CN113468588B - Identity management system based on block chain - Google Patents

Identity management system based on block chain Download PDF

Info

Publication number
CN113468588B
CN113468588B CN202111035456.8A CN202111035456A CN113468588B CN 113468588 B CN113468588 B CN 113468588B CN 202111035456 A CN202111035456 A CN 202111035456A CN 113468588 B CN113468588 B CN 113468588B
Authority
CN
China
Prior art keywords
identity
entity
authority
block
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111035456.8A
Other languages
Chinese (zh)
Other versions
CN113468588A (en
Inventor
张卫平
丁烨
张浩宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Digital Group Co Ltd
Original Assignee
Global Digital Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Global Digital Group Co Ltd filed Critical Global Digital Group Co Ltd
Priority to CN202111035456.8A priority Critical patent/CN113468588B/en
Publication of CN113468588A publication Critical patent/CN113468588A/en
Application granted granted Critical
Publication of CN113468588B publication Critical patent/CN113468588B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an identity management system based on a block chain, which comprises an identity creating module, an authority management module, an identity recognition module, an information management module and a block recording module, wherein the identity creating module is used for creating entity identities and virtual identities, the authority management module is used for managing authorities, the identity recognition module is used for recognizing the entity identities, the information management module is used for recording the entity identities and personal information, and the block recording module is used for recording the entity identity authority change conditions by using a block chain technology. The system manages the authority, the virtual identity and the entity identity independently, so that the difficulty of the independent authority change of the entity identity is increased, meanwhile, the virtual identity setting rule for the entity identity change binding prevents the entity identity from being changed and bound independently, and finally, the change condition of the entity identity is recorded by using a block chain technology, so that the problem of tracing is facilitated.

Description

Identity management system based on block chain
Technical Field
The invention relates to the technical field of management systems, in particular to an identity management system based on a block chain.
Background
At present, many organizations, groups or companies adopt an identity management system to manage their members, and especially when confidential information needs to set different rights for different members, the identity management system with rights management is more important, but most of the existing systems directly give corresponding rights to the member identities, so that the possibility of directly tampering the rights of the member identities is greatly increased, and the system is not safe enough.
Now, many identity management systems have been developed, and through a lot of search and reference, it is found that the existing identity management systems are the systems disclosed by the publication numbers KR101730459B1, KR101195292B1, CN102238148B and KR101620934B1, the identity management method is implemented based on a label network, a terminal and an identity management IDP server have an identity identifier AID representing an identity in the label network, when the terminal initiates an identity service process, an access service node ASN of the label network sends an identity service request of the terminal to the IDP server by using the AID of the terminal and the IDP server, and the IDP server implements identity management of the terminal according to the identity service request. However, the system has not strict authority management on different identities, and can directly modify the authority owned by the identity, so that the security of the system is not high enough.
Disclosure of Invention
The invention aims to provide an identity management system based on a block chain,
the invention adopts the following technical scheme:
an identity management system based on a block chain comprises an identity creating module, an authority management module, an identity recognition module, an information management module and a block recording module, wherein the identity creating module is used for creating entity identities and virtual identities, the authority management module is used for managing authorities, the identity recognition module is used for recognizing the entity identities, the information management module is used for recording the entity identities and personal information, and the block recording module is used for recording the entity identity authority change conditions by using a block chain technology;
the authority management module endows different authorities to the virtual identities, the entity identities acquire authorities by binding with the corresponding virtual identities, and the identity recognition module acquires the authorities owned by the entity identities by recognizing the entity identities so as to determine whether to open the access rights of areas or materials;
the entity identity includes three fields: the system comprises a chip ID, a virtual ID and a change mark, wherein the chip ID is a unique ID representing the entity identity, the virtual ID is the ID of a bound virtual identity, the change mark is used for indicating whether a temporary virtual identity is bound, the virtual ID field can only store one ID, the change mark is a fixed value under the default condition, when the virtual identity bound by the entity identity needs to be changed, the change mark of the temporary virtual identity is a section of character string endowed by the authority management module, and the character string can be different along with different endowing time points;
the change formula of the character string is as follows:
Figure 100002_DEST_PATH_IMAGE001
wherein Z isi(j) A value corresponding to a jth character of an ith character string is represented, t is a current time point, t' is a time point of last character segment assignment, and n is the length of the character string;
further, the entity identity further includes a fourth field: the authority ID is a temporary authority given by the authority management module, the temporary authority has the time effect, and the authority ID field can be automatically restored to a default value when the time effect is exhausted;
further, the manner of acquiring the new authority by the entity identity is limited to changing the bound virtual identity and acquiring the temporary authority, and when the entity identity acquires the new authority, the block recording module records the specific condition of the operation in a block chain;
further, the block content in the block chain includes a block ID, a link block ID, a chip chain block ID, and operation content, where the block ID is used to represent the ID of the block, the link block ID is used to represent the ID of the previous block, the chip ID is the chip ID of the entity identity corresponding to the block, and the chip chain block ID is the block ID of the previous block with the same chip ID;
further, the system also comprises an alarm module, and when the authority change of the entity identity is violated, the alarm module can send an alarm and freeze the corresponding entity identity.
The beneficial effects obtained by the invention are as follows:
this system strengthens the management to the authority of entity identity from a plurality of aspects, firstly, through increasing this transition body of virtual identity, make entity identity not directly bind with the authority, the degree of difficulty that entity identity changes the authority has been increased, the exposure possibility that entity identity changes the binding by oneself has also been increased simultaneously, secondly, virtual temporary identity mechanism has been added when changing the binding of virtual identity, even know the virtual identity ID that needs to change also can trigger the warning because of violating the mechanism, thirdly, can record through the change of block chain meeting authority, it traces back and follows the blame to the authorization of violating the regulations more easily.
Drawings
The invention will be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. Like reference numerals designate corresponding parts throughout the different views.
FIG. 1 is a schematic view of an overall structural framework;
FIG. 2 is a diagram illustrating relationships between entity identities, virtual identities, and permissions;
FIG. 3 is a schematic diagram of temporary virtual identity action;
FIG. 4 is a diagram illustrating an entity identity field;
fig. 5 is a schematic diagram of a block chain structure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to embodiments thereof; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Other systems, methods, and/or features of the present embodiments will become apparent to those skilled in the art upon review of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the detailed description that follows.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it should be understood that if there is an orientation or positional relationship indicated by terms such as "upper", "lower", "left", "right", etc., based on the orientation or positional relationship shown in the drawings, it is only for convenience of description and simplification of description, but it is not indicated or implied that the device or component referred to must have a specific orientation, be constructed and operated in a specific orientation, and therefore, the terms describing the positional relationship in the drawings are only used for illustrative purposes and are not to be construed as limitations of the present patent, and specific meanings of the terms may be understood by those skilled in the art according to specific situations.
The first embodiment.
With reference to fig. 1, this embodiment provides an identity management system based on a block chain, which includes an identity creating module, an authority management module, an identity recognition module, an information management module, and a block recording module, where the identity creating module is configured to create an entity identity and a virtual identity, the authority management module is configured to manage authority, the identity recognition module is configured to recognize the entity identity, the information management module is configured to record the entity identity and personal information, and the block recording module records an authority change condition of the entity identity by using a block chain technology;
the authority management module endows different authorities to the virtual identities, the entity identities acquire authorities by binding with the corresponding virtual identities, and the identity recognition module acquires the authorities owned by the entity identities by recognizing the entity identities so as to determine whether to open the access rights of areas or materials;
the entity identity includes three fields: the system comprises a chip ID, a virtual ID and a change mark, wherein the chip ID is a unique ID representing the entity identity, the virtual ID is the ID of a bound virtual identity, the change mark is used for indicating whether a temporary virtual identity is bound, the virtual ID field can only store one ID, the change mark is a fixed value under the default condition, when the virtual identity bound by the entity identity needs to be changed, the change mark of the temporary virtual identity is a section of character string endowed by the authority management module, and the character string can be different along with different endowing time points;
the change formula of the character string is as follows:
Figure 970394DEST_PATH_IMAGE002
wherein Z isi(j) A value corresponding to a jth character of an ith character string is represented, t is a current time point, t' is a time point of last character segment assignment, and n is the length of the character string;
the entity identity further comprises a fourth field: the authority ID is a temporary authority given by the authority management module, the temporary authority has the time effect, and the authority ID field can be automatically restored to a default value when the time effect is exhausted;
the method for acquiring the new authority by the entity identity is limited to changing the bound virtual identity and acquiring the temporary authority, and when the entity identity acquires the new authority, the block recording module records the specific condition of the operation in a block chain;
the block content in the block chain comprises a block ID, a link block ID, a chip chain block ID and operation content, wherein the block ID is used for representing the ID of the block, the link block ID is used for representing the ID of the last block, the chip ID is the chip ID of the entity identity corresponding to the block, and the chip chain block ID is the block ID of the last block with the same chip ID;
the system also comprises an alarm module, and when the authority change of the entity identity is violated, the alarm module can send an alarm and freeze the corresponding entity identity.
Example two.
The embodiment includes all contents of the first embodiment, and with reference to fig. 2, the identity creating module of the embodiment is configured to create an entity identity and a virtual identity, where the entity identity includes an identity terminal, the identity terminal includes a chip with a unique ID, the identity terminal is bound with an individual, personal information and a corresponding chip ID are recorded in an information management module, the virtual identity is a virtual individual with different rights, the entity identity needs to obtain corresponding rights after being bound with the virtual identity, multiple entity identities can be bound with the same virtual identity, and at most one entity identity is bound with at least one virtual identity at one time point;
the authority management module is used for endowing the virtual identities with authority, all the virtual identities have different authorities, and the authority management module can also endow the entity identities with temporary authorities;
the identity identification module is used for identifying the chip ID of the identity terminal so as to obtain the authority owned by the entity identity and determine whether to open access according to the owned authority;
the block recording module is used for recording the authority change of the entity identity, wherein the change comprises the change of a virtual identity bound by the entity identity and the change of a temporary authority of the entity identity;
the virtual identity comprises a highest virtual identity, the highest virtual identity has all rights, and the highest virtual identity is automatically created by the identity creation module when the system starts to work;
with reference to fig. 3, the virtual identity includes a temporary virtual identity, and the temporary virtual identity is characterized in that an entity identity can bind a temporary virtual identity and another virtual identity at the same time, and the temporary virtual identity does not have any authority, and is used for binding the entity identity to the temporary virtual identity, unbinding the original virtual identity bound to the entity identity, binding a new virtual identity to the entity identity, and unbinding the temporary virtual identity when the virtual identity bound to the entity identity is to be changed;
when the entity identity is not bound with any virtual identity or is bound with more than one virtual identity of a non-temporary virtual identity within a time point, the system generates an identity alarm;
the virtual identity with the least authority is a basic virtual identity, the newly created entity identity is directly bound with the basic virtual authority, and the other virtual identities except the basic virtual identity and the temporary virtual identity have the operation authority of the authority management module;
the binding or unbinding of the entity identity and the virtual identity is realized by operating the authority management module by another entity identity which has the operation authority of the authority management module, but the virtual identity which can be unbound or bound by operating the authority management module is different according to the own authority of an operator;
the entity identity with the operation authority of the identity creation module can create or cancel an entity identity through the identity creation module, when one entity identity is created, a storage area is applied in the information management module for storing personal information and a chip ID, and when one entity identity is destroyed, the corresponding storage area in the information management module deletes the stored content;
when data needs to be accessed or a specific area is entered, the identity identification module is required to identify an identity terminal and determine whether the identity terminal is qualified for access or entry, the identity identification module reads a chip ID of the identity terminal, searches a virtual identity bound with the identity terminal according to the chip ID, then searches whether the virtual identity is endowed with a required authority or not, if so, allows the identity terminal to continue to access the data or enter the area, if not, prohibits the access or entry, and if the entity identity is endowed with a temporary authority, the identity identification module firstly determines whether the temporary authority is a corresponding authority or not and then searches the authority endowed by the virtual identity;
the authority management module can endow temporary authority to the entity identity, the temporary authority has a time limit and/or a secondary limit, when the temporary authority has the time limit, the temporary authority is automatically cancelled after the time limit is reached from the time of endowing the temporary authority, when the temporary authority has the secondary limit, the number of times is reduced by one after the temporary authority is detected and used by the identity recognition module to access data or enter an area, when the number of times is reduced to zero, the temporary authority is automatically cancelled, and when the temporary authority has the time limit and the secondary limit at the same time, the temporary authority is automatically cancelled when one limit is exhausted;
the entity identity, the virtual identity and the right are bound or associated in the following way:
in connection with fig. 4, the entity identity includes four fields: the system comprises a chip ID, a virtual ID, a change mark and a permission ID, wherein the chip ID is the chip ID in a corresponding identity terminal, the virtual ID is the ID of a bound virtual identity, the change mark is used for indicating whether a temporary virtual identity is bound, the permission ID is the ID of a granted temporary permission, it needs to be noted that the virtual ID field can only store one ID, the permission ID field can only store one ID and limited content, the change mark indicates that the temporary virtual identity is bound when being 1, the change mark indicates that the temporary virtual identity is not bound when being 0, in order to improve the safety and reliability of the identity, the change mark when the temporary virtual identity is bound is a section of character string given by a permission management module, and the character string can be different along with different giving time points;
the virtual identity comprises two fields: the virtual ID is the ID of the virtual identity and has uniqueness, the permission ID field is used for storing the ID of the permission given to the virtual identity, and the virtual ID and the permission ID of the virtual identity are not changeable from the time when the virtual identity is created;
the rights include two fields: the authority ID is the ID of the authority and has uniqueness, and the comment field records the place where the authority needs to be used;
the entity identity is stored in an entity identity repository, the virtual identity is stored in a virtual identity repository, and the authority is stored in an authority repository;
the change formula of the character string is as follows:
Figure DEST_PATH_IMAGE003
wherein Z isi(j) A value corresponding to a jth character of an ith character string is represented, t is a current time point, t' is a time point of last character segment assignment, and n is the length of the character string;
the character string is composed of numbers 0-9 and letters A to F, and the corresponding values of the letters A to F are 10 to 15;
counting again from 0 after subscript i of the character string reaches an upper limit;
the entity identity generates a block in a block recording module and adds the block into a block chain when creating, changing a bound virtual identity, giving a temporary authority and canceling the entity identity, and only one operation of one entity identity is recorded in one block because the operation of the entity identity is not frequent, so that the block chain has high timeliness;
with reference to fig. 5, the blocks include a block ID, a link block ID, a chip chain block ID, and an operation content, where the block ID is used to represent an ID of the block, the link block ID is used to represent an ID of a previous block, all the blocks are connected into a block chain by the block ID and the link block ID, the chip ID is a chip ID of an entity identity corresponding to the block, the chip chain block ID is a block ID of a previous block having the same chip ID, all blocks related to a certain entity identity can be quickly found in the block chain by the chip ID and the chip chain block ID, and the operation content includes a specific change situation of the entity identity corresponding to the block and an entity identity of an operator;
when the operation content in the block is endowed with temporary rights, the block recording module generates a simple report, and the simple report is sent to a mailbox associated with the entity identity of the operator;
when the identification module detects that the temporary right needs to be used, the identification module searches whether a corresponding block record exists in the block record module, and if the corresponding block record does not exist, the system generates an alarm.
Although the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications may be made without departing from the scope of the invention. That is, the methods, systems, and devices discussed above are examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in an order different than that described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, as different aspects and elements of the configurations may be combined in a similar manner. Further, elements therein may be updated as technology evolves, i.e., many elements are examples and do not limit the scope of the disclosure or claims.
Specific details are given in the description to provide a thorough understanding of the exemplary configurations including implementations. However, configurations may be practiced without these specific details, for example, well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configurations will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
In conclusion, it is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that these examples are illustrative only and are not intended to limit the scope of the invention. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.

Claims (5)

1. An identity management system based on a block chain is characterized by comprising an identity creating module, an authority management module, an identity recognition module, an information management module and a block recording module, wherein the identity creating module is used for creating entity identities and virtual identities, the authority management module is used for managing authorities, the identity recognition module is used for recognizing entity identities, the information management module is used for recording entity identities and personal information, and the block recording module is used for recording the entity identity authority change conditions by using a block chain technology;
the authority management module endows different authorities to the virtual identities, the entity identities acquire authorities by binding with the corresponding virtual identities, and the identity recognition module acquires the authorities owned by the entity identities by recognizing the entity identities so as to determine whether to open the access rights of areas or materials;
the entity identity includes three fields: the system comprises a chip ID, a virtual ID and a change mark, wherein the chip ID is a unique ID representing the entity identity, the virtual ID is the ID of a bound virtual identity, the change mark is used for indicating whether a temporary virtual identity is bound, the virtual ID field can only store one ID, the change mark is a fixed value under the default condition, when the virtual identity bound by the entity identity needs to be changed, the change mark of the temporary virtual identity is a section of character string endowed by the authority management module, and the character string can be different along with different endowing time points;
the calculation formula of the character string is as follows:
Figure DEST_PATH_IMAGE001
wherein Z isi(j) And the value corresponding to the jth character of the ith character string is represented, t is the current time point, t' is the time point of the last character string, and n is the length of the character string.
2. The blockchain-based identity management system of claim 1, wherein the entity identity further includes a fourth field: and the authority ID is a temporary authority given by the authority management module, the temporary authority has the time effect, and the authority ID field can be automatically restored to a default value when the time effect is exhausted.
3. The system as claimed in claim 2, wherein the entity identity obtains the new authority only by changing the bound virtual identity and obtaining the temporary authority, and when the entity identity obtains the new authority, the block recording module records the details of this operation in the block chain.
4. The system as claimed in claim 3, wherein the block contents in the block chain include a block ID, a link block ID, a chip chain block ID and operation contents, the block ID is used to represent the ID of the block, the link block ID is used to represent the ID of the previous block, the chip ID is the chip ID of the entity identity corresponding to the block, and the chip chain block ID is the block ID of the previous block with the same chip ID.
5. The blockchain-based identity management system of claim 4, wherein the system further comprises an alarm module, and when the authority change of the entity identity is violated, the alarm module issues an alarm and freezes the corresponding entity identity.
CN202111035456.8A 2021-09-06 2021-09-06 Identity management system based on block chain Active CN113468588B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111035456.8A CN113468588B (en) 2021-09-06 2021-09-06 Identity management system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111035456.8A CN113468588B (en) 2021-09-06 2021-09-06 Identity management system based on block chain

Publications (2)

Publication Number Publication Date
CN113468588A CN113468588A (en) 2021-10-01
CN113468588B true CN113468588B (en) 2021-11-26

Family

ID=77867540

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111035456.8A Active CN113468588B (en) 2021-09-06 2021-09-06 Identity management system based on block chain

Country Status (1)

Country Link
CN (1) CN113468588B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114266073B (en) * 2022-03-02 2022-05-17 环球数科集团有限公司 Data link privacy processing system based on block chain technology

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108156111B (en) * 2016-12-02 2021-12-03 北大方正集团有限公司 Method and device for processing network service authority
WO2019033116A1 (en) * 2017-08-11 2019-02-14 Verimatrix, Inc. Systems and methods for rights control of network-connected or iot devices using information stored in a distributed ledger
US11032293B2 (en) * 2018-02-10 2021-06-08 SmartAxiom, Inc. System and method for managing and securing a distributed ledger for a decentralized peer-to-peer network
US20200058019A1 (en) * 2018-08-16 2020-02-20 Free Stream Media Corporation d/b/a Samba TV Viewer data access management
CN110046890A (en) * 2019-04-02 2019-07-23 安徽省沃昇机电科技有限公司 A kind of block chain Rights Management System and method
CN111798342A (en) * 2020-07-07 2020-10-20 德能森智能科技(无锡)有限公司 Smart community system based on cloud platform
CN112200571B (en) * 2020-10-09 2022-04-22 支付宝(杭州)信息技术有限公司 Resource distribution method and device based on block chain and electronic equipment
CN112800441B (en) * 2021-01-05 2023-08-29 上海零数众合信息科技有限公司 Rights management method of energy platform based on blockchain

Also Published As

Publication number Publication date
CN113468588A (en) 2021-10-01

Similar Documents

Publication Publication Date Title
CN108023894B (en) Visa information system based on block chain and processing method thereof
CN104240342B (en) Access control method and device based on identity authentication
CN112565453B (en) Block chain access control strategy model and strategy protection scheme under Internet of things
CN111726353A (en) Sensitive data grading protection method and grading protection system based on numerical control system
CN114363352B (en) Cross-chain interaction method of Internet of things system based on block chain
CN113468588B (en) Identity management system based on block chain
KR102311462B1 (en) Block chain did-based digital evidence management system and method
CN109460675A (en) A kind of enterprise information security management method
CN107016293A (en) Scoped resource authorization policies
CN117150576B (en) Intelligent verification system and method for block chain electronic seal
CN110990858A (en) Cross-cloud resource sharing system and method based on distributed information flow control
JP4805615B2 (en) Access control method
CN112308542B (en) Method and system for realizing intelligent and non-inductive data input
Ardina et al. Design of A blockchain-based employee attendance system
JP7241360B2 (en) SECURITY POLICY AND AUDIT LOG BI-DIRECTIONAL LOOKUP, COMPARING AND TRACKING SYSTEM AND METHOD THEREOF}
CN112069529A (en) Block chain-based volume management method and device, computer and storage medium
CN111083142A (en) Data access method, system and equipment applied to Internet of things
CN106326769B (en) A kind of field monitoring information processing unit
CN115022070A (en) Attribute-based block chain data access control method and system
BR102020009344A2 (en) SYSTEM AND METHOD FOR REGISTRATION, ANALYSIS, STORAGE AND RECOVERY OF DIGITAL EVIDENCE BASED ON INTELLIGENT BLOCKCHAIN CONTRACTS FOR DIGITAL CHAIN OF CUSTODY COMPOSITION
US20170237738A1 (en) Method and apparatus for tracking data access route
CN113608933B (en) Distributed backup synchronization system for public cloud tenant service sensitive data
RU2792790C1 (en) Device for mandatory access to electronic information resources
KR100903125B1 (en) Apparatus for forgery detection and circulation point verification of securities and method therefor
Carroll et al. Using digital fingerprints (or hash values) for investigations and cases involving electronic evidence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant