CN109726531A - A kind of marketer terminal security control method based on block chain intelligence contract - Google Patents

A kind of marketer terminal security control method based on block chain intelligence contract Download PDF

Info

Publication number
CN109726531A
CN109726531A CN201811414424.7A CN201811414424A CN109726531A CN 109726531 A CN109726531 A CN 109726531A CN 201811414424 A CN201811414424 A CN 201811414424A CN 109726531 A CN109726531 A CN 109726531A
Authority
CN
China
Prior art keywords
terminal
marketer
marketer terminal
block chain
intelligence contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811414424.7A
Other languages
Chinese (zh)
Inventor
徐超
邓君华
邹云峰
赵磊
葛崇慧
官国飞
王黎明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Jiangsu Fangtian Power Technology Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Jiangsu Fangtian Power Technology Co Ltd
Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Jiangsu Fangtian Power Technology Co Ltd, Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201811414424.7A priority Critical patent/CN109726531A/en
Publication of CN109726531A publication Critical patent/CN109726531A/en
Pending legal-status Critical Current

Links

Abstract

The present invention discloses a kind of marketer terminal security control method based on block chain intelligence contract, marketing network and information security control platform and provides unified external interface by application layer trusted end-user control micro services;Micro services, which are managed, by marketer terminal manages marketer terminal relevant information, and the validity docked into marketer terminal is verified, asynchronous information synchronous service is provided simultaneously to complete the operation of marketer terminal cache information real-time update, can also reinforce the unified management to marketer terminal;Identity authorization system of the invention improves the execution efficiency and response efficiency of whole system with caching technology, improves the overall performance of system;The method of trusted end-user control guarantees that access passes through operation system management module management business system, complete the registration of access service system, the relevant information of operation system and mark are deposited into block chain intelligence contract, single-sign-on scheme is provided for operation system simultaneously, there is good reliability, stability and safety.

Description

A kind of marketer terminal security control method based on block chain intelligence contract
Technical field
The present invention relates to field of identity authentication, and in particular to a kind of marketer terminal bursting tube based on block chain intelligence contract Prosecutor method.
Background technique
With the hair of the information system security events such as " shake net " virus event, Ukraine's power-off event in 2015 in 2010 Raw, Networks and information security situation is extremely severe, and Chinese information security method is formally implemented within 2017, and information security is in State-level Paid attention to and the guarantee of law, and terminal is information processing system carrier, terminal security control work is to ensure data peace Entirely, the basis that do not reveal, terminal security control work become more important.
Summary of the invention
To solve deficiency in the prior art, the present invention provides a kind of marketer terminal safety based on block chain intelligence contract Management-control method, solving marketing data security protection ability in the prior art has technical problem to be hoisted.
In order to achieve the above objectives, the present invention adopts the following technical scheme:
A kind of marketer terminal security control method based on block chain intelligence contract, it is characterised in that: operate according to the following steps:
Step 1: marketer terminal access authentication:
Specific practice is: in marketer terminal trade mark agency or registration APP, marketer terminal trade mark agency or registration APP are according to terminal Information generates unique identifier, fills in terminal attaching information, is sent to terminal security control micro services, and member's audit to be managed passes through Afterwards, the permission which obtains operation sales service system or communicate with other terminals;
Step 2: it initiates to log in the request of sales service system:
Specific practice is: being stepped on according to the unique identifier generated in user name, password and step 1 to sales service system initiation Record request enters to next step when user name, password and unique identifier pass through verifying Shi Caike;
Step 3: Buffering Verifier:
Specific practice is: sales service system query caching service, and judges unique with the presence or absence of requesting terminal in buffer service Identification code, and if it exists, be then proved to be successful, execute login authentication operation;If it does not exist, then the credible micro services tune of marketer terminal is requested With the query interface in intelligent contract, newest legitimate request terminal unique identifier, wait-for-response are inquired;
Step 4: unique identifier returns and local cache data updates;
Specific practice is: after micro services that marketer terminal is credible receive the call request of query interface, newest certification being passed through Marketer terminal unique identifier returns to buffer service, and updates operation to local data cached execution;
Step 5: caching is verified again:
Specific practice is: matching verification is carried out with the terminal buffers service after updating in step 4 again, if it does, then testing It demonstrate,proves successfully, executes debarkation authentication operation;If authentication failed, return is refused to respond, and normal request process terminates.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned Prosecutor method: the marketer terminal includes computer terminal and mobile terminal.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned Prosecutor method: the end message of computer terminal includes IP, MAC Address, unique identifier, terminal location and relevant department.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned Prosecutor method: the end message of mobile terminal includes IMEI code, MAC Address, unique identifier and relevant department.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned Prosecutor method: terminal unique identification code authentication includes local authentication and two kinds of remote authentication, and local authentication is to utilize local agency The method of offer is authenticated, and remote authentication is to call application layer intelligence contract agency service to provide external interface to be authenticated.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned Prosecutor method: the terminal in step 1 is obtained by acting on behalf of situation deployment or accessing sales service system or other terminals in the form of SDK Extract operation sales service system or the permission communicated with other terminals.
It invents achieved the utility model has the advantages that the present invention is based on block chain intelligence contract platforms to be realized, utilizes block chain Technology can not distort and distributed general ledger characteristic, realize the publicity and validity of authentication, it is credible to promote marketer terminal The management of safe operation of control further promotes marketing data safety assurance work;Identity authorization system fortune of the invention simultaneously The execution efficiency and response efficiency that whole system is improved with caching technology, improve the overall performance of system;Of the invention Trusted end-user control micro services provide unified standard interface and general terminal authentication service, from different sales service systems System carries out seamless link.
Detailed description of the invention
Fig. 1 is flow chart of the invention;
Fig. 2 is architecture diagram of the invention.
Specific embodiment
The invention will be further described below in conjunction with the accompanying drawings.Following embodiment is only used for clearly illustrating the present invention Technical solution, and not intended to limit the protection scope of the present invention.
Present embodiment discloses a kind of marketer terminal security control methods based on block chain intelligence contract:
As shown in Figure 1: when first time using marketer terminal, need to carry out marketer terminal access authentication: the battalion of the present embodiment first Pin terminal includes computer terminal and mobile terminal, in marketer terminal trade mark agency or registration APP, marketer terminal trade mark agency or note Volume APP according to end message generate unique identifier, the end message of computer terminal include IP, MAC Address, unique identifier, Terminal location and relevant department;The end message of mobile terminal includes IMEI code, MAC Address, unique identifier and relevant department. It is then filled out terminal attaching information, is sent to terminal security control micro services, after the approval, which obtains behaviour to member to be managed The permission making sales service system or being communicated with other terminals.Specifically, terminal is to act on behalf of situation deployment or be connect in the form of SDK Enter sales service system or other terminals, the permission for obtaining operation sales service system or communicating with other terminals.
Sales service personnel initiate to log in the request of sales service system, and before initiating log on request, system can be called automatically Agency service obtains unique identifier, and log on request not only needs user name, encrypted message, it is also necessary to which the unique code of terminal, which is used as, to be recognized Parameter is demonstrate,proved, only enters to next step when user name, password and unique identifier pass through verifying Shi Caike.
Then Buffering Verifier: sales service system query caching service is carried out, and judges to whether there is in buffer service and ask Seek terminal unique identifier, and if it exists, be then proved to be successful, execute login authentication operation;If it does not exist, then request marketer terminal can Believe that micro services call the query interface in intelligent contract, inquires newest legitimate request terminal unique identifier, wait-for-response; Terminal unique identification code authentication includes local authentication and two kinds of remote authentication, and local authentication is the side provided using local agency Method is authenticated, and remote authentication is to call application layer intelligence contract agency service to provide external interface to be authenticated.
Micro services that marketer terminal is credible are receiving after query interface call request, by the newest battalion for authenticating and passing through Pin terminal unique identifier returns to buffer service, updates behaviour to local data cached execution by asynchronous message Push Service Make;
Matching verification is carried out with newest terminal buffers service again, if it does, then being proved to be successful, executes debarkation authentication behaviour Make;If authentication failed, return is refused to respond, and normal request process terminates.
Control micro services that marketer terminal of the invention is credible, first have to carry out is the integrating process of sales service system.
Developer needs to introduce the certification SDK packet of offer in sales service system or calls agency, and in configuration text The port numbers of operation system service, the configuration information of deployed position are defined in part, system will be certainly after executing registration operation later It is dynamic to call registration interface be in the credible control micro services of the relevant information marketer terminal of operation system.In provided SDK packet, It can verify first and recognize the unique identifier of this operation system (unique identifier is to contain the encrypted word of operation system information a string Symbol string can obtain the operation systems such as port numbers, deployment path and the systematic name of operation system by decrypted authentication code and believe Breath) it whether there is, later, registration request is initiated by parameter of end message, the intelligent contract method of registration is called, by business system The information of system is written in operation system table.The result of calling can return to an authentication code character string, be used for this industry of unique identification Business system.Then operation system can be used for this authentication code write-in configuration file to facilitate subsequent operation again.
It is as shown in Figure 2: following service can be achieved using the present invention:
(1) application layer intelligence contract agency service, the service are divided into the endpoint to register of computer end endpoint to register agency and mobile terminal APP is acted on behalf of, which is used to encapsulate the call operation of block platform chain intelligence contract, and management access block chain intelligence contract is matched Function is set, and the information docked into sales service system terminal is packaged;Agency externally provides unified calling interface, with generation It manages situation deployment or accesses sales service system in the form of SDK, interface abstracts, United design, improves industry battalion Pin business system integration development efficiency.
Marketer terminal management service, the service management operate the relevant information of sales service system terminal, marketer terminal point For computer terminal and mobile terminal, computer terminal management includes IP, MAC Address, unique identifier, terminal location, relevant department Information, mobile terminal administration include unique identifier, IMEI code, MAC Address, relevant department's relevant information, are docked into marketing end Client information carries out review operation, and docks and carry out validation verification into marketer terminal, and further, it would be desirable to provide marketer terminal statistical report forms The function of service is directed to each sales service system, it will generates the statistical report form of a marketer terminal, for example account is online Several statistical functions;
(3) marketer terminal relevant information is pushed to the application layer trusted end-user certification in incognito by cache synchronization service Business, real-time update marketer terminal cache information;
All certifications can be stored in block chain intelligence by marketer terminal information by control micro services that marketer terminal of the invention is credible In energy contract, it can not distort and inquiry can be recalled.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the technical principles of the invention, several improvement and deformations can also be made, these improvement and deformations Also it should be regarded as protection scope of the present invention.

Claims (6)

1. a kind of marketer terminal security control method based on block chain intelligence contract, it is characterised in that: grasp according to the following steps Make:
Step 1: marketer terminal access authentication:
Specific practice is: in marketer terminal trade mark agency or registration APP, marketer terminal trade mark agency or registration APP are according to terminal Information generates unique identifier, fills in terminal attaching information, is sent to terminal security control micro services, and member's audit to be managed passes through Afterwards, the permission which obtains operation sales service system or communicate with other terminals;
Step 2: it initiates to log in the request of sales service system:
Specific practice is: being stepped on according to the unique identifier generated in user name, password and step 1 to sales service system initiation Record request enters to next step when user name, password and unique identifier pass through verifying Shi Caike;
Step 3: Buffering Verifier:
Specific practice is: sales service system query caching service, and judges unique with the presence or absence of requesting terminal in buffer service Identification code, and if it exists, be then proved to be successful, execute login authentication operation;If it does not exist, then the credible micro services tune of marketer terminal is requested With the query interface in intelligent contract, newest legitimate request terminal unique identifier, wait-for-response are inquired;
Step 4: unique identifier returns and local cache data updates;
Specific practice is: after micro services that marketer terminal is credible receive the call request of query interface, newest certification being passed through Marketer terminal unique identifier returns to buffer service, and updates operation to local data cached execution;
Step 5: caching is verified again:
Specific practice is: matching verification is carried out with the terminal buffers service after updating in step 4 again, if it does, then testing It demonstrate,proves successfully, executes debarkation authentication operation;If authentication failed, return is refused to respond, and normal request process terminates.
2. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 1, feature Be: the marketer terminal includes computer terminal and mobile terminal.
3. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 2, feature Be: the end message of computer terminal includes IP, MAC Address, unique identifier, terminal location and relevant department.
4. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 2, feature Be: the end message of mobile terminal includes IMEI code, MAC Address, unique identifier and relevant department.
5. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 1, feature Be: terminal unique identification code authentication includes local authentication and two kinds of remote authentication, and local authentication is mentioned using local agency The method of confession is authenticated, and remote authentication is to call application layer intelligence contract agency service to provide external interface to be authenticated.
6. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 1, feature Be: the terminal in step 1 is obtained by acting on behalf of situation deployment or accessing sales service system or other terminals in the form of SDK Operation sales service system or the permission communicated with other terminals.
CN201811414424.7A 2018-11-26 2018-11-26 A kind of marketer terminal security control method based on block chain intelligence contract Pending CN109726531A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811414424.7A CN109726531A (en) 2018-11-26 2018-11-26 A kind of marketer terminal security control method based on block chain intelligence contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811414424.7A CN109726531A (en) 2018-11-26 2018-11-26 A kind of marketer terminal security control method based on block chain intelligence contract

Publications (1)

Publication Number Publication Date
CN109726531A true CN109726531A (en) 2019-05-07

Family

ID=66295139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811414424.7A Pending CN109726531A (en) 2018-11-26 2018-11-26 A kind of marketer terminal security control method based on block chain intelligence contract

Country Status (1)

Country Link
CN (1) CN109726531A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602208A (en) * 2019-09-12 2019-12-20 北京笔新互联网科技有限公司 Distributed micro-service management system and construction method thereof
CN111310147A (en) * 2020-03-20 2020-06-19 符安文 Distributed internal information platform
CN111488361A (en) * 2020-04-17 2020-08-04 北京中启智源数字信息技术有限责任公司 Cross report generation method and system
CN112231122A (en) * 2020-10-27 2021-01-15 南京林洋电力科技有限公司 APP management method based on heterogeneous communication model and oriented to terminal software platform
CN112307445A (en) * 2020-09-30 2021-02-02 深圳百纳维科技有限公司 Identity management method and device based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173850A (en) * 2017-12-28 2018-06-15 杭州趣链科技有限公司 A kind of identity authorization system and identity identifying method based on block chain intelligence contract
CN108234515A (en) * 2018-01-25 2018-06-29 中国科学院合肥物质科学研究院 A kind of Self-certified digital identity management system and its method based on intelligent contract
CN108737348A (en) * 2017-04-21 2018-11-02 中国科学院信息工程研究所 A kind of internet of things equipment access control method of the intelligent contract based on block chain
CN108737370A (en) * 2018-04-05 2018-11-02 西安电子科技大学 A kind of cross-domain Verification System of Internet of Things based on block chain and method
CN108833081A (en) * 2018-06-22 2018-11-16 中国人民解放军国防科技大学 Block chain-based equipment networking authentication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737348A (en) * 2017-04-21 2018-11-02 中国科学院信息工程研究所 A kind of internet of things equipment access control method of the intelligent contract based on block chain
CN108173850A (en) * 2017-12-28 2018-06-15 杭州趣链科技有限公司 A kind of identity authorization system and identity identifying method based on block chain intelligence contract
CN108234515A (en) * 2018-01-25 2018-06-29 中国科学院合肥物质科学研究院 A kind of Self-certified digital identity management system and its method based on intelligent contract
CN108737370A (en) * 2018-04-05 2018-11-02 西安电子科技大学 A kind of cross-domain Verification System of Internet of Things based on block chain and method
CN108833081A (en) * 2018-06-22 2018-11-16 中国人民解放军国防科技大学 Block chain-based equipment networking authentication method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602208A (en) * 2019-09-12 2019-12-20 北京笔新互联网科技有限公司 Distributed micro-service management system and construction method thereof
CN110602208B (en) * 2019-09-12 2022-01-21 北京笔新互联网科技有限公司 Distributed micro-service management system and construction method thereof
CN111310147A (en) * 2020-03-20 2020-06-19 符安文 Distributed internal information platform
CN111488361A (en) * 2020-04-17 2020-08-04 北京中启智源数字信息技术有限责任公司 Cross report generation method and system
CN112307445A (en) * 2020-09-30 2021-02-02 深圳百纳维科技有限公司 Identity management method and device based on block chain
CN112307445B (en) * 2020-09-30 2021-08-10 深圳百纳维科技有限公司 Identity management method and device based on block chain
CN112231122A (en) * 2020-10-27 2021-01-15 南京林洋电力科技有限公司 APP management method based on heterogeneous communication model and oriented to terminal software platform

Similar Documents

Publication Publication Date Title
CN108173850B (en) Identity authentication system and identity authentication method based on block chain intelligent contract
CN109726531A (en) A kind of marketer terminal security control method based on block chain intelligence contract
US9124639B2 (en) Managing command compliance in internetworking devices
CN108881308B (en) User terminal and authentication method, system and medium thereof
US20160105410A1 (en) OMA DM Based Terminal Authentication Method, Terminal and Server
CN105357242B (en) Access the method and system of WLAN, short message pushes platform, gate system
JP6337642B2 (en) Method for securely accessing a network from a personal device, personal device, network server, and access point
CN113545018A (en) Protecting a telecommunications network using network components as blockchain nodes
WO2016173199A1 (en) Mobile application single sign-on method and device
CN110266642A (en) Identity identifying method and server, electronic equipment
CN109391612A (en) A kind of identification confirmation system and method based on block chain
CN1997026B (en) An expansion security authentication method based on 802.1X protocol
JP2019510316A (en) Method and device for providing account linking and service processing
CN113221093B (en) Single sign-on system, method, equipment and product based on block chain
CN109040069A (en) A kind of dissemination method, delivery system and the access method of cloud application program
CN106100840A (en) The permission modification method and device of micro services
CN107453872A (en) A kind of unified safety authentication method and system based on Mesos container cloud platforms
US9635017B2 (en) Computer network security management system and method
CN114651424B (en) Access management for publisher nodes of a secure access MAAS network
CN102255904A (en) Communication network and terminal authentication method thereof
CN102624724B (en) Security gateway and method for securely logging in server by gateway
CN109413053B (en) Method for user state verification in service grid
CN114095213B (en) Network access control policy management system
CN101742507B (en) System and method for accessing Web application site for WAPI terminal
CN115242511B (en) Multi-environment application management platform and management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190507

RJ01 Rejection of invention patent application after publication