CN110414268A - Access control method, device, equipment and storage medium - Google Patents

Access control method, device, equipment and storage medium Download PDF

Info

Publication number
CN110414268A
CN110414268A CN201910666952.XA CN201910666952A CN110414268A CN 110414268 A CN110414268 A CN 110414268A CN 201910666952 A CN201910666952 A CN 201910666952A CN 110414268 A CN110414268 A CN 110414268A
Authority
CN
China
Prior art keywords
access authority
authority information
permission
block chain
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910666952.XA
Other languages
Chinese (zh)
Other versions
CN110414268B (en
Inventor
吴皓丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qidi Block Chain Technology Development Co Ltd
Original Assignee
Beijing Qidi Block Chain Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qidi Block Chain Technology Development Co Ltd filed Critical Beijing Qidi Block Chain Technology Development Co Ltd
Priority to CN201910666952.XA priority Critical patent/CN110414268B/en
Publication of CN110414268A publication Critical patent/CN110414268A/en
Application granted granted Critical
Publication of CN110414268B publication Critical patent/CN110414268B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The embodiment of the invention discloses a kind of access control method, device, equipment and storage mediums.This method comprises: identifying the permission of resource request promoter according to the access authority information stored in block chain;Wherein, the access authority information includes: the associated data between user and the associated data and role and permission of role;According to authority recognition as a result, responding the resource request.By being verified according to the access authority information comprising the associated data between user and the associated data and role and permission of role stored in block chain to resource request promoter, to improve the safety of verifying, access authority information centralization is prevented to be tampered when storing, the problem of causing illegal user to carry out unauthorized access or steal resource, improve the safety of resource access.

Description

Access control method, device, equipment and storage medium
Technical field
The present embodiments relate to block chain technical field more particularly to a kind of access control method, device, equipment and deposit Storage media.
Background technique
The right access control (Role-Based Access Control, RBAC) of based role is implemented towards enterprise A kind of effective access control scheme of security strategy.In right access control, role and the addressable resource of user are bound, And user and role bindings, so that it is determined that the resource that user is accessible, user is obtained by becoming the member of appropriate role The permission of these roles simplifies the management of permission.
But change control centered on the right access control of current based role, user, role, the configuration between resource Data are easy to be tampered, and safety is poor.
Summary of the invention
The embodiment of the present invention provides a kind of access control method, device, equipment and storage medium, to improve resource access Safety prevents access authority information to be tampered.
In a first aspect, the embodiment of the invention provides a kind of access control methods, this method comprises:
According to the access authority information stored in block chain, the permission of resource request promoter is identified;Wherein, the access Authority information includes: the associated data between user and the associated data and role and permission of role;
According to authority recognition as a result, responding the resource request.
Second aspect, the embodiment of the invention provides a kind of access control apparatus, which includes:
Authority recognition module, for identifying resource request promoter's according to the access authority information stored in block chain Permission;Wherein, the access authority information includes: the incidence number between user and the associated data and role and permission of role According to;
Respond module, for foundation authority recognition as a result, responding the resource request.
The third aspect, the embodiment of the invention also provides a kind of equipment, which includes:
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes the access control method as described in any in the embodiment of the present invention.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program realizes the access control method as described in any in the embodiment of the present invention when program is executed by processor.
According to the access authority information stored in block chain in the embodiment of the present invention, the power of resource request promoter is identified Limit, access authority information includes: the associated data between user and the associated data and role and permission of role, according to permission Recognition result, resource response request.This programme includes the associated data between user, role, permission based on the storage of block chain Access authority information, so that access authority information has, transparency is high, be difficult to tamper with and public credibility is strong etc.;Meanwhile according to block The permission of the access authority information identification resource request promoter stored in chain, can avoid illegal user and is illegally visited resource The problem of asking or stealing improves the safety of resource access.
Detailed description of the invention
Fig. 1 is the flow chart of one of the embodiment of the present invention one access control method;
Fig. 2 is the flow chart of one of the embodiment of the present invention two access control method;
Fig. 3 is the structural schematic diagram of one of the embodiment of the present invention three access control apparatus;
Fig. 4 is the structural schematic diagram of one of the embodiment of the present invention four equipment.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched State that the specific embodiments are only for explaining the present invention, rather than limitation of the invention.It also should be noted that for the ease of It describes, only the parts related to the present invention are shown rather than entire infrastructure in attached drawing.
Embodiment one
Fig. 1 is the flow chart of one of the embodiment of the present invention one access control method.Access control provided in this embodiment Method processed, which is applicable to access promoter to resource, carries out Authority Verification, the case where to control its access to resource, this method It can specifically be executed by access control apparatus, which can be realized that the device can collect by the mode of software and/or hardware At in the calculating equipment for carrying block chain node, referring to Fig. 1, the method for the embodiment of the present invention is specifically included:
The access authority information stored in step 110, foundation block chain, identifies the permission of resource request promoter;Wherein, Access authority information includes: the associated data between user and the associated data and role and permission of role.
Wherein, resource request promoter can access and initiate the user of resource request to the resource of storage for needs Account.It may include account information and the resource information etc. of resource request promoter in resource request, wherein account information can be with The account information of the system of storage resource is logged in for resource request promoter;Resource information can be for needed for resource request promoter The relevant information of the resource of access, such as resource name, type or address.
For the ease of being managed to resource, in access control based roles, can gather and permission set in user Between establish role set, the corresponding one group of corresponding permission of each of them role, once user be assigned it is appropriate After role, which just possesses all operating rights of this role.Optionally, the association between user and role can be pre-established Associated data between data and role and permission, and in access authority information include the associated data pre-established, it is used for Record resource access authority corresponding to each user.Wherein, the user can be the account for capableing of logging resource storage system Deng the role can be user access resources storage system when institute role, such as operator, administrator, resource look into The person of seeing etc., the permission can access the restrictive condition and range of operation to resource for role.
Specifically, being generally stored in database profession for the storage of access authority information at present, and access authority is believed Breath centralization be stored in database profession, be easy distorted by illegal user, the user and role or role in access authority information and Associated data between permission is once tampered, it will illegal user is caused to obtain the permission of access resource.Therefore, in the present invention In embodiment, access authority information is stored in block chain, and is synchronized in each block chain node, and the storage of decentralization is passed through The safety that can guarantee access authority information, prevents access authority information to be tampered.According to the access money stored in block chain Source information identifies the permission of resource request promoter, accesses so that it is determined that resource request promoter has to which resource Permission, thus improve resource access safety, prevent resource from illegally being stolen.
Optionally, according to the access authority information stored in block chain, the permission of identification resource request promoter be can wrap It includes: according to the identification information of promoter, the identity of promoter being verified;If being verified, stored according in block chain User and role associated data, determine the access role of promoter;According to the pass of the role and permission that are stored in block chain Join data, determines the access authority of promoter.
Wherein, identification information can be the account information etc. of resource request promoter, or resource request promoter Identification information of carrying etc., such as the ID of resource request promoter.Before the permission for determining resource request promoter, need First to the authentication of resource request promoter, to judge whether resource request promoter is to have access authority to the resource of storage User.Illustratively, by the incidence number of the user and role that are stored in the identification information of resource request promoter and block chain The identification information of user in matches, if the user stored in the identification information of resource request promoter and block chain Identification information matches, then illustrates that resource request promoter has the permission of access resource, promoter tests to resource request Card passes through.After authentication passes through, according to the associated data of the user and role that store in block chain, determine that resource request is sent out The corresponding access role of person is played, further according to the associated data of the role and permission stored in block chain, determination and access role phase Corresponding access authority, the as corresponding access authority of resource request promoter.
Step 120, foundation authority recognition are as a result, resource response is requested.
Wherein, authority recognition result can be the corresponding resource access authority of resource request promoter.Specifically, according to power After limit access information determines the corresponding resource access authority of resource request promoter, according to resource access authority respond request person's Resource request makes resource request promoter carry out the permitted access of permission and operation to the resource stored in system.
In the present embodiment, access authority information can be stored in block chain in the form of intelligent contract, can also be with general The form of logical data format is stored in block chain.Optionally, according to the access authority information stored in block chain, resource is identified It can also include: the intelligence for receiving the carrying access authority information that Resource Management node is initiated before the permission for requesting promoter Contract;The intelligent contract for carrying access authority information is stored in block chain.
Wherein, Resource Management node can be the node in block chain network, may not be the section in block chain network Point.If Resource Management node is the node in block chain network, according to the associated data of predetermined user and role with And the associated data of role and permission, intelligent contract is generated, then intelligent contract is transmitted to block chain network, to request block chain Other nodes in network synchronize the intelligence contract;And if then localized nodes are that current block chain generates node, are receiving resource After the intelligent contract for the carrying access authority information that management node is initiated, the intelligence for carrying access authority information can be closed It is about stored in current block, current block can be then sent to other nodes, so that other nodes carry out verifying storage;If Localized nodes are not that current block chain generates node, then can receive current block and generate includes resource management transmitted by node The block of the intelligent contract for the carrying access authority information that node is initiated, and store.
If Resource Management node is not the node in block chain network, Resource Management node can be believed according to access authority Breath generates intelligent contract, can then be sent out intelligent contract by interactive interface (such as client end interface) provided by block chain node It send into block chain network, and then localized nodes can obtain the carrying access right of source control node initiation from block chain network The intelligent contract of limit information is simultaneously stored.
The technical solution of the embodiment of the present invention, according to the access authority information stored in block chain, identification resource request hair The permission of person is played, the access authority information includes: the association between user and the associated data and role and permission of role Data, according to authority recognition as a result, resource response is requested.This programme is based on the storage of block chain comprising between user, role, permission At least one set of associated data access authority information so that access authority information has, transparency is high, is difficult to tamper with and public letter Power is strong etc.;Meanwhile the permission according to the access authority information identification resource request promoter stored in block chain, it can avoid illegal The problem of user carries out unauthorized access or steal to resource, improves the safety of resource access.
Embodiment two
Fig. 2 is the flow chart of one of the embodiment of the present invention two access control method.The present embodiment is in above-described embodiment On the basis of be optimized, and the details not being described in detail in the present embodiment is detailed in above-described embodiment.Referring to fig. 2, this reality Applying the access control method that example provides may include:
Step 210 receives the intelligent contract that Resource Management node is initiated;Wherein intelligent contract includes using hash algorithm pair Access authority information carries out the cryptographic Hash that operation obtains.
Wherein, hash algorithm be the output that the input of random length can be transformed by hashing algorithm regular length Algorithm, such as can be MD4 (Message Digest 4, informative abstract 4) algorithm, MD5 algorithm or SHA serial algorithm etc.. Since the possible information content of access authority information is larger, content is longer, a large amount of memory space can be occupied if direct storage, and send out Taking a long time for journey is passed through, transmitting efficiency is influenced, therefore, in embodiments of the present invention, first using hash algorithm to access authority Information carries out operation, the cryptographic Hash of fixed character length is converted into, thus by the corresponding cryptographic Hash typing of each access authority information Into intelligent contract, so that the occupied space of each access authority information be made only to be the size of a cryptographic Hash, reduce occupancy Memory space.
Intelligent contract is stored in block chain by step 220.
Specifically, will include that the intelligent contract of the corresponding cryptographic Hash of access authority information is stored in block chain, and same Step is into each block chain node, to realize that decentralization stores, to improve the safety of access authority information storage.
Step 230 is called intelligent contract, and must be visited using hash algorithm to the cryptographic Hash progress operation in intelligent contract Ask authority information.
Specifically, needing after localized nodes receive the resource request of resource request promoter according to access authority information It determines the access authority of resource request promoter, therefore, the intelligent contract stored in block chain can be called, according to intelligent contract In include access authority information determine the permission of resource request promoter.Due to being not direct memory access in intelligent contract Authority information, but it is stored with the corresponding cryptographic Hash of access authority information, therefore, using hash algorithm in intelligent contract Cryptographic Hash carries out operation, so that the corresponding access authority information of each cryptographic Hash is obtained, to determine resource according to access authority information Request the access authority of promoter.
Step 240, foundation access authority information, identify the permission of resource request promoter.
Step 250, foundation authority recognition are as a result, resource response is requested.
The technical solution of the embodiment of the present invention carries out access authority information using hash algorithm by Resource Management node The cryptographic Hash that operation obtains, and intelligent contract is initiated according to cryptographic Hash, to make the occupied space of each access authority information only For the size of a cryptographic Hash, the memory space that access authority information occupies is reduced.By the way that intelligent contract is stored in block chain In, and be synchronized in each block chain node, to realize that decentralization stores, to improve the safety of access authority information storage Property.Intelligent contract is called, and operation is carried out to the cryptographic Hash in the intelligent contract using hash algorithm and obtains access authority letter Breath, to determine the access request of resource request promoter, according to access authority information so that resource request promoter is to resource It accesses.
Embodiment three
Fig. 3 is a kind of structural schematic diagram for access control apparatus that the embodiment of the present invention three provides.The device be suitable for pair Resource accesses promoter and carries out Authority Verification, and the case where to control its access to resource, which can be by software and/or hard The mode of part realizes that the device can integrate in the calculating equipment for carrying block chain node.Referring to Fig. 3, the device is specific Include:
Authority recognition module 310, for identifying resource request promoter according to the access authority information stored in block chain Permission;Wherein, the access authority information includes: the association between user and the associated data and role and permission of role Data;
Respond module 320, for foundation authority recognition as a result, resource response is requested.
Optionally, authority recognition module 310, comprising:
Authentication unit verifies the identity of promoter for the identification information according to promoter;
Access authority determination unit is determined and is initiated for the associated data according to the role and permission that store in block chain The access authority of person.
Optionally, above-mentioned apparatus can also include:
Receiving module, for identifying the permission of resource request promoter according to the access authority information stored in block chain Before, the intelligent contract for the carrying access authority information that Resource Management node is initiated is received;
Memory module, for the intelligent contract for carrying access authority information to be stored in block chain.
Optionally, above-mentioned apparatus can also include:
Intelligent contract receiving module, for according to the access authority information stored in block chain, identification resource request to be initiated Before the permission of person, the intelligent contract that Resource Management node is initiated is received;Wherein intelligent contract includes using hash algorithm to visit Ask that authority information carries out the cryptographic Hash that operation obtains;
Intelligent contract memory module, for intelligent contract to be stored in block chain.
Optionally, authority recognition module 310, comprising:
Call unit carries out operation to the cryptographic Hash in intelligent contract for calling intelligent contract, and using hash algorithm Obtain access authority information;
Recognition unit, for identifying the permission of resource request promoter according to access authority information.
The technical solution of the embodiment of the present invention, according to the access authority information stored in block chain, identification resource request hair The permission of person is played, the access authority information includes: the association between user and the associated data and role and permission of role Data, according to authority recognition as a result, resource response is requested.This programme is based on the storage of block chain comprising between user, role, permission At least one set of associated data access authority information so that access authority information has, transparency is high, is difficult to tamper with and public letter Power is strong etc.;Meanwhile the permission according to the access authority information identification resource request promoter stored in block chain, it can avoid illegal The problem of user carries out unauthorized access or steal to resource, improves the safety of resource access.
Example IV
Fig. 4 is a kind of structural schematic diagram for equipment that the embodiment of the present invention four provides.Fig. 4, which is shown, to be suitable for being used to realizing this The block diagram of the example devices 412 of inventive embodiments.The equipment 412 that Fig. 4 is shown is only an example, should not be to of the invention real The function and use scope for applying example bring any restrictions.Optionally, 412 typical case of equipment can be the meter for carrying block chain node Calculate equipment.
As shown in figure 4, equipment 412 is showed in the form of universal computing device.The component of equipment 412 may include but unlimited In one or more processor or processor 416, memory 428, different system components (including memory 428 He is connected Processor 416) bus 418.
Bus 418 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Equipment 412 typically comprises various computing systems readable storage medium storing program for executing.These storage mediums can be any energy Enough usable storage mediums accessed by equipment 412, including volatile and non-volatile storage medium, it is moveable and irremovable Storage medium.
Memory 428 may include the computer system-readable storage medium of form of volatile memory, such as deposit at random Access to memory (RAM) 430 and/or cache memory 432.Equipment 412 may further include other removable/not removable Dynamic, volatile/non-volatile computer system storage medium.Only as an example, storage system 434 can be used for read and write can not Mobile, non-volatile magnetic storage medium (Fig. 4 do not show, commonly referred to as " hard disk drive ").Although not shown in fig 4, may be used To provide the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk "), and it is non-volatile to moving Property CD (such as CD-ROM, DVD-ROM or other optical storage medias) read and write CD drive.In these cases, often A driver can be connected by one or more data storage medium Interface & Bus 418.Memory 428 may include to A few program product, the program product have one group of (for example, at least one) program module, these program modules are configured to Execute the function of various embodiments of the present invention.
Program/utility 440 with one group of (at least one) program module 442, can store in such as memory In 428, such program module 462 includes but is not limited to operating system, one or more application program, other program modules And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 462 Usually execute the function and/or method in embodiment described in the invention.
Equipment 412 can also be logical with one or more external equipments 414 (such as keyboard, sensing equipment, display 426 etc.) Letter, can also be enabled a user to one or more equipment interact with the equipment 412 communicate, and/or with make the equipment 412 Any equipment (such as network interface card, modem etc.) that can be communicated with one or more of the other calculating equipment communicates.This Kind communication can be carried out by input/output (I/O) interface 422.Also, equipment 412 can also by network adapter 420 with One or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.Such as Shown in figure, network adapter 420 is communicated by bus 418 with other modules of equipment 412.It should be understood that although not showing in Fig. 4 Out, other hardware and/or software module can be used with bonding apparatus 412, including but not limited to: microcode, device driver, superfluous Remaining processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processor 416 by other programs in multiple programs for being stored in memory 428 of operation at least one, thus Application and data processing are performed various functions, such as realizes a kind of access control method provided by the embodiment of the present invention, packet It includes:
According to the access authority information stored in block chain, the permission of resource request promoter is identified;Wherein, the access Authority information includes: the associated data between user and the associated data and role and permission of role;According to authority recognition knot Fruit, resource response request.
Embodiment five
The embodiment of the present invention five additionally provides a kind of storage medium comprising computer executable instructions, and the computer can It executes instruction when being executed by computer processor for executing a kind of access control method:
According to the access authority information stored in block chain, the permission of resource request promoter is identified;Wherein, the access Authority information includes: the associated data between user and the associated data and role and permission of role;
According to authority recognition as a result, resource response is requested.
The computer storage medium of the embodiment of the present invention, can be using one or more computer-readable storage mediums Any combination.Computer readable storage medium can be computer-readable signal storage medium or computer-readable storage medium Matter.Computer readable storage medium for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor System, device or device, or any above combination.The more specific example of computer readable storage medium is (non exhaustive List) include: electrical connection with one or more conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc Read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.Of the invention real It applies in example, it includes or the tangible media of storage program that the program can be by that computer readable storage medium, which can be any, Instruction execution system, device or device use or in connection.
Computer-readable signal storage medium may include in a base band or as carrier wave a part propagate data Signal, wherein carrying computer-readable program code.The data-signal of this propagation can take various forms, including but It is not limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal storage medium can also be Any computer readable storage medium other than computer readable storage medium, which can send, It propagates or transmits for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer readable storage medium can be transmitted with any storage medium appropriate, packet Include --- but it is not limited to wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, It further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on remote computer or equipment completely on the remote computer on the user computer.It is relating to And in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or extensively Domain net (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as provided using Internet service Quotient is connected by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. a kind of access control method characterized by comprising
According to the access authority information stored in block chain, the permission of resource request promoter is identified;Wherein, the access authority Information includes: the associated data between user and the associated data and role and permission of role;
According to authority recognition as a result, responding the resource request.
2. the method according to claim 1, wherein being identified according to the access authority information stored in block chain The permission of resource request promoter, comprising:
According to the identification information of promoter, the identity of the promoter is verified;
If being verified, according to the associated data of the user and role that store in block chain, the access of the promoter is determined Role;
According to the associated data of the role and permission that store in block chain, the access authority of the promoter is determined.
3. the method according to claim 1, wherein being identified according to the access authority information stored in block chain Before the permission of resource request promoter, further includes:
Receive the intelligent contract for the carrying access authority information that Resource Management node is initiated;
The intelligent contract for carrying the access authority information is stored in block chain.
4. the method according to claim 1, wherein being identified according to the access authority information stored in block chain Before the permission of resource request promoter, further includes:
Receive the intelligent contract that Resource Management node is initiated;Wherein the intelligent contract includes using hash algorithm to the access Authority information carries out the cryptographic Hash that operation obtains;
The intelligent contract is stored in block chain.
5. according to the method described in claim 4, it is characterized in that, being identified according to the access authority information stored in block chain The permission of resource request promoter, comprising:
The intelligent contract is called, and operation is carried out to the cryptographic Hash in the intelligent contract using hash algorithm and obtains the visit Ask authority information;
According to the access authority information, the permission of resource request promoter is identified.
6. a kind of access control apparatus, which is characterized in that described device includes:
Authority recognition module, for identifying the permission of resource request promoter according to the access authority information stored in block chain; Wherein, the access authority information includes: the associated data between user and the associated data and role and permission of role;
Respond module, for foundation authority recognition as a result, responding the resource request.
7. device according to claim 6, which is characterized in that the authority recognition module, comprising:
Authentication unit verifies the identity of the promoter for the identification information according to promoter;
Access authority determination unit determines the initiation for the associated data according to the role and permission that store in block chain The access authority of person.
8. device according to claim 6, which is characterized in that further include:
Receiving module, the intelligent contract of the carrying access authority information for receiving Resource Management node initiation;
Memory module, for the intelligent contract for carrying the access authority information to be stored in block chain.
9. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real Now such as a kind of access control method as claimed in any one of claims 1 to 5.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor A kind of such as access control method as claimed in any one of claims 1 to 5 is realized when execution.
CN201910666952.XA 2019-07-23 2019-07-23 Access control method, device, equipment and storage medium Active CN110414268B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910666952.XA CN110414268B (en) 2019-07-23 2019-07-23 Access control method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910666952.XA CN110414268B (en) 2019-07-23 2019-07-23 Access control method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110414268A true CN110414268A (en) 2019-11-05
CN110414268B CN110414268B (en) 2022-05-10

Family

ID=68362613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910666952.XA Active CN110414268B (en) 2019-07-23 2019-07-23 Access control method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110414268B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310233A (en) * 2020-03-24 2020-06-19 腾讯科技(深圳)有限公司 Application interface display method, device, equipment and storage medium
CN111597585A (en) * 2020-05-26 2020-08-28 牛津(海南)区块链研究院有限公司 Privacy protection method, system and related components of block chain data
CN111597584A (en) * 2020-05-26 2020-08-28 牛津(海南)区块链研究院有限公司 Privacy protection and data sharing method, device and equipment based on block chain
CN111625866A (en) * 2020-05-28 2020-09-04 广东浪潮大数据研究有限公司 Authority management method, system, equipment and storage medium
CN111797374A (en) * 2020-07-21 2020-10-20 浙江同善人工智能技术有限公司 Supply chain access control system and method based on public chain intelligent contract
CN112118224A (en) * 2020-08-12 2020-12-22 北京大学 Trusted mechanism authority management method and system for big data block chain
CN112215609A (en) * 2020-11-05 2021-01-12 深圳市瀚兰区块链地产有限公司 House property user identity authentication method and device based on super account book and electronic equipment
CN112347435A (en) * 2020-09-27 2021-02-09 北京淇瑀信息科技有限公司 Computer-aided resource delivery management method and platform based on data permission
CN112541640A (en) * 2020-12-22 2021-03-23 平安银行股份有限公司 Resource authority management method and device, electronic equipment and computer storage medium
CN112632575A (en) * 2020-12-22 2021-04-09 平安普惠企业管理有限公司 Authority management method and device of business system, computer equipment and storage medium
CN113452650A (en) * 2020-03-24 2021-09-28 钉钉控股(开曼)有限公司 Access control method, device, equipment and storage medium
CN113612754A (en) * 2021-07-28 2021-11-05 中国科学院深圳先进技术研究院 Cross-domain access method and system based on block chain
CN115102770A (en) * 2022-06-24 2022-09-23 平安普惠企业管理有限公司 Resource access method, device and equipment based on user permission and storage medium
CN115277242A (en) * 2022-08-04 2022-11-01 北京智融云河科技有限公司 Access control method and device for digital object
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751256A (en) * 2013-12-25 2015-07-01 技嘉科技股份有限公司 Method and system for message structuralization
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN107480555A (en) * 2017-08-01 2017-12-15 中国联合网络通信集团有限公司 Database-access rights control method and equipment based on block chain
CN108023894A (en) * 2017-12-18 2018-05-11 苏州优千网络科技有限公司 Visa information system and its processing method based on block chain
US20180225008A1 (en) * 2015-07-09 2018-08-09 Sensoriant, Inc. Method and System for Creating Adaptive User Interfaces Using User Provided and Controlled Data
CN108632268A (en) * 2018-04-28 2018-10-09 腾讯科技(深圳)有限公司 The method for authenticating and device, storage medium, electronic device that block chain accesses
CN108737348A (en) * 2017-04-21 2018-11-02 中国科学院信息工程研究所 A kind of internet of things equipment access control method of the intelligent contract based on block chain
CN108768988A (en) * 2018-05-17 2018-11-06 深圳前海微众银行股份有限公司 Block chain access control method, equipment and computer readable storage medium
CN109391612A (en) * 2018-08-17 2019-02-26 杭州微链区块链科技有限公司 A kind of identification confirmation system and method based on block chain
US20190102423A1 (en) * 2017-09-29 2019-04-04 Oracle International Corporation System and method for providing an interface for a blockchain cloud service
CN109714348A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Permission processing method, device, equipment and the medium realized based on block chain
WO2019125081A1 (en) * 2017-12-21 2019-06-27 문인식 System for granting one-time access rights using blockchain
CN110032865A (en) * 2019-03-28 2019-07-19 腾讯科技(深圳)有限公司 A kind of right management method, device and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751256A (en) * 2013-12-25 2015-07-01 技嘉科技股份有限公司 Method and system for message structuralization
US20180225008A1 (en) * 2015-07-09 2018-08-09 Sensoriant, Inc. Method and System for Creating Adaptive User Interfaces Using User Provided and Controlled Data
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
CN108737348A (en) * 2017-04-21 2018-11-02 中国科学院信息工程研究所 A kind of internet of things equipment access control method of the intelligent contract based on block chain
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN107480555A (en) * 2017-08-01 2017-12-15 中国联合网络通信集团有限公司 Database-access rights control method and equipment based on block chain
US20190102423A1 (en) * 2017-09-29 2019-04-04 Oracle International Corporation System and method for providing an interface for a blockchain cloud service
CN108023894A (en) * 2017-12-18 2018-05-11 苏州优千网络科技有限公司 Visa information system and its processing method based on block chain
WO2019125081A1 (en) * 2017-12-21 2019-06-27 문인식 System for granting one-time access rights using blockchain
CN108632268A (en) * 2018-04-28 2018-10-09 腾讯科技(深圳)有限公司 The method for authenticating and device, storage medium, electronic device that block chain accesses
CN108768988A (en) * 2018-05-17 2018-11-06 深圳前海微众银行股份有限公司 Block chain access control method, equipment and computer readable storage medium
CN109391612A (en) * 2018-08-17 2019-02-26 杭州微链区块链科技有限公司 A kind of identification confirmation system and method based on block chain
CN109714348A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Permission processing method, device, equipment and the medium realized based on block chain
CN110032865A (en) * 2019-03-28 2019-07-19 腾讯科技(深圳)有限公司 A kind of right management method, device and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李宏卓: "基于区块链技术的信息资源目录体系研究与设计", 《中国优秀硕士学位论文全文数据库社会科学I辑》 *
谷利泽 等: "《现代密码学教程(第2版)》", 31 March 2015, 北京邮电大学出版社 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113452650A (en) * 2020-03-24 2021-09-28 钉钉控股(开曼)有限公司 Access control method, device, equipment and storage medium
CN111310233A (en) * 2020-03-24 2020-06-19 腾讯科技(深圳)有限公司 Application interface display method, device, equipment and storage medium
CN113452650B (en) * 2020-03-24 2023-04-07 钉钉控股(开曼)有限公司 Access control method, device, equipment and storage medium
CN111597585A (en) * 2020-05-26 2020-08-28 牛津(海南)区块链研究院有限公司 Privacy protection method, system and related components of block chain data
CN111597584A (en) * 2020-05-26 2020-08-28 牛津(海南)区块链研究院有限公司 Privacy protection and data sharing method, device and equipment based on block chain
CN111597584B (en) * 2020-05-26 2023-12-19 牛津(海南)区块链研究院有限公司 Privacy protection and data sharing method, device and equipment based on blockchain
CN111597585B (en) * 2020-05-26 2023-08-11 牛津(海南)区块链研究院有限公司 Privacy protection method, system and related components of blockchain data
CN111625866A (en) * 2020-05-28 2020-09-04 广东浪潮大数据研究有限公司 Authority management method, system, equipment and storage medium
CN111625866B (en) * 2020-05-28 2024-04-19 广东浪潮大数据研究有限公司 Authority management method, system, equipment and storage medium
CN111797374B (en) * 2020-07-21 2023-06-06 浙江同善人工智能技术有限公司 Supply chain access control system and method based on public chain intelligent contract
CN111797374A (en) * 2020-07-21 2020-10-20 浙江同善人工智能技术有限公司 Supply chain access control system and method based on public chain intelligent contract
CN112118224B (en) * 2020-08-12 2021-07-23 北京大学 Trusted mechanism authority management method and system for big data block chain
CN112118224A (en) * 2020-08-12 2020-12-22 北京大学 Trusted mechanism authority management method and system for big data block chain
CN112347435A (en) * 2020-09-27 2021-02-09 北京淇瑀信息科技有限公司 Computer-aided resource delivery management method and platform based on data permission
CN112215609B (en) * 2020-11-05 2021-09-21 深圳市瀚兰区块链地产有限公司 House property user identity authentication method and device based on super account book and electronic equipment
CN112215609A (en) * 2020-11-05 2021-01-12 深圳市瀚兰区块链地产有限公司 House property user identity authentication method and device based on super account book and electronic equipment
CN112632575A (en) * 2020-12-22 2021-04-09 平安普惠企业管理有限公司 Authority management method and device of business system, computer equipment and storage medium
CN112541640A (en) * 2020-12-22 2021-03-23 平安银行股份有限公司 Resource authority management method and device, electronic equipment and computer storage medium
CN113612754A (en) * 2021-07-28 2021-11-05 中国科学院深圳先进技术研究院 Cross-domain access method and system based on block chain
WO2023004889A1 (en) * 2021-07-28 2023-02-02 中国科学院深圳先进技术研究院 Blockchain-based method and system for cross-domain access
CN115102770A (en) * 2022-06-24 2022-09-23 平安普惠企业管理有限公司 Resource access method, device and equipment based on user permission and storage medium
CN115277242A (en) * 2022-08-04 2022-11-01 北京智融云河科技有限公司 Access control method and device for digital object
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain
CN116684207B (en) * 2023-08-03 2023-10-20 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Also Published As

Publication number Publication date
CN110414268B (en) 2022-05-10

Similar Documents

Publication Publication Date Title
CN110414268A (en) Access control method, device, equipment and storage medium
CN106991298B (en) Access method of application program to interface, authorization request method and device
CN106063218B (en) The methods, devices and systems of encryption and decryption in virtualization system
CN104506487B (en) The credible execution method of privacy policy under cloud environment
CN114726643A (en) Data storage and access method and device on cloud platform
CN109995523B (en) Activation code management method and device and activation code generation method and device
CN106341234A (en) Authorization method and device
CN110555293A (en) Method, apparatus, electronic device and computer readable medium for protecting data
CN110324416B (en) Download path tracking method, device, server, terminal and medium
CN110300125A (en) API Access control method and API Access agent apparatus
CN110324358B (en) Video data management and control authentication method, module, equipment and platform
CN110430051A (en) A kind of method for storing cipher key, device and server
CN111200593A (en) Application login method and device and electronic equipment
CN110070360B (en) Transaction request processing method, device, equipment and storage medium
CN115580413A (en) Zero-trust multi-party data fusion calculation method and device
CN115102744A (en) Data access method and device
CN109522683A (en) Software source tracing method, system, computer equipment and storage medium
CN110543775A (en) data security protection method and system based on super-fusion concept
CN109711178A (en) A kind of storage method of key-value pair, device, equipment and storage medium
CN109685507A (en) The identification of transactions requests validity and initiating method, device, equipment and medium
CN110008186A (en) For file management method, device, terminal and the medium of more ftp data sources
US11526633B2 (en) Media exfiltration prevention system
CN112800004B (en) License plate algorithm library control method, device, equipment and medium
CN109802927A (en) A kind of security service providing method and device
WO2020228564A1 (en) Application service method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant