CN112948811A - Block chain-based user authorization information processing method, device, medium and system - Google Patents

Block chain-based user authorization information processing method, device, medium and system Download PDF

Info

Publication number
CN112948811A
CN112948811A CN202110240171.1A CN202110240171A CN112948811A CN 112948811 A CN112948811 A CN 112948811A CN 202110240171 A CN202110240171 A CN 202110240171A CN 112948811 A CN112948811 A CN 112948811A
Authority
CN
China
Prior art keywords
user authorization
authorization information
management
user
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110240171.1A
Other languages
Chinese (zh)
Inventor
黄富伟
彭志卫
许飘
陈文凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Dongxin Yitong Technology Co ltd
Original Assignee
Shenzhen Dongxin Yitong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Dongxin Yitong Technology Co ltd filed Critical Shenzhen Dongxin Yitong Technology Co ltd
Priority to CN202110240171.1A priority Critical patent/CN112948811A/en
Publication of CN112948811A publication Critical patent/CN112948811A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the disclosure provides a method, a device, a medium and a system for processing user authorization information based on a block chain, which belong to the technical field of data processing, and specifically comprise the following steps: managing block chain link points; managing user authorization information; the user authorization information data is managed synchronously in a grading way, and the data of user authorization information management departments in different grades is synchronously acquired; and (4) authorization management, namely establishing an authorization management mechanism, and providing information of a corresponding inquiring and practical main body after authorization. By the scheme, the user authorization information block chain is constructed, and the requirements of tamper resistance, traceability and reliable storage of the user authorization information are met. The method supports the service application of the supervision department, realizes the deep fusion of the user authorization information system and the service compliance operation, realizes the one-point change full-chain sensing, full-chain synchronization and full-chain recording of the user authorization information management, and improves the processing efficiency and the safety because different users can only operate limited data.

Description

Block chain-based user authorization information processing method, device, medium and system
Technical Field
The embodiment of the disclosure relates to the technical field of data processing, and in particular, to a method, device, medium, and system for processing user authorization information based on a block chain.
Background
At present, in the mobile communication industry, the credit bureau and the pipe bureau are always not well defined, whether an enterprise user obtains the authorization of a personal terminal user or not and whether the enterprise user complains about the approval or not are problems. In the related art, the method of tracing to source and canceling has three common processing modes, wherein the first mode is that an enterprise carries out number reporting and enterprise use reporting in advance to the Ministry of industry and communications, and the mode is only limited to pre-reporting; secondly, complaints are issued by a pipe passing bureau every day, and the processing method is only limited to that enterprises submit the verification and marketing materials afterwards; in any way, the user authorization material and the verification and cancellation process are influenced by factors such as the stealing of enterprise users, slow processing flow, distortion of enterprise submitted verification and cancellation materials, incapability of final tracing and the like, and inconvenience is brought to the compliance management and virtuous circle of the whole communication industry.
Therefore, a safe and efficient user authorization information processing method based on the block chain is needed.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a method, an apparatus, a medium, and a system for processing user authorization information based on a block chain, which at least partially solve the problems of poor processing efficiency and poor security in the prior art.
In a first aspect, an embodiment of the present disclosure provides a method for processing user authorization information based on a block chain, including:
managing the block chain nodes, managing areas, processing service requests and managing block chain accounts;
user authorization link management, namely transacting user authorization information supervision gate node link-in service, user authorization information management service and authority management service on line, and managing the user authorization information supervision gate node link-in service, the user authorization information management service and the authority management service;
the method comprises the steps of managing user authorization information, managing the full life cycle of the user authorization information, ensuring the consistency of user authorization information data, and providing an independent isolation environment for the user authorization information data, wherein the user authorization information is an automatically executable code stored in a block chain;
the user authorization information data is managed synchronously in a grading way, and the data of user authorization information management departments in different grades is synchronously acquired;
and (4) authorization management, namely establishing an authorization management mechanism, and providing information of a corresponding inquiring and practical main body after authorization.
According to a specific implementation mode of the embodiment of the disclosure, the method further comprises the step of inquiring user authorization information data, wherein the related user authorization information data are inquired for government departments, enterprises and third parties authorized by the enterprises according to user authorization information subject names, legal names, industrial and commercial registration numbers, organization and organization codes and unified social credit codes;
the method also comprises accessing records, automatically recording the access information of the system in real time, storing the access logs in all nodes on a block chain, inquiring the logs of each node according to the authority, managing the access record writing rules, and labeling and storing the data access records according to the use of the user inquiry data;
the system also comprises service system access management which supports service system access of all levels of government departments and comprises access of a credit data providing system and access of a user authorization information data application system;
and the method also comprises the step of authorizing third-party query, and supporting the user to authorize the third-party user to query the related user authorization information data.
According to a specific implementation manner of the embodiment of the present disclosure, in the step of managing the block chain nodes, the management area includes adding and deactivating management block nodes, and each node of the block chain stores the same information;
the step of hierarchical synchronous management of the user authorization information data comprises the following steps:
managing the synchronization rules, namely newly building, deleting or modifying the synchronization rules;
synchronizing task management, namely performing new creation, deletion, modification, starting or stopping on a task;
monitoring a synchronous task, monitoring the execution condition of the synchronous task, and finding an abnormal condition;
and log management is synchronized, and the log is inquired and exported.
According to a specific implementation manner of the embodiment of the present disclosure, the step of managing the user authorization link further includes transacting the system access related service online.
In a second aspect, an embodiment of the present disclosure further provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method for processing user authorization information based on blockchains in any implementation manner of the first aspect or the first aspect.
In a third aspect, the disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the method for processing user authorization information based on a block chain in any implementation manner of the foregoing first aspect or first aspect.
In a fourth aspect, an embodiment of the present disclosure further provides a system for processing user authorization information based on a block chain, including:
the system comprises a block link point management module, a user authorization link management module, a user authorization information data grading synchronous management module and an authorization management module; wherein the content of the first and second substances,
the block chain link point management module is used for managing regions, processing service requests and managing block chain accounts;
the user authorization link management module is used for handling user authorization information supervision gate node link-in service, user authorization information management service and authority management service on line and managing the user authorization information supervision gate node link-in service, the user authorization information management service and the authority management service;
the user authorization information management module is used for managing the full life cycle of user authorization information, ensuring the consistency of user authorization information data and providing an independent isolation environment for the user authorization information, wherein the user authorization information is an automatically executable code stored in a block chain;
the user authorization information data grading synchronous management module is used for synchronously acquiring data of user authorization information management departments at different levels;
the authorization management module is used for establishing an authorization management mechanism and providing information of a corresponding inquiring and practical main body after authorization.
According to a specific implementation manner of the embodiment of the disclosure, the system further comprises a user authorization information data query module, an access recording module, a service system access management module and an authorization third party query module;
the user authorization information data query module is used for supporting a government department, an enterprise and a third party authorized by the enterprise to query relevant credit data according to the name of a user authorization information main body, the name of a legal person, a business registration number, an organization code and a unified social credit code;
the access recording module is used for automatically recording access information of the system in real time, storing access logs in all nodes on a block chain, inquiring own logs of each node according to authority, managing access record writing rules, and labeling and storing data access records according to the purpose of user query data;
the business system access management is used for supporting business system access of all levels of government departments, and comprises user authorization information data providing system access and user authorization information data application system access;
the authorized third-party query module is used for supporting the user to authorize the third-party user to query the related user authorization information data.
According to a specific implementation manner of the embodiment of the present disclosure, the management area includes addition and deactivation of management block nodes, and each node of the block chain stores the same information;
the user authorization information data grading synchronization management module comprises a synchronization rule management module, a synchronization task monitoring module and a synchronization log management module; wherein the content of the first and second substances,
the synchronization rule management module is used for newly building, deleting or modifying the synchronization rule;
the synchronous task management module is used for creating, deleting, modifying, starting or stopping a task;
the synchronous task monitoring module is used for monitoring the execution condition of the synchronous task and finding an abnormal condition;
the synchronous log management module is used for inquiring and exporting the log;
the authorization management module is used for establishing an authorization management mechanism and providing information of a corresponding inquiring and practical main body after authorization.
According to a specific implementation manner of the embodiment of the disclosure, the user authorization link management module is used for handling system access related services on line.
In a fifth aspect, the disclosed embodiments also provide a computer program product, which includes a computer program stored on a non-transitory computer-readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer is caused to execute the method for processing user authorization information based on a block chain in the foregoing first aspect or any implementation manner of the first aspect.
The scheme for processing the user authorization information based on the block chain in the embodiment of the disclosure comprises the following steps: managing the block chain nodes, managing areas, processing service requests and managing block chain accounts; managing user authorization information, transacting user authorization information supervision node in-chain service, user authorization information management service and authority management service on line, and managing the user authorization information supervision node in-chain service, the user authorization information management service and the authority management service; the method comprises the steps of managing user authorization information, managing the full life cycle of the user authorization information, ensuring the consistency of user authorization information data, and providing an independent isolation environment for the user authorization information data, wherein the user authorization information is an automatically executable code stored in a block chain; the user authorization information data is managed synchronously in a grading way, and the data of user authorization information management departments in different grades is synchronously acquired; and (4) authorization management, namely establishing an authorization management mechanism, and providing information of a corresponding inquiring and practical main body after authorization. By the scheme, the user authorization information block chain is constructed, and the requirements of tamper resistance, traceability and reliable storage of the user authorization information are met. The method supports the service application of the supervision department, realizes the deep fusion of the user authorization information system and the service compliance operation, realizes the one-point change full-chain sensing, full-chain synchronization and full-chain recording of the user authorization information management, and improves the processing efficiency and the safety because different users can only operate limited data.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for processing user authorization information based on a block chain according to an embodiment of the present disclosure;
fig. 2 is a partial schematic flow chart of another block chain-based user authorization information processing method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a user authorization information processing system based on a block chain according to an embodiment of the present disclosure;
fig. 4 is a schematic view of an electronic device provided in an embodiment of the present disclosure.
Detailed Description
The embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
The embodiments of the present disclosure are described below with specific examples, and other advantages and effects of the present disclosure will be readily apparent to those skilled in the art from the disclosure in the specification. It is to be understood that the described embodiments are merely illustrative of some, and not restrictive, of the embodiments of the disclosure. The disclosure may be embodied or carried out in various other specific embodiments, and various modifications and changes may be made in the details within the description without departing from the spirit of the disclosure. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present disclosure, and the drawings only show the components related to the present disclosure rather than the number, shape and size of the components in actual implementation, and the type, amount and ratio of the components in actual implementation may be changed arbitrarily, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
At present, in the mobile communication industry, the credit bureau and the pipe bureau are always not well defined, whether an enterprise user obtains the authorization of a personal terminal user or not and whether the enterprise user complains about the approval or not are problems. In the related art, the method of tracing to source and canceling has three common processing modes, wherein the first mode is that an enterprise carries out number reporting and enterprise use reporting in advance to the Ministry of industry and communications, and the mode is only limited to pre-reporting; secondly, complaints are issued by a pipe passing bureau every day, and the processing method is only limited to that enterprises submit the verification and marketing materials afterwards; in any way, the user authorization material and the verification and cancellation process are influenced by factors such as the stealing of enterprise users, slow processing flow, distortion of enterprise submitted verification and cancellation materials, incapability of final tracing and the like, and inconvenience is brought to the compliance management and virtuous circle of the whole communication industry. The embodiment of the disclosure provides a user authorization information processing method based on a block chain, which can be applied to an authorization information tracing process in a mobile communication scene.
Referring to fig. 1, a schematic flowchart of a method for processing user authorization information based on a block chain according to an embodiment of the present disclosure is shown. As shown in fig. 1, the method mainly comprises the following steps:
s101, managing block chain nodes, managing areas, processing service requests and managing block chain accounts;
in specific implementation, the blockchain node may include a management node and a common node, where the management node manages and processes different blocks, the common node is configured to process a service request and manage a blockchain account book, and information stored in each node is the same, so that each node can independently operate and can also realize mutual supervision, thereby preventing information from being tampered, and certainly, security can be improved by adding more nodes.
S102, managing user authorization links, handling user authorization information supervision gate node chaining-in service, user authorization information management service and authority management service on line, and managing the user authorization information supervision gate node chaining-in service, the user authorization information management service and the authority management service;
for example, when an enterprise user acquires individual user authorization information, a user number, a call, an enterprise name, an authorization number, a source IP, terminal device information, and an authorization protocol are acquired through the blockchain acquisition sdk, before the enterprise user dials a terminal phone, a blockchain node address is acquired and the terminal phone authorization information is uploaded, and then the blockchain operation platform performs anti-counterfeiting identification and wind control information analysis on user authorization data according to the node information. And when the pipe management office and the message management office receive the complaint of the terminal user, acquiring the authenticity verification of the user authorization information according to the calling number and the called number.
S103, managing user authorization information, managing the full life cycle of the user authorization information, ensuring the consistency of user authorization information data, and providing an independent isolation environment for the user authorization information data, wherein the user authorization information is an automatically executable code stored in a block chain;
when the user applies for authorization, the authorization information of each user can be recorded and managed after the user authorizes, the full life cycle of the authorization information of the user is managed, the consistency of the authorization information data of the user is guaranteed, an independent isolation environment is provided for the authorization information data of the user, the authorization information of the user is automatically executable codes stored in a block chain, so that the stored data cannot be controlled and tampered, and the response efficiency during subsequent query traceability is facilitated.
S104, carrying out hierarchical synchronous management on the user authorization information data, and synchronously acquiring data of user authorization information management departments at different levels;
in specific implementation, the user authorization information can be classified, then the classified information is synchronously managed, and data of user authorization information management departments in different levels are synchronously acquired.
S105, authorization management, establishing an authorization management mechanism, and providing information of the corresponding inquiring and practical main body after authorization.
For example, after acquiring a user number, a name, an enterprise name, an authorization number, a source IP, terminal equipment information and an authorization protocol, the access information of the system is automatically recorded in real time so as to supervise the access information of the system. The access logs are stored in all nodes on a block chain, the logs of each node are inquired according to authority, access record writing rules are managed, data access records are labeled and stored according to the purpose of user inquiry data, service system access management is carried out, service system access of all levels of government departments is supported, and the access of a user authorization information providing system and the access of a user authorization information application system are included, so that the access and interconnection of various heterogeneous systems are met.
The user authorization information block chain is constructed by the block chain-based user authorization information processing method provided by the embodiment of the disclosure, and the requirements of tamper resistance, traceability and reliable storage of the user authorization information are met. The method supports the service application of the supervision department, realizes the deep fusion of the user authorization information system and the service compliance operation, realizes the one-point change full-chain sensing, full-chain synchronization and full-chain recording of the user authorization information management, and improves the processing efficiency and the safety because different users can only operate limited data.
On the basis of the embodiment, the method also comprises the step of inquiring user authorization information data, wherein the user authorization information data is inquired for third parties authorized by government departments, enterprises and enterprises according to user authorization information main body names, legal names, industrial and commercial registration numbers, organization codes and unified social credit codes;
the method also comprises accessing records, automatically recording the access information of the system in real time, storing the access logs in all nodes on a block chain, inquiring the logs of each node according to the authority, managing the access record writing rules, and labeling and storing the data access records according to the use of the user inquiry data;
the system also comprises service system access management which supports service system access of all levels of government departments and comprises access of a credit data providing system and access of a user authorization information data application system;
and the method also comprises the step of authorizing third-party query, and supporting the user to authorize the third-party user to query the related user authorization information data.
Optionally, the user authorization link management in step S102 further includes transacting system access related services online.
In specific implementation, the user authorization information data or the access records can be inquired, and business systems of all levels of government departments can also be accessed, including access of a credit data providing system and access of a user authorization information data application system.
On the basis of the above embodiment, as shown in fig. 2, in the step of managing the blockchain nodes, the management area includes adding and deactivating management blockchain nodes, and each node of the blockchain stores the same information;
step S104, the hierarchical synchronization management of the user authorization information data includes:
s201, managing synchronization rules, and newly building, deleting or modifying the synchronization rules;
s202, synchronizing task management, and performing new creation, deletion, modification, starting or stopping on a task;
s203, monitoring a synchronous task, monitoring the execution condition of the synchronous task, and finding an abnormal condition;
s204, log management is synchronized, and the log is inquired and exported.
During specific implementation, a synchronization rule can be established, then the user authorization information data is synchronized, then synchronization task management is performed, for example, new creation, deletion, modification, starting or stopping and the like are performed on tasks, then the execution condition of the synchronization tasks is monitored, abnormal conditions are found, meanwhile, synchronization logs in the monitoring process can be inquired and exported, and the processing efficiency is improved.
Corresponding to the above method embodiment, referring to fig. 3, the embodiment of the present disclosure further provides a user authorization information processing system 30 based on a block chain, including:
a block link point management module 301, a user authorization link management module 302, a user authorization information management module 303, a user authorization information data grading synchronization management module 304, and an authorization management module 305; wherein the content of the first and second substances,
the block link point management module 301 is configured to manage a region, process a service request, and manage a block link book;
the user authorization link management module 302 is configured to handle a user authorization information supervision node chaining service, a user authorization information management service, and an authority management service on line, and manage the user authorization information supervision node chaining service, the user authorization information management service, and the authority management service;
the user authorization information management module 303 is configured to manage a full life cycle of user authorization information, ensure consistency of user authorization information data, and provide an independent isolation environment for the user authorization information, where the user authorization information is an automatically executable code stored in a block chain;
the user authorization information data grading and synchronization management module 304 is configured to synchronously acquire data of user authorization information management departments at different levels;
the authorization management module 305 is used to establish an authorization management mechanism, and provide information of a query, a utility and corresponding subject after authorization.
Optionally, the system further comprises a user authorization information data query module, an access recording module, a service system access management module and an authorization third party query module;
the user authorization information data query module is used for supporting a government department, an enterprise and a third party authorized by the enterprise to query relevant credit data according to the name of a user authorization information main body, the name of a legal person, a business registration number, an organization code and a unified social credit code;
the access recording module is used for automatically recording access information of the system in real time, storing access logs in all nodes on a block chain, inquiring own logs of each node according to authority, managing access record writing rules, and labeling and storing data access records according to the purpose of user query data;
the business system access management is used for supporting business system access of all levels of government departments, and comprises user authorization information data providing system access and user authorization information data application system access;
the authorized third-party query module is used for supporting the user to authorize the third-party user to query the related user authorization information data.
Optionally, the management area includes addition and deactivation of management block nodes, and each node of the block chain stores the same information;
the user authorization information data grading synchronization management module 304 comprises a synchronization rule management module, a synchronization task monitoring module and a synchronization log management module; wherein the content of the first and second substances,
the synchronization rule management module is used for newly building, deleting or modifying the synchronization rule;
the synchronous task management module is used for creating, deleting, modifying, starting or stopping a task;
the synchronous task monitoring module is used for monitoring the execution condition of the synchronous task and finding an abnormal condition;
the synchronous log management module is used for inquiring and exporting the log;
the authorization management module is used for establishing an authorization management mechanism and providing information of a corresponding inquiring and practical main body after authorization.
Optionally, the user authorization link management module 302 is configured to handle system access related services online.
The system shown in fig. 3 may correspondingly execute the content in the above method embodiment, and details of the part not described in detail in this embodiment refer to the content described in the above method embodiment, which is not described again here.
Referring to fig. 4, an embodiment of the present disclosure also provides an electronic device 40, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method for processing user authorization information based on blockchain in the above method embodiments.
The disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing the computer to execute the method for processing user authorization information based on a block chain in the foregoing method embodiments.
The disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform the user authorization information processing method based on a blockchain in the aforementioned method embodiments.
Referring now to FIG. 4, a block diagram of an electronic device 40 suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 4, the electronic device 40 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 401 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage means 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data necessary for the operation of the electronic apparatus 40 are also stored. The processing device 401, the ROM 402, and the RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
Generally, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touch pad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 408 including, for example, tape, hard disk, etc.; and a communication device 409. The communication device 409 may allow the electronic device 40 to communicate wirelessly or by wire with other devices to exchange data. While the figures illustrate an electronic device 40 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication device 409, or from the storage device 408, or from the ROM 402. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processing device 401.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the steps associated with the method embodiments.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, enable the electronic device to perform the steps associated with the method embodiments.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware.
It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.
The above description is only for the specific embodiments of the present disclosure, but the scope of the present disclosure is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present disclosure should be covered within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (10)

1. A user authorization information processing method based on a block chain is characterized by comprising the following steps:
managing the block chain nodes, managing areas, processing service requests and managing block chain accounts;
user authorization link management, namely transacting user authorization information supervision gate node link-in service, user authorization information management service and authority management service on line, and managing the user authorization information supervision gate node link-in service, the user authorization information management service and the authority management service;
the method comprises the steps of managing user authorization information, managing the full life cycle of the user authorization information, ensuring the consistency of user authorization information data, and providing an independent isolation environment for the user authorization information data, wherein the user authorization information is an automatically executable code stored in a block chain;
the user authorization information data is managed synchronously in a grading way, and the data of user authorization information management departments in different grades is synchronously acquired;
and (4) authorization management, namely establishing an authorization management mechanism, and providing information of a corresponding inquiring and practical main body after authorization.
2. The method of claim 1, further comprising a user authorization information data query, wherein third parties authorized for government, business and enterprise query relevant user authorization information data according to user authorization information subject name, legal name, business registration number, organization code, unified social credit code;
the method also comprises accessing records, automatically recording the access information of the system in real time, storing the access logs in all nodes on a block chain, inquiring the logs of each node according to the authority, managing the access record writing rules, and labeling and storing the data access records according to the use of the user inquiry data;
the system also comprises service system access management which supports service system access of all levels of government departments and comprises access of a credit data providing system and access of a user authorization information data application system;
and the method also comprises the step of authorizing third-party query, and supporting the user to authorize the third-party user to query the related user authorization information data.
3. The method according to claim 1, wherein in the blockchain node management step, the management area includes management of joining and deactivation of blockchain nodes, each node of the blockchain storing the same information;
the step of hierarchical synchronous management of the user authorization information data comprises the following steps:
managing the synchronization rules, namely newly building, deleting or modifying the synchronization rules;
synchronizing task management, namely performing new creation, deletion, modification, starting or stopping on a task;
monitoring a synchronous task, monitoring the execution condition of the synchronous task, and finding an abnormal condition;
and log management is synchronized, and the log is inquired and exported.
4. The method of claim 2, wherein the user authorization link management step further comprises transacting system access-related services online.
5. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the blockchain based user authorization information processing method of any of the preceding claims 1 to 4.
6. A non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the block chain-based user authorization information processing method of any one of the preceding claims 1 to 4.
7. A system for processing block chain-based user authorization information, comprising:
the system comprises a block link point management module, a user authorization link management module, a user authorization information data grading synchronous management module and an authorization management module; wherein the content of the first and second substances,
the block chain link point management module is used for managing regions, processing service requests and managing block chain accounts;
the user authorization link management module is used for handling user authorization information supervision gate node link-in service, user authorization information management service and authority management service on line and managing the user authorization information supervision gate node link-in service, the user authorization information management service and the authority management service;
the user authorization information management module is used for managing the full life cycle of user authorization information, ensuring the consistency of user authorization information data and providing an independent isolation environment for the user authorization information, wherein the user authorization information is an automatically executable code stored in a block chain;
the user authorization information data grading synchronous management module is used for synchronously acquiring data of user authorization information management departments at different levels;
the authorization management module is used for establishing an authorization management mechanism and providing information of a corresponding inquiring and practical main body after authorization.
8. The system of claim 7, further comprising a user authorization information data query module, an access record module, a service system access management module, and an authorization third party query module;
the user authorization information data query module is used for supporting a government department, an enterprise and a third party authorized by the enterprise to query relevant credit data according to the name of a user authorization information main body, the name of a legal person, a business registration number, an organization code and a unified social credit code;
the access recording module is used for automatically recording access information of the system in real time, storing access logs in all nodes on a block chain, inquiring own logs of each node according to authority, managing access record writing rules, and labeling and storing data access records according to the purpose of user query data;
the business system access management is used for supporting business system access of all levels of government departments, and comprises user authorization information data providing system access and user authorization information data application system access;
the authorized third-party query module is used for supporting the user to authorize the third-party user to query the related user authorization information data.
9. The system of claim 7, wherein the management area includes management of the joining and deactivation of nodes of blocks, each node of the block chain storing the same information;
the user authorization information data grading synchronization management module comprises a synchronization rule management module, a synchronization task monitoring module and a synchronization log management module; wherein the content of the first and second substances,
the synchronization rule management module is used for newly building, deleting or modifying the synchronization rule;
the synchronous task management module is used for creating, deleting, modifying, starting or stopping a task;
the synchronous task monitoring module is used for monitoring the execution condition of the synchronous task and finding an abnormal condition;
the synchronous log management module is used for inquiring and exporting the log;
the authorization management module is used for establishing an authorization management mechanism and providing information of a corresponding inquiring and practical main body after authorization.
10. The system of claim 8, wherein the user authorization link management module is configured to transact system access-related services online.
CN202110240171.1A 2021-03-04 2021-03-04 Block chain-based user authorization information processing method, device, medium and system Pending CN112948811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110240171.1A CN112948811A (en) 2021-03-04 2021-03-04 Block chain-based user authorization information processing method, device, medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110240171.1A CN112948811A (en) 2021-03-04 2021-03-04 Block chain-based user authorization information processing method, device, medium and system

Publications (1)

Publication Number Publication Date
CN112948811A true CN112948811A (en) 2021-06-11

Family

ID=76247671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110240171.1A Pending CN112948811A (en) 2021-03-04 2021-03-04 Block chain-based user authorization information processing method, device, medium and system

Country Status (1)

Country Link
CN (1) CN112948811A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113987079A (en) * 2021-12-27 2022-01-28 四川旷谷信息工程有限公司 Data synchronization method for urban rail transit security system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110516474A (en) * 2019-08-27 2019-11-29 腾讯科技(深圳)有限公司 User information processing method, device, electronic equipment and storage medium in block chain network
CN110597832A (en) * 2019-09-12 2019-12-20 腾讯云计算(北京)有限责任公司 Government affair information processing method and device based on block chain network, electronic equipment and storage medium
CN110704531A (en) * 2019-04-25 2020-01-17 中国南方电网有限责任公司 Block chain-based electricity consumption client credit management method and system
CN111898851A (en) * 2020-06-15 2020-11-06 广州智能科技发展有限公司 Enterprise credit information processing method, device, medium and system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110704531A (en) * 2019-04-25 2020-01-17 中国南方电网有限责任公司 Block chain-based electricity consumption client credit management method and system
CN110516474A (en) * 2019-08-27 2019-11-29 腾讯科技(深圳)有限公司 User information processing method, device, electronic equipment and storage medium in block chain network
CN110597832A (en) * 2019-09-12 2019-12-20 腾讯云计算(北京)有限责任公司 Government affair information processing method and device based on block chain network, electronic equipment and storage medium
CN111898851A (en) * 2020-06-15 2020-11-06 广州智能科技发展有限公司 Enterprise credit information processing method, device, medium and system based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113987079A (en) * 2021-12-27 2022-01-28 四川旷谷信息工程有限公司 Data synchronization method for urban rail transit security system

Similar Documents

Publication Publication Date Title
CN107430666B (en) Tenant lock box
CN112036824A (en) Business approval method, system, storage medium and electronic equipment
CN111177617A (en) Web direct operation and maintenance method and device based on operation and maintenance management system and electronic equipment
CN107770146B (en) User data authority control method and device
CN110704833A (en) Data permission configuration method, device, electronic device and storage medium
CN115185967A (en) Data processing method and device, electronic equipment and storage medium
CN111258998A (en) Data verification method, device, medium and electronic equipment
CN111460432B (en) On-line document authority control method, device, equipment and computer readable medium
CN112948811A (en) Block chain-based user authorization information processing method, device, medium and system
US20160219075A1 (en) Policy conflict resolution engine for mobile application management
CN110674082A (en) Method and device for removing online document, electronic equipment and computer readable medium
CN111538717B (en) Data processing method, device, electronic equipment and computer readable medium
US9444850B2 (en) Seeding of mobile application management policies
CN113158259A (en) Block chain integrity verification method and device
CN115017149A (en) Data processing method and device, electronic equipment and storage medium
CN111310175A (en) iOS application safety monitoring and protecting method and device based on plug-in
US20140143349A1 (en) Distributed Architecture Data Transfer System
CN111367590A (en) Interrupt event processing method and device
CN111273967A (en) Remote hook setting method and device suitable for Android system and electronic equipment
CN111400402A (en) Data sharing method, device and equipment based on block chain
CN111008178A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN112929162B (en) Password management method and system, electronic equipment and readable storage medium
CN113641966B (en) Application integration method, system, equipment and medium
CN111641692B (en) Session data processing method and device and electronic equipment
CN113742663B (en) Watermark file acquisition method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination