CN114629727B - Block chain-based security authentication method and system - Google Patents

Block chain-based security authentication method and system Download PDF

Info

Publication number
CN114629727B
CN114629727B CN202210446228.8A CN202210446228A CN114629727B CN 114629727 B CN114629727 B CN 114629727B CN 202210446228 A CN202210446228 A CN 202210446228A CN 114629727 B CN114629727 B CN 114629727B
Authority
CN
China
Prior art keywords
node
block chain
security
value
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210446228.8A
Other languages
Chinese (zh)
Other versions
CN114629727A (en
Inventor
贺评
李虹
陈慧强
李治良
孙秋玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiaye Co Creation Supply Chain Management Co.,Ltd.
Original Assignee
Shenzhen Jiaye Industry Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiaye Industry Development Co ltd filed Critical Shenzhen Jiaye Industry Development Co ltd
Priority to CN202210446228.8A priority Critical patent/CN114629727B/en
Publication of CN114629727A publication Critical patent/CN114629727A/en
Application granted granted Critical
Publication of CN114629727B publication Critical patent/CN114629727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a safety certification method and system based on a block chain. The block chain represents a node I to receive an access request sent by a block chain representing a node II; the block chain represents a first node to obtain security authentication data from the access request, and a security value to be estimated is calculated according to the security authentication data; acquiring a stored current security value of a user node to be accessed, and if the current security value is lower than a security value to be estimated, considering that the block chain represents that the second node security authentication passes; if the current security value is higher than the security value to be estimated, the current security value of the associated user node is obtained, the associated security value is calculated, if the associated security value is larger than the security value to be estimated, the block chain representing node two is considered to pass the security authentication, and if the associated security value is smaller than the security value to be estimated, the block chain representing node two is refused to access. By adopting the technical scheme, the node authentication accuracy and the node authentication safety in the block chain can be improved.

Description

Block chain-based security authentication method and system
Technical Field
The invention relates to the technical field of block chains, in particular to a safety authentication method and system based on a block chain.
Background
The blockchain is a decentralized and distrusted reliable database maintained collectively, and is essentially a shared database, and the data or information stored in the database has the characteristics of unforgeability, trace in the whole process, traceability, openness and transparency, collective maintenance and the like. Based on the characteristics, the block chain technology lays a solid trust foundation, creates a reliable cooperation mechanism and has wide application prospect.
The existing block chain security authentication basically does not perform security authentication on nodes belonging to the same private chain or alliance chain, and allows release directly, the nodes not belonging to the same private chain or alliance chain send security authentication requests to the nodes receiving the requests by the nodes initiating the requests, and the receiving nodes determine whether to allow access or not, so a large number of node access operations occur in data access, the operation efficiency is low, and the authentication of the receiving nodes can limit the access of some security nodes, so that the security authentication is forced to be terminated. Based on the block chain, the invention constructs a block chain-based security authentication method.
Disclosure of Invention
The invention provides a safety certification method based on a block chain, which comprises the following steps:
if the user node below the block chain representative node II needs to access the user node below the block chain representative node II, the block chain representative node I receives an access request sent by the block chain representative node II;
the block chain representative node I acquires security authentication data from the access request, and calculates a security value to be estimated according to the security authentication data;
the first block chain representative node acquires a stored current safety value of the user node to be accessed, if the current safety value is lower than a safety value to be estimated, the second block chain representative node is considered to pass safety authentication, and the first block chain representative node sends an access request to the user node to be accessed;
if the current security value is higher than the security value to be estimated, the first block chain representative node acquires the current security value of the associated user node of the user to be accessed, calculates the associated security value, if the associated security value is lower than the security value to be estimated, the second block chain representative node is considered to pass the security authentication, the first block chain representative node sends the access request to the user node to be accessed, and if the associated security value is higher than the security value to be estimated, the second block chain representative node is denied access.
The method for security authentication based on the blockchain as described above, wherein the blockchain includes a plurality of blocks, each of the blocks has a representative node, and the user registers a decentralized identity at the representative node when joining the blockchain, so as to become a trusted user node under the representative node.
The block chain-based security authentication method as described above, wherein the representative node stores the security values of all the user nodes in the subordinate user node set, the security values are initially preset by the representative node according to the registration security degree of the user nodes, and then are dynamically updated according to the number of times the node is accessed and the security level.
The block chain-based security authentication method as described above, wherein the user node sets its associated node when registering at the representative node, or the block chain representative node assigns a plurality of associated nodes with the same attribute to the user node according to the attribute of the user node.
The block chain-based security authentication method as described above, wherein the attributes having the same type of service include the same type of service, a security level higher than that of the registered user node, and the same private chain or federation chain.
The invention also provides a security authentication system based on a block chain, which comprises a plurality of blocks, wherein each block is provided with a representative node, and when a user node under a block chain representative node II accesses the user node under the block chain representative node I, the block chain representative node I specifically comprises:
an access request receiving module, configured to receive an access request sent by a block chain representing node two;
the security value to be estimated calculation module is used for acquiring security authentication data from the access request and calculating a security value to be estimated according to the security authentication data;
the safety authentication module is used for acquiring a stored current safety value of the user node to be accessed, if the current safety value is lower than the safety value to be estimated, the block chain representative node II is considered to pass the safety authentication, and the block chain representative node I sends the access request to the user node to be accessed; if the current security value is higher than the security value to be estimated, the first block chain representative node acquires the current security value of the associated user node of the user to be accessed, calculates the associated security value, if the associated security value is lower than the security value to be estimated, the second block chain representative node is considered to pass the security authentication, the first block chain representative node sends the access request to the user node to be accessed, and if the associated security value is higher than the security value to be estimated, the second block chain representative node is denied access.
The block chain-based security authentication system as described above, wherein the user registers the decentralized identity at the representative node when joining the block chain, and becomes a trusted user node under the representative node.
The security authentication system based on the block chain is characterized in that the representative node stores the security values of all the user nodes in the subordinate user node set, the security values are initially preset by the representative node according to the registration security degree of the user nodes, and then are dynamically updated according to the number of times the node is accessed and the security level.
The block chain-based security authentication system as described above, wherein the user node sets its associated node by itself when registering at the representative node, or the block chain representative node assigns several associated nodes with the same attribute to the user node according to the attribute of the user node.
The block chain-based security authentication system as described above, wherein the attributes that are the same include the same service type, a higher security level than the registered user node, and belonging to the same private chain or federation chain.
The invention has the following beneficial effects: by adopting the technical scheme, the representative node with higher security level in the block chain processes the security authentication between the blocks, and the representative node adopts a multi-node decision mechanism to decide whether to accord with the security authentication condition according to a plurality of user nodes thereunder, thereby improving the accuracy and the security of the node authentication in the block chain.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart of a security authentication method based on a block chain according to an embodiment of the present invention;
fig. 2 is a block chain diagram provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
As shown in fig. 1, an embodiment of the present invention provides a block chain-based security authentication method, including:
step 110, the user node below the second block chain representative node accesses the user node below the second block chain representative node, and the first block chain representative node receives an access request sent by the second block chain representative node;
as shown in fig. 2, the block chain includes a plurality of blocks, such as a block a, a block B, and a block C shown in the figure, where each block has a representative node, that is, a representative node of the block a is a1, a representative node of the block B is B1, and a representative node of the block C is C1, a user registers a DID (decentralized identity) at the representative node when joining the block chain, becomes a user node that is trusted under the representative node, for example, user nodes a2 and A3 register under the representative node a1, becomes a block link point of the block a, user nodes B2, B3, and B4 register under the representative node B1, and block link points user nodes C2, C3, C4, and C5 that become the block B register under the representative node C1, become a block chain node of the block C.
When a subordinate user node of block a wants to access a subordinate user node in block B, for example, subordinate user node a2 of block a wants to access subordinated user node B3 of blockchain B, then the access request carrying the security authentication data is sent by blockchain representative node a1 of block a to blockchain representative node B.
Step 120, the first block chain representative node acquires security authentication data from the access request, and calculates a security value to be estimated according to the security authentication data;
in the embodiment of the present application, after the blockchain representative node a1 of the blockchain sends the access request carrying the security authentication data to the blockchain representative node B1, the representative nodePoint B1 obtains the security authentication data from the access request using the formula
Figure BDA0003616988400000051
Calculating a safety value to be estimated, wherein SE 1 Representing a safety value to be estimated of a block chain representing a second node; n is a radical of 1 The total number of the service types of the block chain representative node II belonging to the service types of the block chain representative node I is represented; n is a radical of 2 The total number of the service types of the block chain representative node II which do not belong to the service types of the block chain representative node I is represented; the value of i is 1 to M, and M is the total number of the core service types of the first block chain representative node and the second block chain representative node; k i Core value, H, representing the ith core service for which the blockchain represents node two i And the core value of the ith core service representing the first block chain representative node (the core value is initially a preset value when the user node registers at the representative node, and is updated correspondingly as the service types and the number of the registered core services increase, if the core service is increased, the core value is added with a preset step length, and if the core service is decreased, the core value is subtracted with the preset step length).
Step 130, the first block chain representative node obtains a stored current security value of the user node to be accessed, if the current security value is lower than the security value to be estimated, the second block chain representative node is considered to pass the security authentication, and the first block chain representative node sends the access request to the user node to be accessed;
specifically, the representative node stores the security values of all user nodes in the subordinate user node set, the security values are initially preset by the representative node according to the registration security degree of the user nodes, and then are dynamically updated according to the number of times the node is accessed, the security level and the like.
Step 140, if the current security value is higher than the security value to be estimated, the first blockchain representative node obtains the current security value of the associated user node of the user to be accessed, calculates the associated security value, if the associated security value is lower than the security value to be estimated, the second blockchain representative node is considered to pass the security authentication, sends the access request to the user node to be accessed, and if the associated security value is higher than the security value to be estimated, denies the access to the second blockchain representative node.
In the embodiment of the application, if the current security value of the user node to be accessed, which is obtained by the first blockchain representative node, is higher than the security value to be estimated of the second blockchain representative node, there may be two situations, one is that the user node initiating access is indeed an insecure node, and the other is that the security value to be estimated, which is caused by the situation that the user node initiating access is a secure node but may access the user node to be accessed for the first time, is low.
Preferably, when the user node registers at the representative node, the user node may set its associated node by itself, or the blockchain representative node may assign several associated nodes with the same attribute to the user node according to the attribute of the user node (for example, the user node has the same service type, a higher security level than the registered user node, belongs to the same private chain or federation chain, etc.).
Using a formula
Figure BDA0003616988400000061
Calculating an associated security value, SE, of the associated node 2 Is the associated security value of the associated node of the user node to be accessed, S' is the current security value of the node to be accessed, GL r For the association degree of the node to be accessed and the r-th associated node, S r The current security value of the R-th associated node is the value of R from 1 to R, and R is the total number of the associated nodes.
And if the calculated associated security value of each associated node is higher than the security value to be estimated of the second block chain representative node, the second block chain representative node is considered to fail to perform security authentication, and the second block chain representative node is rejected.
Example two
The second embodiment of the invention provides a safety certification system based on a block chain, which comprises a plurality of blocks, wherein each block is provided with a representative node, and a user registers decentralized identity at the representative node when joining the block chain to become a trusted user node under the representative node. When a user node under the second block chain representative node accesses a user node under the first block chain representative node, the first block chain representative node specifically includes:
an access request receiving module, configured to receive an access request sent by a block chain representing node two;
as shown in fig. 2, the block chain includes a plurality of blocks, such as a block a, a block B, and a block C shown in the figure, where each block has a representative node, that is, a representative node of the block a is a1, a representative node of the block B is B1, and a representative node of the block C is C1, a user registers a DID (decentralized identity) at the representative node when joining the block chain, becomes a user node that is trusted under the representative node, for example, user nodes a2 and A3 register under the representative node a1, becomes a block link point of the block a, user nodes B2, B3, and B4 register under the representative node B1, and block link points user nodes C2, C3, C4, and C5 that become the block B register under the representative node C1, become a block chain node of the block C.
When a subordinate user node of block a wants to access a subordinate user node in block B, for example, subordinate user node a2 of block a wants to access subordinated user node B3 of blockchain B, then the access request carrying the security authentication data is sent by blockchain representative node a1 of block a to blockchain representative node B.
The security value to be estimated calculation module is used for acquiring security authentication data from the access request and calculating a security value to be estimated according to the security authentication data; the representative node stores the security values of all the user nodes in the subordinate user node set, the security values are initially preset by the representative node according to the registration security degree of the user nodes, and then dynamic updating is carried out according to the number of times the nodes are accessed and the security level.
In the embodiment of the present application, the blockchain of the block a represents the node a1 to send the access request carrying the security authentication data to the node aAfter the blockchain represents the node B1, the security authentication data is obtained from the access request on behalf of the node B1 by adopting a formula
Figure BDA0003616988400000071
Calculating a safety value to be estimated, wherein SE 1 Representing a safety value to be estimated of a block chain representing a second node; n is a radical of hydrogen 1 The total number of the service types of the block chain representative node II belonging to the service types of the block chain representative node I is represented; n is a radical of hydrogen 2 The total number of the service types of the block chain representative node II which do not belong to the service types of the block chain representative node I is represented; the value of i is 1 to M, and M is the total number of the core service types of the first block chain representative node and the second block chain representative node; k i Core value, H, representing the ith core service for which the blockchain represents node two i And the core value of the ith core service of the block chain representative node I is represented (the core value is a preset value initially when the user node registers at the representative node, and is updated correspondingly with the increase of the service types and the number of the registered core services, if the core service is increased, the core value is added with a preset step length, and if the core service is decreased, the core value is subtracted with the preset step length).
The safety authentication module is used for acquiring a stored current safety value of the user node to be accessed, if the current safety value is lower than the safety value to be estimated, the block chain representative node II is considered to pass the safety authentication, and the block chain representative node I sends the access request to the user node to be accessed; if the current security value is higher than the security value to be estimated, the first block chain representative node acquires the current security value of the associated user node of the user to be accessed, calculates the associated security value, if the associated security value is lower than the security value to be estimated, the second block chain representative node is considered to pass the security authentication, the first block chain representative node sends the access request to the user node to be accessed, and if the associated security value is higher than the security value to be estimated, the second block chain representative node is denied access.
Specifically, the user node sets its associated nodes when registering at the representative node, or the blockchain representative node allocates a plurality of associated nodes with the same attribute to the user node according to the attribute of the user node. The attributes are the same, and comprise the same service type, the security level is higher than that of the registered user nodes, and the user nodes belong to the same private chain or alliance chain.
In the embodiment of the application, if the current security value of the user node to be accessed, which is obtained by the first blockchain representative node, is higher than the security value to be estimated of the second blockchain representative node, there may be two situations, one is that the user node initiating access is indeed an insecure node, and the other is that the security value to be estimated, which is caused by the situation that the user node initiating access is a secure node but may access the user node to be accessed for the first time, is low.
Preferably, the user node may set its associated node when registering at the representative node, or the blockchain representative node may assign several associated nodes with the same attribute to the user node according to the attribute of the user node (e.g., the user node has the same service type, a higher security level than the registered user node, belongs to the same private chain or alliance chain, etc.).
Using a formula
Figure BDA0003616988400000081
Calculating an associated security value, SE, of an associated node 2 The associated security value of the associated node of the user node to be accessed, S' the current security value of the node to be accessed, GL r For the association degree of the node to be accessed and the r-th associated node, S r The current security value of the R-th associated node is the value of R from 1 to R, and R is the total number of the associated nodes.
And if the calculated associated security value of each associated node is higher than the security value to be estimated of the second block chain representative node, the second block chain representative node is considered to fail to perform security authentication, and the second block chain representative node is rejected.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.

Claims (10)

1. A block chain-based security authentication method is characterized by comprising the following steps:
if the user node below the block chain representative node II needs to access the user node below the block chain representative node II, the block chain representative node I receives an access request sent by the block chain representative node II;
the block chain represents a first node to obtain security authentication data from the access request, and a security value to be estimated is calculated according to the security authentication data;
the first block chain representative node acquires a stored current security value of the user node to be accessed, if the current security value is lower than a security value to be estimated, the second block chain representative node is considered to pass the security authentication, and the first block chain representative node sends an access request to the user node to be accessed;
if the current security value is higher than the security value to be estimated, the first block chain representative node acquires the current security value of the associated user node of the user to be accessed, calculates the associated security value, if the associated security value is lower than the security value to be estimated, the second block chain representative node is considered to pass the security authentication, the first block chain representative node sends an access request to the user node to be accessed, and if the associated security value is higher than the security value to be estimated, the second block chain representative node is denied access;
using a formula
Figure FDA0003806241770000011
Calculating a safety value to be estimated, wherein SE 1 Representing a safety value to be estimated of a block chain representing a second node; n is a radical of 1 The total number of the service types of the block chain representative node II belonging to the service types of the block chain representative node I is represented; n is a radical of 2 The total number of the service types of the block chain representative node II which do not belong to the service types of the block chain representative node I is represented; the value of i is 1 to M, and M is the total number of the core service types of the first block chain representative node and the second block chain representative node; k i Core value, H, representing the ith core service for which the blockchain represents node two i A core value representing the ith core service of the first node represented by the block chain;
using a formula
Figure FDA0003806241770000012
Calculating an associated security value, SE, of an associated node 2 Is the associated security value of the associated node of the user node to be accessed, S' is the current security value of the node to be accessed, GL r For the association degree of the node to be accessed and the r-th associated node, S r The current security value of the R-th associated node is the value of R from 1 to R, and R is the total number of the associated nodes.
2. The method as claimed in claim 1, wherein the blockchain includes a plurality of blocks, each of the blocks has a representative node, and the user registers a decentralized identity at the representative node when joining the blockchain, so as to become a trusted user node under the representative node.
3. The blockchain-based security authentication method of claim 1, wherein the security values of all the user nodes in the subordinate user node set are stored in the representative node, and the security values are initially preset by the representative node according to the registered security degree of the user nodes, and then are dynamically updated according to the number of times the node is accessed and the security level.
4. The blockchain-based security authentication method according to claim 1, wherein the user node sets its associated node when registering at the representative node, or the blockchain representative node assigns a plurality of associated nodes with the same attribute to the user node according to the attribute of the user node.
5. The blockchain-based security authentication method according to claim 4, wherein the attributes having the same property include the same service type, the security level higher than that of the registered user node, and belonging to the same private chain or alliance chain.
6. A safety certification system based on block chain, which is characterized in that it includes multiple blocks, where each block has a representative node, and when a user node under a block chain representative node b wants to access the user node under the block chain representative node b, the block chain representative node b specifically includes:
an access request receiving module, configured to receive an access request sent by a block chain representing node two;
the security value to be estimated calculation module is used for acquiring security authentication data from the access request and calculating a security value to be estimated according to the security authentication data;
the safety authentication module is used for acquiring a stored current safety value of the user node to be accessed, if the current safety value is lower than the safety value to be estimated, the block chain representative node II is considered to pass the safety authentication, and the block chain representative node I sends the access request to the user node to be accessed; if the current security value is higher than the security value to be estimated, the first block chain representative node acquires the current security value of the associated user node of the user to be accessed, calculates the associated security value, if the associated security value is lower than the security value to be estimated, the second block chain representative node is considered to pass the security authentication, the first block chain representative node sends an access request to the user node to be accessed, and if the associated security value is lower than the security value to be estimated, the second block chain representative node is denied access;
using a formula
Figure FDA0003806241770000021
Calculating a safety value to be estimated, wherein SE 1 Representing a safety value to be estimated of a block chain representing a second node; n is a radical of 1 Indicating that the traffic class of the second node represented by the blockchain belongs to the traffic class of the first node represented by the blockchainThe total number; n is a radical of 2 The total number of the service types of the block chain representative node II which do not belong to the service types of the block chain representative node I is represented; the value of i is 1 to M, wherein M is the total number of the core service types of the first block chain representative node and the second block chain representative node; k i Core value, H, representing the ith core service for which the blockchain represents node two i A core value representing the ith core service of the first node represented by the block chain;
using a formula
Figure FDA0003806241770000031
Calculating an associated security value, SE, of an associated node 2 Is the associated security value of the associated node of the user node to be accessed, S' is the current security value of the node to be accessed, GL r For the association degree of the node to be accessed and the r-th associated node, S r The current security value of the R-th associated node is the value of R from 1 to R, and R is the total number of the associated nodes.
7. The blockchain-based security authentication system of claim 6, wherein the user registers the decentralized identity at the representative node when joining the blockchain to become a trusted user node under the representative node.
8. The system of claim 6, wherein the representative node stores the security values of all the user nodes in the subordinate user node set, the security values are initially preset by the representative node according to the registered security level of the user nodes, and then are dynamically updated according to the number of times the node is accessed and the security level.
9. The blockchain-based security authentication system of claim 6, wherein the user node sets its associated node when registering at the representative node, or the blockchain representative node assigns a plurality of associated nodes with the same attribute to the user node according to the attribute of the user node.
10. The blockchain-based security authentication system of claim 9, wherein the attributes having the same comprise the same service type, the security level higher than that of the registered user node, and belonging to the same private chain or federation chain.
CN202210446228.8A 2022-04-26 2022-04-26 Block chain-based security authentication method and system Active CN114629727B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210446228.8A CN114629727B (en) 2022-04-26 2022-04-26 Block chain-based security authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210446228.8A CN114629727B (en) 2022-04-26 2022-04-26 Block chain-based security authentication method and system

Publications (2)

Publication Number Publication Date
CN114629727A CN114629727A (en) 2022-06-14
CN114629727B true CN114629727B (en) 2022-09-30

Family

ID=81906863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210446228.8A Active CN114629727B (en) 2022-04-26 2022-04-26 Block chain-based security authentication method and system

Country Status (1)

Country Link
CN (1) CN114629727B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10142347B2 (en) * 2016-02-10 2018-11-27 Bank Of America Corporation System for centralized control of secure access to process data network
CN111327568B (en) * 2018-12-14 2022-04-01 中国电信股份有限公司 Identity authentication method and system
CN113946875B (en) * 2021-12-21 2022-05-20 北京中科金财科技股份有限公司 Identity authentication method and system based on block chain
CN114389902B (en) * 2022-03-24 2022-06-10 北京中科金财科技股份有限公司 Block chain-based network security monitoring method and system

Also Published As

Publication number Publication date
CN114629727A (en) 2022-06-14

Similar Documents

Publication Publication Date Title
CN111541656B (en) Identity authentication method and system based on converged media cloud platform
US7568218B2 (en) Selective cross-realm authentication
CN111654465A (en) Power service cross-domain credible authentication system and method based on block chain
CN110519085B (en) Configuration change method and block chain platform
CN109688186B (en) Data interaction method, device, equipment and readable storage medium
CN113242230B (en) Multi-level authentication and access control system and method based on intelligent contracts
CN110995718B (en) Power terminal cross-domain authentication method based on block chain
CN107908979B (en) Method and electronic device for configuration and endorsement in blockchain
US20230388288A1 (en) Wireless lan (wlan) public identity federation trust architecture
CN113343196A (en) Internet of things security authentication method
CN101232424B (en) Access method, access system, trust service center, network trust platform
CN105991596A (en) Access control method and system
CN110601995A (en) Method, apparatus, storage medium, and device for controlling traffic in a blockchain network
Rathore et al. TangleCV: Decentralized technique for secure message sharing in connected vehicles
CN115022841A (en) V2X communication digital certificate system based on high concurrency and multiple mutual trust
CN111385274B (en) Cross-network service calling method and device, feature gateway and identity recognition system
CN112651044B (en) Business transaction method, system and storage medium based on block chain technology
CN114629727B (en) Block chain-based security authentication method and system
CN112804207B (en) Alliance chain node security admission method applied to electronic government affair scene
CN111866993B (en) Wireless local area network connection management method, device, software program and storage medium
CN112422516A (en) Connection method and device of power system, computer equipment and storage medium
CN113766506B (en) Hierarchical access control method for Internet of things
CN113518124B (en) Internet of things equipment authentication method based on cellular block chain network
CN113055886B (en) Terminal authentication method, system, server and medium in edge computing network
CN114844896B (en) Resource sharing method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231226

Address after: Building 801, Building 4, Baoxing Zhihui City, No. 650 Zhoushi Road, Zhongwu Community, Hangcheng Street, Bao'an District, Shenzhen City, Guangdong Province, 518100

Patentee after: Shenzhen Jiaye Co Creation Supply Chain Management Co.,Ltd.

Address before: 518100 Room 802, building 4, Baoxing Zhihui City, No. 650, Zhoushi Road, Zhongwu community, Hangcheng street, Bao'an District, Shenzhen City, Guangdong Province

Patentee before: Shenzhen JIAYE Industry Development Co.,Ltd.

TR01 Transfer of patent right