CN118018630A - Multi-center cross-chain identification method for data elements - Google Patents

Multi-center cross-chain identification method for data elements Download PDF

Info

Publication number
CN118018630A
CN118018630A CN202410414905.7A CN202410414905A CN118018630A CN 118018630 A CN118018630 A CN 118018630A CN 202410414905 A CN202410414905 A CN 202410414905A CN 118018630 A CN118018630 A CN 118018630A
Authority
CN
China
Prior art keywords
authentication
user
identification
entity
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410414905.7A
Other languages
Chinese (zh)
Inventor
沈益民
许珊珊
段占褀
张永锋
陈峥
林冉孜
侯冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Fufan Technology Co ltd
Chengdu Bitnum Technology Co ltd
Chengdu Technological University CDTU
Original Assignee
Sichuan Fufan Technology Co ltd
Chengdu Bitnum Technology Co ltd
Chengdu Technological University CDTU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Fufan Technology Co ltd, Chengdu Bitnum Technology Co ltd, Chengdu Technological University CDTU filed Critical Sichuan Fufan Technology Co ltd
Priority to CN202410414905.7A priority Critical patent/CN118018630A/en
Publication of CN118018630A publication Critical patent/CN118018630A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a data element multi-center cross-link identification method, which relates to the technical field of cross-link communication protocols, in particular to a data element multi-center cross-link identification method, comprising the following characteristics and steps: s1, unifying data element identification code formats among all identification management centers, and dividing the identification of the data elements into two sections of entity codes and element codes; s2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes; s3, each identification management center establishes an identification data area for storing the identification; s4, the data element rights person applies for the entity codes according to the following flow. According to the data element multi-center cross-link identification method, a user has multiple authentication mode selections in the protocol mutual authentication process, the success passing rate of the protocol mutual authentication is increased, unnecessary failure factors in the authentication process are reduced, and the authentication efficiency of the cross-link communication protocol is improved.

Description

Multi-center cross-chain identification method for data elements
Technical Field
The invention relates to the technical field of cross-link communication protocols, in particular to a multi-center cross-link identification method for data elements.
Background
When there are multiple data elements identifying centers, each center manages the identification of its corresponding region.
However, if a data right person operates across areas, for example, there is a service in both a and B, it is possible to select any one of the areas to be performed when applying for the data element identifier, and therefore, when another user needs to search for the identifier, it is difficult to determine to which center the search request should be issued.
Of course, each center can send its identification information to other centers, and each center records repeatedly, so that any center can complete identification search, but this causes huge storage and communication waste.
The traditional cross-link communication protocol has the defects that the authentication mode is simpler, the flexible conversion cannot be carried out according to the authentication requirement of a user, the timeliness in the process of mutual authentication of the protocol is greatly influenced, the use requirement of people cannot be well met, and the like.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data element multi-center cross-chain identification method, which solves the problems in the background art:
1. By segmenting the identifier, only a portion of the identifier (i.e., the entity code) can be copied between the identifier management centers, which reduces the traffic and storage of the entire copied identifier and all its associated information;
2. by establishing a collaborative request mechanism, a user can apply for, search and other services in any center, and no matter in which center the complete identification is stored;
3. The physical code catalog area is stored by adopting a block chain structure, so that mutual trust among centers is enhanced by utilizing a technical mechanism of block chain decentralization and decharacterization; the element codes and other related information are not stored by adopting a block chain, so that the storage space and the consensus time are saved;
4. The communication method and the communication system provided by the invention have the advantages that the controllers which communicate with each other comprise a plurality of independent communication channels which are suitable for different communication protocols, and the normal channels can be switched when communication abnormality occurs, so that the normal communication among the controllers is ensured.
In order to achieve the above purpose, the invention is realized by the following technical scheme: the multi-center cross-chain identification method of the data elements comprises the following characteristics and steps:
S1, unifying data element identification code formats among all identification management centers, and dividing the identification of the data elements into two sections of entity codes and element codes;
S2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes;
S3, each identification management center establishes an identification data area for storing the identification;
S4, the data element rights person applies for the entity codes according to the following flow:
(a) Selecting any one of the identifier management center application entity codes;
(b) The identifier management center searches the entity code catalog area, if the entity code of the right person is not found, the entity code is allocated to the right person, and the entity code information is counted on the entity code catalog area and is noted as a 'positive book'; otherwise, returning the information of the 'allocated entity code' and terminating the flow;
(c) The identification management center informs the entity code information to the right person and other identification management centers;
(d) All other centers bill the entity code information on the respective entity code catalog area and mark as a copy;
S5, when the right person needs to identify the data elements, the following flow is adopted:
(a) Submitting the entity code to any one of the identification management centers, and sending a request for applying for the element code and additional information;
(b) The center receiving the request searches the managed entity code catalog area and carries out the following processing steps:
(1) If the entity code is marked as a 'positive book' in the entity code catalog area, element codes are allocated to the data elements, the entity code and the element codes are combined into complete data element identifications according to the identification standard, and accounting is carried out in the entity code catalog area and the identification data area;
(2) Otherwise, sending out a collaborative application request to all other centers, and including additional information of the rights holder in the request; the other center receiving the request of the collaborative application searches the managed entity code catalog area, if the entity code is marked as a copy in the entity code catalog area, ignoring the request; if the data element is the positive book, element codes are distributed for the data element, the entity codes and the element codes are combined into complete data element identifications according to the identification standards, accounting is carried out on the entity code catalog area and the identification data area, and the accounting is fed back to a center for sending a collaborative application request;
(3) Feeding back the identification code to the requesting party;
s6, when a user needs to search a certain data element identifier, the following flow is adopted:
(a) Submitting the data element identifier to any identifier management center and sending an identifier retrieval request;
(b) The center searches the managed entity code catalog area, and the searching steps are as follows:
(1) If the entity code of the data element identifier is marked as a positive book in the entity code catalog area, inquiring the related information of the data element identifier in the managed identifier data area;
(2) Otherwise, sending out collaborative search requests to all other centers; the center receiving the collaborative search request searches the managed entity code catalog area, if the entity code identified by the data element is marked as a copy in the entity code catalog area, the request is ignored; if the result is positive, inquiring the related information of the data element identification in the identification data area managed by the result, and feeding back the search result to a center for sending the collaborative search request;
(3) Feeding back the search result to the sending requesting party;
(c) The personal user terminal sends a message protocol to the gateway so as to initiate a protocol authentication request containing user identity information to the network terminal;
(d) The network terminal receiving the authentication request by the intelligent remote terminal sends the authentication request to the user terminal, and the user directly performs authentication operation through the personal user terminal;
the user terminal is set as an intelligent remote terminal, and the intelligent remote terminal comprises a signal receiving and transmitting module, an authentication mode switching module and a confirmation display module;
(e) The intelligent remote terminal receives the network terminal signal through the signal receiving and transmitting module, and the user selects a communication protocol authentication mode through the authentication mode switching module;
(f) Authentication confirmation is achieved through the confirmation display module, a confirmation signal is sent to the network terminal through the signal receiving and transmitting module, and a user performs selection scheduling of various protocols on a network terminal platform through the signal receiving and transmitting module.
Optionally, the confirmation display module generates authentication error, returns to the upper level again, and sends a secondary authentication request.
Optionally, the authentication mode switching module specifically includes the following modules:
The user personal password authentication module is used for the user to perform personal information authentication login operation through the verification of the login password;
the user verification code authentication module is used for a user to carry out personal information authentication login operation through verification of the verification code;
the user fingerprint authentication module is used for a user to perform personal information authentication login operation through the verification of personal fingerprint data;
the user face recognition authentication module is used for a user to carry out personal information authentication login operation through the verification of the face looks characteristic data;
the user voice wave authentication module is used for a user to perform personal information authentication login operation through the verification of the personal voice print data;
the user fingerprint authentication module, the user face recognition authentication module and the user voice authentication module are all biological characteristic information of the user.
Optionally, the user personal password authentication module and the user verification code authentication module are both user personal physical information authentication modes.
Optionally, the selecting schedule includes parsing a protocol message, for parsing data elements of the protocol message selected by a user after the protocol is invoked, so as to obtain specific contents of the message and checking and authenticating modes;
the method comprises the following specific steps:
(1) After the selected protocol messages are checked to be consistent, confirming the transmission protocol for authentication;
(2) Selecting an authentication mode required by a user, and feeding back the authentication mode to the intelligent remote terminal through the signal receiving and transmitting module;
(3) User authentication operation confirmation, wherein an authentication confirmation signal is sent to a network terminal for feedback;
(4) And (5) inputting mutual identification information of a network terminal protocol, and confirming record backup.
Optionally, the authentication mode adopts a user fingerprint authentication module, a user face identification authentication module and a user sound wave authentication module in the authentication mode switching module.
Optionally, after the authentication operation is confirmed, if the user authentication information is inconsistent, secondary protocol selection scheduling is performed.
Optionally, in the execution of the data element task of the parsing protocol message, each center needs to collect and aggregate data of other centers at any time, and accordingly complete the required fusion and parsing task.
The invention provides a data element multi-center cross-chain identification method, which has the following beneficial effects:
1. according to the multi-center cross-chain identification method of the data elements, through segmenting the identifications, only a part of the identifications (namely entity codes) can be copied among all identification management centers, so that the traffic and the storage quantity of all copied identifications and all relevant information thereof are reduced;
2. by establishing a collaborative request mechanism, a user can apply for, search and other services in any center, and no matter in which center the complete identification is stored;
3. The physical code catalog area is stored by adopting a block chain structure, so that mutual trust among centers is enhanced by utilizing a technical mechanism of block chain decentralization and decharacterization; and element codes and other related information are not stored by adopting a block chain, so that the storage space and the consensus time are saved.
Drawings
Fig. 1 is a schematic flow diagram of the data element multi-center cross-chain identification method.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "connected," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
Example 1: referring to fig. 1, the present invention provides a technical solution: the multi-center cross-chain identification method of the data elements comprises the following characteristics and steps:
S1, unifying data element identification code formats among all identification management centers, and dividing the identification of the data elements into two sections of entity codes and element codes;
S2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes;
S3, each identification management center establishes an identification data area for storing the identification;
S4, the data element rights person applies for the entity codes according to the following flow:
(a) Selecting any one of the identifier management center application entity codes;
(b) The identifier management center searches the entity code catalog area, if the entity code of the right person is not found, the entity code is allocated to the right person, and the entity code information is counted on the entity code catalog area and is noted as a 'positive book'; otherwise, returning the information of the 'allocated entity code' and terminating the flow;
(c) The identification management center informs the entity code information to the right person and other identification management centers;
(d) All other centers bill the entity code information on the respective entity code catalog area and mark as a copy;
S5, when the right person needs to identify the data elements, the following flow is adopted:
(a) Submitting the entity code to any one of the identification management centers, and sending a request for applying for the element code and additional information;
(b) The center receiving the request searches the managed entity code catalog area and carries out the following processing steps:
(1) If the entity code is marked as a 'positive book' in the entity code catalog area, element codes are allocated to the data elements, the entity code and the element codes are combined into complete data element identifications according to the identification standard, and accounting is carried out in the entity code catalog area and the identification data area;
(2) Otherwise, sending out a collaborative application request to all other centers, and including additional information of the rights holder in the request; the other center receiving the request of the collaborative application searches the managed entity code catalog area, if the entity code is marked as a copy in the entity code catalog area, ignoring the request; if the data element is the positive book, element codes are distributed for the data element, the entity codes and the element codes are combined into complete data element identifications according to the identification standards, accounting is carried out on the entity code catalog area and the identification data area, and the accounting is fed back to a center for sending a collaborative application request;
(3) Feeding back the identification code to the requesting party;
s6, when a user needs to search a certain data element identifier, the following flow is adopted:
(a) Submitting the data element identifier to any identifier management center and sending an identifier retrieval request;
(b) The center searches the managed entity code catalog area, and the searching steps are as follows:
(1) If the entity code of the data element identifier is marked as a positive book in the entity code catalog area, inquiring the related information of the data element identifier in the managed identifier data area;
(2) Otherwise, sending out collaborative search requests to all other centers; the center receiving the collaborative search request searches the managed entity code catalog area, if the entity code identified by the data element is marked as a copy in the entity code catalog area, the request is ignored; if the result is positive, inquiring the related information of the data element identification in the identification data area managed by the result, and feeding back the search result to a center for sending the collaborative search request;
(3) Feeding back the search result to the sending requesting party;
(c) The personal user terminal sends a message protocol to the gateway so as to initiate a protocol authentication request containing user identity information to the network terminal;
(d) The network terminal receiving the authentication request by the intelligent remote terminal sends the authentication request to the user terminal, and the user directly performs authentication operation through the personal user terminal;
the user terminal is set as an intelligent remote terminal, and the intelligent remote terminal comprises a signal receiving and transmitting module, an authentication mode switching module and a confirmation display module;
(e) The intelligent remote terminal receives the network terminal signal through the signal receiving and transmitting module, and the user selects a communication protocol authentication mode through the authentication mode switching module;
(f) Authentication confirmation is achieved through the confirmation display module, a confirmation signal is sent to the network terminal through the signal receiving and transmitting module, and a user performs selection scheduling of various protocols on a network terminal platform through the signal receiving and transmitting module.
In this embodiment, as shown in fig. 1, the confirmation display module generates an authentication error, returns to the upper stage again, and performs the secondary authentication request transmission.
In this embodiment, as shown in fig. 1, the authentication mode switching module specifically includes the following modules:
The user personal password authentication module is used for the user to perform personal information authentication login operation through the verification of the login password;
the user verification code authentication module is used for a user to carry out personal information authentication login operation through verification of the verification code;
the user fingerprint authentication module is used for a user to perform personal information authentication login operation through the verification of personal fingerprint data;
the user face recognition authentication module is used for a user to carry out personal information authentication login operation through the verification of the face looks characteristic data;
the user voice wave authentication module is used for a user to perform personal information authentication login operation through the verification of the personal voice print data;
the user fingerprint authentication module, the user face recognition authentication module and the user voice authentication module are all biological characteristic information of the user.
In this embodiment, as shown in fig. 1, the user personal password authentication module and the user verification code authentication module are both user personal physical information authentication modes.
In this embodiment, as shown in fig. 1, the selection schedule includes an analysis protocol message, which is used for analyzing data elements of the user selection protocol message after protocol call, so as to obtain specific contents of the message and checking and authentication modes;
the method comprises the following specific steps:
(1) After the selected protocol messages are checked to be consistent, confirming the transmission protocol for authentication;
(2) Selecting an authentication mode required by a user, and feeding back the authentication mode to the intelligent remote terminal through the signal receiving and transmitting module;
(3) User authentication operation confirmation, wherein an authentication confirmation signal is sent to a network terminal for feedback;
(4) And (5) inputting mutual identification information of a network terminal protocol, and confirming record backup.
In this embodiment, as shown in fig. 1, the authentication mode adopts a user fingerprint authentication module, a user face identification authentication module and a user voice authentication module in the authentication mode switching module.
In this embodiment, as shown in fig. 1, after the authentication operation is confirmed, if the user authentication information is inconsistent, the secondary protocol selection scheduling is performed.
In this embodiment, as shown in fig. 1, in the execution of the task of analyzing the data elements of the protocol message, each center needs to collect and aggregate the data of other centers at any time, and accordingly, perform the required fusion and analysis tasks.
Example 2: referring to fig. 1, the present invention provides a technical solution: the multi-center cross-chain identification method of the data elements comprises the following characteristics and steps:
S1, establishing a ground identification management center A, an identification management center B and an identification management center C, unifying data element identification code formats among the identification management centers (the specific reference can be made to a standard DB50/T10002-2022DB51/T10002-2022 'public information resource identification Specification'), and dividing the identification of the data elements into two sections of entity codes and element codes;
S2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes;
S3, each identification management center establishes an identification data area for storing the identification;
S4, a company of a certain data element rights person from the C place applies for entity codes according to the following flow:
(a) Selecting any one of the identification management centers (for example, C) to apply for the entity code;
(b) C, the identification management center searches the entity code catalog area, if the entity code of the right person is not found, the entity code W15M1 is allocated to the right person, the entity information is billed on the entity code catalog area, and the entity information is noted as a 'positive book';
(c) The identification management center informs the entity code information to the company, the identification management center such as B place, A place and the like;
(d) The identifier management center such as B place and A place counts the entity code information on the respective entity code catalog area and marks the entity code information as 'copy';
s5, when the office of the company in the A place needs to identify the data elements, the following flow is adopted:
(a) The company submits the entity code W15M1 to any one identification management center (such as an A-site identification management center) and sends a request for applying element codes and additional information;
(b) The A-land identification management center receiving the request searches the entity code catalog area managed by the A-land identification management center and carries out the following processing steps:
(1) Finding that the entity code is marked as a copy on the entity code catalog area, so that a collaborative application request is sent to other centers such as C place, B place and the like, and additional information (such as entity code W15M 1) of a right person is contained in the request; b, the identification center receives the request of the collaborative application, searches the managed entity code catalog area, and discovers that the entity code is marked as a copy on the entity code catalog area, and ignores the request; the identification center receives the request of the cooperative application C, discovers that the entity code is indicated as 'positive book' in the directory area of the entity code, allocates element codes 210606 for the data elements, merges the entity code and the element code into complete data element identifications W15M1-210606 according to the identification standard, performs accounting on the directory area of the entity code and the identification data area, and feeds back to the A-land identification management center which sends the request of the cooperative application;
(2) The A-land identification management center feeds an identification code back to the requesting party;
s6, when Fan Mou from the B place needs to search the data element identifier W15M1-210606, the following flow is carried out:
(a) Submitting the data element identifier W15M1-210606 to any one identifier management center (for example, an identifier management center B) and issuing an identifier retrieval request;
(1) B, the identification management center searches the managed entity code catalog area, and finds that the entity code W15M1 identified by the data element is marked as a copy on the entity code catalog area, so that a collaborative search request is sent to all other centers; the A-land identification management center which receives the collaborative search request searches the managed entity code catalog area, and the entity code is marked as a copy on the entity code catalog area, so that the request is ignored; the identification management center receives the collaborative search request, searches the managed entity code catalog area, discovers that the entity code is marked as a positive book on the entity code catalog area, inquires the relevant information of the data element identification in the managed identification data area, and feeds back the search result to the B-type identification management center which sends the collaborative search request;
(2) B, the identification management center feeds back the search result to the sending request Fang Fanmou;
(b) The personal user terminal sends a message protocol to the gateway so as to initiate a protocol authentication request containing user identity information to the network terminal;
(c) The network terminal receiving the authentication request by the intelligent remote terminal sends the authentication request to the user terminal, and the user directly performs authentication operation through the personal user terminal;
the user terminal is set as an intelligent remote terminal, and the intelligent remote terminal comprises a signal receiving and transmitting module, an authentication mode switching module and a confirmation display module;
(d) The intelligent remote terminal receives the network terminal signal through the signal receiving and transmitting module, and the user selects a communication protocol authentication mode through the authentication mode switching module;
(e) Authentication confirmation is achieved through the confirmation display module, a confirmation signal is sent to the network terminal through the signal receiving and transmitting module, and a user performs selection scheduling of various protocols on a network terminal platform through the signal receiving and transmitting module.
The foregoing is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art, who is within the scope of the present invention, should make equivalent substitutions or modifications according to the technical scheme of the present invention and the inventive concept thereof, and should be covered by the scope of the present invention.

Claims (8)

1. The multi-center cross-chain identification method for the data elements is characterized by comprising the following steps:
S1, unifying data element identification code formats among all identification management centers, and dividing the identification of the data elements into two sections of entity codes and element codes;
S2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes;
S3, each identification management center establishes an identification data area for storing the identification;
S4, the data element rights person applies for the entity codes according to the following flow:
(a) Selecting any one of the identifier management center application entity codes;
(b) The identification management center searches the entity code catalog area, if the entity code of the right person is not found, the entity code is allocated to the right person, and the entity code information is counted on the entity code catalog area and is noted as a principal; otherwise, returning the information of the allocated entity codes and terminating the flow;
(c) The identification management center informs the entity code information to the right person and other identification management centers;
(d) All other centers bill the entity code information on the respective entity code catalog area and mark the entity code information as copies;
S5, when the right person needs to identify the data elements, the following flow is adopted:
(a) Submitting the entity code to any one of the identification management centers, and sending a request for applying for the element code and additional information;
(b) The center receiving the request searches the managed entity code catalog area and carries out the following processing steps:
(1) If the entity code is marked as a positive book on the entity code catalog area, element codes are allocated to the data elements, the entity code and the element codes are combined into complete data element identifications according to the identification standard, and accounting is carried out on the entity code catalog area and the identification data area;
(2) Otherwise, sending out a collaborative application request to all other centers, and including additional information of the rights holder in the request; the other center receiving the request of the collaborative application searches the managed entity code catalog area, if the entity code is marked as a copy on the entity code catalog area, ignoring the request; if the element code is the positive, element codes are distributed for the data elements, the entity codes and the element codes are combined into complete data element identifiers according to the identification standards, accounting is carried out on the entity code catalog area and the identification data area, and the accounting is fed back to a center for sending a collaborative application request;
(3) Feeding back the identification code to the requesting party;
s6, when a user needs to search a certain data element identifier, the following flow is adopted:
(a) Submitting the data element identifier to any identifier management center and sending an identifier retrieval request;
(b) The center searches the managed entity code catalog area, and the searching steps are as follows:
(1) If the entity code of the data element identifier is marked as a positive in the entity code catalog area, inquiring the related information of the data element identifier in the managed identifier data area;
(2) Otherwise, sending out collaborative search requests to all other centers; the center receiving the collaborative search request searches the managed entity code catalog area, if the entity code identified by the data element is marked as a copy on the entity code catalog area, the request is ignored; if the result is positive, inquiring the related information of the data element identification in the identification data area managed by the result, and feeding back the search result to a center for sending the collaborative search request;
(3) Feeding back the search result to the sending requesting party;
(c) The personal user terminal sends a message protocol to the gateway so as to initiate a protocol authentication request containing user identity information to the network terminal;
(d) The network terminal receiving the authentication request by the intelligent remote terminal sends the authentication request to the user terminal, and the user directly performs authentication operation through the personal user terminal;
the user terminal is set as an intelligent remote terminal, and the intelligent remote terminal comprises a signal receiving and transmitting module, an authentication mode switching module and a confirmation display module;
(e) The intelligent remote terminal receives the network terminal signal through the signal receiving and transmitting module, and the user selects a communication protocol authentication mode through the authentication mode switching module;
(f) Authentication confirmation is achieved through the confirmation display module, a confirmation signal is sent to the network terminal through the signal receiving and transmitting module, and a user performs selection scheduling of various protocols on a network terminal platform through the signal receiving and transmitting module.
2. The data element multi-center cross-chain identification method of claim 1, wherein: and the confirmation display module returns to the upper level again when authentication errors occur, and sends a secondary authentication request.
3. The data element multi-center cross-chain identification method of claim 1, wherein: the authentication mode switching module specifically comprises the following modules:
The user personal password authentication module is used for the user to perform personal information authentication login operation through the verification of the login password;
the user verification code authentication module is used for a user to carry out personal information authentication login operation through verification of the verification code;
the user fingerprint authentication module is used for a user to perform personal information authentication login operation through the verification of personal fingerprint data;
the user face recognition authentication module is used for a user to carry out personal information authentication login operation through the verification of the face looks characteristic data;
the user voice wave authentication module is used for a user to perform personal information authentication login operation through the verification of the personal voice print data;
the user fingerprint authentication module, the user face recognition authentication module and the user voice authentication module are all biological characteristic information of the user.
4. A data element multi-center cross-chain identification method as claimed in claim 3, wherein: the user personal password authentication module and the user verification code authentication module are both user personal physical information authentication modes.
5. The data element multi-center cross-chain identification method of claim 1, wherein: the selecting schedule comprises analyzing protocol messages, and is used for analyzing data elements of the protocol messages selected by a user after protocol calling so as to acquire specific contents of the messages and checking and authenticating modes;
the method comprises the following specific steps:
(1) After the selected protocol messages are checked to be consistent, confirming the transmission protocol for authentication;
(2) Selecting an authentication mode required by a user, and feeding back the authentication mode to the intelligent remote terminal through the signal receiving and transmitting module;
(3) User authentication operation confirmation, wherein an authentication confirmation signal is sent to a network terminal for feedback;
(4) And (5) inputting mutual identification information of a network terminal protocol, and confirming record backup.
6. The data element multi-center cross-chain identification method of claim 5, wherein: the authentication mode adopts a user fingerprint authentication module, a user face recognition authentication module and a user sound wave authentication module in an authentication mode switching module.
7. The data element multi-center cross-chain identification method of claim 5, wherein: and after the authentication operation is confirmed, if the user authentication information is inconsistent, carrying out secondary protocol selection scheduling.
8. The data element multi-center cross-chain identification method of claim 5, wherein: in the execution of the data element task of the analysis protocol message, each center needs to collect and aggregate the data of other centers at any time, and accordingly, the required fusion and analysis tasks are completed.
CN202410414905.7A 2024-04-08 2024-04-08 Multi-center cross-chain identification method for data elements Pending CN118018630A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410414905.7A CN118018630A (en) 2024-04-08 2024-04-08 Multi-center cross-chain identification method for data elements

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410414905.7A CN118018630A (en) 2024-04-08 2024-04-08 Multi-center cross-chain identification method for data elements

Publications (1)

Publication Number Publication Date
CN118018630A true CN118018630A (en) 2024-05-10

Family

ID=90952303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410414905.7A Pending CN118018630A (en) 2024-04-08 2024-04-08 Multi-center cross-chain identification method for data elements

Country Status (1)

Country Link
CN (1) CN118018630A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002008875A2 (en) * 2000-07-25 2002-01-31 Authentisure, Inc. Unified trust model providing secure identification, authentication and validation of physical products and entities, and processing, storage, and exchange of information
CN1848126A (en) * 1995-06-06 2006-10-18 美国电报电话公司 System and method for database access administration
CN103118034A (en) * 2013-03-07 2013-05-22 西安电子科技大学 Method for adaptively authenticating heterogenous networks
CN108984768A (en) * 2018-07-21 2018-12-11 江苏飞搏软件股份有限公司 It is distributed chain type data resource catalogue and index managing method
US20210014060A1 (en) * 2016-01-19 2021-01-14 Priv8Pay, Inc. Network node authentication
CN112258304A (en) * 2020-09-01 2021-01-22 网络通信与安全紫金山实验室 Consensus accounting method, identification tracing method and system, and computer storage medium
US20230006845A1 (en) * 2021-10-12 2023-01-05 Syferex, LLC Systems and methods for blockchain storage of data generated via paired smartphone and smartwatch
CN115760008A (en) * 2022-12-01 2023-03-07 东华软件股份公司 Method for formulating identification for industrial internet virtual asset based on four-dimensional coordinate
CN116361292A (en) * 2023-04-03 2023-06-30 南京邮电大学 Cross-chain resource mapping and management method and system
CN116800846A (en) * 2023-04-17 2023-09-22 苏州青林文化传播有限公司 Distributed management method for video data

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848126A (en) * 1995-06-06 2006-10-18 美国电报电话公司 System and method for database access administration
WO2002008875A2 (en) * 2000-07-25 2002-01-31 Authentisure, Inc. Unified trust model providing secure identification, authentication and validation of physical products and entities, and processing, storage, and exchange of information
CN103118034A (en) * 2013-03-07 2013-05-22 西安电子科技大学 Method for adaptively authenticating heterogenous networks
US20210014060A1 (en) * 2016-01-19 2021-01-14 Priv8Pay, Inc. Network node authentication
CN108984768A (en) * 2018-07-21 2018-12-11 江苏飞搏软件股份有限公司 It is distributed chain type data resource catalogue and index managing method
CN112258304A (en) * 2020-09-01 2021-01-22 网络通信与安全紫金山实验室 Consensus accounting method, identification tracing method and system, and computer storage medium
US20230006845A1 (en) * 2021-10-12 2023-01-05 Syferex, LLC Systems and methods for blockchain storage of data generated via paired smartphone and smartwatch
CN115760008A (en) * 2022-12-01 2023-03-07 东华软件股份公司 Method for formulating identification for industrial internet virtual asset based on four-dimensional coordinate
CN116361292A (en) * 2023-04-03 2023-06-30 南京邮电大学 Cross-chain resource mapping and management method and system
CN116800846A (en) * 2023-04-17 2023-09-22 苏州青林文化传播有限公司 Distributed management method for video data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
戴炳荣: ""跨区块链系统交互方法研究"", 《中国博士学位论文全文数据库(电子期刊)信息科技辑》, 15 April 2022 (2022-04-15) *

Similar Documents

Publication Publication Date Title
US8204190B2 (en) Apparatus and method for integrated billing management by real-time session management in wire/wireless integrated service network
US6385444B1 (en) Method and device for checking accuracy of call data records in telecommunications systems
JP3303721B2 (en) Dealer locator service and device for mobile telecommunications system
CN1254041C (en) Method and system for providing object to user of telecommunication network
EP1860906B1 (en) A general authentication form and a method for implementing the authentication
RU2169437C1 (en) Procedure to gain access to objects for users of telecommunication network
US20050277407A1 (en) Method and device for providing mobile services with virtual number
US20050021428A1 (en) Time management system for mobile employees
RU99124604A (en) METHOD OF GIVING ACCESS TO OBJECTS TO TELECOMMUNICATIONS NETWORK USERS
CN1322426A (en) Method and arrangement for complementing telephone connection with additional ihformation
WO2004036874A1 (en) Configuration of enterprise gateways
RU2004132709A (en) METHOD FOR QUICK REGISTRATION FOR USER IDENTIFICATION AND PAYMENT SETTINGS USING TWO DIFFERENT COMMUNICATION CHANNELS AND ITS IMPLEMENTATION SYSTEM
EP1681796B1 (en) Wireless local area network prepaid billing system and method
CN1158878C (en) Communication network
WO2019179423A1 (en) Card calling method and device, information pushing method and device, and card allocation system
RU2165679C1 (en) Telecommunication-network pay-service system (alternatives)
CN108430059A (en) Method, apparatus, system and the readable storage medium storing program for executing of Subscriber Identity Module distribution
CN101018238B (en) User identification system, registration, service and route configuration method
Patel et al. A technique for multi-network access to multimedia messages
JP2000125332A (en) Service registration system
CN118018630A (en) Multi-center cross-chain identification method for data elements
US7353405B2 (en) Method and systems for sharing network access capacities across internet service providers
CN1128552C (en) Communications addressing network and terminal therefor
CN1859498B (en) Method for realizing telephone number leasing
KR100209355B1 (en) Method for connection to numerous information provider by using single account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination