CN112100178A - Delegation authorization verification method and system - Google Patents

Delegation authorization verification method and system Download PDF

Info

Publication number
CN112100178A
CN112100178A CN202010937142.6A CN202010937142A CN112100178A CN 112100178 A CN112100178 A CN 112100178A CN 202010937142 A CN202010937142 A CN 202010937142A CN 112100178 A CN112100178 A CN 112100178A
Authority
CN
China
Prior art keywords
signature
trustee
transaction
hash value
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010937142.6A
Other languages
Chinese (zh)
Other versions
CN112100178B (en
Inventor
张伦泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010937142.6A priority Critical patent/CN112100178B/en
Publication of CN112100178A publication Critical patent/CN112100178A/en
Application granted granted Critical
Publication of CN112100178B publication Critical patent/CN112100178B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate

Abstract

The application discloses a method and a system for verifying entrusting authorization, wherein the method comprises the following steps: retrieving the specific content of the entrusted transaction sent in advance by the entrusted party according to the received application number provided by the entrusted party; when the trustee signature and the trustee signature carried by the specific content are successfully verified, calculating the description information and the hash value of the obtained trustee authorization validity period of the trustee transaction; retrieving a data item corresponding to the index number of the trusting party from the block chain, wherein the data item is a data item of a trusting transaction which is issued to a trusting and trusting party in the block chain in advance by node equipment of the trusting party; and when the signature of the entrusting party carried by the data item is successfully verified, if the hash value contained in the data item is the same as the calculated hash value, determining that the entrusting transaction is authorized by the entrusting party. According to the method provided by the embodiment of the application, the interests of the principal are prevented from being damaged illegally.

Description

Delegation authorization verification method and system
Technical Field
The application relates to the technical field of block chains, in particular to a delegation authorization verification method and a delegation authorization verification system.
Background
In daily life, the situation that others are entrusted to handle various daily affairs often occurs. For example, the first entrusts the second entrusts the. However, often, due to the fact that an executing party performing business operations, such as a contract partner, a bank, a real estate management center, a business bureau, etc., cannot accurately verify the trusteeship authority of the consignee, cannot determine whether the entrusting party really entrusts the consignee to handle a specific business, and if an unauthorized agent occurs, the consignee is lost.
Therefore, it is necessary to verify the entrusted authority of the entrusted person before the business operation executor actually handles the business operation, so as to ensure that the interests of the client are not unduly impaired.
Disclosure of Invention
Therefore, the application provides a delegation authorization verification method and a delegation authorization verification system, so as to solve the problem that the benefits of a principal are unfairly damaged due to the fact that the delegation authority of a delegate cannot be accurately verified in the prior art.
In order to achieve the above object, a first aspect of the present application provides a delegation authorization verification method, including: retrieving specific contents of the entrusted transaction which is sent to the node equipment by the entrusted party in advance from a preset database according to the received application number provided by the entrusted party, wherein the specific contents of the entrusted transaction at least comprise the application number of the entrusted party, the index number of the entrusted party and the description information of the entrusted transaction; when the trustee signature and the trustee signature carried by the specific content are successfully verified, calculating the description information and the hash value of the obtained trustee authorization validity period of the trustee transaction; retrieving a data item corresponding to the index number of the trusting party from the block chain, wherein the data item is a data item of a trusting transaction which is issued to a trusting and trusting party in the block chain in advance by node equipment of the trusting party; and when the signature of the entrusting party carried by the data item is successfully verified, if the hash value contained in the data item is the same as the calculated hash value, determining that the entrusting transaction is authorized by the entrusting party.
A second aspect of the present application provides a delegation authorization verification method, including: calculating to obtain a first hash value based on the generated description information of the entrusted transaction and the entrusted authorization validity period of the entrusted transaction; allocating an entrustor index number for the entrusted transaction, signing the data item containing the entrustor index number and the first hash value, and issuing the data item signed by the entrustor to a block chain; obtaining specific contents of the entrusted transaction according to the entruster index number, the description information and the entrusted authorization validity period, and signing the specific contents by the entruster to obtain the specific contents signed by the entruster; and sending the specific content signed by the entrusting party to the entrusted party node in a preset file form, wherein the specific content signed by the entrusting party is used for being sent to the executing party node after the entrusted party is signed by the entrusted party node, and the specific content is used for being compared with a hash value of a data item issued to the block chain at the executing party node so as to determine that the entrusting transaction is authorized by the entrusting party.
A third aspect of the present application provides a delegation authorization verification system, including: one or more processors; a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement any of the methods in the embodiments of the present application.
This application has following advantage: according to the delegation authorization verification method of the first aspect and the delegation authorization verification system for executing the delegation authorization verification method of the first aspect in the embodiments of the present application, before actually executing a delegation transaction, the executing node device may calculate a hash value of content received from a delegate, compare the hash value with a signature of the delegate retrieved from a block chain, and determine whether the delegate really gets the delegation of the delegate according to a comparison result, thereby ensuring that the interests of the delegate are protected from being unduly damaged;
according to the delegation authorization verification method of the second aspect and the delegation authorization verification system for executing the delegation authorization verification method of the second aspect in the embodiment of the application, the node device of the delegation party signs the transaction items of the delegation and trustee and then issues the signed transaction items to the block chain, and the signed transaction items of the delegation and trustee are directly sent to the trustee, so that the subsequent corresponding processing of the trustee node and the executive node is performed, and the benefits of the delegation party are prevented from being damaged illegally.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application and not to limit the application.
FIG. 1 is a flow diagram illustrating a delegated authorization verification method according to an embodiment of the present application;
FIG. 2 shows a flow diagram of a delegated authorization verification method of another embodiment of the present application;
FIG. 3 is a schematic diagram illustrating a process flow related to delegation authorization verification applied to a delegate node in an exemplary embodiment of the present application;
FIG. 4 is a flow chart illustrating the process flow associated with delegation authorization verification as applied to a delegate node in exemplary embodiments of the present application;
FIG. 5 is a process flow diagram of an executing node in an exemplary embodiment of the present application;
FIG. 6 is a schematic diagram illustrating an exemplary architecture of a delegated authorization validation mechanism provided in accordance with an embodiment of the present application;
FIG. 7 is a schematic diagram illustrating an architecture of a delegated authorization validation mechanism provided in accordance with another embodiment of the present application;
fig. 8 is a block diagram illustrating an exemplary hardware architecture of a computing device capable of implementing the delegation authorization verification method and apparatus according to embodiments of the application.
Detailed Description
The following detailed description of embodiments of the present application will be made with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present application, are given by way of illustration and explanation only, and are not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For a better understanding of the present application, a delegation authorization verification method and system according to embodiments of the present application will be described in detail below with reference to the accompanying drawings, and it should be noted that these embodiments are not intended to limit the scope of the present disclosure.
Fig. 1 is a flow diagram illustrating a delegated authorization verification method according to an embodiment of the present application. As shown in fig. 1, the delegation authorization verification method in the embodiment of the present application can be applied to an executing node device, and includes the following steps.
S110, according to the received application number provided by the trustee, the specific content of the entrusted affair which is sent to the node equipment by the trustee in advance is searched from the preset database, and the specific content of the entrusted affair at least comprises the application number of the trustee, the index number of the entrustor and the description information of the entrusted affair.
And S120, when the trustee signature and the trustee signature carried by the specific content are verified successfully, calculating the description information and the obtained hash value of the trustee authorization validity period of the trustee transaction.
S130, retrieving a data item corresponding to the index number of the trustee from the block chain, wherein the data item is a data item of a trustee transaction which is issued to a trustee in the block chain in advance by the trustee node equipment.
And S140, when the signature of the entrusting party carried by the data item is successfully verified, if the hash value contained in the data item is the same as the calculated hash value, determining that the entrusting transaction is authorized by the entrusting party.
In the embodiment of the application, the content published to the blockchain adopts the hash value, so that the published content can be verified and does not reveal privacy.
According to the delegation authorization verification method of the embodiment of the application, before actually executing the delegation transaction, the executing node device can calculate the hash value of the content received from the trustee, compare the hash value with the delegation party signature retrieved from the block chain, and determine whether the trustee really gets the delegation of the delegation party according to the comparison result, so that the benefit of the delegation party is prevented from being damaged illegally.
In the embodiment of the present application, the specific content of the delegation transaction may include the principal identity specification information, the trustee identity specification information, and the specific description of the delegation item. In some embodiments, the specific content of the delegated transaction may also be one or more accompanying electronic files, which may include one or more of the following file items in electronic form: documents, pictures, and videos.
In one embodiment, the entrustor signature and the trustee signature carried by the specific content include a first signature, a second signature and a third signature; the first signature is a signature which is carried out on the node equipment of the entrusting party by taking the index number of the entrusting party, the description information and the entrusting authorization validity period of the entrusting transaction as a whole; the second signature is a signature carried out on the application number of the trustee at the node equipment of the trustee, and the third signature is a signature carried out on the index number, the description information and the validity period of the trustee as a whole at the node equipment of the trustee.
In step S120, the step of verifying the truer signature and the trustee signature carried by the specific content may specifically include: s11, verifying the second signature and the third signature according to the real-name authentication information completed by the trustee in the block chain in advance; and verifying the first signature according to real-name authentication information which is completed in the block chain in advance by the client.
In this embodiment, according to real-name authentication information previously completed by the trustee in the block chain, the trustee application number signed individually at the trustee node device and a signature made by the trustee index number, the description information, and the delegation authorization validity period as a whole at the trustee node device are verified.
In one embodiment, if the specific content of the entrusted transaction is accompanied by at least one electronic file, the entrusted party signature and the entrusted party signature carried by the specific content further include a fourth signature and a fifth signature; the fourth signature includes a signature made on each attached electronic file at the entrusting node device, and the fifth signature includes a signature made on each attached electronic file at the entrusting node device.
The step of verifying the trustee signature and the trustee signature carried by the specific content in step S120 may further include: s12, verifying a fifth signature according to real-name authentication information which is completed in the block chain by the trustee in advance; and verifying the fourth signature according to real-name authentication information which is completed in the block chain in advance by the client.
In this embodiment, if an electronic file is attached to the specific content of the entrusted transaction, each attached electronic file is individually verified.
In one embodiment, if the specific content of the entrusting transaction is not accompanied by the electronic file, the entrusting party signature carried by the data item is a sixth signature, and the sixth signature is a signature which is carried out on the entrusting party node device by taking the entrusting party index number and the first hash value as a whole. The first hash value is a hash value obtained by calculating the authorization validity period and the description information as a whole at the node equipment of the client.
The step S140 may specifically include: and S21, if the sixth signature is successfully verified, the hash value obtained by carrying out hash calculation on the authorization validity period and the description information is the same as the first hash value, and the current date is within the authorization validity period, determining that the authorization of the authorization party is passed by the authorization transaction.
In this embodiment, if the specific content of the entrusted transaction is not accompanied by the electronic file, the entruster signature carried by the entruster index number is verified, and the entruster signature carried by the entrusted authorization validity period and the description information of the entrusted transaction as a whole is verified to determine that the entrusted transaction is authorized by the entruster.
In one embodiment, if the specific content of the entrusted transaction is attached with at least one electronic file, the entrustor signature carried by the data item is a seventh signature, and the seventh signature is a signature which is carried out on the entrustor node equipment by taking the entrustor index number, the first hash value and the calculated second hash value as a whole; the second hash value is a hash value of each electronic file obtained by calculating each attached electronic file.
The step S140 may further include: and S22, if the seventh signature is successfully verified, performing hash calculation on the authorization validity period and the description information to obtain a hash value which is the same as the first hash value, and determining that the authorization of the authorization party is passed by the authorization of the authorization transaction if the hash value calculated for each attached electronic file is the same as the second hash value and the current date is within the authorization validity period.
In this embodiment, if the electronic file is attached to the specific content of the entrusted transaction, the entrustor signature carried by each electronic file needs to be verified.
In one embodiment, before step S120, the delegation authorization verification method further includes the following steps.
And S31, if the retrieved specific content contains the authorization validity period, determining the authorization validity period of the authorization transaction as the retrieved authorization validity period.
S32, if the retrieved specific content does not contain the valid period of the delegation authorization, and the delegation transaction has the legal valid period, the valid period of the delegation authorization of the delegation transaction is determined to be the legal valid period.
S33, if the retrieved specific content does not contain the entrusting authorization validity period and the entrusting transaction does not have the legal validity period, the entrusting authorization validity period of the entrusting transaction is determined to be a permanent validity period.
Through the above steps S31-S33, the validity period of the delegation authority of the specific content of the delegation transaction retrieved from the blockchain is verified to ensure that the delegation party really delegates the trustee to handle the specific service, and the delegation authority is in the corresponding authorization message.
According to the delegation authorization verification method of the embodiment of the application, the node equipment of the executive party can accurately verify the delegation authority of the delegate, and the trusteeship of the delegate is ensured to be truly delegated by the delegate, so that the benefit of the delegate is ensured to be prevented from being damaged illegally.
Fig. 2 shows a flow diagram of a delegated authorization verification method according to another embodiment of the present application. As shown in fig. 2, the delegation authorization verification method in the embodiment of the present application may be applied to a node device of a delegation party, and may include the following steps.
S210, calculating to obtain a first hash value based on the generated description information of the entrusted transaction and the entrusted authorization validity period of the entrusted transaction.
S220, assigning a trustee index number for the entrusted transaction, signing the data item containing the trustee index number and the first hash value, and issuing the data item signed by the trustee to a block chain.
And S230, obtaining the specific content of the entrusted transaction according to the entruster index number, the description information and the entrusted authorization validity period, and signing the specific content by the entruster to obtain the specific content signed by the entruster.
And S240, sending the specific content signed by the trustee to the entrusted node in a preset file form.
The specific content signed by the entrusting party is used for being sent to the executing party node after the entrusted party node signs the entrusted party, and the specific content is used for being compared with the hash value of the data item issued to the block chain at the executing party node so as to determine that the entrusting transaction is authorized by the entrusting party.
Through the above steps S210-S240, the entrusting node device can sign the transaction processing transaction processing, the entrusted node device transaction.
In one embodiment, if the specific content of the delegated transaction is accompanied by at least one electronic file, the method further comprises the steps of: and S250, respectively calculating the hash value of each attached electronic file to obtain a second hash value, wherein the second hash value comprises the hash value of each electronic file.
Step S220 may specifically include: and S41, signing the data item containing the truer index number, the first hash value and the second hash value, and issuing the data item signed by the truer to the block chain.
S230 may specifically include: and S42, signing the trustee by taking the index number of the trustee, the description information and the specific content of the trustee authorization validity period as a whole, and signing each attached electronic file by the trustee to obtain the specific content signed by the trustee.
In this embodiment, when calculating the hash value for the electronic file attached to the delegation transaction, it is necessary to calculate the hash value for each electronic file individually, and accordingly, when signing the delegation party for the electronic file attached to the delegation transaction, it is necessary to sign the delegation party for each attached electronic file in sequence.
In one embodiment, if the specific content of the entrusted transaction is accompanied by at least one electronic file, the signature of the specific content signed by the entruster at the entrusted node comprises the following signature items: after the trustee node distributes the trustee application number for the received specific content, the trustee signature is carried out on the application number; the trustee signature which is carried out by taking the trustee index number, the description information and the trustee authorization validity period in the specific content as a whole; and a trusted party signature performed separately for each attached electronic document.
According to the entrusted authorization verification method of the embodiment of the application, the entrustor node equipment can sign and issue the business transaction items of the entrusted and entrusted party into the block chain, sign and directly send the business transaction items of the entrusted and entrusted party to the entrusted party, the entrusted business signed by the entrustor is added with the entrusted party signature and sent to the executing party node by the entrusted party, and therefore before the executing party node executes the entrusted business, the computed hash value of the content of the entrusted business received from the entrusted party is compared with the hash value with the entrusted party signature searched from the block chain, whether the entrusted party really obtains the entrusted party is determined according to the comparison result, and the interests of the entrustor are prevented from being damaged illegally.
For a better understanding of the present application, exemplary delegated authorization verification methods of the present application are described below in conjunction with fig. 3-5. FIG. 3 is a schematic diagram illustrating a process flow related to delegation authorization verification applied to a delegate node in an exemplary embodiment of the present application; FIG. 4 is a flow chart illustrating the process flow associated with delegation authorization verification as applied to a delegate node in exemplary embodiments of the present application; fig. 5 is a schematic processing flow diagram of an executor node in an exemplary embodiment of the present application.
As shown in fig. 3, the process flow related to the delegation authorization verification applied to the delegation party node in the exemplary embodiment of the present application includes the following steps.
S301, generating specific content of the delegation transaction, where the specific content may specifically include a delegation identity description, a trustee identity description, and a detailed description of the delegation item.
In some embodiments, if the entrusted transaction requires the use of an electronic file, the specific content of the entrusted transaction may also be accompanied by a file in electronic form, such as an electronic document, a picture, a video, etc.
S302, taking the consignor identity description, the trustee identity description, the detailed description of the consignment items and the validity period of the consignment authorization as a whole, calculating a hash value as a first hash value.
S303, if the electronic file is attached to the specific content of the entrusted transaction, separately calculating a hash value for each electronic file as a second hash value.
S304, allocating an entrustor index number for the entrusted transaction for subsequent retrieval from the block chain according to the entrustor index number.
S305, the index number of the consignor, the first hash value and the second hash value are taken as a whole, and the consignor signature is carried out and then the result is issued to the block chain.
And S306, directly sending the trustee index number, the trustee identity description, the detailed description of the trustee items, the validity period of the trustee authorization and the attached electronic file signature to the trustee node in an electronic form by the trustee.
In some embodiments, the specific content of the entrusted transaction may also be sent to the entrusted party in other electronic forms, for example, in the form of encrypted e-mail, and the entrusted party index number, the entrusted party identity description, and the specific description of the entrusted item may be signed as a whole, and the attached electronic files may be signed individually by the entrusted party.
Through the above steps S305 to S306, the entrusting node device signs the transaction.
As shown in fig. 4, the process flow related to the delegated authorization verification applied to the trustee node in the exemplary embodiment of the present application includes the following steps.
S401, before actually executing the transaction entrusted by the entruster, a trustee application number is created for the transaction entrusted by the entruster.
S402, signing the trustee application number, the trustee index number of the entrusted affair received from the trustee and the concrete content, and directly sending the concrete content of the entrusted affair with the entrusted party signature to the executive node in an electronic form.
In step S402, the specific content of the entrusted transaction to which the entrusted party signature is added may be sent to the executing node device by way of an e-mail.
Illustratively, the application number generated by the entrusted node device for the current delegated service, the index number assigned to the current delegated service received from the delegating node, and the specific content of the current delegated service received from the delegating node are sent to the executing node device, e.g., in a specified electronic form.
Illustratively, the specific content of the current delegation service includes a delegation identity specification, a delegate identity specification, a specific description of the delegation transaction, and a validity period of the delegation authorization. In one embodiment, the specific content of the current entrusting business may further include an attached electronic file according to the specific requirements of the entrusting matter in the actual application scenario.
And S403, signing the application number of the client independently, signing the client identity description, the trustee identity description and the detailed description of the client as a whole, and signing the attached electronic files one by one.
Through the above steps S401 to S403, the trusted party adds its own signature to the content received from the trusted party and transmits the content to the executing party.
In the application scenario of the embodiment of the present application, the trustee may hold its own identification document, such as an identification card, a passport, a driver's license, etc., to the location of the executing party, and present the identification document and the application number to the executing party, so that the executing party calculates the hash value of the content received from the trustee before actually executing the delegation transaction, and compares the hash value with the signature of the delegating party retrieved from the blockchain, and determines whether the record of the same content can be found on the blockchain according to the comparison result, if so, it indicates that the trustee has obtained the delegation of the delegating party, and at this time, the executing party can execute the business operation requested by the trustee, and ensure that the interests of the delegating party are not damaged by mistake.
As shown in fig. 5, the process flow related to the delegated authorization verification applied to the executing node in the exemplary embodiment of the present application includes the following steps.
S501, according to the application number, the specific content of the entrusted affair sent by the entrusted party in advance is searched locally, and the entrusted party signature are verified respectively.
S502, calculating a hash value for the consignor id description, the consignee id description, the detailed description of the consignment item, and the validity period of the consignment authorization in the specific content to obtain a first hash value, and if an electronic file is attached, calculating the hash value for each attached electronic file individually to obtain a second hash value.
S503, finding the corresponding data item on the block chain book according to the index number of the entrustor, and verifying that the signature of the found data item is the signature of the entrustor.
S504, whether the data items found on the block chain account book are in one-to-one correspondence with the calculated hash values is compared.
S505, it is determined whether the current date is within the delegation authority validity period.
S506, if the data item found on the block chain account book is consistent with the calculated hash value and the current date is within the validity period of the delegation authority, determining that the delegation transaction is authorized by the delegation party.
In some embodiments, a verification result of whether the delegate transaction is authorized by the delegate may be displayed on the screen, for example, if the data item found on the blockchain ledger is consistent with the calculated hash value and the current date is within the delegation authority validity period, "verification pass" is displayed on the screen to prove that the delegate is indeed authorized by the delegate, otherwise, the delegation transaction is refused to be processed, and the benefit of the delegate is protected from improper damage.
In the embodiment of the present application, the trustee, and the executor all complete the real-name authentication on the blockchain, and the embodiment of the present application does not specifically limit the specific process of the trustee, and the executor performing the real-name authentication on the blockchain.
According to the delegation authorization verification method of the embodiment of the application, a delegation party signs and issues description information of a delegation transaction and a hash value of additional information to a block chain, the delegation party signs and directly sends the description information of the delegation transaction and the additional information to a trustee, the trustee adds the signature of the trustee to content received from the delegation party and sends the content to an executive party, the executive party calculates the hash value of the content received from the trustee before actually executing the delegation transaction, the hash value is compared with the hash value with the signature of the delegation party retrieved from the block chain, whether the delegation transaction is actually executed is determined according to a comparison result, and therefore the delegation transaction is determined to be executed under the condition that the trustee really obtains the delegation party, and the interests of a delegation person are prevented from being illegally damaged.
The following describes a delegation authorization verification device according to an embodiment of the present application in detail with reference to the accompanying drawings. Fig. 6 is a schematic structural diagram of a delegation authorization verification device provided according to an embodiment of the present application. As shown in fig. 6, the entrusting authority verifying apparatus includes the following modules.
The transaction content acquiring module 610 is configured to retrieve, from a predetermined database, specific content of a delegation transaction that is sent to the node device in advance by a trustee according to a received application number provided by the trustee, where the specific content of the delegation transaction at least includes the trustee application number, a delegating party index number, and description information of the delegation transaction;
the hash value calculation module 620 is configured to calculate a hash value of the description information and the obtained delegation authorization validity period of the delegation transaction when the delegation party signature and the trusted party signature carried by the specific content are successfully verified;
a blockchain query module 630, configured to retrieve, from the blockchain, a data item corresponding to the entrustor index number, where the data item is a data item of an entrusted transaction issued by an entrustor node device to an entrusted trusted party in the blockchain in advance;
the comparison verification module 640 is configured to, when the signature of the entrusting party carried by the data item is successfully verified, determine that the entrusting transaction is authorized by the entrusting party if the hash value included in the data item is the same as the calculated hash value.
According to the delegation authorization verifying apparatus of the embodiment of the application, the executing node device may calculate the hash value of the content received from the trustee before actually executing the delegation transaction, compare the hash value with the delegation party signature retrieved from the blockchain, and determine whether the trustee really gets the delegation of the delegation party according to the comparison result, thereby ensuring that the benefit of the delegation party is not damaged illegally.
In one embodiment, the entrusting party signature and the entrusted party signature carried by the specific content of the entrusting transaction include a first signature, a second signature and a third signature; the first signature is a signature which is carried out on the node equipment of the entrusting party by taking the index number of the entrusting party, the description information and the entrusting authorization validity period of the entrusting transaction as a whole; the second signature is a signature carried out on the application number of the trustee at the node equipment of the trustee, and the third signature is a signature carried out on the index number, the description information and the validity period of the trustee as a whole at the node equipment of the trustee.
In this embodiment, the hash value calculation module 620 is specifically configured to, when configured to verify the trustee signature and the trustee signature carried by the specific content: verifying the second signature and the third signature according to real-name authentication information which is completed in the block chain by the trustee in advance; and verifying the first signature according to real-name authentication information which is completed in the block chain in advance by the client.
In one embodiment, if the specific content of the entrusted transaction is accompanied by at least one electronic file, the entrusted party signature and the entrusted party signature carried by the specific content further include a fourth signature and a fifth signature; wherein the fourth signature includes a signature made on each attached electronic file at the entrusting node device, and the fifth signature includes a signature made on each attached electronic file at the entrusting node device.
In this embodiment, the hash value calculation module 620 is specifically configured to, when configured to verify the trustee signature and the trustee signature carried by the specific content: verifying the fifth signature according to real-name authentication information which is completed in the block chain by the trustee in advance; and verifying the fourth signature according to real-name authentication information which is completed in the block chain in advance by the client.
In one embodiment, if the specific content of the entrusted transaction is not accompanied by the electronic file, the entrustor signature carried by the data item is a sixth signature, and the sixth signature is a signature which is carried out on the entrustor node equipment by taking the entrustor index number and the first hash value as a whole; the first hash value is obtained by calculating the authorization validity period and the description information as a whole at the node equipment of the consignor; and when the signature of the client carried by the data item is successfully verified, if the hash value contained in the data item is the same as the calculated hash value, the verification is carried out.
In this embodiment, when determining that the delegation transaction is authorized by the delegating party, the comparison verification module 640 is specifically configured to: and if the sixth signature is successfully verified, performing hash calculation on the authorization validity period and the description information to obtain a hash value which is the same as the first hash value, and determining that the authorization of the authorization party is passed by the authorization of the authorization transaction if the current date is within the authorization validity period.
In one embodiment, if the specific content of the entrusted transaction is attached with at least one electronic file, the entrustor signature carried by the data item is a seventh signature, and the seventh signature is a signature which is carried out on the entrustor node equipment by taking the entrustor index number, the first hash value and the calculated second hash value as a whole; the second hash value is a hash value of each electronic file obtained by calculating each attached electronic file.
In an embodiment, the alignment verification module 640 is further configured to: and if the verification of the seventh signature is successful, performing hash calculation on the authorization validity period and the description information to obtain a hash value which is the same as the first hash value, performing corresponding calculation on each attached electronic file to obtain a hash value which is the same as the second hash value, and determining that the authorization of the authorization party is passed by the authorization of the authorization transaction if the current date is within the authorization validity period.
In one embodiment, the delegation authorization verifying device further comprises a delegation authorization validity verifying module, configured to, before verifying a delegation party signature and a trusteeship party signature carried by the specific content, determine, if the retrieved specific content includes a delegation authorization validity, that the delegation authorization validity of the delegation transaction is the retrieved delegation authorization validity; if the retrieved specific content does not contain the entrusting authorization validity period and the entrusting transaction has the legal validity period, determining the entrusting authorization validity period of the entrusting transaction as the legal validity period; and if the retrieved specific content does not contain the entrusting authorization validity period and the entrusting transaction does not have the legal validity period, determining the entrusting authorization validity period of the entrusting transaction as a permanent validity period.
According to the delegation authorization verification device of the embodiment of the application, the node equipment of the executive party can accurately verify the delegation authority of the delegate, and the trusteeship of the delegate is ensured to be truly delegated by the delegate, so that the benefit of the delegate is ensured to be prevented from being damaged illegally.
Fig. 7 is a schematic structural diagram of a delegation authorization verification device provided according to another embodiment of the present application. As shown in fig. 7, the entrusting authority verifying apparatus includes the following modules.
The hash value obtaining module 710 is configured to calculate a first hash value based on the generated description information of the delegated transaction and a delegation authorization validity period of the delegated transaction.
The data item issuing module 720 is configured to allocate a delegator index number to the delegated transaction, perform delegator signature on the data item that includes the delegator index number and the first hash value, and issue the data item that is signed by the delegator to the block chain.
And the trustee signature module 730 is used for obtaining the specific content of the entrusted transaction according to the index number of the trustee, the description information and the entrusted authorization validity period, and performing trustee signature on the specific content to obtain the specific content signed by the trustee.
The signature file sending module 740 is configured to send the specific content signed by the entrusting party to the entrusted party node in a predetermined file form.
In the embodiment of the present application, the specific content signed by the delegator is used for being sent to the executor node after the delegator node performs the delegator signature, and the specific content is used for performing hash value comparison with the data item issued into the blockchain at the executor node, so as to determine that the delegated transaction is authorized by the delegator.
In one embodiment, if the specific content of the delegation transaction is accompanied by at least one electronic file, the hash value calculation module 710 is further configured to: respectively calculating the hash value of each attached electronic file to obtain a second hash value, wherein the second hash value comprises the hash value of each electronic file; the data item publishing module 720 is further configured to perform a principal signature on a data item including the principal index number, the first hash value, and the second hash value, and publish the data item signed by the principal to the blockchain; the trustee signature module 730 is further configured to perform trustee signature on the whole of the index number of the trustee, the description information, and the specific content of the entrusted transaction of the entrusted authorization validity period, and perform trustee signature on each attached electronic file to obtain the specific content signed by the trustee.
In one embodiment, if the specific content of the entrusted transaction is accompanied by at least one electronic file, the signature of the specific content signed by the entruster at the entrusted node comprises the following signature items: after the trustee node distributes the trustee application number for the received specific content, the trustee signature is carried out on the application number; the trustee signature which is carried out by taking the trustee index number, the description information and the trustee authorization validity period in the specific content as a whole; and a trusted party signature performed separately for each attached electronic document.
According to the delegation authorization verifying device of the embodiment of the application, the delegation party node device can sign and issue the items of the delegation and delegate transacting business into the block chain, sign and directly send the items of the delegation and delegate transacting business to the delegate, the delegation business signed by the delegation party adds the signature of the delegate to the delegate and sends the signed entrusted business to the executive party node, thereby before the executive party node executes the delegation business, whether the delegate really obtains the delegation of the delegation party is verified according to the calculated hash value of the content of the delegation business received from the entrusted party and the hash value with the signature of the delegation party searched from the block chain, and the interests of the delegation party are prevented from being damaged illegally.
It should be apparent that the present application is not limited to the particular configurations and processes described in the above embodiments and shown in the figures. For convenience and brevity of description, detailed description of a known method is omitted here, and for the specific working processes of the system, the module and the unit described above, reference may be made to corresponding processes in the foregoing method embodiments, which are not described herein again.
Fig. 8 is a block diagram illustrating an exemplary hardware architecture of a computing device capable of implementing the delegation authorization verification method and apparatus according to embodiments of the application.
As shown in fig. 8, computing device 800 includes an input device 801, an input interface 802, a central processor 803, a memory 804, an output interface 805, and an output device 806. The input interface 802, the central processing unit 803, the memory 804, and the output interface 805 are connected to each other via a bus 810, and the input device 801 and the output device 806 are connected to the bus 810 via the input interface 802 and the output interface 805, respectively, and further connected to other components of the computing device 800.
Specifically, the input device 801 receives input information from the outside, and transmits the input information to the central processor 803 through the input interface 802; the central processor 803 processes input information based on computer-executable instructions stored in the memory 804 to generate output information, temporarily or permanently stores the output information in the memory 804, and then transmits the output information to the output device 806 via the output interface 805; output device 806 outputs output information external to computing device 800 for use by a user.
In one embodiment, the computing device 800 shown in FIG. 8 may be implemented as an executing node device, which may include: a memory configured to store a program; a processor configured to execute the program stored in the memory to execute the delegation authorization verification method applied to the delegation party node device described in the above embodiments.
In one embodiment, computing device 800 shown in fig. 8 may be implemented as a trusted node device that may include: a memory configured to store a program; a processor configured to execute the program stored in the memory to execute the delegation authorization verification method applied to the entrusted-party node device described in the above embodiments.
In one embodiment, the computing device 800 shown in fig. 8 may be implemented as an executing node device that may include: a memory configured to store a program; a processor configured to execute the program stored in the memory to execute the delegation authorization verification method applied to the executor node device described in the above embodiments.
According to an embodiment of the application, the process described above with reference to the flow chart may be implemented as a computer software program. For example, embodiments of the present application include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network, and/or installed from a removable storage medium.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions which, when run on a computer, cause the computer to perform the methods described in the various embodiments above. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk), among others.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present application, and that the present application is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the application, and these changes and modifications are to be considered as the scope of the application.

Claims (10)

1. A delegation authorization verification method is applied to an executing node device, and comprises the following steps:
retrieving specific contents of a delegation transaction which is sent to the node equipment by a trustee in advance from a preset database according to a received application number provided by the trustee, wherein the specific contents of the delegation transaction at least comprise the application number of the trustee, an index number of the trustee and description information of the delegation transaction;
when the trustee signature and the trustee signature carried by the specific content are successfully verified, calculating the description information and the obtained hash value of the trustee authorization validity period of the trustee transaction;
retrieving a data item corresponding to the entrustor index number from the blockchain, wherein the data item is a data item of an entrusted transaction entrusted to the entrusted party and pre-issued to the blockchain by entrustor node equipment;
and when the signature of the entrusting party carried by the data item is successfully verified, if the hash value contained in the data item is the same as the calculated hash value, determining that the entrusting transaction is authorized by the entrusting party.
2. The method of claim 1, wherein the entrustor signature and the trustee signature carried by the specific content comprise a first signature, a second signature and a third signature; wherein,
the first signature is a signature which is carried out on the node equipment of the entrusting party by taking the index number of the entrusting party, the description information and the entrusting authorization validity period of the entrusting transaction as a whole;
the second signature is a signature which is carried out on the application number of the trustee at the node equipment of the trustee, and the third signature is a signature which is carried out on the index number of the trustee, the description information and the validity period of the trustee authorization as a whole at the node equipment of the trustee;
the verifying the trustee signature and the trustee signature carried by the specific content includes:
verifying the second signature and the third signature according to real-name authentication information which is completed by the trustee in a block chain in advance; and verifying the first signature according to real-name authentication information which is completed in a block chain by the consignor in advance.
3. The method according to claim 2, wherein if at least one electronic file is attached to the specific content of the entrusted transaction, the entrustor signature and trustee signature carried by the specific content further include a fourth signature and a fifth signature; wherein,
the fourth signature includes a signature made on each attached electronic file at the entrusting node device, and the fifth signature includes a signature made on each attached electronic file at the entrusting node device;
the verifying the trustee signature and the trustee signature carried by the specific content further includes:
verifying the fifth signature according to real-name authentication information which is completed by the trustee in a block chain in advance; and verifying the fourth signature according to real-name authentication information which is completed in a block chain by the consignor in advance.
4. The method according to claim 1, wherein if the specific content of the entrusted transaction is not accompanied by an electronic file, the entrustor signature carried by the data item is a sixth signature, and the sixth signature is a signature performed on an entrustor node device by taking the entrustor index number and the first hash value as a whole; wherein,
the first hash value is obtained by calculating the authorization validity period of the delegation and the description information as a whole at the node equipment of the delegation party;
when the verification of the signature of the entrusting party carried by the data item is successful, if the hash value contained in the data item is the same as the calculated hash value, determining that the entrusting transaction is authorized by the entrusting party, including:
and if the sixth signature is verified successfully, performing hash calculation on the authorization validity period and the description information to obtain a hash value which is the same as the first hash value, and determining that the authorization of the authorization party is passed by the authorization of the authorization transaction if the current date is within the authorization validity period.
5. The method according to claim 4, wherein if at least one electronic file is attached to the specific content of the entrusted transaction, the entrustor signature carried by the data item is a seventh signature, and the seventh signature is a signature performed by taking the entrustor index number, the first hash value and the calculated second hash value as a whole at an entrustor node device; wherein,
the second hash value is a hash value of each attached electronic file obtained by calculating each electronic file;
when the verification of the signature of the entrusting party carried by the data item is successful, if the hash value contained in the data item is the same as the calculated hash value, determining that the entrusting transaction is authorized by the entrusting party, including:
and if the seventh signature is verified successfully, performing hash calculation on the authorization validity period and the description information to obtain a hash value which is the same as the first hash value, performing hash calculation on each attached electronic file to obtain a hash value which is the same as the second hash value correspondingly, and determining that the authorization of the authorization party is passed by the authorization of the authorization party if the current date is within the authorization validity period.
6. The method of any of claims 1 to 5, wherein prior to verifying the trusted and entrusted signatures carried by the particular content, the method further comprises:
if the retrieved specific content contains the entrusted authorization validity period, determining the entrusted authorization validity period of the entrusted transaction as the retrieved entrusted authorization validity period;
if the retrieved specific content does not contain the entrusting authorization validity period and the entrusting transaction has a legal validity period, determining the entrusting authorization validity period of the entrusting transaction as the legal validity period;
and if the retrieved specific content does not contain the entrusting authorization validity period and the entrusting transaction does not have the legal validity period, determining the entrusting authorization validity period of the entrusting transaction to be a permanent validity period.
7. A delegated authorization verification method, comprising:
calculating to obtain a first hash value based on the generated description information of the entrusted transaction and the entrusted authorization validity period of the entrusted transaction;
assigning a trustee index number to the entrusted transaction, performing trustee signature on the data item containing the trustee index number and the first hash value, and issuing the data item subjected to the trustee signature to a block chain;
obtaining specific content of the entrusted transaction according to the entruster index number, the description information and the entrusted authorization validity period, and signing the specific content by the entruster to obtain the specific content signed by the entruster;
and sending the specific content signed by the entrusting party to a entrusted party node in a preset file form, wherein,
the specific content signed by the delegator is used for being sent to the executive node after the delegator node signs the delegator, and the specific content is used for being compared with the hash value of the data item issued to the block chain at the executive node so as to determine that the delegated transaction is authorized by the delegator.
8. The method of claim 7, wherein if the specific content of the delegated transaction is accompanied by at least one electronic file, the method further comprises:
respectively calculating the hash value of each attached electronic file to obtain a second hash value, wherein the second hash value comprises the hash value of each electronic file;
the signing the data item containing the trustee index number and the first hash value by the trustee and issuing the data item signed by the trustee to the block chain includes:
performing consignor signature on the data item comprising the consignor index number, the first hash value and the second hash value, and issuing the data item subjected to the consignor signature to a block chain;
the obtaining of the specific content of the entrusted transaction according to the entrustor index number, the description information and the entrustment authorization validity period, and performing entrustor signing on the specific content to obtain the specific content signed by the entrustor, including:
and signing the trustee by taking the trustee index number, the description information and the specific content of the trustee transaction with the trustee authorization validity period as a whole, and signing each attached electronic file by the trustee to obtain the specific content signed by the trustee.
9. The method of claim 7, wherein if the specific content of the entrusting transaction is accompanied by at least one electronic file, the signature of the specific content signed by the entrusting party at the entrusted party node comprises the following signature items:
after the trustee node distributes a trustee application number for the received specific content, the trustee signature is carried out on the application number;
signing a trustee by taking the trustee index number, the description information and the trustee authorization validity period in the specific content as a whole;
and a trusted party signature performed separately for each attached electronic document.
10. A delegated authorization validation system comprising a memory and a processor;
the memory is used for storing executable program codes;
the processor is configured to read executable program code stored in the memory to perform the delegated authorization verification method of any of claims 1-6, or any of claims 7-9.
CN202010937142.6A 2020-09-08 2020-09-08 Delegation authorization verification method and system Active CN112100178B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010937142.6A CN112100178B (en) 2020-09-08 2020-09-08 Delegation authorization verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010937142.6A CN112100178B (en) 2020-09-08 2020-09-08 Delegation authorization verification method and system

Publications (2)

Publication Number Publication Date
CN112100178A true CN112100178A (en) 2020-12-18
CN112100178B CN112100178B (en) 2023-05-12

Family

ID=73751808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010937142.6A Active CN112100178B (en) 2020-09-08 2020-09-08 Delegation authorization verification method and system

Country Status (1)

Country Link
CN (1) CN112100178B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023020428A1 (en) * 2021-08-20 2023-02-23 清华大学 Data verification method and apparatus, and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109104396A (en) * 2017-06-21 2018-12-28 上海钜真金融信息服务有限公司 A kind of block chain agent authorization method based on allograph, medium
CN109409122A (en) * 2018-09-13 2019-03-01 远光软件股份有限公司 File memory method and its electronic equipment, storage medium
CN109754267A (en) * 2018-12-29 2019-05-14 百度在线网络技术(北京)有限公司 Brand authorization method, device, equipment and medium based on block chain
KR20190114432A (en) * 2018-03-30 2019-10-10 주식회사 코인플러그 Method for oauth service through blockchain, and terminal and server using the same
CN110457942A (en) * 2018-12-07 2019-11-15 深圳市智税链科技有限公司 To the signature verification method, service node and medium of uplink data block
CN110768967A (en) * 2019-10-11 2020-02-07 支付宝(杭州)信息技术有限公司 Service authorization method, device, equipment and system
CN110958223A (en) * 2019-10-31 2020-04-03 百度在线网络技术(北京)有限公司 Delegation authorization method, device, equipment and medium based on block chain
CN111079157A (en) * 2019-11-21 2020-04-28 山东爱城市网信息技术有限公司 Secret fragmentation trusteeship platform based on block chain, equipment and medium
US10652184B1 (en) * 2019-06-03 2020-05-12 Syniverse Technologies, Llc System and method using blockchain ledger and zero knowledge proof for tokenized communications
CN111314059A (en) * 2018-12-11 2020-06-19 北京沃东天骏信息技术有限公司 Processing method, device and equipment of account authority proxy and readable storage medium
CN111368324A (en) * 2018-12-25 2020-07-03 北京思源政通科技集团有限公司 Credible electronic license platform system based on block chain and authentication method thereof
CN111488596A (en) * 2020-03-30 2020-08-04 腾讯科技(深圳)有限公司 Data processing permission verification method and device, electronic equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109104396A (en) * 2017-06-21 2018-12-28 上海钜真金融信息服务有限公司 A kind of block chain agent authorization method based on allograph, medium
KR20190114432A (en) * 2018-03-30 2019-10-10 주식회사 코인플러그 Method for oauth service through blockchain, and terminal and server using the same
CN109409122A (en) * 2018-09-13 2019-03-01 远光软件股份有限公司 File memory method and its electronic equipment, storage medium
CN110457942A (en) * 2018-12-07 2019-11-15 深圳市智税链科技有限公司 To the signature verification method, service node and medium of uplink data block
CN111314059A (en) * 2018-12-11 2020-06-19 北京沃东天骏信息技术有限公司 Processing method, device and equipment of account authority proxy and readable storage medium
CN111368324A (en) * 2018-12-25 2020-07-03 北京思源政通科技集团有限公司 Credible electronic license platform system based on block chain and authentication method thereof
CN109754267A (en) * 2018-12-29 2019-05-14 百度在线网络技术(北京)有限公司 Brand authorization method, device, equipment and medium based on block chain
US10652184B1 (en) * 2019-06-03 2020-05-12 Syniverse Technologies, Llc System and method using blockchain ledger and zero knowledge proof for tokenized communications
CN110768967A (en) * 2019-10-11 2020-02-07 支付宝(杭州)信息技术有限公司 Service authorization method, device, equipment and system
CN110958223A (en) * 2019-10-31 2020-04-03 百度在线网络技术(北京)有限公司 Delegation authorization method, device, equipment and medium based on block chain
CN111079157A (en) * 2019-11-21 2020-04-28 山东爱城市网信息技术有限公司 Secret fragmentation trusteeship platform based on block chain, equipment and medium
CN111488596A (en) * 2020-03-30 2020-08-04 腾讯科技(深圳)有限公司 Data processing permission verification method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AAFAF OUADDAH 等: "Harnessing the power of blockchain technology to solve IoT security & privacy issues", 《ICC \'17: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING》 *
曹傧 等: "区块链研究综述", 《重庆邮电大学学报(自然科学版)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023020428A1 (en) * 2021-08-20 2023-02-23 清华大学 Data verification method and apparatus, and storage medium

Also Published As

Publication number Publication date
CN112100178B (en) 2023-05-12

Similar Documents

Publication Publication Date Title
CN108810006B (en) Resource access method, device, equipment and storage medium
US10958436B2 (en) Methods contract generator and validation server for access control of contract data in a distributed system with distributed consensus
US20210319132A1 (en) Methods and Devices For Managing User Identity Authentication Data
CN108111314B (en) Method and equipment for generating and verifying digital certificate
CN109690549B (en) Tracking objects across different parties
CN112106324A (en) Methods, computer program products and devices for creating, registering and verifying digitally stamped assets
US11855978B2 (en) Sharing credentials
CN110209691B (en) Data processing method and device
US10810325B2 (en) Method for custody and provenance of digital documentation
RU2740605C1 (en) Method of transmitting user data from trusted party to third party and implementing system thereof
US11769146B1 (en) Blockchain transactional identity verification
CN109992976A (en) Access credentials verification method, device, computer equipment and storage medium
US8799675B2 (en) System and method for electronic certification and authentication of data
US20230403254A1 (en) Decentralized identifier determination by a registry operator or registrar
CN112100178B (en) Delegation authorization verification method and system
JP4527491B2 (en) Content provision system
CN110737920B (en) Digital certificate management and control method, device and registration and audit server
CN112287311A (en) Service implementation method and device based on block chain
KR101876672B1 (en) Digital signature method using block chain and system performing the same
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
CN113642239A (en) Method and system for modeling federated learning
CN112862589A (en) Identity verification method, device and system in financial scene
CN112966309A (en) Service implementation method and device based on block chain
CN111311341A (en) Bill processing method, apparatus and medium
US10271206B2 (en) Methods and systems for securely routing documents through third party infrastructures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant