CN115396145A - Block chain access control method based on centralized strategy - Google Patents

Block chain access control method based on centralized strategy Download PDF

Info

Publication number
CN115396145A
CN115396145A CN202210861119.2A CN202210861119A CN115396145A CN 115396145 A CN115396145 A CN 115396145A CN 202210861119 A CN202210861119 A CN 202210861119A CN 115396145 A CN115396145 A CN 115396145A
Authority
CN
China
Prior art keywords
access
data
user terminal
block chain
network node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210861119.2A
Other languages
Chinese (zh)
Inventor
余丹
兰雨晴
邢智涣
王丹星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Standard Intelligent Security Technology Co Ltd
Original Assignee
China Standard Intelligent Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Standard Intelligent Security Technology Co Ltd filed Critical China Standard Intelligent Security Technology Co Ltd
Priority to CN202210861119.2A priority Critical patent/CN115396145A/en
Publication of CN115396145A publication Critical patent/CN115396145A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a block chain access control method based on a centralized strategy, which analyzes a data access request of a user terminal through a central server terminal, so that the user terminal is given the right to perform data access on a specific block chain network node, the user terminal can only browse data, and the central server terminal is used for copying and sending the data, so that the user terminal is ensured to obtain a corresponding data copy and simultaneously, no adverse effect is generated on the data security of a block chain.

Description

Block chain access control method based on centralized strategy
Technical Field
The invention relates to the technical field of block chain data management, in particular to a block chain access control method based on a centralized strategy.
Background
The blockchain is a data storage technology, and can provide safe and stable secret storage for data. At present, a blockchain generally performs access management of data based on a centralized policy, that is, a central service terminal is set to perform centralized management on all user terminals, and when a user terminal initiates a data access request for the blockchain, and after the data access request is authenticated by the central service terminal, the user terminal is given access authority to the whole blockchain, so that the user terminal directly reads and copies data from the blockchain. However, the above method opens the access right of the whole block chain to the user terminal, so that the user terminal has an opportunity to edit the data of the block chain, and the block chain may have a potential safety hazard that the data is tampered.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a block chain access control method based on a centralized strategy, which analyzes a data access request from a user terminal through a central server terminal to obtain block chain network nodes expected to be accessed and an access sequence of the user terminal to the block chain network nodes; setting an access action life cycle of the block chain network node for the user terminal according to historical access information of the user terminal to the block chain; analyzing the access records of the user terminal to the data blocks of the block chain network node in the access action life cycle, determining the target data block from which the user terminal needs to acquire data, generating a data copy and a time-limited data packet of the target data block through the central server terminal, and sending the time-limited data packet to the user terminal; according to the method, the central server terminal analyzes the data access request of the user terminal, so that the user terminal is given the right to perform data access on the specific block chain network node, the user terminal can only browse data, the central server terminal is used for copying and sending the data, the user terminal is guaranteed to obtain the corresponding data copy, and no adverse effect is generated on the data security of the block chain.
The invention provides a block chain access control method based on a centralized strategy, which comprises the following steps:
step S1, a data access request from a user terminal is obtained through a central server terminal, and the data access request is analyzed and processed to obtain a block chain network node which the user terminal expects to access; determining the access sequence of the user terminal to the blockchain network nodes according to the current access state of the blockchain network nodes;
s2, determining the access duration of the user terminal to the network node of the block chain according to the historical access information of the user terminal to the block chain by the central server terminal; after the user terminal is distributed with the access authority to the block chain network node, setting an access action life cycle of the block chain network node for the user terminal according to the access duration by the central server terminal;
s3, acquiring an access record of the user terminal to the data block of the block chain network node in the access action life cycle; analyzing and processing the access record, and determining a target data block from which the user terminal needs to acquire data;
and S4, generating a data copy related to the target data block through a central server terminal, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to a user terminal.
Further, in step S1, obtaining, by the central server terminal, a data access request from the user terminal, and analyzing and processing the data access request, the obtaining of the network node of the blockchain that the user terminal desires to access specifically includes:
when a central server terminal receives a data access request from a user terminal, identifying and obtaining terminal identity information of the user terminal from the data access request; judging whether the terminal identity information is matched with a preset terminal identity information white list or not, and if so, determining that the data access request is a legal data access request; if not, determining that the data access request is an illegal data access request;
when the data access request is a legal data access request, analyzing and processing the data access request, and determining the data content and the creation time of data which a user terminal expects to access; determining a blockchain network node where data expected to be accessed is located from a blockchain according to the data content and the creation time;
and when the data access request is an illegal data access request, terminating the current data access process of the user terminal through the central server.
Further, in step S1, determining, according to the current access state of the blockchain network node, an access sequence of the user terminal to the blockchain network node specifically includes:
acquiring whether the block chain network node has legal data access requests from other user terminals at present, and if not, setting the current user terminal to have a first access sequence to the block chain network node;
if yes, determining the access sequence of the current user terminal to the block chain network node according to the preset terminal grade between the current user terminal and all other user terminals; the preset terminal level refers to the preset high or low level of the access authority of all user terminals to the block chain.
Further, in step S2, determining, by the central server terminal according to the historical access information of the user terminal to the blockchain, the access duration of the user terminal to the blockchain network node specifically includes:
acquiring historical access log information of the user terminal to the block chain through the central server terminal according to the terminal identity information of the user terminal;
analyzing and processing the historical access log information, and determining the historical total access times and the historical total access duration of the user terminal to the network nodes of the block chain;
and determining the average access duration of the user terminal to the network nodes of the block chain according to the historical total access times and the historical total access duration.
Further, in step S2, after the user terminal is assigned with the access right to the blockchain network node, setting, by the central server terminal according to the access duration, an access action lifecycle of the blockchain network node for the user terminal specifically includes:
when the central server terminal determines that the user terminal has a first access sequence to the block chain network nodes, the central server terminal allocates access rights to the user terminal to the block chain network nodes;
and setting an access action life cycle of the blockchain network node to the user terminal through the central server terminal, wherein the access action life cycle is not more than the average access duration.
Further, in step S3, the obtaining of the access record of the user terminal to the data block of the block chain network node in the access action lifecycle specifically includes:
and acquiring the data browsing duration of each data block of the block chain network node by the user terminal in the access action life cycle.
Further, in step S3, analyzing the access record, and determining a target data block from which the user terminal needs to obtain data specifically includes:
and if the data browsing duration corresponding to a certain data block is greater than or equal to a preset time threshold, determining that the data block is a target data block from which the user terminal needs to acquire data.
Further, in step S4, generating, by the central server terminal, a data copy related to the target data chunk, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to the user terminal specifically includes:
generating data copies of all stored data in the target data block through a central server terminal, packaging and compressing the data copies to form a time-limited data packet with a certain life cycle, and sending the time-limited data packet to a user terminal;
and if the continuous persistence time of the time-limited data packet in the user terminal is longer than the life cycle, triggering the time-limited data packet to be automatically destroyed.
Compared with the prior art, the block chain access control method based on the centralized strategy analyzes the data access request from the user terminal through the central server terminal to obtain the block chain network node expected to be accessed and the access sequence of the user terminal; setting an access action life cycle of the block chain network node for the user terminal according to historical access information of the user terminal to the block chain; analyzing the access records of the user terminal to the data blocks of the block chain network node in the access action life cycle, determining the target data block from which the user terminal needs to acquire data, generating a data copy and a time-limited data packet of the target data block through the central server terminal, and sending the time-limited data packet to the user terminal; according to the method, the central server terminal analyzes the data access request of the user terminal, so that the user terminal is given the right to perform data access on the specific block chain network node, the user terminal can only browse data, the central server terminal is used for copying and sending the data, the user terminal is guaranteed to obtain the corresponding data copy, and no adverse effect is generated on the data security of the block chain.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart illustrating a block chain access control method based on a centralized policy according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flowchart of a block chain access control method based on a centralized policy according to an embodiment of the present invention. The block chain access control method based on the centralization strategy comprises the following steps:
step S1, a data access request from a user terminal is obtained through a central server terminal, and the data access request is analyzed and processed to obtain a block chain network node which the user terminal expects to access; determining the access sequence of the user terminal to the blockchain network node according to the current access state of the blockchain network node;
s2, determining the access duration of the user terminal to the network node of the block chain according to the historical access information of the user terminal to the block chain by the central server terminal; after the user terminal is distributed with the access authority to the blockchain network node, setting an access action life cycle of the blockchain network node for the user terminal according to the access duration through the central server terminal;
s3, acquiring an access record of the user terminal to the data block of the block chain network node in the life cycle of the access action; analyzing and processing the access record, and determining a target data block from which the user terminal needs to acquire data;
and S4, generating a data copy related to the target data block through the central server terminal, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to the user terminal.
The beneficial effects of the above technical scheme are: the block chain access control method based on the centralized strategy analyzes a data access request from a user terminal through a central server terminal to obtain block chain network nodes expected to be accessed and an access sequence of the user terminal; setting an access action life cycle of the block chain network node for the user terminal according to historical access information of the user terminal to the block chain; analyzing the access records of the user terminal to the data blocks of the block chain network node in the access action life cycle, determining a target data block from which the user terminal needs to acquire data, generating a data copy and a time-limited data packet of the target data block through the central server terminal, and sending the time-limited data packet to the user terminal; according to the method, the central server terminal analyzes the data access request of the user terminal, so that the user terminal is given the right to perform data access on the specific block chain network node, the user terminal can only browse data, the central server terminal is used for copying and sending the data, the user terminal is guaranteed to obtain the corresponding data copy, and no adverse effect is generated on the data security of the block chain.
Preferably, in step S1, obtaining, by the central server terminal, a data access request from the user terminal, and performing analysis processing on the data access request, the obtaining of the blockchain network node that the user terminal desires to access specifically includes:
when the central server terminal receives a data access request from a user terminal, identifying and obtaining terminal identity information of the user terminal from the data access request; judging whether the terminal identity information is matched with a preset terminal identity information white list, if so, determining that the data access request is a legal data access request; if not, determining that the data access request is an illegal data access request;
when the data access request is a legal data access request, analyzing and processing the data access request, and determining the data content and the creation time of data which the user terminal expects to access; determining a blockchain network node where the data expected to be accessed is located from the blockchain according to the data content and the creation time;
when the data access request is an illegal data access request, the current data access process of the user terminal is terminated through the central server.
The beneficial effects of the above technical scheme are: through the method, the identification and authentication processing about the terminal identity information is firstly carried out on the data access request from the user terminal, and whether the current data access request is from the legal user terminal in the preset terminal identity information white list or not is determined, so that the condition that the illegal user terminal obtains the authority of accessing the block chain can be avoided, and the data security of the block chain is improved. In addition, data content and creation time of data expected to be accessed by the user terminal are extracted from the data access request from the user terminal, so that the block chain network node expected to be accessed by the user terminal can be accurately positioned, the data access efficiency of the user terminal to the block chain is improved, and data access congestion is avoided.
Preferably, in the step S1, determining an access sequence of the user terminal to the blockchain network node according to the current access state of the blockchain network node specifically includes:
acquiring whether a block chain network node currently has a legal data access request from other user terminals, and if not, setting the current user terminal to have a first access sequence for the block chain network node;
if the access sequence exists, determining the access sequence of the current user terminal to the network node of the block chain according to the preset terminal level between the current user terminal and all other user terminals; the preset terminal level refers to a preset high or low level of access authority of all user terminals to the block chain.
The beneficial effects of the above technical scheme are: by the above method, when a plurality of user terminals access the block chain simultaneously, the data access sequence of each user terminal to the block chain is orderly arranged, so that the phenomenon that the data access channel of the block chain is overloaded due to the simultaneous data access of the plurality of user terminals is avoided.
Preferably, in step S2, determining, by the central server terminal, the access duration of the user terminal to the network node of the block chain according to the historical access information of the user terminal to the block chain specifically includes:
acquiring historical access log information of the user terminal to the block chain through the central server terminal according to the terminal identity information of the user terminal;
analyzing and processing the historical access log information, and determining the historical total access times and the historical total access duration of the user terminal to the network node of the block chain;
and determining the average access duration of the user terminal to the block chain network node according to the historical total access times and the historical total access duration.
The beneficial effects of the above technical scheme are: by the method, the average access duration of the user terminal to the block chain network node is determined by taking the historical total access times and the historical total access duration of the user terminal to the block chain network node as references, so that a proper standard can be provided for the upper limit of the allowed access duration of the block chain currently accessed by the user terminal.
Preferably, in step S2, after the user terminal is assigned with the access right to the blockchain network node, setting, by the central server terminal according to the access duration, an access action lifecycle for the blockchain network node for the user terminal specifically includes:
when the central server terminal determines that the user terminal has a first access sequence to the blockchain network node, the central server terminal allocates access authority to the user terminal to the blockchain network node;
and setting an access action life cycle of the block chain network node to the user terminal through the central server terminal, wherein the access action life cycle is not more than the average access duration.
The beneficial effects of the above technical scheme are: by the mode, the access action life cycle of the user terminal to the block chain network node is set to be not more than the average access duration, so that the user terminal can be ensured to have sufficient time to carry out data access browsing on the block chain network node, and the user terminal is prevented from occupying longer time and compressing the normal access of other user terminals to the block chain.
Preferably, in step S3, the obtaining the access record of the user terminal to the data block of the blockchain network node in the access action lifecycle specifically includes:
and acquiring the data browsing duration of each data block of the block chain network node by the user terminal in the access action life cycle.
The beneficial effects of the above technical scheme are: by the method, when the user terminal obtains the right to access the corresponding block chain network node, the user terminal can browse the data of the corresponding block chain network node in the life cycle of the access action, wherein the browsing action is only limited to the user terminal to look up and browse the data of the block chain network node, and the user terminal cannot copy, cut, edit and the like the data. And when the whole data browsing duration of the user terminal at the blockchain network node exceeds the access action life cycle, the user terminal will automatically lose the corresponding access authority and be forced to exit the current blockchain network node.
Preferably, in step S3, analyzing the access record, and determining a target data block from which the user terminal needs to obtain data specifically includes:
and if the data browsing duration corresponding to a certain data block is greater than or equal to a preset time threshold, determining that the data block is a target data block from which the user terminal needs to acquire data.
The beneficial effects of the above technical scheme are: by the method, the data browsing duration time corresponding to each data block of the user terminal is taken as a reference, whether the data block belongs to a target data block from which the user terminal needs to acquire data or not is judged in a quantized mode, and data information stored in the target data block can be conveniently and accurately extracted and obtained in a follow-up mode.
Preferably, in step S4, generating a data copy related to the target data block by the central server terminal, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to the user terminal specifically includes:
generating data copies of all stored data in the target data block through a central server terminal, packaging and compressing the data copies to form a time-limited data packet with a certain life cycle, and sending the time-limited data packet to a user terminal;
and if the continuous persistence time of the time-limited data packet in the user terminal is longer than the life cycle, triggering the time-limited data packet to be automatically destroyed.
The beneficial effects of the above technical scheme are: through the mode, the central server terminal generates data copies of all stored data in the target data block, and packs and compresses the data copies to form a time-limited data packet with a certain life cycle, so that the central server terminal is only allowed to read and copy data of the block chain, and potential safety hazards to the block chain data caused by directly reading the data of the block chain by the user terminal are avoided; in addition, if the continuous persistence time of the time-limited data packet in the user terminal is longer than the life cycle, the time-limited data packet is triggered to be automatically destroyed, so that the time-limited data packet can be prevented from being illegally used by the user terminal.
As can be seen from the content of the foregoing embodiment, in the block chain access control method based on a centralized policy, a central server terminal analyzes a data access request from a user terminal to obtain a block chain network node to be accessed and an access order of the user terminal; setting an access action life cycle of the block chain network node for the user terminal according to historical access information of the user terminal to the block chain; analyzing the access records of the user terminal to the data blocks of the block chain network node in the access action life cycle, determining the target data block from which the user terminal needs to acquire data, generating a data copy and a time-limited data packet of the target data block through the central server terminal, and sending the time-limited data packet to the user terminal; according to the method, the central server terminal analyzes the data access request of the user terminal, so that the user terminal is given the right to perform data access on the specific blockchain network node, the user terminal can only browse data, and the central server terminal is used for copying and sending the data, so that the user terminal is ensured to obtain the corresponding data copy without any adverse effect on the data security of the blockchain.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (8)

1. The block chain access control method based on the centralized strategy is characterized by comprising the following steps:
step S1, a central server terminal acquires a data access request from a user terminal, and analyzes and processes the data access request to obtain a block chain network node which the user terminal expects to access; determining the access sequence of the user terminal to the blockchain network nodes according to the current access state of the blockchain network nodes;
s2, determining the access duration of the user terminal to the block chain network node through the central server terminal according to the historical access information of the user terminal to the block chain; after the user terminal is distributed with the access authority to the block chain network node, setting an access action life cycle of the block chain network node for the user terminal according to the access duration by the central server terminal;
s3, acquiring an access record of the user terminal to the data block of the block chain network node in the access action life cycle; analyzing and processing the access record, and determining a target data block from which the user terminal needs to acquire data;
and S4, generating a data copy related to the target data block through a central server terminal, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to a user terminal.
2. The centralized policy-based blockchain access control method of claim 1, wherein:
in step S1, obtaining, by the central server terminal, a data access request from the user terminal, and analyzing and processing the data access request, the obtaining of the blockchain network node that the user terminal desires to access specifically includes:
when a central server terminal receives a data access request from a user terminal, identifying and obtaining terminal identity information of the user terminal from the data access request; judging whether the terminal identity information is matched with a preset terminal identity information white list or not, and if so, determining that the data access request is a legal data access request; if not, determining that the data access request is an illegal data access request;
when the data access request is a legal data access request, analyzing and processing the data access request, and determining the data content and the creation time of data which a user terminal expects to access; determining a blockchain network node where data expected to be accessed is located from a blockchain according to the data content and the creation time;
and when the data access request is an illegal data access request, terminating the current data access process of the user terminal through the central server.
3. The centralized policy-based blockchain access control method of claim 2, wherein:
in step S1, determining, according to the current access state of the blockchain network node, an access sequence of the user terminal to the blockchain network node specifically includes:
acquiring whether a legal data access request from other user terminals exists in the block chain network node or not, and if not, setting the current user terminal to have a first access sequence to the block chain network node;
if the access sequence exists, determining the access sequence of the current user terminal to the block chain network node according to the preset terminal level between the current user terminal and all other user terminals; the preset terminal level refers to the preset access authority level of all user terminals to the block chain.
4. The centralized policy-based blockchain access control method of claim 3, wherein:
in step S2, determining, by the central server terminal, an access duration of the user terminal to the network node of the block chain according to historical access information of the user terminal to the block chain specifically includes:
acquiring historical access log information of the user terminal to the block chain through the central server terminal according to the terminal identity information of the user terminal;
analyzing and processing the historical access log information, and determining the historical total access times and the historical total access duration of the user terminal to the block chain network node;
and determining the average access duration of the user terminal to the block chain network node according to the historical total access times and the historical total access duration.
5. The centralized policy-based blockchain access control method of claim 4, wherein:
in step S2, after the user terminal is assigned with the access right to the blockchain network node, setting, by the central server terminal according to the access duration, an access action lifecycle for the blockchain network node to the user terminal specifically includes:
when the central server terminal determines that the user terminal has a first access sequence to the block chain network nodes, the central server terminal allocates access rights to the user terminal to the block chain network nodes;
and setting an access action life cycle of the block chain network node to the user terminal through the central server terminal, wherein the access action life cycle is not more than the average access duration.
6. The centralized policy-based blockchain access control method of claim 5, wherein:
in step S3, the obtaining of the access record of the user terminal to the data block of the block chain network node in the access action lifecycle specifically includes:
and acquiring the data browsing duration of each data block of the block chain network node by the user terminal in the access action life cycle.
7. The centralized policy-based blockchain access control method of claim 6, wherein:
in step S3, analyzing the access record, and determining a target data block from which the user terminal needs to obtain data specifically includes:
and if the data browsing duration corresponding to a certain data block is greater than or equal to a preset time threshold, determining that the data block is a target data block from which the user terminal needs to acquire data.
8. The centralized policy-based blockchain access control method of claim 7, wherein:
in step S4, generating, by the central server terminal, a data copy related to the target data chunk, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to the user terminal specifically includes:
generating data copies of all stored data in the target data block through a central server terminal, packaging and compressing the data copies to form a time-limited data packet with a certain life cycle, and then sending the time-limited data packet to a user terminal;
and if the continuous persistence time of the time-limited data packet in the user terminal is longer than the life cycle, triggering the time-limited data packet to be automatically destroyed.
CN202210861119.2A 2022-07-20 2022-07-20 Block chain access control method based on centralized strategy Pending CN115396145A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210861119.2A CN115396145A (en) 2022-07-20 2022-07-20 Block chain access control method based on centralized strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210861119.2A CN115396145A (en) 2022-07-20 2022-07-20 Block chain access control method based on centralized strategy

Publications (1)

Publication Number Publication Date
CN115396145A true CN115396145A (en) 2022-11-25

Family

ID=84117709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210861119.2A Pending CN115396145A (en) 2022-07-20 2022-07-20 Block chain access control method based on centralized strategy

Country Status (1)

Country Link
CN (1) CN115396145A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116614316A (en) * 2023-07-20 2023-08-18 国网四川省电力公司信息通信公司 Block chain data safety control method and system for multi-terminal scene

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116614316A (en) * 2023-07-20 2023-08-18 国网四川省电力公司信息通信公司 Block chain data safety control method and system for multi-terminal scene
CN116614316B (en) * 2023-07-20 2023-09-22 国网四川省电力公司信息通信公司 Block chain data safety control method and system for multi-terminal scene

Similar Documents

Publication Publication Date Title
CN107480555B (en) Database access authority control method and device based on block chain
CN111400714B (en) Virus detection method, device, equipment and storage medium
CN112231726B (en) Access control method and device based on trusted verification and computer equipment
CN115396145A (en) Block chain access control method based on centralized strategy
CN116545784B (en) Data center operation control method and system for multi-user scene
CN110830496B (en) Using method and operation method of system for preventing scanning authority file
CN112651010A (en) Method and device for verifying sliding verification code, computer equipment and medium
CN111935104A (en) Internet of things equipment illegal access detection method and device and computer equipment
CN115242546A (en) Industrial control system access control method based on zero trust architecture
CN109120609B (en) Social information reporting method and device based on block chain
CN111988644B (en) Anti-stealing-link method, device, equipment and storage medium for network video
CN111291300B (en) Webpage data processing method and device, webpage system and server
CN114036480B (en) Security access control method and system for private application and readable storage medium
CN114840492A (en) Big data based information processing method and device and readable storage medium
CN115134169A (en) Block chain data management method and system
CN115189937A (en) Security protection method and device for client data
CN114640536A (en) Data access monitoring method
CN113824738A (en) Method and system for node communication management in block chain
CN114244566A (en) Illegal external connection detection method and device based on IP address and computer equipment
CN112800132A (en) Block chain storage method of electronic file
CN116488820B (en) Electronic data security method based on data acquisition analysis
CN117040935B (en) Cloud computing-based node data security transmission method and system
CN116614316B (en) Block chain data safety control method and system for multi-terminal scene
CN111131254B (en) File processing method, block chain node, block chain and storage medium
CN101729504A (en) Method for implementing improving success ratio of access authentication of AAA server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination