, wherein the intelligence contract is used for the area The user of the node of resource described in request authorizes in block catenary system.
2. being wrapped the method according to claim 1, wherein issuing the operation of the resource in block catenary system Include: first public key of first terminal equipment utilization encrypts the resource to obtain encryption resource, and in the block chain The encryption resource is issued in system, wherein first public key is the public key of the user of the first terminal equipment.
3. according to the method described in claim 2, it is characterized in that, to resource described in request in the block catenary system The operation that the user of node is authorized, comprising:
Second public key pair of first terminal equipment utilization the first private key corresponding with first public key carries out being converted to weight Encryption key, wherein second public key is the public key of the user of the node of resource described in request;And
The re-encrypted private key is sent to the node of resource described in request by the first terminal equipment.
4. a kind of method for obtaining authorization characterized by comprising
Second terminal equipment receives the instruction of the request resource of user's input, wherein the resource is by first terminal equipment User's publication, and the first terminal equipment and the second terminal equipment are the node in block catenary system;
The second terminal equipment is in response to described instruction, and according to intelligent contract, starting obtains authorization relevant to the resource Operation.
5. according to the method described in claim 4, it is characterized in that, the operation for obtaining authorization, comprising:
The second terminal equipment obtains encryption resource, and receives the re-encrypted private key that the first terminal equipment is sent, Described in encryption resource be encrypted using the resource of first public key to request, wherein it is described first public affairs Key is the public key of the user of the first terminal equipment, and the re-encrypted private key is the user using the second terminal equipment Second public key pair the first private key corresponding with first public key is converted and is generated;
Re-encrypted private key described in the second terminal equipment utilization carries out re-encryption to the encryption resource, obtains re-encryption money Source;And
The re-encryption resource is decrypted in the second terminal equipment utilization the second private key corresponding with second public key, Obtain the resource of request.
6. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When as processor perform claim require any one of 1 to 5 described in method.
7. a kind of system for issuing resource characterized by comprising
First receiving module receives the publication instruction of the publication resource of input for first terminal equipment, wherein described first is whole End equipment is a node in block catenary system;
First respond module instructs in response to the publication for the first terminal equipment, institute is issued in block catenary system State resource;And
Setup module, for first terminal equipment setting intelligent contract relevant to the resource, wherein the intelligence is closed User about for the node to resource described in request in the block catenary system authorizes.
8. a kind of system for obtaining authorization characterized by comprising
Second receiving module receives the instruction of the request resource of user's input for second terminal equipment, wherein the money Source is issued by the user of first terminal equipment, and the first terminal equipment and the second terminal equipment are block catenary system In node;And
Starting module, for the second terminal equipment in response to described instruction, according to intelligent contract, starting is obtained and the money The operation of the relevant authorization in source.
9. a kind of device for issuing resource characterized by comprising
First processor;And
First memory is connect with the first processor, for providing processing following processing step for the first processor Instruction:
First terminal equipment receives the publication instruction of the publication resource of input, wherein the first terminal equipment is block catenary system In a node;
The first terminal equipment is instructed in response to the publication, and the resource is issued in block catenary system;And
Intelligent contract relevant to the resource is arranged in the first terminal equipment, wherein the intelligence contract is used for the area The user of the node of resource described in request authorizes in block catenary system.
10. a kind of device for obtaining authorization characterized by comprising
Second processor;And
Second memory is connect with the second processor, for providing processing following processing step for the second processor Instruction:
Second terminal equipment receives the instruction of the request resource of user's input, wherein the resource is by first terminal equipment User's publication, and the first terminal equipment and the second terminal equipment are the node in block catenary system;
The second terminal equipment is in response to described instruction, and according to intelligent contract, starting obtains authorization relevant to the resource Operation.
CN201811497226.1A 2018-12-07 2018-12-07 It issues resource and obtains method, system, device and the storage medium of authorization Pending CN109635559A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811497226.1A CN109635559A (en) 2018-12-07 2018-12-07 It issues resource and obtains method, system, device and the storage medium of authorization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811497226.1A CN109635559A (en) 2018-12-07 2018-12-07 It issues resource and obtains method, system, device and the storage medium of authorization

Publications (1)

Publication Number Publication Date
CN109635559A true CN109635559A (en) 2019-04-16

Family

ID=66071972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811497226.1A Pending CN109635559A (en) 2018-12-07 2018-12-07 It issues resource and obtains method, system, device and the storage medium of authorization

Country Status (1)

Country Link
CN (1) CN109635559A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108063752A (en) * 2017-11-02 2018-05-22 暨南大学 A kind of credible genetic test and data sharing method based on block chain and proxy re-encryption technology
CN108632284A (en) * 2018-05-10 2018-10-09 网易(杭州)网络有限公司 User data authorization method, medium, device and computing device based on block chain
US20180309581A1 (en) * 2017-04-19 2018-10-25 International Business Machines Corporation Decentralized biometric signing of digital contracts
CN108881312A (en) * 2018-08-24 2018-11-23 北京京东尚科信息技术有限公司 Intelligent contract upgrade method, system and relevant device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180309581A1 (en) * 2017-04-19 2018-10-25 International Business Machines Corporation Decentralized biometric signing of digital contracts
CN108063752A (en) * 2017-11-02 2018-05-22 暨南大学 A kind of credible genetic test and data sharing method based on block chain and proxy re-encryption technology
CN108632284A (en) * 2018-05-10 2018-10-09 网易(杭州)网络有限公司 User data authorization method, medium, device and computing device based on block chain
CN108881312A (en) * 2018-08-24 2018-11-23 北京京东尚科信息技术有限公司 Intelligent contract upgrade method, system and relevant device and storage medium

Similar Documents

Publication Publication Date Title
CN111683071B (en) Private data processing method, device, equipment and storage medium of block chain
CN111931207B (en) Method, device, equipment and storage medium for obtaining privacy set intersection
CN105007577B (en) A kind of virtual SIM card parameter management method, mobile terminal and server
EP2601771B1 (en) System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device
CN109698822A (en) Combination learning method and system based on publicly-owned block chain and encryption neural network
CN107113162B (en) The system and method for multivalue packing scheme for homomorphic cryptography
CN106533662A (en) Methods and devices for transmitting network safety secret key
CN110351228A (en) Remote entry method, device and system
CN105359491A (en) User authentication in a cloud environment
CN109525989A (en) Data processing, identity identifying method and system, terminal
CN106533665A (en) Method, system and device for storing website private key plaintext
CN109714185A (en) Policy deployment method, apparatus, system and the computing system of trusted servers
CN110225032B (en) Business data transaction method and equipment
US20170250804A1 (en) Apparatus and method for encrypting and decrypting
CN109862103A (en) File data secure sharing method and device based on block chain
CN105847000A (en) Token generation method and communication system based on same
CN107172001A (en) Control method, key proxy server and the web proxy server of web proxy server
CN112749812A (en) Joint learning system, training result aggregation method and equipment
CN112765642A (en) Data processing method, data processing apparatus, electronic device, and medium
CN109640135A (en) It issues video and obtains the method, apparatus and storage medium of video
CN109379345A (en) Sensitive information transmission method and system
CN116308776A (en) Transaction supervision method and device based on blockchain, electronic equipment and storage medium
CN106161363A (en) A kind of method and system of SSL connection establishment
CN112700014A (en) Method, device and system for deploying federal learning application and electronic equipment
CN109981280A (en) A kind of electronic data evidence obtaining method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190416