CN111698211A - Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain - Google Patents
Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain Download PDFInfo
- Publication number
- CN111698211A CN111698211A CN202010388441.9A CN202010388441A CN111698211A CN 111698211 A CN111698211 A CN 111698211A CN 202010388441 A CN202010388441 A CN 202010388441A CN 111698211 A CN111698211 A CN 111698211A
- Authority
- CN
- China
- Prior art keywords
- file
- user
- unit
- module
- intelligent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Automation & Control Theory (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses an intelligent consensus system based on double pass certificates and suitable for an intellectual property alliance chain, wherein a verification module comprises at least two pass identification units, an intelligent matching component for identifying the identity of a user is arranged on each pass identification unit, and at least two pass cards which are connected in series and used for intercepting the pass are arranged on each intelligent matching component; the sharing module comprises a storage unit, the storage unit is used for sharing the file uploaded by the user on the cloud platform in real time, and the cloud platform is connected with the user terminal through a wireless network; and an output module comprising a display unit; at least two cascade gates on the intelligent matching assembly realize double-pass authentication of user identities, so that the safety and privacy of the system are greatly improved, external risk invasion is effectively blocked, and the sharing module enables devices such as mobile phones, PCs and intelligent watches of the user terminals to use a wireless network to check shared information in real time through the cloud platform.
Description
Technical Field
The invention relates to the technical field of intelligent consensus systems, in particular to an intelligent consensus system based on double certificates and suitable for an intellectual property alliance chain.
Background
The purpose of authentication is to confirm that a user currently claiming to be of some identity is indeed the claimed user. In daily life, authentication is not uncommon; for example, by checking the other party's certificate, we can generally be confident of the identity of the other party.
There are many methods for authentication, which can be basically classified into: shared key based authentication, biometric based authentication, and public key encryption algorithm based authentication. The security of different identity authentication methods is high and low respectively.
At present, most of the existing system verification passes the password verification, and for an intelligent shared common-knowledge system, because a large number of commercial secrets exist, a common verification mode has larger security loopholes, and a system with higher security is urgently needed to be developed.
Therefore, the intelligent consensus system based on double certificates and suitable for the intellectual property alliance chain is provided.
Disclosure of Invention
Based on the defects in the prior art mentioned in the background art, the invention provides an intelligent consensus system based on double certificates and suitable for intellectual property alliance chains.
The invention overcomes the technical problems by adopting the following technical scheme, and specifically comprises the following steps:
an intelligent consensus system based on dual certificates and applicable to intellectual property alliance chains, comprising:
the verification module comprises at least two passage identification units, an intelligent matching assembly for identifying the identity of a user is arranged on each passage identification unit, and at least two pass cards which are connected in series and used for intercepting the passage are arranged on each intelligent matching assembly;
the sharing module comprises a storage unit, the storage unit is used for sharing the file uploaded by the user on the cloud platform in real time, the cloud platform is connected with the user terminal through a wireless network, and the sharing module is used for allowing the user identified by the verification module to upload the file to the cloud platform and/or download the file from the cloud platform;
and the output module comprises a display unit, and the display unit is used for transmitting the file stored in the storage unit in the sharing module to the user terminal in an image-text mode.
As a further scheme of the invention: the verification module further comprises an alarm unit for feeding back the wrong user identity to an administrator, wherein the alarm unit is connected with the intelligent matching assembly and used for sending an alarm signal to the administrator when at least one level intercepts the user identity;
the sharing module is provided with a manager connected with the checkpoint in a single-wire mode, and the manager is used for monitoring an alarm signal by an administrator.
As a still further scheme of the invention: the intelligent matching component is a verification code matching identifier, an image identification module and a password identification module are arranged on the verification code matching identifier, the image identification module is used for identifying the face and/or iris of a user, and the password identification module is used for identifying through a number and/or an alphabet character group;
and a user account number querier is arranged on the verification code pairing identifier and is used for querying the account number identity of the user, including registered and unregistered.
As a still further scheme of the invention: the sharing module further comprises an automatic deleting unit and a compressing unit, the automatic deleting unit is used for deleting the last file with the same name uploaded by the same user, and the compressing unit is used for automatically compressing the file uploaded by the user and then transmitting the file to the storage unit.
As a still further scheme of the invention: the storage unit is provided with a file interceptor, the file interceptor is used for intercepting the initial part of the file at the upper part, the initial part comprises a file name and a head-up part of the file, and the file interceptor is connected with the output module.
As a still further scheme of the invention: the output module also comprises a picture generator which is connected with the file interceptor and is used for converting the file name and the new head intercepted by the file interceptor into a picture form.
As a still further scheme of the invention: the output module is provided with a calling unit, the calling unit is connected with the cloud platform and the storage unit, and the calling unit is used for automatically downloading all contents of the original file from the storage unit through the cloud platform after a user determines the name and the contents of the file through a file interceptor.
Compared with the prior art, the invention has the following advantages: according to the invention, the at least two cascade connection checkpoints on the intelligent matching assembly realize double-pass verification of the user identity, the safety and privacy of the system are greatly improved, and the invasion of external risks is effectively blocked, the sharing module enables equipment such as a mobile phone, a PC (personal computer), an intelligent watch and the like of the user terminal to use a wireless network to check the sharing information in real time through the cloud platform, the sharing information can be retrieved no matter where the sharing information is, the file on the sharing module is briefly introduced to the user through the image-text mode through the display unit on the output module, the file content does not need to be compared one by one, and the checking time of the user is greatly reduced.
Drawings
Fig. 1 is a block diagram of a dual-certification based intelligent consensus system for intellectual property alliance chain.
In the figure: the authentication module 100, the sharing module 200, and the output module 300.
Detailed Description
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Preferred embodiments of the present invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
In addition, an element of the present invention may be said to be "fixed" or "disposed" to another element, either directly on the other element or with intervening elements present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "left," "right," and the like as used herein are for illustrative purposes only and do not represent the only embodiments.
Referring to fig. 1, in an embodiment of the present invention, an intelligent consensus system applicable to an intellectual property alliance chain based on two certificates includes:
the verification module 100 comprises at least two passage identification units, wherein an intelligent matching component for identifying the identity of a user is arranged on each passage identification unit, and at least two pass cards which are connected in series and used for intercepting the passage are arranged on each intelligent matching component; and
the sharing module 200, the sharing module 200 including a storage unit, the storage unit being configured to share a file uploaded by a user in a cloud platform in real time, the cloud platform being connected to a user terminal through a wireless network, the sharing module 200 being configured to allow the user identified by the verification module 100 to upload the file to the cloud platform and/or download the file from the cloud platform; and
the output module 300, the output module 300 includes a display unit, and the display unit is used for sending the file stored in the storage unit of the sharing module 200 to the user terminal in a graphic mode;
the intelligent matching component is used for realizing double-pass authentication of the user identity by utilizing at least two cascade connection checkpoints, the safety and privacy of the system are greatly improved, and external risk invasion is effectively blocked, the sharing module 200 enables devices such as a mobile phone of a user terminal, a PC (personal computer) and an intelligent watch to use a wireless network to check shared information in real time through a cloud platform, the devices can be called anywhere, a display unit on the output module 300 can be used for checking the files on the sharing module 200 for the user profile in a picture and text mode, file content does not need to be checked one by one, and the checking time of the user is greatly reduced.
In an embodiment of the present invention, the verification module 100 further includes an alarm unit for feeding back the wrong user identity to the administrator, wherein the alarm unit is connected to the intelligent matching component and is configured to send a warning signal to the administrator when at least one level intercepts the user identity;
a manager connected with the checkpoint in a single line is arranged on the sharing module 200, and the manager is used for monitoring an alarm signal by an administrator;
when a user without identity breaks into the intelligent matching component and the pass held by the user is not matched with the level, the level sends an alarm signal to the manager, and because at least two levels are connected in series, the user only passes through the intelligent matching component and enters the sharing module 200 when all levels are verified to be passed, so that the safety of the system is greatly improved.
In another embodiment of the present invention, the intelligent matching component is a verification code matching identifier, the verification code matching identifier is provided with an image recognition module and a password recognition module, the image recognition module is used for recognizing the face and/or iris of a user, and the password recognition module is used for recognizing through numbers and/or alphabetic character groups;
a user account number querier is arranged on the verification code pairing identifier and is used for querying the account number identity of the user, including registered and unregistered;
the identity of the user is determined by the user account number querier, and when the user account number is a registered account number, the face and/or iris and the number and/or letter password of the user are identified by the verification code pairing identifier, so that double-pass verification is performed.
In another embodiment of the present invention, the sharing module 200 further includes an automatic deleting unit and a compressing unit, the automatic deleting unit is configured to delete a previous file with the same name uploaded by the same user, and the compressing unit is configured to automatically compress the file uploaded by the user and transmit the compressed file to the storage unit;
the space utilization rate of the storage unit is greatly improved through the automatic deleting unit and the compressing unit, and the phenomenon that repeated files are stored for many times to occupy a large amount of space is avoided.
In another embodiment of the present invention, a file interceptor is disposed on the storage unit, the file interceptor is configured to intercept a beginning portion of the file at the top, the beginning portion includes a file name and a head-up portion of the file, the file interceptor is connected to the output module 300, and the file interceptor is configured to send the file name and the head-up portion to the output module 300, so as to omit transmission of the whole file, facilitate a user to query the file, and intercept the file.
In another embodiment of the present invention, the output module 300 further includes a picture generator, and the picture generator is connected to the file interceptor and is configured to convert the file name and the new header intercepted by the file interceptor into a picture form, so as to avoid generating messy codes during transmission.
In another embodiment of the present invention, the output module 300 is provided with a call unit, the call unit is connected to the cloud platform and the storage unit, and the call unit is configured to automatically download all contents of the original file from the storage unit through the cloud platform after the user determines the file name and the contents through the file interceptor.
The foregoing is merely illustrative of the preferred embodiments of the present invention and is not to be construed as limiting the claims. The present invention is not limited to the above embodiments, and the specific structure thereof is allowed to vary. But all changes which come within the scope of the invention are intended to be embraced therein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
Claims (7)
1. An intelligent consensus system applicable to intellectual property alliance chains based on double certificates, comprising:
the verification module (100) comprises at least two passing identification units, an intelligent matching assembly for identifying the identity of a user is arranged on each passing identification unit, and at least two gates which are connected in series and used for intercepting the passing are arranged on each intelligent matching assembly;
the sharing module (200), the sharing module (200) includes a storage unit, the storage unit is used for sharing files uploaded by users on a cloud platform in real time, the cloud platform is connected with a user terminal through a wireless network, and the sharing module (200) is used for allowing the users identified by the verification module (100) to upload the files to the cloud platform and/or download the files from the cloud platform;
the output module (300) comprises a display unit, and the display unit is used for sending the files stored in the storage unit of the sharing module (200) to a user terminal in an image-text mode.
2. The double-certification-based intelligent consensus system applicable to intellectual property alliance chains as claimed in claim 1, wherein the verification module (100) further comprises an alarm unit for feeding back the wrong user identity to the administrator, wherein the alarm unit is connected to the intelligent matching component and is configured to send an alarm signal to the administrator when at least one level intercepts the user identity;
and a manager connected with the checkpoint by a single line is arranged on the sharing module (200), and the manager is used for monitoring an alarm signal by an administrator.
3. The dual-certification-based intelligent consensus system applicable to intellectual property alliance chains as claimed in claim 1, wherein the intelligent matching component is an authentication code pairing identifier, the authentication code pairing identifier is provided with an image recognition module and a password recognition module, the image recognition module is used for recognizing the face and/or iris of a user, and the password recognition module is used for recognizing through a number and/or an alphabet character group;
and a user account number querier is arranged on the verification code pairing identifier and is used for querying the account number identity of the user, including registered and unregistered.
4. The double-certification-based intelligent consensus system applicable to intellectual property alliance chains according to claim 1, wherein the sharing module (200) further comprises an automatic deleting unit and a compressing unit, the automatic deleting unit is used for deleting a previous file with the same name uploaded by the same user, and the compressing unit is used for automatically compressing the file uploaded by the user and transmitting the compressed file to the storage unit.
5. The double-certification-based intelligent consensus system applicable to intellectual property alliance chain according to claim 1, wherein a file interceptor is disposed on the storage unit, the file interceptor is configured to intercept a beginning portion of the file, the beginning portion includes a file name and a head-up portion of the file, and the file interceptor is connected to the output module (300).
6. The double-certification-based intelligent consensus system applicable to intellectual property alliance chain according to claim 5, wherein the output module (300) further comprises a picture generator, wherein the picture generator is connected to the file interceptor, and is configured to convert the file name and the new head intercepted by the file interceptor into a picture form.
7. The double-license-based intelligent consensus system applicable to intellectual property alliance chains as claimed in claim 5, wherein a calling unit is arranged on the output module (300), the calling unit is connected with the cloud platform and the storage unit, and the calling unit is used for automatically downloading all contents of an original file from the storage unit through the cloud platform after a user determines a file name and contents through a file interceptor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010388441.9A CN111698211A (en) | 2020-05-09 | 2020-05-09 | Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010388441.9A CN111698211A (en) | 2020-05-09 | 2020-05-09 | Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111698211A true CN111698211A (en) | 2020-09-22 |
Family
ID=72477521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010388441.9A Pending CN111698211A (en) | 2020-05-09 | 2020-05-09 | Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111698211A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035090A (en) * | 2006-03-09 | 2007-09-12 | 腾讯科技(深圳)有限公司 | Instant communication method |
CN209435252U (en) * | 2018-11-27 | 2019-09-24 | 南瑞集团有限公司 | A kind of backup verifying network system |
CN110473600A (en) * | 2019-08-19 | 2019-11-19 | 重庆华医康道科技有限公司 | Sharing method and device are reported between a kind of medical institutions based on block chain |
CN111062059A (en) * | 2019-11-06 | 2020-04-24 | 支付宝(杭州)信息技术有限公司 | Method and device for service processing |
-
2020
- 2020-05-09 CN CN202010388441.9A patent/CN111698211A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035090A (en) * | 2006-03-09 | 2007-09-12 | 腾讯科技(深圳)有限公司 | Instant communication method |
CN209435252U (en) * | 2018-11-27 | 2019-09-24 | 南瑞集团有限公司 | A kind of backup verifying network system |
CN110473600A (en) * | 2019-08-19 | 2019-11-19 | 重庆华医康道科技有限公司 | Sharing method and device are reported between a kind of medical institutions based on block chain |
CN111062059A (en) * | 2019-11-06 | 2020-04-24 | 支付宝(杭州)信息技术有限公司 | Method and device for service processing |
Non-Patent Citations (1)
Title |
---|
符艳军等: "结合人脸特征和密码技术的网络身份认证系统", 《计算机应用研究》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107592308B (en) | Double-server multi-factor authentication method oriented to mobile payment scene | |
US20210092228A1 (en) | Method and system for automatically blocking robocalls | |
CN103442061A (en) | Method and system for encrypting cloud server files and cloud server | |
CN104038613B (en) | The method and apparatus of information security management | |
WO2010101476A1 (en) | Method and computer program for generation and verification of otp between server and mobile device using multiple channels | |
CN109618344B (en) | Safe connection method and device of wireless monitoring equipment | |
CN107067516A (en) | Method for unlocking and system and door-locking system | |
CN1997188A (en) | A recognition method of the user identity and its handset | |
CN103096316A (en) | Terminal, network side equipment system and method for authenticating user identification card | |
CN108737094B (en) | Domain password security detection method and related equipment | |
CN103023900A (en) | Identity authentication method, cloud service system and cloud server based on cloud server-side | |
CN105635113A (en) | SDK-based remote service processing method and system | |
CN115632809A (en) | Wind control platform system for intelligently identifying abnormal events based on big data | |
CN101594615B (en) | Method, system and equipment for network management of terminal triple information security | |
CN107995381A (en) | A kind of alarm terminal, high in the clouds and its alarm processing method and storage medium | |
CN108347730A (en) | A kind of wireless communication process method and device | |
CN108322440B (en) | Card reading login method and security login system by using security equipment | |
EP1737201A1 (en) | A method for the safe protecting of the user card | |
CN111698211A (en) | Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain | |
CN106330580A (en) | Method and device for controlling monitoring equipment | |
CN114938465B (en) | Encrypted data transmission method and device based on characteristic sequence | |
DE102012210343A1 (en) | Method and apparatus for transmitting a verification request to an identification module | |
AT&T | behavior.dvi | |
CN108337385A (en) | A kind of system for establishing call connection using safety equipment | |
CN101640591A (en) | Authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200922 |