CN115396145A - Block chain access control method based on centralized strategy - Google Patents
Block chain access control method based on centralized strategy Download PDFInfo
- Publication number
- CN115396145A CN115396145A CN202210861119.2A CN202210861119A CN115396145A CN 115396145 A CN115396145 A CN 115396145A CN 202210861119 A CN202210861119 A CN 202210861119A CN 115396145 A CN115396145 A CN 115396145A
- Authority
- CN
- China
- Prior art keywords
- access
- data
- user terminal
- block chain
- network node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a block chain access control method based on a centralized strategy, which analyzes a data access request of a user terminal through a central server terminal, so that the user terminal is given the right to perform data access on a specific block chain network node, the user terminal can only browse data, and the central server terminal is used for copying and sending the data, so that the user terminal is ensured to obtain a corresponding data copy and simultaneously, no adverse effect is generated on the data security of a block chain.
Description
Technical Field
The invention relates to the technical field of block chain data management, in particular to a block chain access control method based on a centralized strategy.
Background
The blockchain is a data storage technology, and can provide safe and stable secret storage for data. At present, a blockchain generally performs access management of data based on a centralized policy, that is, a central service terminal is set to perform centralized management on all user terminals, and when a user terminal initiates a data access request for the blockchain, and after the data access request is authenticated by the central service terminal, the user terminal is given access authority to the whole blockchain, so that the user terminal directly reads and copies data from the blockchain. However, the above method opens the access right of the whole block chain to the user terminal, so that the user terminal has an opportunity to edit the data of the block chain, and the block chain may have a potential safety hazard that the data is tampered.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a block chain access control method based on a centralized strategy, which analyzes a data access request from a user terminal through a central server terminal to obtain block chain network nodes expected to be accessed and an access sequence of the user terminal to the block chain network nodes; setting an access action life cycle of the block chain network node for the user terminal according to historical access information of the user terminal to the block chain; analyzing the access records of the user terminal to the data blocks of the block chain network node in the access action life cycle, determining the target data block from which the user terminal needs to acquire data, generating a data copy and a time-limited data packet of the target data block through the central server terminal, and sending the time-limited data packet to the user terminal; according to the method, the central server terminal analyzes the data access request of the user terminal, so that the user terminal is given the right to perform data access on the specific block chain network node, the user terminal can only browse data, the central server terminal is used for copying and sending the data, the user terminal is guaranteed to obtain the corresponding data copy, and no adverse effect is generated on the data security of the block chain.
The invention provides a block chain access control method based on a centralized strategy, which comprises the following steps:
step S1, a data access request from a user terminal is obtained through a central server terminal, and the data access request is analyzed and processed to obtain a block chain network node which the user terminal expects to access; determining the access sequence of the user terminal to the blockchain network nodes according to the current access state of the blockchain network nodes;
s2, determining the access duration of the user terminal to the network node of the block chain according to the historical access information of the user terminal to the block chain by the central server terminal; after the user terminal is distributed with the access authority to the block chain network node, setting an access action life cycle of the block chain network node for the user terminal according to the access duration by the central server terminal;
s3, acquiring an access record of the user terminal to the data block of the block chain network node in the access action life cycle; analyzing and processing the access record, and determining a target data block from which the user terminal needs to acquire data;
and S4, generating a data copy related to the target data block through a central server terminal, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to a user terminal.
Further, in step S1, obtaining, by the central server terminal, a data access request from the user terminal, and analyzing and processing the data access request, the obtaining of the network node of the blockchain that the user terminal desires to access specifically includes:
when a central server terminal receives a data access request from a user terminal, identifying and obtaining terminal identity information of the user terminal from the data access request; judging whether the terminal identity information is matched with a preset terminal identity information white list or not, and if so, determining that the data access request is a legal data access request; if not, determining that the data access request is an illegal data access request;
when the data access request is a legal data access request, analyzing and processing the data access request, and determining the data content and the creation time of data which a user terminal expects to access; determining a blockchain network node where data expected to be accessed is located from a blockchain according to the data content and the creation time;
and when the data access request is an illegal data access request, terminating the current data access process of the user terminal through the central server.
Further, in step S1, determining, according to the current access state of the blockchain network node, an access sequence of the user terminal to the blockchain network node specifically includes:
acquiring whether the block chain network node has legal data access requests from other user terminals at present, and if not, setting the current user terminal to have a first access sequence to the block chain network node;
if yes, determining the access sequence of the current user terminal to the block chain network node according to the preset terminal grade between the current user terminal and all other user terminals; the preset terminal level refers to the preset high or low level of the access authority of all user terminals to the block chain.
Further, in step S2, determining, by the central server terminal according to the historical access information of the user terminal to the blockchain, the access duration of the user terminal to the blockchain network node specifically includes:
acquiring historical access log information of the user terminal to the block chain through the central server terminal according to the terminal identity information of the user terminal;
analyzing and processing the historical access log information, and determining the historical total access times and the historical total access duration of the user terminal to the network nodes of the block chain;
and determining the average access duration of the user terminal to the network nodes of the block chain according to the historical total access times and the historical total access duration.
Further, in step S2, after the user terminal is assigned with the access right to the blockchain network node, setting, by the central server terminal according to the access duration, an access action lifecycle of the blockchain network node for the user terminal specifically includes:
when the central server terminal determines that the user terminal has a first access sequence to the block chain network nodes, the central server terminal allocates access rights to the user terminal to the block chain network nodes;
and setting an access action life cycle of the blockchain network node to the user terminal through the central server terminal, wherein the access action life cycle is not more than the average access duration.
Further, in step S3, the obtaining of the access record of the user terminal to the data block of the block chain network node in the access action lifecycle specifically includes:
and acquiring the data browsing duration of each data block of the block chain network node by the user terminal in the access action life cycle.
Further, in step S3, analyzing the access record, and determining a target data block from which the user terminal needs to obtain data specifically includes:
and if the data browsing duration corresponding to a certain data block is greater than or equal to a preset time threshold, determining that the data block is a target data block from which the user terminal needs to acquire data.
Further, in step S4, generating, by the central server terminal, a data copy related to the target data chunk, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to the user terminal specifically includes:
generating data copies of all stored data in the target data block through a central server terminal, packaging and compressing the data copies to form a time-limited data packet with a certain life cycle, and sending the time-limited data packet to a user terminal;
and if the continuous persistence time of the time-limited data packet in the user terminal is longer than the life cycle, triggering the time-limited data packet to be automatically destroyed.
Compared with the prior art, the block chain access control method based on the centralized strategy analyzes the data access request from the user terminal through the central server terminal to obtain the block chain network node expected to be accessed and the access sequence of the user terminal; setting an access action life cycle of the block chain network node for the user terminal according to historical access information of the user terminal to the block chain; analyzing the access records of the user terminal to the data blocks of the block chain network node in the access action life cycle, determining the target data block from which the user terminal needs to acquire data, generating a data copy and a time-limited data packet of the target data block through the central server terminal, and sending the time-limited data packet to the user terminal; according to the method, the central server terminal analyzes the data access request of the user terminal, so that the user terminal is given the right to perform data access on the specific block chain network node, the user terminal can only browse data, the central server terminal is used for copying and sending the data, the user terminal is guaranteed to obtain the corresponding data copy, and no adverse effect is generated on the data security of the block chain.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart illustrating a block chain access control method based on a centralized policy according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flowchart of a block chain access control method based on a centralized policy according to an embodiment of the present invention. The block chain access control method based on the centralization strategy comprises the following steps:
step S1, a data access request from a user terminal is obtained through a central server terminal, and the data access request is analyzed and processed to obtain a block chain network node which the user terminal expects to access; determining the access sequence of the user terminal to the blockchain network node according to the current access state of the blockchain network node;
s2, determining the access duration of the user terminal to the network node of the block chain according to the historical access information of the user terminal to the block chain by the central server terminal; after the user terminal is distributed with the access authority to the blockchain network node, setting an access action life cycle of the blockchain network node for the user terminal according to the access duration through the central server terminal;
s3, acquiring an access record of the user terminal to the data block of the block chain network node in the life cycle of the access action; analyzing and processing the access record, and determining a target data block from which the user terminal needs to acquire data;
and S4, generating a data copy related to the target data block through the central server terminal, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to the user terminal.
The beneficial effects of the above technical scheme are: the block chain access control method based on the centralized strategy analyzes a data access request from a user terminal through a central server terminal to obtain block chain network nodes expected to be accessed and an access sequence of the user terminal; setting an access action life cycle of the block chain network node for the user terminal according to historical access information of the user terminal to the block chain; analyzing the access records of the user terminal to the data blocks of the block chain network node in the access action life cycle, determining a target data block from which the user terminal needs to acquire data, generating a data copy and a time-limited data packet of the target data block through the central server terminal, and sending the time-limited data packet to the user terminal; according to the method, the central server terminal analyzes the data access request of the user terminal, so that the user terminal is given the right to perform data access on the specific block chain network node, the user terminal can only browse data, the central server terminal is used for copying and sending the data, the user terminal is guaranteed to obtain the corresponding data copy, and no adverse effect is generated on the data security of the block chain.
Preferably, in step S1, obtaining, by the central server terminal, a data access request from the user terminal, and performing analysis processing on the data access request, the obtaining of the blockchain network node that the user terminal desires to access specifically includes:
when the central server terminal receives a data access request from a user terminal, identifying and obtaining terminal identity information of the user terminal from the data access request; judging whether the terminal identity information is matched with a preset terminal identity information white list, if so, determining that the data access request is a legal data access request; if not, determining that the data access request is an illegal data access request;
when the data access request is a legal data access request, analyzing and processing the data access request, and determining the data content and the creation time of data which the user terminal expects to access; determining a blockchain network node where the data expected to be accessed is located from the blockchain according to the data content and the creation time;
when the data access request is an illegal data access request, the current data access process of the user terminal is terminated through the central server.
The beneficial effects of the above technical scheme are: through the method, the identification and authentication processing about the terminal identity information is firstly carried out on the data access request from the user terminal, and whether the current data access request is from the legal user terminal in the preset terminal identity information white list or not is determined, so that the condition that the illegal user terminal obtains the authority of accessing the block chain can be avoided, and the data security of the block chain is improved. In addition, data content and creation time of data expected to be accessed by the user terminal are extracted from the data access request from the user terminal, so that the block chain network node expected to be accessed by the user terminal can be accurately positioned, the data access efficiency of the user terminal to the block chain is improved, and data access congestion is avoided.
Preferably, in the step S1, determining an access sequence of the user terminal to the blockchain network node according to the current access state of the blockchain network node specifically includes:
acquiring whether a block chain network node currently has a legal data access request from other user terminals, and if not, setting the current user terminal to have a first access sequence for the block chain network node;
if the access sequence exists, determining the access sequence of the current user terminal to the network node of the block chain according to the preset terminal level between the current user terminal and all other user terminals; the preset terminal level refers to a preset high or low level of access authority of all user terminals to the block chain.
The beneficial effects of the above technical scheme are: by the above method, when a plurality of user terminals access the block chain simultaneously, the data access sequence of each user terminal to the block chain is orderly arranged, so that the phenomenon that the data access channel of the block chain is overloaded due to the simultaneous data access of the plurality of user terminals is avoided.
Preferably, in step S2, determining, by the central server terminal, the access duration of the user terminal to the network node of the block chain according to the historical access information of the user terminal to the block chain specifically includes:
acquiring historical access log information of the user terminal to the block chain through the central server terminal according to the terminal identity information of the user terminal;
analyzing and processing the historical access log information, and determining the historical total access times and the historical total access duration of the user terminal to the network node of the block chain;
and determining the average access duration of the user terminal to the block chain network node according to the historical total access times and the historical total access duration.
The beneficial effects of the above technical scheme are: by the method, the average access duration of the user terminal to the block chain network node is determined by taking the historical total access times and the historical total access duration of the user terminal to the block chain network node as references, so that a proper standard can be provided for the upper limit of the allowed access duration of the block chain currently accessed by the user terminal.
Preferably, in step S2, after the user terminal is assigned with the access right to the blockchain network node, setting, by the central server terminal according to the access duration, an access action lifecycle for the blockchain network node for the user terminal specifically includes:
when the central server terminal determines that the user terminal has a first access sequence to the blockchain network node, the central server terminal allocates access authority to the user terminal to the blockchain network node;
and setting an access action life cycle of the block chain network node to the user terminal through the central server terminal, wherein the access action life cycle is not more than the average access duration.
The beneficial effects of the above technical scheme are: by the mode, the access action life cycle of the user terminal to the block chain network node is set to be not more than the average access duration, so that the user terminal can be ensured to have sufficient time to carry out data access browsing on the block chain network node, and the user terminal is prevented from occupying longer time and compressing the normal access of other user terminals to the block chain.
Preferably, in step S3, the obtaining the access record of the user terminal to the data block of the blockchain network node in the access action lifecycle specifically includes:
and acquiring the data browsing duration of each data block of the block chain network node by the user terminal in the access action life cycle.
The beneficial effects of the above technical scheme are: by the method, when the user terminal obtains the right to access the corresponding block chain network node, the user terminal can browse the data of the corresponding block chain network node in the life cycle of the access action, wherein the browsing action is only limited to the user terminal to look up and browse the data of the block chain network node, and the user terminal cannot copy, cut, edit and the like the data. And when the whole data browsing duration of the user terminal at the blockchain network node exceeds the access action life cycle, the user terminal will automatically lose the corresponding access authority and be forced to exit the current blockchain network node.
Preferably, in step S3, analyzing the access record, and determining a target data block from which the user terminal needs to obtain data specifically includes:
and if the data browsing duration corresponding to a certain data block is greater than or equal to a preset time threshold, determining that the data block is a target data block from which the user terminal needs to acquire data.
The beneficial effects of the above technical scheme are: by the method, the data browsing duration time corresponding to each data block of the user terminal is taken as a reference, whether the data block belongs to a target data block from which the user terminal needs to acquire data or not is judged in a quantized mode, and data information stored in the target data block can be conveniently and accurately extracted and obtained in a follow-up mode.
Preferably, in step S4, generating a data copy related to the target data block by the central server terminal, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to the user terminal specifically includes:
generating data copies of all stored data in the target data block through a central server terminal, packaging and compressing the data copies to form a time-limited data packet with a certain life cycle, and sending the time-limited data packet to a user terminal;
and if the continuous persistence time of the time-limited data packet in the user terminal is longer than the life cycle, triggering the time-limited data packet to be automatically destroyed.
The beneficial effects of the above technical scheme are: through the mode, the central server terminal generates data copies of all stored data in the target data block, and packs and compresses the data copies to form a time-limited data packet with a certain life cycle, so that the central server terminal is only allowed to read and copy data of the block chain, and potential safety hazards to the block chain data caused by directly reading the data of the block chain by the user terminal are avoided; in addition, if the continuous persistence time of the time-limited data packet in the user terminal is longer than the life cycle, the time-limited data packet is triggered to be automatically destroyed, so that the time-limited data packet can be prevented from being illegally used by the user terminal.
As can be seen from the content of the foregoing embodiment, in the block chain access control method based on a centralized policy, a central server terminal analyzes a data access request from a user terminal to obtain a block chain network node to be accessed and an access order of the user terminal; setting an access action life cycle of the block chain network node for the user terminal according to historical access information of the user terminal to the block chain; analyzing the access records of the user terminal to the data blocks of the block chain network node in the access action life cycle, determining the target data block from which the user terminal needs to acquire data, generating a data copy and a time-limited data packet of the target data block through the central server terminal, and sending the time-limited data packet to the user terminal; according to the method, the central server terminal analyzes the data access request of the user terminal, so that the user terminal is given the right to perform data access on the specific blockchain network node, the user terminal can only browse data, and the central server terminal is used for copying and sending the data, so that the user terminal is ensured to obtain the corresponding data copy without any adverse effect on the data security of the blockchain.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (8)
1. The block chain access control method based on the centralized strategy is characterized by comprising the following steps:
step S1, a central server terminal acquires a data access request from a user terminal, and analyzes and processes the data access request to obtain a block chain network node which the user terminal expects to access; determining the access sequence of the user terminal to the blockchain network nodes according to the current access state of the blockchain network nodes;
s2, determining the access duration of the user terminal to the block chain network node through the central server terminal according to the historical access information of the user terminal to the block chain; after the user terminal is distributed with the access authority to the block chain network node, setting an access action life cycle of the block chain network node for the user terminal according to the access duration by the central server terminal;
s3, acquiring an access record of the user terminal to the data block of the block chain network node in the access action life cycle; analyzing and processing the access record, and determining a target data block from which the user terminal needs to acquire data;
and S4, generating a data copy related to the target data block through a central server terminal, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to a user terminal.
2. The centralized policy-based blockchain access control method of claim 1, wherein:
in step S1, obtaining, by the central server terminal, a data access request from the user terminal, and analyzing and processing the data access request, the obtaining of the blockchain network node that the user terminal desires to access specifically includes:
when a central server terminal receives a data access request from a user terminal, identifying and obtaining terminal identity information of the user terminal from the data access request; judging whether the terminal identity information is matched with a preset terminal identity information white list or not, and if so, determining that the data access request is a legal data access request; if not, determining that the data access request is an illegal data access request;
when the data access request is a legal data access request, analyzing and processing the data access request, and determining the data content and the creation time of data which a user terminal expects to access; determining a blockchain network node where data expected to be accessed is located from a blockchain according to the data content and the creation time;
and when the data access request is an illegal data access request, terminating the current data access process of the user terminal through the central server.
3. The centralized policy-based blockchain access control method of claim 2, wherein:
in step S1, determining, according to the current access state of the blockchain network node, an access sequence of the user terminal to the blockchain network node specifically includes:
acquiring whether a legal data access request from other user terminals exists in the block chain network node or not, and if not, setting the current user terminal to have a first access sequence to the block chain network node;
if the access sequence exists, determining the access sequence of the current user terminal to the block chain network node according to the preset terminal level between the current user terminal and all other user terminals; the preset terminal level refers to the preset access authority level of all user terminals to the block chain.
4. The centralized policy-based blockchain access control method of claim 3, wherein:
in step S2, determining, by the central server terminal, an access duration of the user terminal to the network node of the block chain according to historical access information of the user terminal to the block chain specifically includes:
acquiring historical access log information of the user terminal to the block chain through the central server terminal according to the terminal identity information of the user terminal;
analyzing and processing the historical access log information, and determining the historical total access times and the historical total access duration of the user terminal to the block chain network node;
and determining the average access duration of the user terminal to the block chain network node according to the historical total access times and the historical total access duration.
5. The centralized policy-based blockchain access control method of claim 4, wherein:
in step S2, after the user terminal is assigned with the access right to the blockchain network node, setting, by the central server terminal according to the access duration, an access action lifecycle for the blockchain network node to the user terminal specifically includes:
when the central server terminal determines that the user terminal has a first access sequence to the block chain network nodes, the central server terminal allocates access rights to the user terminal to the block chain network nodes;
and setting an access action life cycle of the block chain network node to the user terminal through the central server terminal, wherein the access action life cycle is not more than the average access duration.
6. The centralized policy-based blockchain access control method of claim 5, wherein:
in step S3, the obtaining of the access record of the user terminal to the data block of the block chain network node in the access action lifecycle specifically includes:
and acquiring the data browsing duration of each data block of the block chain network node by the user terminal in the access action life cycle.
7. The centralized policy-based blockchain access control method of claim 6, wherein:
in step S3, analyzing the access record, and determining a target data block from which the user terminal needs to obtain data specifically includes:
and if the data browsing duration corresponding to a certain data block is greater than or equal to a preset time threshold, determining that the data block is a target data block from which the user terminal needs to acquire data.
8. The centralized policy-based blockchain access control method of claim 7, wherein:
in step S4, generating, by the central server terminal, a data copy related to the target data chunk, generating a time-limited data packet related to the data copy, and sending the time-limited data packet to the user terminal specifically includes:
generating data copies of all stored data in the target data block through a central server terminal, packaging and compressing the data copies to form a time-limited data packet with a certain life cycle, and then sending the time-limited data packet to a user terminal;
and if the continuous persistence time of the time-limited data packet in the user terminal is longer than the life cycle, triggering the time-limited data packet to be automatically destroyed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210861119.2A CN115396145A (en) | 2022-07-20 | 2022-07-20 | Block chain access control method based on centralized strategy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210861119.2A CN115396145A (en) | 2022-07-20 | 2022-07-20 | Block chain access control method based on centralized strategy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115396145A true CN115396145A (en) | 2022-11-25 |
Family
ID=84117709
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210861119.2A Pending CN115396145A (en) | 2022-07-20 | 2022-07-20 | Block chain access control method based on centralized strategy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115396145A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116614316A (en) * | 2023-07-20 | 2023-08-18 | 国网四川省电力公司信息通信公司 | Block chain data safety control method and system for multi-terminal scene |
-
2022
- 2022-07-20 CN CN202210861119.2A patent/CN115396145A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116614316A (en) * | 2023-07-20 | 2023-08-18 | 国网四川省电力公司信息通信公司 | Block chain data safety control method and system for multi-terminal scene |
CN116614316B (en) * | 2023-07-20 | 2023-09-22 | 国网四川省电力公司信息通信公司 | Block chain data safety control method and system for multi-terminal scene |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107480555B (en) | Database access authority control method and device based on block chain | |
CN111400714B (en) | Virus detection method, device, equipment and storage medium | |
CN112231726B (en) | Access control method and device based on trusted verification and computer equipment | |
CN115396145A (en) | Block chain access control method based on centralized strategy | |
CN116545784B (en) | Data center operation control method and system for multi-user scene | |
CN110830496B (en) | Using method and operation method of system for preventing scanning authority file | |
CN112651010A (en) | Method and device for verifying sliding verification code, computer equipment and medium | |
CN111935104A (en) | Internet of things equipment illegal access detection method and device and computer equipment | |
CN115242546A (en) | Industrial control system access control method based on zero trust architecture | |
CN109120609B (en) | Social information reporting method and device based on block chain | |
CN111988644B (en) | Anti-stealing-link method, device, equipment and storage medium for network video | |
CN111291300B (en) | Webpage data processing method and device, webpage system and server | |
CN114036480B (en) | Security access control method and system for private application and readable storage medium | |
CN114840492A (en) | Big data based information processing method and device and readable storage medium | |
CN115134169A (en) | Block chain data management method and system | |
CN115189937A (en) | Security protection method and device for client data | |
CN114640536A (en) | Data access monitoring method | |
CN113824738A (en) | Method and system for node communication management in block chain | |
CN114244566A (en) | Illegal external connection detection method and device based on IP address and computer equipment | |
CN112800132A (en) | Block chain storage method of electronic file | |
CN116488820B (en) | Electronic data security method based on data acquisition analysis | |
CN117040935B (en) | Cloud computing-based node data security transmission method and system | |
CN116614316B (en) | Block chain data safety control method and system for multi-terminal scene | |
CN111131254B (en) | File processing method, block chain node, block chain and storage medium | |
CN101729504A (en) | Method for implementing improving success ratio of access authentication of AAA server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |