CN109726531A - A kind of marketer terminal security control method based on block chain intelligence contract - Google Patents
A kind of marketer terminal security control method based on block chain intelligence contract Download PDFInfo
- Publication number
- CN109726531A CN109726531A CN201811414424.7A CN201811414424A CN109726531A CN 109726531 A CN109726531 A CN 109726531A CN 201811414424 A CN201811414424 A CN 201811414424A CN 109726531 A CN109726531 A CN 109726531A
- Authority
- CN
- China
- Prior art keywords
- terminal
- marketer
- marketer terminal
- block chain
- intelligence contract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The present invention discloses a kind of marketer terminal security control method based on block chain intelligence contract, marketing network and information security control platform and provides unified external interface by application layer trusted end-user control micro services;Micro services, which are managed, by marketer terminal manages marketer terminal relevant information, and the validity docked into marketer terminal is verified, asynchronous information synchronous service is provided simultaneously to complete the operation of marketer terminal cache information real-time update, can also reinforce the unified management to marketer terminal;Identity authorization system of the invention improves the execution efficiency and response efficiency of whole system with caching technology, improves the overall performance of system;The method of trusted end-user control guarantees that access passes through operation system management module management business system, complete the registration of access service system, the relevant information of operation system and mark are deposited into block chain intelligence contract, single-sign-on scheme is provided for operation system simultaneously, there is good reliability, stability and safety.
Description
Technical field
The present invention relates to field of identity authentication, and in particular to a kind of marketer terminal bursting tube based on block chain intelligence contract
Prosecutor method.
Background technique
With the hair of the information system security events such as " shake net " virus event, Ukraine's power-off event in 2015 in 2010
Raw, Networks and information security situation is extremely severe, and Chinese information security method is formally implemented within 2017, and information security is in State-level
Paid attention to and the guarantee of law, and terminal is information processing system carrier, terminal security control work is to ensure data peace
Entirely, the basis that do not reveal, terminal security control work become more important.
Summary of the invention
To solve deficiency in the prior art, the present invention provides a kind of marketer terminal safety based on block chain intelligence contract
Management-control method, solving marketing data security protection ability in the prior art has technical problem to be hoisted.
In order to achieve the above objectives, the present invention adopts the following technical scheme:
A kind of marketer terminal security control method based on block chain intelligence contract, it is characterised in that: operate according to the following steps:
Step 1: marketer terminal access authentication:
Specific practice is: in marketer terminal trade mark agency or registration APP, marketer terminal trade mark agency or registration APP are according to terminal
Information generates unique identifier, fills in terminal attaching information, is sent to terminal security control micro services, and member's audit to be managed passes through
Afterwards, the permission which obtains operation sales service system or communicate with other terminals;
Step 2: it initiates to log in the request of sales service system:
Specific practice is: being stepped on according to the unique identifier generated in user name, password and step 1 to sales service system initiation
Record request enters to next step when user name, password and unique identifier pass through verifying Shi Caike;
Step 3: Buffering Verifier:
Specific practice is: sales service system query caching service, and judges unique with the presence or absence of requesting terminal in buffer service
Identification code, and if it exists, be then proved to be successful, execute login authentication operation;If it does not exist, then the credible micro services tune of marketer terminal is requested
With the query interface in intelligent contract, newest legitimate request terminal unique identifier, wait-for-response are inquired;
Step 4: unique identifier returns and local cache data updates;
Specific practice is: after micro services that marketer terminal is credible receive the call request of query interface, newest certification being passed through
Marketer terminal unique identifier returns to buffer service, and updates operation to local data cached execution;
Step 5: caching is verified again:
Specific practice is: matching verification is carried out with the terminal buffers service after updating in step 4 again, if it does, then testing
It demonstrate,proves successfully, executes debarkation authentication operation;If authentication failed, return is refused to respond, and normal request process terminates.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned
Prosecutor method: the marketer terminal includes computer terminal and mobile terminal.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned
Prosecutor method: the end message of computer terminal includes IP, MAC Address, unique identifier, terminal location and relevant department.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned
Prosecutor method: the end message of mobile terminal includes IMEI code, MAC Address, unique identifier and relevant department.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned
Prosecutor method: terminal unique identification code authentication includes local authentication and two kinds of remote authentication, and local authentication is to utilize local agency
The method of offer is authenticated, and remote authentication is to call application layer intelligence contract agency service to provide external interface to be authenticated.
As a kind of prioritization scheme of the invention, a kind of marketer terminal bursting tube based on block chain intelligence contract above-mentioned
Prosecutor method: the terminal in step 1 is obtained by acting on behalf of situation deployment or accessing sales service system or other terminals in the form of SDK
Extract operation sales service system or the permission communicated with other terminals.
It invents achieved the utility model has the advantages that the present invention is based on block chain intelligence contract platforms to be realized, utilizes block chain
Technology can not distort and distributed general ledger characteristic, realize the publicity and validity of authentication, it is credible to promote marketer terminal
The management of safe operation of control further promotes marketing data safety assurance work;Identity authorization system fortune of the invention simultaneously
The execution efficiency and response efficiency that whole system is improved with caching technology, improve the overall performance of system;Of the invention
Trusted end-user control micro services provide unified standard interface and general terminal authentication service, from different sales service systems
System carries out seamless link.
Detailed description of the invention
Fig. 1 is flow chart of the invention;
Fig. 2 is architecture diagram of the invention.
Specific embodiment
The invention will be further described below in conjunction with the accompanying drawings.Following embodiment is only used for clearly illustrating the present invention
Technical solution, and not intended to limit the protection scope of the present invention.
Present embodiment discloses a kind of marketer terminal security control methods based on block chain intelligence contract:
As shown in Figure 1: when first time using marketer terminal, need to carry out marketer terminal access authentication: the battalion of the present embodiment first
Pin terminal includes computer terminal and mobile terminal, in marketer terminal trade mark agency or registration APP, marketer terminal trade mark agency or note
Volume APP according to end message generate unique identifier, the end message of computer terminal include IP, MAC Address, unique identifier,
Terminal location and relevant department;The end message of mobile terminal includes IMEI code, MAC Address, unique identifier and relevant department.
It is then filled out terminal attaching information, is sent to terminal security control micro services, after the approval, which obtains behaviour to member to be managed
The permission making sales service system or being communicated with other terminals.Specifically, terminal is to act on behalf of situation deployment or be connect in the form of SDK
Enter sales service system or other terminals, the permission for obtaining operation sales service system or communicating with other terminals.
Sales service personnel initiate to log in the request of sales service system, and before initiating log on request, system can be called automatically
Agency service obtains unique identifier, and log on request not only needs user name, encrypted message, it is also necessary to which the unique code of terminal, which is used as, to be recognized
Parameter is demonstrate,proved, only enters to next step when user name, password and unique identifier pass through verifying Shi Caike.
Then Buffering Verifier: sales service system query caching service is carried out, and judges to whether there is in buffer service and ask
Seek terminal unique identifier, and if it exists, be then proved to be successful, execute login authentication operation;If it does not exist, then request marketer terminal can
Believe that micro services call the query interface in intelligent contract, inquires newest legitimate request terminal unique identifier, wait-for-response;
Terminal unique identification code authentication includes local authentication and two kinds of remote authentication, and local authentication is the side provided using local agency
Method is authenticated, and remote authentication is to call application layer intelligence contract agency service to provide external interface to be authenticated.
Micro services that marketer terminal is credible are receiving after query interface call request, by the newest battalion for authenticating and passing through
Pin terminal unique identifier returns to buffer service, updates behaviour to local data cached execution by asynchronous message Push Service
Make;
Matching verification is carried out with newest terminal buffers service again, if it does, then being proved to be successful, executes debarkation authentication behaviour
Make;If authentication failed, return is refused to respond, and normal request process terminates.
Control micro services that marketer terminal of the invention is credible, first have to carry out is the integrating process of sales service system.
Developer needs to introduce the certification SDK packet of offer in sales service system or calls agency, and in configuration text
The port numbers of operation system service, the configuration information of deployed position are defined in part, system will be certainly after executing registration operation later
It is dynamic to call registration interface be in the credible control micro services of the relevant information marketer terminal of operation system.In provided SDK packet,
It can verify first and recognize the unique identifier of this operation system (unique identifier is to contain the encrypted word of operation system information a string
Symbol string can obtain the operation systems such as port numbers, deployment path and the systematic name of operation system by decrypted authentication code and believe
Breath) it whether there is, later, registration request is initiated by parameter of end message, the intelligent contract method of registration is called, by business system
The information of system is written in operation system table.The result of calling can return to an authentication code character string, be used for this industry of unique identification
Business system.Then operation system can be used for this authentication code write-in configuration file to facilitate subsequent operation again.
It is as shown in Figure 2: following service can be achieved using the present invention:
(1) application layer intelligence contract agency service, the service are divided into the endpoint to register of computer end endpoint to register agency and mobile terminal
APP is acted on behalf of, which is used to encapsulate the call operation of block platform chain intelligence contract, and management access block chain intelligence contract is matched
Function is set, and the information docked into sales service system terminal is packaged;Agency externally provides unified calling interface, with generation
It manages situation deployment or accesses sales service system in the form of SDK, interface abstracts, United design, improves industry battalion
Pin business system integration development efficiency.
Marketer terminal management service, the service management operate the relevant information of sales service system terminal, marketer terminal point
For computer terminal and mobile terminal, computer terminal management includes IP, MAC Address, unique identifier, terminal location, relevant department
Information, mobile terminal administration include unique identifier, IMEI code, MAC Address, relevant department's relevant information, are docked into marketing end
Client information carries out review operation, and docks and carry out validation verification into marketer terminal, and further, it would be desirable to provide marketer terminal statistical report forms
The function of service is directed to each sales service system, it will generates the statistical report form of a marketer terminal, for example account is online
Several statistical functions;
(3) marketer terminal relevant information is pushed to the application layer trusted end-user certification in incognito by cache synchronization service
Business, real-time update marketer terminal cache information;
All certifications can be stored in block chain intelligence by marketer terminal information by control micro services that marketer terminal of the invention is credible
In energy contract, it can not distort and inquiry can be recalled.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the technical principles of the invention, several improvement and deformations can also be made, these improvement and deformations
Also it should be regarded as protection scope of the present invention.
Claims (6)
1. a kind of marketer terminal security control method based on block chain intelligence contract, it is characterised in that: grasp according to the following steps
Make:
Step 1: marketer terminal access authentication:
Specific practice is: in marketer terminal trade mark agency or registration APP, marketer terminal trade mark agency or registration APP are according to terminal
Information generates unique identifier, fills in terminal attaching information, is sent to terminal security control micro services, and member's audit to be managed passes through
Afterwards, the permission which obtains operation sales service system or communicate with other terminals;
Step 2: it initiates to log in the request of sales service system:
Specific practice is: being stepped on according to the unique identifier generated in user name, password and step 1 to sales service system initiation
Record request enters to next step when user name, password and unique identifier pass through verifying Shi Caike;
Step 3: Buffering Verifier:
Specific practice is: sales service system query caching service, and judges unique with the presence or absence of requesting terminal in buffer service
Identification code, and if it exists, be then proved to be successful, execute login authentication operation;If it does not exist, then the credible micro services tune of marketer terminal is requested
With the query interface in intelligent contract, newest legitimate request terminal unique identifier, wait-for-response are inquired;
Step 4: unique identifier returns and local cache data updates;
Specific practice is: after micro services that marketer terminal is credible receive the call request of query interface, newest certification being passed through
Marketer terminal unique identifier returns to buffer service, and updates operation to local data cached execution;
Step 5: caching is verified again:
Specific practice is: matching verification is carried out with the terminal buffers service after updating in step 4 again, if it does, then testing
It demonstrate,proves successfully, executes debarkation authentication operation;If authentication failed, return is refused to respond, and normal request process terminates.
2. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 1, feature
Be: the marketer terminal includes computer terminal and mobile terminal.
3. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 2, feature
Be: the end message of computer terminal includes IP, MAC Address, unique identifier, terminal location and relevant department.
4. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 2, feature
Be: the end message of mobile terminal includes IMEI code, MAC Address, unique identifier and relevant department.
5. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 1, feature
Be: terminal unique identification code authentication includes local authentication and two kinds of remote authentication, and local authentication is mentioned using local agency
The method of confession is authenticated, and remote authentication is to call application layer intelligence contract agency service to provide external interface to be authenticated.
6. a kind of marketer terminal security control method based on block chain intelligence contract according to claim 1, feature
Be: the terminal in step 1 is obtained by acting on behalf of situation deployment or accessing sales service system or other terminals in the form of SDK
Operation sales service system or the permission communicated with other terminals.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811414424.7A CN109726531A (en) | 2018-11-26 | 2018-11-26 | A kind of marketer terminal security control method based on block chain intelligence contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811414424.7A CN109726531A (en) | 2018-11-26 | 2018-11-26 | A kind of marketer terminal security control method based on block chain intelligence contract |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109726531A true CN109726531A (en) | 2019-05-07 |
Family
ID=66295139
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811414424.7A Pending CN109726531A (en) | 2018-11-26 | 2018-11-26 | A kind of marketer terminal security control method based on block chain intelligence contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109726531A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602208A (en) * | 2019-09-12 | 2019-12-20 | 北京笔新互联网科技有限公司 | Distributed micro-service management system and construction method thereof |
CN111310147A (en) * | 2020-03-20 | 2020-06-19 | 符安文 | Distributed internal information platform |
CN111488361A (en) * | 2020-04-17 | 2020-08-04 | 北京中启智源数字信息技术有限责任公司 | Cross report generation method and system |
CN112231122A (en) * | 2020-10-27 | 2021-01-15 | 南京林洋电力科技有限公司 | APP management method based on heterogeneous communication model and oriented to terminal software platform |
CN112307445A (en) * | 2020-09-30 | 2021-02-02 | 深圳百纳维科技有限公司 | Identity management method and device based on block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108173850A (en) * | 2017-12-28 | 2018-06-15 | 杭州趣链科技有限公司 | A kind of identity authorization system and identity identifying method based on block chain intelligence contract |
CN108234515A (en) * | 2018-01-25 | 2018-06-29 | 中国科学院合肥物质科学研究院 | A kind of Self-certified digital identity management system and its method based on intelligent contract |
CN108737348A (en) * | 2017-04-21 | 2018-11-02 | 中国科学院信息工程研究所 | A kind of internet of things equipment access control method of the intelligent contract based on block chain |
CN108737370A (en) * | 2018-04-05 | 2018-11-02 | 西安电子科技大学 | A kind of cross-domain Verification System of Internet of Things based on block chain and method |
CN108833081A (en) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
-
2018
- 2018-11-26 CN CN201811414424.7A patent/CN109726531A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108737348A (en) * | 2017-04-21 | 2018-11-02 | 中国科学院信息工程研究所 | A kind of internet of things equipment access control method of the intelligent contract based on block chain |
CN108173850A (en) * | 2017-12-28 | 2018-06-15 | 杭州趣链科技有限公司 | A kind of identity authorization system and identity identifying method based on block chain intelligence contract |
CN108234515A (en) * | 2018-01-25 | 2018-06-29 | 中国科学院合肥物质科学研究院 | A kind of Self-certified digital identity management system and its method based on intelligent contract |
CN108737370A (en) * | 2018-04-05 | 2018-11-02 | 西安电子科技大学 | A kind of cross-domain Verification System of Internet of Things based on block chain and method |
CN108833081A (en) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602208A (en) * | 2019-09-12 | 2019-12-20 | 北京笔新互联网科技有限公司 | Distributed micro-service management system and construction method thereof |
CN110602208B (en) * | 2019-09-12 | 2022-01-21 | 北京笔新互联网科技有限公司 | Distributed micro-service management system and construction method thereof |
CN111310147A (en) * | 2020-03-20 | 2020-06-19 | 符安文 | Distributed internal information platform |
CN111488361A (en) * | 2020-04-17 | 2020-08-04 | 北京中启智源数字信息技术有限责任公司 | Cross report generation method and system |
CN112307445A (en) * | 2020-09-30 | 2021-02-02 | 深圳百纳维科技有限公司 | Identity management method and device based on block chain |
CN112307445B (en) * | 2020-09-30 | 2021-08-10 | 深圳百纳维科技有限公司 | Identity management method and device based on block chain |
CN112231122A (en) * | 2020-10-27 | 2021-01-15 | 南京林洋电力科技有限公司 | APP management method based on heterogeneous communication model and oriented to terminal software platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108173850B (en) | Identity authentication system and identity authentication method based on block chain intelligent contract | |
CN109726531A (en) | A kind of marketer terminal security control method based on block chain intelligence contract | |
US9124639B2 (en) | Managing command compliance in internetworking devices | |
CN108881308B (en) | User terminal and authentication method, system and medium thereof | |
US20160105410A1 (en) | OMA DM Based Terminal Authentication Method, Terminal and Server | |
CN105357242B (en) | Access the method and system of WLAN, short message pushes platform, gate system | |
JP6337642B2 (en) | Method for securely accessing a network from a personal device, personal device, network server, and access point | |
CN113545018A (en) | Protecting a telecommunications network using network components as blockchain nodes | |
WO2016173199A1 (en) | Mobile application single sign-on method and device | |
CN110266642A (en) | Identity identifying method and server, electronic equipment | |
CN109391612A (en) | A kind of identification confirmation system and method based on block chain | |
CN1997026B (en) | An expansion security authentication method based on 802.1X protocol | |
JP2019510316A (en) | Method and device for providing account linking and service processing | |
CN113221093B (en) | Single sign-on system, method, equipment and product based on block chain | |
CN109040069A (en) | A kind of dissemination method, delivery system and the access method of cloud application program | |
CN106100840A (en) | The permission modification method and device of micro services | |
CN107453872A (en) | A kind of unified safety authentication method and system based on Mesos container cloud platforms | |
US9635017B2 (en) | Computer network security management system and method | |
CN114651424B (en) | Access management for publisher nodes of a secure access MAAS network | |
CN102255904A (en) | Communication network and terminal authentication method thereof | |
CN102624724B (en) | Security gateway and method for securely logging in server by gateway | |
CN109413053B (en) | Method for user state verification in service grid | |
CN114095213B (en) | Network access control policy management system | |
CN101742507B (en) | System and method for accessing Web application site for WAPI terminal | |
CN115242511B (en) | Multi-environment application management platform and management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190507 |
|
RJ01 | Rejection of invention patent application after publication |