CN118018630A - Multi-center cross-chain identification method for data elements - Google Patents
Multi-center cross-chain identification method for data elements Download PDFInfo
- Publication number
- CN118018630A CN118018630A CN202410414905.7A CN202410414905A CN118018630A CN 118018630 A CN118018630 A CN 118018630A CN 202410414905 A CN202410414905 A CN 202410414905A CN 118018630 A CN118018630 A CN 118018630A
- Authority
- CN
- China
- Prior art keywords
- authentication
- user
- identification
- entity
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000004891 communication Methods 0.000 claims abstract description 15
- 238000013515 script Methods 0.000 claims abstract description 5
- 238000012790 confirmation Methods 0.000 claims description 25
- 238000012795 verification Methods 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 230000004927 fusion Effects 0.000 claims description 3
- 230000007547 defect Effects 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Landscapes
- Computer And Data Communications (AREA)
Abstract
The invention discloses a data element multi-center cross-link identification method, which relates to the technical field of cross-link communication protocols, in particular to a data element multi-center cross-link identification method, comprising the following characteristics and steps: s1, unifying data element identification code formats among all identification management centers, and dividing the identification of the data elements into two sections of entity codes and element codes; s2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes; s3, each identification management center establishes an identification data area for storing the identification; s4, the data element rights person applies for the entity codes according to the following flow. According to the data element multi-center cross-link identification method, a user has multiple authentication mode selections in the protocol mutual authentication process, the success passing rate of the protocol mutual authentication is increased, unnecessary failure factors in the authentication process are reduced, and the authentication efficiency of the cross-link communication protocol is improved.
Description
Technical Field
The invention relates to the technical field of cross-link communication protocols, in particular to a multi-center cross-link identification method for data elements.
Background
When there are multiple data elements identifying centers, each center manages the identification of its corresponding region.
However, if a data right person operates across areas, for example, there is a service in both a and B, it is possible to select any one of the areas to be performed when applying for the data element identifier, and therefore, when another user needs to search for the identifier, it is difficult to determine to which center the search request should be issued.
Of course, each center can send its identification information to other centers, and each center records repeatedly, so that any center can complete identification search, but this causes huge storage and communication waste.
The traditional cross-link communication protocol has the defects that the authentication mode is simpler, the flexible conversion cannot be carried out according to the authentication requirement of a user, the timeliness in the process of mutual authentication of the protocol is greatly influenced, the use requirement of people cannot be well met, and the like.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data element multi-center cross-chain identification method, which solves the problems in the background art:
1. By segmenting the identifier, only a portion of the identifier (i.e., the entity code) can be copied between the identifier management centers, which reduces the traffic and storage of the entire copied identifier and all its associated information;
2. by establishing a collaborative request mechanism, a user can apply for, search and other services in any center, and no matter in which center the complete identification is stored;
3. The physical code catalog area is stored by adopting a block chain structure, so that mutual trust among centers is enhanced by utilizing a technical mechanism of block chain decentralization and decharacterization; the element codes and other related information are not stored by adopting a block chain, so that the storage space and the consensus time are saved;
4. The communication method and the communication system provided by the invention have the advantages that the controllers which communicate with each other comprise a plurality of independent communication channels which are suitable for different communication protocols, and the normal channels can be switched when communication abnormality occurs, so that the normal communication among the controllers is ensured.
In order to achieve the above purpose, the invention is realized by the following technical scheme: the multi-center cross-chain identification method of the data elements comprises the following characteristics and steps:
S1, unifying data element identification code formats among all identification management centers, and dividing the identification of the data elements into two sections of entity codes and element codes;
S2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes;
S3, each identification management center establishes an identification data area for storing the identification;
S4, the data element rights person applies for the entity codes according to the following flow:
(a) Selecting any one of the identifier management center application entity codes;
(b) The identifier management center searches the entity code catalog area, if the entity code of the right person is not found, the entity code is allocated to the right person, and the entity code information is counted on the entity code catalog area and is noted as a 'positive book'; otherwise, returning the information of the 'allocated entity code' and terminating the flow;
(c) The identification management center informs the entity code information to the right person and other identification management centers;
(d) All other centers bill the entity code information on the respective entity code catalog area and mark as a copy;
S5, when the right person needs to identify the data elements, the following flow is adopted:
(a) Submitting the entity code to any one of the identification management centers, and sending a request for applying for the element code and additional information;
(b) The center receiving the request searches the managed entity code catalog area and carries out the following processing steps:
(1) If the entity code is marked as a 'positive book' in the entity code catalog area, element codes are allocated to the data elements, the entity code and the element codes are combined into complete data element identifications according to the identification standard, and accounting is carried out in the entity code catalog area and the identification data area;
(2) Otherwise, sending out a collaborative application request to all other centers, and including additional information of the rights holder in the request; the other center receiving the request of the collaborative application searches the managed entity code catalog area, if the entity code is marked as a copy in the entity code catalog area, ignoring the request; if the data element is the positive book, element codes are distributed for the data element, the entity codes and the element codes are combined into complete data element identifications according to the identification standards, accounting is carried out on the entity code catalog area and the identification data area, and the accounting is fed back to a center for sending a collaborative application request;
(3) Feeding back the identification code to the requesting party;
s6, when a user needs to search a certain data element identifier, the following flow is adopted:
(a) Submitting the data element identifier to any identifier management center and sending an identifier retrieval request;
(b) The center searches the managed entity code catalog area, and the searching steps are as follows:
(1) If the entity code of the data element identifier is marked as a positive book in the entity code catalog area, inquiring the related information of the data element identifier in the managed identifier data area;
(2) Otherwise, sending out collaborative search requests to all other centers; the center receiving the collaborative search request searches the managed entity code catalog area, if the entity code identified by the data element is marked as a copy in the entity code catalog area, the request is ignored; if the result is positive, inquiring the related information of the data element identification in the identification data area managed by the result, and feeding back the search result to a center for sending the collaborative search request;
(3) Feeding back the search result to the sending requesting party;
(c) The personal user terminal sends a message protocol to the gateway so as to initiate a protocol authentication request containing user identity information to the network terminal;
(d) The network terminal receiving the authentication request by the intelligent remote terminal sends the authentication request to the user terminal, and the user directly performs authentication operation through the personal user terminal;
the user terminal is set as an intelligent remote terminal, and the intelligent remote terminal comprises a signal receiving and transmitting module, an authentication mode switching module and a confirmation display module;
(e) The intelligent remote terminal receives the network terminal signal through the signal receiving and transmitting module, and the user selects a communication protocol authentication mode through the authentication mode switching module;
(f) Authentication confirmation is achieved through the confirmation display module, a confirmation signal is sent to the network terminal through the signal receiving and transmitting module, and a user performs selection scheduling of various protocols on a network terminal platform through the signal receiving and transmitting module.
Optionally, the confirmation display module generates authentication error, returns to the upper level again, and sends a secondary authentication request.
Optionally, the authentication mode switching module specifically includes the following modules:
The user personal password authentication module is used for the user to perform personal information authentication login operation through the verification of the login password;
the user verification code authentication module is used for a user to carry out personal information authentication login operation through verification of the verification code;
the user fingerprint authentication module is used for a user to perform personal information authentication login operation through the verification of personal fingerprint data;
the user face recognition authentication module is used for a user to carry out personal information authentication login operation through the verification of the face looks characteristic data;
the user voice wave authentication module is used for a user to perform personal information authentication login operation through the verification of the personal voice print data;
the user fingerprint authentication module, the user face recognition authentication module and the user voice authentication module are all biological characteristic information of the user.
Optionally, the user personal password authentication module and the user verification code authentication module are both user personal physical information authentication modes.
Optionally, the selecting schedule includes parsing a protocol message, for parsing data elements of the protocol message selected by a user after the protocol is invoked, so as to obtain specific contents of the message and checking and authenticating modes;
the method comprises the following specific steps:
(1) After the selected protocol messages are checked to be consistent, confirming the transmission protocol for authentication;
(2) Selecting an authentication mode required by a user, and feeding back the authentication mode to the intelligent remote terminal through the signal receiving and transmitting module;
(3) User authentication operation confirmation, wherein an authentication confirmation signal is sent to a network terminal for feedback;
(4) And (5) inputting mutual identification information of a network terminal protocol, and confirming record backup.
Optionally, the authentication mode adopts a user fingerprint authentication module, a user face identification authentication module and a user sound wave authentication module in the authentication mode switching module.
Optionally, after the authentication operation is confirmed, if the user authentication information is inconsistent, secondary protocol selection scheduling is performed.
Optionally, in the execution of the data element task of the parsing protocol message, each center needs to collect and aggregate data of other centers at any time, and accordingly complete the required fusion and parsing task.
The invention provides a data element multi-center cross-chain identification method, which has the following beneficial effects:
1. according to the multi-center cross-chain identification method of the data elements, through segmenting the identifications, only a part of the identifications (namely entity codes) can be copied among all identification management centers, so that the traffic and the storage quantity of all copied identifications and all relevant information thereof are reduced;
2. by establishing a collaborative request mechanism, a user can apply for, search and other services in any center, and no matter in which center the complete identification is stored;
3. The physical code catalog area is stored by adopting a block chain structure, so that mutual trust among centers is enhanced by utilizing a technical mechanism of block chain decentralization and decharacterization; and element codes and other related information are not stored by adopting a block chain, so that the storage space and the consensus time are saved.
Drawings
Fig. 1 is a schematic flow diagram of the data element multi-center cross-chain identification method.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "connected," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
Example 1: referring to fig. 1, the present invention provides a technical solution: the multi-center cross-chain identification method of the data elements comprises the following characteristics and steps:
S1, unifying data element identification code formats among all identification management centers, and dividing the identification of the data elements into two sections of entity codes and element codes;
S2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes;
S3, each identification management center establishes an identification data area for storing the identification;
S4, the data element rights person applies for the entity codes according to the following flow:
(a) Selecting any one of the identifier management center application entity codes;
(b) The identifier management center searches the entity code catalog area, if the entity code of the right person is not found, the entity code is allocated to the right person, and the entity code information is counted on the entity code catalog area and is noted as a 'positive book'; otherwise, returning the information of the 'allocated entity code' and terminating the flow;
(c) The identification management center informs the entity code information to the right person and other identification management centers;
(d) All other centers bill the entity code information on the respective entity code catalog area and mark as a copy;
S5, when the right person needs to identify the data elements, the following flow is adopted:
(a) Submitting the entity code to any one of the identification management centers, and sending a request for applying for the element code and additional information;
(b) The center receiving the request searches the managed entity code catalog area and carries out the following processing steps:
(1) If the entity code is marked as a 'positive book' in the entity code catalog area, element codes are allocated to the data elements, the entity code and the element codes are combined into complete data element identifications according to the identification standard, and accounting is carried out in the entity code catalog area and the identification data area;
(2) Otherwise, sending out a collaborative application request to all other centers, and including additional information of the rights holder in the request; the other center receiving the request of the collaborative application searches the managed entity code catalog area, if the entity code is marked as a copy in the entity code catalog area, ignoring the request; if the data element is the positive book, element codes are distributed for the data element, the entity codes and the element codes are combined into complete data element identifications according to the identification standards, accounting is carried out on the entity code catalog area and the identification data area, and the accounting is fed back to a center for sending a collaborative application request;
(3) Feeding back the identification code to the requesting party;
s6, when a user needs to search a certain data element identifier, the following flow is adopted:
(a) Submitting the data element identifier to any identifier management center and sending an identifier retrieval request;
(b) The center searches the managed entity code catalog area, and the searching steps are as follows:
(1) If the entity code of the data element identifier is marked as a positive book in the entity code catalog area, inquiring the related information of the data element identifier in the managed identifier data area;
(2) Otherwise, sending out collaborative search requests to all other centers; the center receiving the collaborative search request searches the managed entity code catalog area, if the entity code identified by the data element is marked as a copy in the entity code catalog area, the request is ignored; if the result is positive, inquiring the related information of the data element identification in the identification data area managed by the result, and feeding back the search result to a center for sending the collaborative search request;
(3) Feeding back the search result to the sending requesting party;
(c) The personal user terminal sends a message protocol to the gateway so as to initiate a protocol authentication request containing user identity information to the network terminal;
(d) The network terminal receiving the authentication request by the intelligent remote terminal sends the authentication request to the user terminal, and the user directly performs authentication operation through the personal user terminal;
the user terminal is set as an intelligent remote terminal, and the intelligent remote terminal comprises a signal receiving and transmitting module, an authentication mode switching module and a confirmation display module;
(e) The intelligent remote terminal receives the network terminal signal through the signal receiving and transmitting module, and the user selects a communication protocol authentication mode through the authentication mode switching module;
(f) Authentication confirmation is achieved through the confirmation display module, a confirmation signal is sent to the network terminal through the signal receiving and transmitting module, and a user performs selection scheduling of various protocols on a network terminal platform through the signal receiving and transmitting module.
In this embodiment, as shown in fig. 1, the confirmation display module generates an authentication error, returns to the upper stage again, and performs the secondary authentication request transmission.
In this embodiment, as shown in fig. 1, the authentication mode switching module specifically includes the following modules:
The user personal password authentication module is used for the user to perform personal information authentication login operation through the verification of the login password;
the user verification code authentication module is used for a user to carry out personal information authentication login operation through verification of the verification code;
the user fingerprint authentication module is used for a user to perform personal information authentication login operation through the verification of personal fingerprint data;
the user face recognition authentication module is used for a user to carry out personal information authentication login operation through the verification of the face looks characteristic data;
the user voice wave authentication module is used for a user to perform personal information authentication login operation through the verification of the personal voice print data;
the user fingerprint authentication module, the user face recognition authentication module and the user voice authentication module are all biological characteristic information of the user.
In this embodiment, as shown in fig. 1, the user personal password authentication module and the user verification code authentication module are both user personal physical information authentication modes.
In this embodiment, as shown in fig. 1, the selection schedule includes an analysis protocol message, which is used for analyzing data elements of the user selection protocol message after protocol call, so as to obtain specific contents of the message and checking and authentication modes;
the method comprises the following specific steps:
(1) After the selected protocol messages are checked to be consistent, confirming the transmission protocol for authentication;
(2) Selecting an authentication mode required by a user, and feeding back the authentication mode to the intelligent remote terminal through the signal receiving and transmitting module;
(3) User authentication operation confirmation, wherein an authentication confirmation signal is sent to a network terminal for feedback;
(4) And (5) inputting mutual identification information of a network terminal protocol, and confirming record backup.
In this embodiment, as shown in fig. 1, the authentication mode adopts a user fingerprint authentication module, a user face identification authentication module and a user voice authentication module in the authentication mode switching module.
In this embodiment, as shown in fig. 1, after the authentication operation is confirmed, if the user authentication information is inconsistent, the secondary protocol selection scheduling is performed.
In this embodiment, as shown in fig. 1, in the execution of the task of analyzing the data elements of the protocol message, each center needs to collect and aggregate the data of other centers at any time, and accordingly, perform the required fusion and analysis tasks.
Example 2: referring to fig. 1, the present invention provides a technical solution: the multi-center cross-chain identification method of the data elements comprises the following characteristics and steps:
S1, establishing a ground identification management center A, an identification management center B and an identification management center C, unifying data element identification code formats among the identification management centers (the specific reference can be made to a standard DB50/T10002-2022DB51/T10002-2022 'public information resource identification Specification'), and dividing the identification of the data elements into two sections of entity codes and element codes;
S2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes;
S3, each identification management center establishes an identification data area for storing the identification;
S4, a company of a certain data element rights person from the C place applies for entity codes according to the following flow:
(a) Selecting any one of the identification management centers (for example, C) to apply for the entity code;
(b) C, the identification management center searches the entity code catalog area, if the entity code of the right person is not found, the entity code W15M1 is allocated to the right person, the entity information is billed on the entity code catalog area, and the entity information is noted as a 'positive book';
(c) The identification management center informs the entity code information to the company, the identification management center such as B place, A place and the like;
(d) The identifier management center such as B place and A place counts the entity code information on the respective entity code catalog area and marks the entity code information as 'copy';
s5, when the office of the company in the A place needs to identify the data elements, the following flow is adopted:
(a) The company submits the entity code W15M1 to any one identification management center (such as an A-site identification management center) and sends a request for applying element codes and additional information;
(b) The A-land identification management center receiving the request searches the entity code catalog area managed by the A-land identification management center and carries out the following processing steps:
(1) Finding that the entity code is marked as a copy on the entity code catalog area, so that a collaborative application request is sent to other centers such as C place, B place and the like, and additional information (such as entity code W15M 1) of a right person is contained in the request; b, the identification center receives the request of the collaborative application, searches the managed entity code catalog area, and discovers that the entity code is marked as a copy on the entity code catalog area, and ignores the request; the identification center receives the request of the cooperative application C, discovers that the entity code is indicated as 'positive book' in the directory area of the entity code, allocates element codes 210606 for the data elements, merges the entity code and the element code into complete data element identifications W15M1-210606 according to the identification standard, performs accounting on the directory area of the entity code and the identification data area, and feeds back to the A-land identification management center which sends the request of the cooperative application;
(2) The A-land identification management center feeds an identification code back to the requesting party;
s6, when Fan Mou from the B place needs to search the data element identifier W15M1-210606, the following flow is carried out:
(a) Submitting the data element identifier W15M1-210606 to any one identifier management center (for example, an identifier management center B) and issuing an identifier retrieval request;
(1) B, the identification management center searches the managed entity code catalog area, and finds that the entity code W15M1 identified by the data element is marked as a copy on the entity code catalog area, so that a collaborative search request is sent to all other centers; the A-land identification management center which receives the collaborative search request searches the managed entity code catalog area, and the entity code is marked as a copy on the entity code catalog area, so that the request is ignored; the identification management center receives the collaborative search request, searches the managed entity code catalog area, discovers that the entity code is marked as a positive book on the entity code catalog area, inquires the relevant information of the data element identification in the managed identification data area, and feeds back the search result to the B-type identification management center which sends the collaborative search request;
(2) B, the identification management center feeds back the search result to the sending request Fang Fanmou;
(b) The personal user terminal sends a message protocol to the gateway so as to initiate a protocol authentication request containing user identity information to the network terminal;
(c) The network terminal receiving the authentication request by the intelligent remote terminal sends the authentication request to the user terminal, and the user directly performs authentication operation through the personal user terminal;
the user terminal is set as an intelligent remote terminal, and the intelligent remote terminal comprises a signal receiving and transmitting module, an authentication mode switching module and a confirmation display module;
(d) The intelligent remote terminal receives the network terminal signal through the signal receiving and transmitting module, and the user selects a communication protocol authentication mode through the authentication mode switching module;
(e) Authentication confirmation is achieved through the confirmation display module, a confirmation signal is sent to the network terminal through the signal receiving and transmitting module, and a user performs selection scheduling of various protocols on a network terminal platform through the signal receiving and transmitting module.
The foregoing is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art, who is within the scope of the present invention, should make equivalent substitutions or modifications according to the technical scheme of the present invention and the inventive concept thereof, and should be covered by the scope of the present invention.
Claims (8)
1. The multi-center cross-chain identification method for the data elements is characterized by comprising the following steps:
S1, unifying data element identification code formats among all identification management centers, and dividing the identification of the data elements into two sections of entity codes and element codes;
S2, each identification management center establishes an entity code catalog area for storing the scripts or copies of all entity codes;
S3, each identification management center establishes an identification data area for storing the identification;
S4, the data element rights person applies for the entity codes according to the following flow:
(a) Selecting any one of the identifier management center application entity codes;
(b) The identification management center searches the entity code catalog area, if the entity code of the right person is not found, the entity code is allocated to the right person, and the entity code information is counted on the entity code catalog area and is noted as a principal; otherwise, returning the information of the allocated entity codes and terminating the flow;
(c) The identification management center informs the entity code information to the right person and other identification management centers;
(d) All other centers bill the entity code information on the respective entity code catalog area and mark the entity code information as copies;
S5, when the right person needs to identify the data elements, the following flow is adopted:
(a) Submitting the entity code to any one of the identification management centers, and sending a request for applying for the element code and additional information;
(b) The center receiving the request searches the managed entity code catalog area and carries out the following processing steps:
(1) If the entity code is marked as a positive book on the entity code catalog area, element codes are allocated to the data elements, the entity code and the element codes are combined into complete data element identifications according to the identification standard, and accounting is carried out on the entity code catalog area and the identification data area;
(2) Otherwise, sending out a collaborative application request to all other centers, and including additional information of the rights holder in the request; the other center receiving the request of the collaborative application searches the managed entity code catalog area, if the entity code is marked as a copy on the entity code catalog area, ignoring the request; if the element code is the positive, element codes are distributed for the data elements, the entity codes and the element codes are combined into complete data element identifiers according to the identification standards, accounting is carried out on the entity code catalog area and the identification data area, and the accounting is fed back to a center for sending a collaborative application request;
(3) Feeding back the identification code to the requesting party;
s6, when a user needs to search a certain data element identifier, the following flow is adopted:
(a) Submitting the data element identifier to any identifier management center and sending an identifier retrieval request;
(b) The center searches the managed entity code catalog area, and the searching steps are as follows:
(1) If the entity code of the data element identifier is marked as a positive in the entity code catalog area, inquiring the related information of the data element identifier in the managed identifier data area;
(2) Otherwise, sending out collaborative search requests to all other centers; the center receiving the collaborative search request searches the managed entity code catalog area, if the entity code identified by the data element is marked as a copy on the entity code catalog area, the request is ignored; if the result is positive, inquiring the related information of the data element identification in the identification data area managed by the result, and feeding back the search result to a center for sending the collaborative search request;
(3) Feeding back the search result to the sending requesting party;
(c) The personal user terminal sends a message protocol to the gateway so as to initiate a protocol authentication request containing user identity information to the network terminal;
(d) The network terminal receiving the authentication request by the intelligent remote terminal sends the authentication request to the user terminal, and the user directly performs authentication operation through the personal user terminal;
the user terminal is set as an intelligent remote terminal, and the intelligent remote terminal comprises a signal receiving and transmitting module, an authentication mode switching module and a confirmation display module;
(e) The intelligent remote terminal receives the network terminal signal through the signal receiving and transmitting module, and the user selects a communication protocol authentication mode through the authentication mode switching module;
(f) Authentication confirmation is achieved through the confirmation display module, a confirmation signal is sent to the network terminal through the signal receiving and transmitting module, and a user performs selection scheduling of various protocols on a network terminal platform through the signal receiving and transmitting module.
2. The data element multi-center cross-chain identification method of claim 1, wherein: and the confirmation display module returns to the upper level again when authentication errors occur, and sends a secondary authentication request.
3. The data element multi-center cross-chain identification method of claim 1, wherein: the authentication mode switching module specifically comprises the following modules:
The user personal password authentication module is used for the user to perform personal information authentication login operation through the verification of the login password;
the user verification code authentication module is used for a user to carry out personal information authentication login operation through verification of the verification code;
the user fingerprint authentication module is used for a user to perform personal information authentication login operation through the verification of personal fingerprint data;
the user face recognition authentication module is used for a user to carry out personal information authentication login operation through the verification of the face looks characteristic data;
the user voice wave authentication module is used for a user to perform personal information authentication login operation through the verification of the personal voice print data;
the user fingerprint authentication module, the user face recognition authentication module and the user voice authentication module are all biological characteristic information of the user.
4. A data element multi-center cross-chain identification method as claimed in claim 3, wherein: the user personal password authentication module and the user verification code authentication module are both user personal physical information authentication modes.
5. The data element multi-center cross-chain identification method of claim 1, wherein: the selecting schedule comprises analyzing protocol messages, and is used for analyzing data elements of the protocol messages selected by a user after protocol calling so as to acquire specific contents of the messages and checking and authenticating modes;
the method comprises the following specific steps:
(1) After the selected protocol messages are checked to be consistent, confirming the transmission protocol for authentication;
(2) Selecting an authentication mode required by a user, and feeding back the authentication mode to the intelligent remote terminal through the signal receiving and transmitting module;
(3) User authentication operation confirmation, wherein an authentication confirmation signal is sent to a network terminal for feedback;
(4) And (5) inputting mutual identification information of a network terminal protocol, and confirming record backup.
6. The data element multi-center cross-chain identification method of claim 5, wherein: the authentication mode adopts a user fingerprint authentication module, a user face recognition authentication module and a user sound wave authentication module in an authentication mode switching module.
7. The data element multi-center cross-chain identification method of claim 5, wherein: and after the authentication operation is confirmed, if the user authentication information is inconsistent, carrying out secondary protocol selection scheduling.
8. The data element multi-center cross-chain identification method of claim 5, wherein: in the execution of the data element task of the analysis protocol message, each center needs to collect and aggregate the data of other centers at any time, and accordingly, the required fusion and analysis tasks are completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410414905.7A CN118018630A (en) | 2024-04-08 | 2024-04-08 | Multi-center cross-chain identification method for data elements |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410414905.7A CN118018630A (en) | 2024-04-08 | 2024-04-08 | Multi-center cross-chain identification method for data elements |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118018630A true CN118018630A (en) | 2024-05-10 |
Family
ID=90952303
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410414905.7A Pending CN118018630A (en) | 2024-04-08 | 2024-04-08 | Multi-center cross-chain identification method for data elements |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118018630A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002008875A2 (en) * | 2000-07-25 | 2002-01-31 | Authentisure, Inc. | Unified trust model providing secure identification, authentication and validation of physical products and entities, and processing, storage, and exchange of information |
CN1848126A (en) * | 1995-06-06 | 2006-10-18 | 美国电报电话公司 | System and method for database access administration |
CN103118034A (en) * | 2013-03-07 | 2013-05-22 | 西安电子科技大学 | Method for adaptively authenticating heterogenous networks |
CN108984768A (en) * | 2018-07-21 | 2018-12-11 | 江苏飞搏软件股份有限公司 | It is distributed chain type data resource catalogue and index managing method |
US20210014060A1 (en) * | 2016-01-19 | 2021-01-14 | Priv8Pay, Inc. | Network node authentication |
CN112258304A (en) * | 2020-09-01 | 2021-01-22 | 网络通信与安全紫金山实验室 | Consensus accounting method, identification tracing method and system, and computer storage medium |
US20230006845A1 (en) * | 2021-10-12 | 2023-01-05 | Syferex, LLC | Systems and methods for blockchain storage of data generated via paired smartphone and smartwatch |
CN115760008A (en) * | 2022-12-01 | 2023-03-07 | 东华软件股份公司 | Method for formulating identification for industrial internet virtual asset based on four-dimensional coordinate |
CN116361292A (en) * | 2023-04-03 | 2023-06-30 | 南京邮电大学 | Cross-chain resource mapping and management method and system |
CN116800846A (en) * | 2023-04-17 | 2023-09-22 | 苏州青林文化传播有限公司 | Distributed management method for video data |
-
2024
- 2024-04-08 CN CN202410414905.7A patent/CN118018630A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1848126A (en) * | 1995-06-06 | 2006-10-18 | 美国电报电话公司 | System and method for database access administration |
WO2002008875A2 (en) * | 2000-07-25 | 2002-01-31 | Authentisure, Inc. | Unified trust model providing secure identification, authentication and validation of physical products and entities, and processing, storage, and exchange of information |
CN103118034A (en) * | 2013-03-07 | 2013-05-22 | 西安电子科技大学 | Method for adaptively authenticating heterogenous networks |
US20210014060A1 (en) * | 2016-01-19 | 2021-01-14 | Priv8Pay, Inc. | Network node authentication |
CN108984768A (en) * | 2018-07-21 | 2018-12-11 | 江苏飞搏软件股份有限公司 | It is distributed chain type data resource catalogue and index managing method |
CN112258304A (en) * | 2020-09-01 | 2021-01-22 | 网络通信与安全紫金山实验室 | Consensus accounting method, identification tracing method and system, and computer storage medium |
US20230006845A1 (en) * | 2021-10-12 | 2023-01-05 | Syferex, LLC | Systems and methods for blockchain storage of data generated via paired smartphone and smartwatch |
CN115760008A (en) * | 2022-12-01 | 2023-03-07 | 东华软件股份公司 | Method for formulating identification for industrial internet virtual asset based on four-dimensional coordinate |
CN116361292A (en) * | 2023-04-03 | 2023-06-30 | 南京邮电大学 | Cross-chain resource mapping and management method and system |
CN116800846A (en) * | 2023-04-17 | 2023-09-22 | 苏州青林文化传播有限公司 | Distributed management method for video data |
Non-Patent Citations (1)
Title |
---|
戴炳荣: ""跨区块链系统交互方法研究"", 《中国博士学位论文全文数据库(电子期刊)信息科技辑》, 15 April 2022 (2022-04-15) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8204190B2 (en) | Apparatus and method for integrated billing management by real-time session management in wire/wireless integrated service network | |
US6385444B1 (en) | Method and device for checking accuracy of call data records in telecommunications systems | |
JP3303721B2 (en) | Dealer locator service and device for mobile telecommunications system | |
CN1254041C (en) | Method and system for providing object to user of telecommunication network | |
EP1860906B1 (en) | A general authentication form and a method for implementing the authentication | |
RU2169437C1 (en) | Procedure to gain access to objects for users of telecommunication network | |
US20050277407A1 (en) | Method and device for providing mobile services with virtual number | |
US20050021428A1 (en) | Time management system for mobile employees | |
RU99124604A (en) | METHOD OF GIVING ACCESS TO OBJECTS TO TELECOMMUNICATIONS NETWORK USERS | |
CN1322426A (en) | Method and arrangement for complementing telephone connection with additional ihformation | |
WO2004036874A1 (en) | Configuration of enterprise gateways | |
RU2004132709A (en) | METHOD FOR QUICK REGISTRATION FOR USER IDENTIFICATION AND PAYMENT SETTINGS USING TWO DIFFERENT COMMUNICATION CHANNELS AND ITS IMPLEMENTATION SYSTEM | |
EP1681796B1 (en) | Wireless local area network prepaid billing system and method | |
CN1158878C (en) | Communication network | |
WO2019179423A1 (en) | Card calling method and device, information pushing method and device, and card allocation system | |
RU2165679C1 (en) | Telecommunication-network pay-service system (alternatives) | |
CN108430059A (en) | Method, apparatus, system and the readable storage medium storing program for executing of Subscriber Identity Module distribution | |
CN101018238B (en) | User identification system, registration, service and route configuration method | |
Patel et al. | A technique for multi-network access to multimedia messages | |
JP2000125332A (en) | Service registration system | |
CN118018630A (en) | Multi-center cross-chain identification method for data elements | |
US7353405B2 (en) | Method and systems for sharing network access capacities across internet service providers | |
CN1128552C (en) | Communications addressing network and terminal therefor | |
CN1859498B (en) | Method for realizing telephone number leasing | |
KR100209355B1 (en) | Method for connection to numerous information provider by using single account |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |