CN115277252B - Data authorization method based on multi-signature mechanism - Google Patents

Data authorization method based on multi-signature mechanism Download PDF

Info

Publication number
CN115277252B
CN115277252B CN202211169136.6A CN202211169136A CN115277252B CN 115277252 B CN115277252 B CN 115277252B CN 202211169136 A CN202211169136 A CN 202211169136A CN 115277252 B CN115277252 B CN 115277252B
Authority
CN
China
Prior art keywords
data
authorization
sign
request
operator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211169136.6A
Other languages
Chinese (zh)
Other versions
CN115277252A (en
Inventor
谭克强
周宏超
郭思余
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Shutian Information Technology Co ltd
Original Assignee
Sichuan Shutian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Shutian Information Technology Co ltd filed Critical Sichuan Shutian Information Technology Co ltd
Priority to CN202211169136.6A priority Critical patent/CN115277252B/en
Publication of CN115277252A publication Critical patent/CN115277252A/en
Application granted granted Critical
Publication of CN115277252B publication Critical patent/CN115277252B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data authorization method based on a multi-sign mechanism, which belongs to the technical field of data interaction, and is characterized in that roles are divided into a data owner, a data operator and a data user, the data owner and the data operator are bound to create a multi-sign data authorization management address, the data user is bound to create a multi-sign data authorization request address, the authority and the method of related roles are clearly defined, and messages in all steps are recorded into a block chain, so that the safety, auditability, non-tampering and traceability of data authorization are improved, a randomly generated supervisor is used for authorization supervision, and the safety of authorization is improved.

Description

Data authorization method based on multi-signature mechanism
Technical Field
The invention belongs to the technical field of data interaction, and particularly relates to a data authorization method based on a multi-signature mechanism.
Background
Data resources are the fundamental basis for the development of digital economies. In order to better exploit the value of this element, data needs to be sufficiently distributed and utilized. However, in order to balance the authorized use of data and reduce the risk of data abuse, a public data resource system needs to be established, unified directory management is carried out to make and perfect the relevant standards of data, data collection and aggregation modes are standardized, the legal generation and effective aggregation and integration of data are ensured, a public data resource general survey, quality control, data check and assessment evaluation system is established, and a perfect data management system is established. The method has the advantages that a public data authorization operation mechanism is explored, a safe, auditable, non-falsifiable, extensible and simple and practicable data authorization method is provided, and the method has great significance.
There are many ways of data authorization, and common ways include: 1. storing the data authorization process and result through a centralized authorization server; by adopting the mode, the centralized authorization server can be accessed when the used data is required to be read every time, the advantages are that the data authorization can be conveniently managed and is relatively simple, the defects are that the centralized authorization server needs to have strong processing capacity and possibly forms single-point faults, in order to ensure high availability and high safety, special trusted equipment is generally adopted, the manufacturing cost is high, and professional personnel are required to maintain for a long time. 2. Each data provider maintains its own data authorization service. The scheme has the advantages that the service pressure of the system is dispersed, and the defect that a data provider can modify an authorization result at will and cannot achieve high credibility, full audit and complete non-tampering; legal disputes are easy to occur in the later operation and use process of the data.
And based on a point-to-point signature mechanism of the block chain technology, each authorization of data is recorded into the block chain, and each node stores authorization information. The block chain technology-based authorization information has the advantages that data consistency, auditability and non-falsification can be guaranteed through the authorization information based on the block chain technology, a decentralized distributed node network can guarantee high availability, and the block chain technology-based authorization information is required to be stored in each node, so that the block chain information is increased rapidly, and a large number of synchronous messages consume higher computing and storage resources.
How to realize data synchronization and reduce resource consumption under the conditions of high credibility, auditability and no falsification of a data authorization function is one of main problems in data interaction at present.
Disclosure of Invention
In view of the above problems in the prior art, the present invention provides a data authorization method based on a multi-signature mechanism, which aims to overcome at least one of the above disadvantages in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
a data authorization method based on a multi-signature mechanism specifically comprises the following steps:
s1, creating a multi-label data authorization management address:
the multi-label data authorization management is completed by assistance of a data operator, when the multi-label data authorization management is performed, the data operator binds the ID of the data operator and the ID of a data owner, and creates at least one multi-label data authorization management address based on the bound ID information, wherein when the multi-label data authorization management is performed, the data operator sets a threshold value for the multi-label authorization to be effective according to the authorization allowing information and the data type provided by the data owner, and when the authorization number reaches the threshold value for the multi-label authorization to be effective, the multi-label authorization effective condition is met; if one data can be accessed without authorization, namely the data is public data, setting a threshold value of multiple-sign authorization to be effective to be 1, and at the moment, authorization can be generated without a data owner agreeing with a data operator, and if one data needs to be approved by multiple persons and can pass by the data owner agreeing, setting the threshold value of multiple-sign authorization to be effective to be m +1; the number N of the data owners is more than or equal to m, and m is a positive integer more than 1;
s2, creating a multi-label data authorization request address:
the method comprises the following steps that a data user binds an ID of the data user and IDs of other data users to n IDs to create at least one multi-signature data authorization request address, a threshold value for the multi-signature request to take effect is set according to the source of a data request, if one data request only needs to be submitted by one person, the application is taken effect, the threshold value for the multi-signature request to take effect is set to be 1, if one data request needs to be applied by all the data users to take effect, the threshold value for the multi-signature request to take effect is set to be n, and the threshold value for the multi-signature request to take effect is a positive integer of 1~n; when a data user carries out a data authorization request, the condition that the request number reaches the corresponding multi-signature request validation threshold is the validation condition of the multi-signature request; n is a positive integer greater than 1;
step S3, submitting an authorization data application:
a data user sends a Request message signature to a multi-signature data authorization Request address by using a private key of the data user; if the condition that the multi-signature Request takes effect in the step S2 is met, the multi-signature data authorization Request address sends a Request message to the multi-signature data authorization management address;
s4, multi-signature approval of data application:
after receiving the valid data application, the multi-data authorization management address verifies the data application by a data operator, and if the data application does not pass the preliminary verification of the data operator, directly sends a Reject message to a data user and returns a rejection reason; if the data application passes the preliminary examination of the data operator and can be authorized without the consent of the data owner, directly entering the next step; if the data application passes the preliminary examination of the data operator and needs the authorization of the data owner, the data operator initiates a prompt message to the multi-sign data authorization management address by using the private key of the data operator to wait for the prompt message of the data owner;
and S5, conveying an approval result:
if the effective condition of the multi-sign authorization in the step S1 is met, the multi-sign data authorization management address sends an approval result and a corresponding authorization code to the multi-sign data authorization request address;
step S6, request data verification:
the data user transmits the authorization code and the request content to the data management node, and the data management node returns a response data field after verifying the signature and the information correctness;
the data owner has ownership and authorization functions of the data, the authorized and requested data are stored in the data operator, the data operator has data operation and management capacity, and the data user has data use application and viewing behaviors.
Compared with the prior art, the invention has at least the following beneficial effects:
1. the method is a brand-new method in the field of data management and data authorization, the roles are divided into a data owner, a data operator and a data user, and the authority and the method of the related roles are clearly defined, so that the ownership, the operation right and the use right of the data are completely protected. In addition, the operation management of the data is realized through a multi-label technology based on the block chain, and the information of each step is recorded into the block chain, so that the safety, auditability, non-tampering and traceability of data authorization are improved. The multi-sign roles can be regarded as roles serving as agents, namely a data owner and a data operator can form a multi-sign agent, and a plurality of data users can be bound into one multi-sign to complete batch authorization, so that mutual communication and data synchronization among nodes are greatly reduced, multi-sign and/or binding are carried out on different roles, and the resource consumption of a system is reduced while the safety is improved;
2. the auxiliary function of a data operator is fully exerted, the randomly generated supervisor is used for authorization supervision, the authorization safety is improved, and malicious collusion between partial data owners and data users can be effectively prevented.
Drawings
Fig. 1 is a schematic diagram of an infrastructure of a data authorization method adopted by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
As shown in fig. 1, the present invention provides a data authorization method based on a multi-signature mechanism, which specifically includes the following steps:
s1, creating a multi-label data authorization management address:
the multi-label data authorization management is completed by assistance of a data operator, when the multi-label data authorization management is performed, the data operator binds the ID of the data operator and the ID of a data owner, and creates at least one multi-label data authorization management address based on the bound ID information, wherein when the multi-label data authorization management is performed, the data operator sets a threshold value for the multi-label authorization to be effective according to the authorization allowing information and the data type provided by the data owner, and when the authorization number reaches the threshold value for the multi-label authorization to be effective, the multi-label authorization effective condition is met; if one data can be accessed without authorization, that is, the data is public data, the threshold value of multiple-sign authorization validation is set to be 1, at this time, authorization can be generated without a data owner agreeing to a data operator, and if one data needs to be approved by multiple persons and can pass by the approval of m data owners (for example, a data owner a and a data owner B in fig. 1), the threshold value of multiple-sign authorization validation is set to be m +1; wherein the number N of data owners is more than or equal to m, and m is a positive integer more than 1;
s2, creating a multi-label data authorization request address:
the data user binds the ID of the data user and the IDs of other data users to create at least one multi-label data authorization request address (such as the data users A, B and C in fig. 1) by summing up n IDs, and sets a threshold value for the multi-label request to take effect according to the source of the data request, if one data request is submitted by only one person, the application is taken effect, the threshold value for the multi-label request to take effect is set to be 1, and if one data request needs all the data users to apply for taking effect, the threshold value for the multi-label request to take effect is set to be n; when a data user carries out a data authorization request, the number of requests reaches the corresponding multiple-signature request validation threshold value, namely, the condition that the multiple-signature request is validated is met; n is a positive integer greater than 1;
step S3, submitting an authorization data application:
a data user uses a private key of the data user to send a Request message signature to a multi-signature data authorization Request address, wherein the Request content comprises an ID (identity) of the data user, a data validity period, multi-signature data authorization management address information corresponding to data and the like; if the conditions that the multi-signature Request takes effect in the step S2 are met, the multi-signature data authorization Request address sends a Request message to the multi-signature data authorization management address;
s4, applying for multiple data to examine and approve:
after receiving the valid data application, the multi-data authorization management address verifies the data application by a data operator, and if the data application does not pass the preliminary verification of the data operator, directly sends a Reject message to a data user and returns a Reject reason; if the data application passes the preliminary examination of the data operator and can be authorized without the consent of the data owner, directly entering the next step; if the data application passes the preliminary audit of the data operator and needs the authorization of the data owner, the data operator can use the private key of the data operator to initiate a prompt (proposal) message to the multi-sign data authorization management address and wait for the Approve message of the data owner;
and S5, conveying an approval result:
if the effective condition of the multi-sign authorization in the step S1 is met, the multi-sign data authorization management address sends an approval result and a corresponding authorization code to the multi-sign data authorization request address;
step S6, request data verification:
the data user transmits the authorization code and the request content to the data management node, and the data management node returns a response data field after verifying the signature and the information correctness;
the data owner has ownership and authorization functions of the data, the authorized and requested data are stored in the data operator, the data operator has data operation and management capacity, and the data user has data use application and viewing behaviors.
In order to better realize the purpose of the invention, in the whole process, the request, authorization, approval, transmission and verification of the data form corresponding data information lists, the data information lists are stored on a block chain, and labels of all data are generated according to the data information lists and are used for uniquely identifying all data for data tracing query; this facilitates risk checking in the process.
As an alternative preferred scheme, only a small part of the authorization and request data (which may also include data of the processes of approval, communication and verification) is stored at the data operator, and the small part of the data is also held in the hands of the data owner and the data user, the small part of the data is data (for example, only 5% to 10% of the total data) obtained by randomly fragmenting the authorization and request data, the rest of the authorization and request data is stored in the block chain, and the complete authorization and request data can be obtained only when the authorization and request data stored in the block chain is matched with the small part of the data after the fragmentation processing. The advantage of this is that most data is stored in the blockchain, which reduces the data storage pressure of the data owner, the data user and the data operator, and the small part of data stored in the fragmentation is equivalent to a key provided to the data owner, the data user and the data operator, and the three parties can perform the traceability query on the whole process.
In order to better achieve the object of the present invention, in step S5, after the validation condition of the multi-sign authorization in step S1 is reached, the data operator further determines the number of data owners not participating in the multi-sign authorization, if (N-m) is greater than or equal to t and m/N <0.6 (t is a preset lower limit of the number of data owners not participating in the multi-sign authorization, for example, 5, 10, or 20, … …, and so on, and m/N is greater than or equal to 0.6, it can be determined that full-person authorization of the data owner has been performed), the data operator assigns and encodes the data owners not participating in the multi-sign authorization, the encoding value is 0 to (N-m), then a random encoding value is generated by using a random number [0, (N-m) ] function, the data operator specifies the data owners not participating in the multi-sign authorization corresponding to the encoding value according to the generated random encoding value, and uses the random encoding value as a (for example, the data owner in fig. 1) to perform corresponding multi-sign authorization management on the data when the multi-sign authorization is approved, and the supervision result is also made to be the multi-sign authorization. Because the supervisor is randomly generated, malicious collusion among partial data owners can be effectively avoided, and data authorization security is ensured.
Further preferably, when random code values are generated by using random, random [0, (N-m) ] function, multiple random generation operations may be performed, thereby designating multiple supervisors for authorized supervision.
Further preferably, the data operator is further provided with a clock module, after the administrator is designated, if the administrator does not respond within a specified time, the random-code [0, (N-m) ] function is reused to generate a random code value, and the random code value generated anew needs to be excluded from the code values generated previously, so that the rest of data owners are designated as the administrators. If the authorization approval from the supervisor is not received after a plurality of supervisors (such as 3~5) are specified continuously and the preset time t' is reached, the default supervisor already makes the authorization and enters the subsequent process.
Preferably, the data operator is an intelligent auxiliary robot, preferably a big data analysis and decision robot.
It should be noted that each role of the whole data authorization process has a unique public-private key signature pair.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.

Claims (8)

1. A data authorization method based on a multi-signature mechanism is characterized by comprising the following steps:
s1, creating a multi-label data authorization management address:
the multi-sign data authorization management is completed by assistance of a data operator, when the multi-sign data authorization management is carried out, the data operator binds the ID of the data operator and the ID of a data owner, and at least one multi-sign data authorization management address is created based on the bound ID information; the data operator sets a threshold value for the multiple-sign authorization to take effect according to the authorization allowing information and the data type provided by the data owner, and when the authorization number reaches the threshold value for the multiple-sign authorization to take effect, the multiple-sign authorization taking effect condition is met;
s2, creating a multi-label data authorization request address:
the method comprises the steps that a data user binds own ID and IDs of other data users to n data user IDs in total to create at least one multi-sign data authorization request address, and sets a threshold value for the multi-sign request to take effect according to a source of a data request, wherein when the data user carries out a data authorization request, the condition that the multi-sign request takes effect when the request number reaches the corresponding threshold value for the multi-sign request to take effect is the condition for achieving the multi-sign request to take effect; n is a positive integer greater than 1;
step S3, submitting an authorization data application:
a data user sends a request message signature to a multi-signature data authorization request address by using a private key of the data user; if the condition that the multi-sign request is valid in the step S2 is met, the multi-sign data authorization request address sends a request message to the multi-sign data authorization management address;
s4, applying for multiple data to examine and approve:
after receiving the valid data application, the multi-data authorization management address verifies the data application by a data operator, and if the data application does not pass the preliminary verification of the data operator, directly sends a rejection message to the data user and returns a rejection reason; if the data application passes the preliminary examination of the data operator and can be authorized without the consent of the data owner, directly entering the next step; if the data application passes the preliminary examination of the data operator and needs the authorization of the data owner, the data operator can use the private key of the data operator to initiate a proposal message to the multi-sign data authorization management address and wait for the approval message of the data owner;
and S5, conveying an approval result:
if the effective condition of the multi-sign authorization in the step S1 is met, the multi-sign data authorization management address sends an approval result and a corresponding authorization code to the multi-sign data authorization request address;
s6, request data verification:
the data user transmits the authorization code and the request content to the data management node, and the data management node returns a response data field after verifying the signature and the information correctness;
the data owner has ownership and authorization functions of the data, the authorized and requested data are stored in the data operator, the data operator has data operation and management capacity, and the data user has data use application and viewing behaviors.
2. The data authorization method based on the multi-sign mechanism according to claim 1, wherein in step S1, when performing multi-sign data authorization management, the data operator sets a threshold for the multi-sign authorization to take effect according to authorization-allowing information and data types provided by the data owner, and if one data can be accessed without authorization, that is, the data is public data, the threshold for the multi-sign authorization to take effect is set to 1, and at this time, authorization can be generated without the data owner agreeing to the data operator, and if one data needs to be approved by multiple persons, and m data owners must agree to pass, the threshold for the multi-sign authorization to take effect is set to m +1; wherein the number N of data owners is more than or equal to m, and m is a positive integer more than 1;
in step S2, if a data request only needs to be submitted by one person, i.e., the application becomes effective, the threshold value of the multiple-sign request becoming effective is set to 1, and if a data request needs to be applied by all data users to become effective, the threshold value of the multiple-sign request becoming effective is set to n, and the value of the threshold value of the multiple-sign request becoming effective is a positive integer of 1~n.
3. The data authorization method based on the multi-signature mechanism as claimed in claim 2, wherein in the whole data authorization process, the request, authorization, approval, transmission and verification of data form corresponding data information lists, the data information lists are stored in a block chain, and tags of each piece of data are generated according to the data information lists, and are used for uniquely identifying each piece of data for data source-tracing query.
4. The method as claimed in claim 3, wherein in step S5, after the validation condition of the multi-sign authorization in step S1 is reached, the method further includes that the data operator determines the number of data owners not participating in the multi-sign authorization, if (N-m) is greater than or equal to t and m/N is less than 0.6, the data operator performs assignment coding on the data owners not participating in the multi-sign authorization, the coding takes a value of 0 to (N-m), then a random number is generated by using a random number random [0, (N-m) ] function, the data operator specifies, according to the generated random number, the data owners not participating in the multi-sign authorization corresponding to the random number, and uses the data owners as the supervisor to supervise the multi-sign authorization in step S1, and when the supervisor also performs authorization approval, the data operator sends the approval result and the corresponding authorization code to the multi-sign authorization request address through the multi-sign data authorization management address; and t is a preset lower limit of the number of data owners which do not participate in the multi-sign authorization.
5. A data authorization method based on multi-signature mechanism, according to claim 4, characterized in that, when random code value is generated by using random. Random [0, (N-m) ] function, multiple random generation operations are performed, thereby designating multiple supervisors for authorization supervision.
6. The method as claimed in claim 5, wherein a clock module is further provided at the data operator, and after the administrator is designated, if the administrator does not respond within a specified time, random-code [0 (N-m) ] function is reused to generate the random code value, and the random code value generated again needs to be excluded from the code values generated previously, thereby designating the rest of data owners as the administrators.
7. The method as claimed in claim 6, wherein if no authorization approval from the administrator is received after the multiple administrators are consecutively assigned and the predetermined time t' is reached, the default administrator has made authorization and enters the subsequent process.
8. The method as claimed in claim 2 or 3, wherein instead, only a small part of the authorization and request data is stored at the data operator, and the small part of the data is also held by the data owner and the data user, the small part of the data is obtained after the authorization and request data is randomly fragmented, and the rest of the authorization and request data is stored in the block chain.
CN202211169136.6A 2022-09-26 2022-09-26 Data authorization method based on multi-signature mechanism Active CN115277252B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211169136.6A CN115277252B (en) 2022-09-26 2022-09-26 Data authorization method based on multi-signature mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211169136.6A CN115277252B (en) 2022-09-26 2022-09-26 Data authorization method based on multi-signature mechanism

Publications (2)

Publication Number Publication Date
CN115277252A CN115277252A (en) 2022-11-01
CN115277252B true CN115277252B (en) 2022-11-25

Family

ID=83756904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211169136.6A Active CN115277252B (en) 2022-09-26 2022-09-26 Data authorization method based on multi-signature mechanism

Country Status (1)

Country Link
CN (1) CN115277252B (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869102B (en) * 2014-02-24 2019-04-02 腾讯科技(北京)有限公司 Authorization method, device and system based on xAuth agreement
CN106850654B (en) * 2017-02-23 2020-08-21 布比(北京)网络技术有限公司 Distributed information authorized access method and system
CN109088857B (en) * 2018-07-12 2020-12-25 中国电子科技集团公司第十五研究所 Distributed authorization management method in scene of Internet of things
CN111835528B (en) * 2020-07-16 2023-04-07 广州大学 Decentralized Internet of things cross-domain access authorization method and system
CN214896409U (en) * 2021-01-19 2021-11-26 四川蜀天信息技术有限公司 Big data analysis device based on neural network algorithm
CN113127910B (en) * 2021-04-30 2022-04-12 复旦大学 Controllable anonymous voting system based on block chain and decentralization traceable attribute signature
CN114697073B (en) * 2022-02-22 2023-12-22 昆明理工大学 Telecommunication operator data security sharing method based on blockchain

Also Published As

Publication number Publication date
CN115277252A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
RU2670778C1 (en) Forming the key depending on the parameter
CN110278462B (en) Block chain-based mobile showing authorization management method
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
CN102891840B (en) Based on the Information Security Management System of separation of the three powers and the management method of information security
CN103259663A (en) User unified authentication method in cloud computing environment
CN113256297B (en) Data processing method, device and equipment based on block chain and readable storage medium
CN112152778B (en) Node management method and device and electronic equipment
CN108881309A (en) Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform
CN113708934A (en) Energy internet credible interaction data model based on block chain in heterogeneous environment
CN110719298A (en) Method and device for supporting user-defined change of privileged account password
CN112818056A (en) Log security sharing method, system and device of block chain
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN115987697A (en) Multi-level information data sharing method and system based on event subscription mechanism
WO2022141024A1 (en) Blockchain technology-based business transaction method and system, and storage medium
CN112651044B (en) Business transaction method, system and storage medium based on block chain technology
CN111327602B (en) Equipment access processing method, equipment and storage medium
CN113342617A (en) Equipment monitoring method, system, device, computer equipment and storage medium
CN113315753A (en) Block data credibility recovery method based on coding technology
CN111506661B (en) Content access management method, device and storage medium
CN113011960A (en) Block chain-based data access method, device, medium and electronic equipment
CN115277252B (en) Data authorization method based on multi-signature mechanism
CN115189959A (en) Account login and access management method based on master-slave account
CN113014540A (en) Data processing method, device, equipment and storage medium
CN114499872B (en) Starfire chain crossing method and device based on industrial Internet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant