CN118282738A - Interconnection data security management method and system based on block chain - Google Patents
Interconnection data security management method and system based on block chain Download PDFInfo
- Publication number
- CN118282738A CN118282738A CN202410370916.XA CN202410370916A CN118282738A CN 118282738 A CN118282738 A CN 118282738A CN 202410370916 A CN202410370916 A CN 202410370916A CN 118282738 A CN118282738 A CN 118282738A
- Authority
- CN
- China
- Prior art keywords
- access
- data
- user
- authentication
- management terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 92
- 238000013523 data management Methods 0.000 claims abstract description 45
- 238000012795 verification Methods 0.000 claims abstract description 44
- 238000000034 method Methods 0.000 claims abstract description 17
- 238000012545 processing Methods 0.000 claims abstract description 5
- 230000004044 response Effects 0.000 claims abstract description 4
- 238000004891 communication Methods 0.000 claims description 17
- 238000013500 data storage Methods 0.000 claims description 8
- 230000006399 behavior Effects 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000013068 supply chain management Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a block chain-based interconnected data security management method and system, which relate to the technical field of data security, wherein the method comprises the following steps: the access management terminal receives an interconnection data access request sent by a user, and the access management terminal performs identity verification on the user based on the data access request; in response to passing the authentication of the user, the access management terminal generates first authentication signature information and access authentication information based on the first intelligent contract, and sends the access authentication information to the data management terminal through the first intelligent contract; the data management terminal calls a second intelligent contract and carries out access right authentication on the user based on the access authentication information, and responds to the passing of the access right authentication on the user, a request processing result is sent to the user, and the user is granted with the access right of the corresponding data of the target access data identification. The method and the system realize the safety protection of the campus interconnection data.
Description
Technical Field
The invention relates to the technical field of data security, in particular to a block chain-based interconnection data security management method and system.
Background
In the present industrial park, with the rapid development of intelligent technology, the management of interconnection data is becoming more and more important. The data comprise key information such as power consumption, production efficiency, equipment state and the like, and also comprise data in aspects such as supply chain management, environment monitoring, safety monitoring and the like. The real-time collection and analysis of this information is critical to improving the operational efficiency of the industrial park, ensuring production safety, and promoting sustainable development.
While industrial parks have been able to enable the collection and access of such interconnected data through various information systems and internet of things devices, significant challenges of data security and privacy protection remain. In particular, the data is easy to be accessed, tampered and leaked without authorization in the process of transmission and storage, for example, a user can access a data center of a park through own terminal equipment, and acquire the needed data from the data center, so that the interconnected data of the park has security risks.
Disclosure of Invention
The invention provides a block chain-based interconnection data security management method and system, which are used for solving at least one technical problem in the background technology.
The first aspect of the present invention provides a blockchain-based interconnection data security management method, comprising:
The access management terminal receives an interconnection data access request sent by a user based on a user terminal, wherein the interconnection data access request comprises target identity information, a first public key and a target access data identifier, the access management terminal performs identity verification on the user based on the data access request, and the access management terminal comprises calling a first intelligent contract to inquire a target digital certificate matched with the first public key, and performs identity verification on the user based on the target digital certificate and the target identity information;
responding to the passing of the identity verification of the user, the access management terminal generates first authentication signature information based on a first intelligent contract, generates access authentication information based on the first authentication signature information and a target access data identifier, and sends the access authentication information to the data management terminal through the first intelligent contract;
The data management terminal calls a second intelligent contract and authenticates the access authority of the user based on the access authentication information, generates second authentication signature information and an access execution instruction by calling the second intelligent contract in response to the access authority authentication of the user, processes the access authentication information, the second authentication signature information and the access execution instruction by calling a third intelligent contract, comprises sending a request processing result to the user and granting the user access authority of corresponding data to a target access data identifier, and records the request behavior of the user based on the first authentication signature information and the second authentication signature information of the interconnection data access request.
Preferably, the access management terminal performs authentication on the user based on the data access request, and further includes:
The access management terminal calls a first intelligent contract to inquire a target digital certificate matched with a first public key, matches target identity information with the target digital certificate, generates a signature authentication text based on the request time of an interconnection data access request and a pseudo-random number generator if the matching is successful, encrypts the signature authentication text through the first public key and then sends the encrypted signature authentication text to a user side, and matches the target text with the signature authentication text after receiving the target text decrypted by the user side through the first private key, and indicates that the identity verification of the user passes if the matching is successful.
Preferably, for the first authentication signature information, further comprising:
The first authentication signature information comprises a target identity of a user, an identity management identity of an access management terminal and an identity verification time stamp, and is obtained by encrypting the target identity of the user, the identity management identity of the access management terminal and the identity verification time stamp through a second public key by a first intelligent contract.
Preferably, the data management terminal invokes a second smart contract and performs access right authentication on the user based on the access authentication information, including:
The second intelligent contract decrypts the first authentication signature information in the access authentication information through the second private key, if the identity management identification of the access management terminal is checked correctly, the target data access right corresponding to the target access data identification is queried based on the data storage list, the set access right of the user is queried based on the user right list, the set access right of the user is matched with the target data access right, if the matching is successful, the access right authentication of the user is passed, wherein the data storage list comprises the data access rights corresponding to the plurality of data identifications, and the user right list comprises the set access rights initially configured for the plurality of users.
Preferably, for the second authentication signature information, further comprising:
The second authentication signature information comprises a target identity of the user, an identity management identity of the data management terminal and an access right authentication time stamp, and is generated by encrypting the target identity of the user, the identity management identity of the data management terminal and the access right authentication time through a second public key by a second intelligent contract.
Preferably, the signature authentication text includes a time stamp and a random text, the time stamp is a request time corresponding to the interconnection data access request, and the random text is generated by a pseudo random number generator according to a preset character number.
The invention provides a block chain-based interconnection data security management system, which comprises a user side, an access management terminal and a data management terminal, wherein the system is used for realizing the block chain-based interconnection data security management method, and the user side, the access management terminal and the data management terminal are in communication connection with each other;
The user terminal comprises a first communication module which is used for communicating with the access management terminal and the data management terminal;
the access management terminal comprises a second communication module and an identity verification module, wherein the second communication module is used for communicating with the user side and the data management terminal, and the identity verification module is used for carrying out identity verification on the user;
the data management terminal comprises a third communication module, a right authentication module and a data management module, wherein the third communication module is used for communicating with the user terminal and the access management terminal, the right authentication module is used for authenticating the right of the user, and the data management module is used for adjusting the data access right of the user.
Preferably, for the authentication module, further comprising:
the identity verification module performs identity verification on the user based on a data access request, and comprises a step of calling a first intelligent contract to inquire a target digital certificate matched with a first public key, performs identity verification on the user based on the target digital certificate and target identity information, and the interconnection data access request comprises the target identity information, the first public key and a target access data identifier.
The invention has the following beneficial effects:
According to the invention, the access management terminal and the data management terminal respectively carry out identity verification and authority authentication on the user requesting access to the interconnection data stored in the campus data, the authentication process is realized through the pre-deployed intelligent contract, the identity and authority of the user are doubly verified, the access behavior of the user is recorded, the safety protection of the campus interconnection data is realized, and the safety risk of the campus interconnection data is reduced.
Drawings
Fig. 1 is a flow chart of a block chain-based interconnection data security management method according to an embodiment of the present invention.
Detailed Description
In order to enable those skilled in the art to better understand the technical solution of the present invention, the technical solution of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Fig. 1 is a flow chart of a method for managing interconnect data security based on a blockchain according to an embodiment of the present invention, as shown in fig. 1, and the method for managing interconnect data security based on a blockchain includes the following steps:
S10, the access management terminal receives an interconnection data access request sent by a user based on the user terminal, and performs identity verification on the user based on the data access request.
The interconnection data access request sent by the user includes, but is not limited to, target identity information, a first public key, a target access data identifier, and the like, where the target identity information may be a user ID for uniquely representing the user identity, and biometric information for proving the user identity, such as a fingerprint, a facial image, and the like, and in this embodiment, the user ID is taken as an example, the first public key and the first private key are a pair of public and private keys, and the target data access identifier is used to indicate a type of interconnection data that the user wants to access, for example, video monitoring data in a certain time park. After receiving an interconnection data access request sent by a user, the access management terminal performs identity verification on the user through information recorded in the interconnection data access request and a preset first intelligent contract, wherein the first intelligent contract is specifically called to inquire a target digital certificate matched with a first public key, and the user is subjected to identity verification based on the target digital certificate and target identity information.
And S20, responding to the passing of the authentication of the user, generating first authentication signature information by the access management terminal based on the first intelligent contract, generating access authentication information based on the first authentication signature information and the target access data identifier, and transmitting the access authentication information to the data management terminal through the first intelligent contract.
After the identity verification of the user passes, the access management terminal records information related in the identity verification process by calling a first intelligent contract to generate first authentication signature information, wherein the first authentication signature information comprises, but is not limited to, a target identity of the user, an identity management identity of the access management terminal and an identity verification timestamp, the first intelligent contract encrypts the information through a second public key to generate first authentication signature information, the target identity and the identity management identity of the access management terminal are respectively used for uniquely representing the identity of the user and the identity of the access management terminal, the target identity can be the user ID, the identity management identity of the access management terminal can be ID information or a number and the like representing the identity of the terminal, and the identity verification timestamp is used for recording the time when the access management terminal passes the identity verification of the user.
In this embodiment, the access management terminal further generates access authentication information based on the first authentication signature information and the target access data identifier, where the access authentication information is used to indicate a response result of the access management terminal to the interconnection data access request, so that after the authentication of the user is passed, the data management terminal performs a subsequent data authority setting operation.
S30, the data management terminal calls a second intelligent contract and performs access authority authentication on the user based on the access authentication information, and responds to the access authority authentication of the user, generates second authentication signature information and an access execution instruction by calling the second intelligent contract, and calls a third intelligent contract to grant the user with the access authority of the data corresponding to the target access data identifier.
After the access authority authentication of the user is passed, the data management terminal indicates that the user has the access authority corresponding to the target access data identifier, and generates second authentication signature information by calling information related in the second intelligent integrated recording authority authentication process, specifically, the second authentication signature information includes, but is not limited to, a target identity identifier of the user, an identity management identifier of the data management terminal and an access authority authentication timestamp, the second authentication signature information is generated after the second intelligent contract encrypts the information through a second public key, wherein the identity management identifier of the data management terminal is used for uniquely indicating the identity of the data management terminal, such as ID information or a number indicating the identity of the terminal, and the access authority authentication timestamp is used for recording the time when the data management terminal completes the authority authentication of the user.
In this embodiment, the data management terminal further generates an access execution instruction by invoking the second intelligent contract, where the access execution instruction is used to instruct to complete subsequent operations after authentication and authority authentication of the user, the third intelligent contract grants access authority to the corresponding data of the target access data identifier to the user according to the access execution instruction, sends a request processing result to the user, and is used to inform the user of a final processing result of the request, so that the user can access and browse the corresponding data of the target access data identifier stored in the data center of the campus, and meanwhile, the third intelligent contract stores and records information related to the whole access process, writes the information into the blockchain, and specifically writes the first authentication signature information in the access authentication information and the second authentication signature information generated by the second intelligent contract into the blockchain, so as to realize the record of the whole process information of the access behavior of the data, and facilitate the knowledge of the stored interconnection data in the data center of the campus.
It is worth to say that, in the interconnection data security management method based on the blockchain provided by the embodiment of the invention, the access management terminal and the data management terminal are used for respectively carrying out identity verification and authority authentication on the user requesting to access the interconnection data stored in the campus data, the authentication process is realized through the intelligent contracts deployed in advance, the double verification of the identity and the authority is carried out on the user, the access behaviors of the user are recorded, the security protection of the campus interconnection data is realized, and the security risk of the campus interconnection data is reduced.
In an alternative embodiment, for step S10, the access management terminal performs authentication on the user based on the data access request, and specifically includes:
The access management terminal calls a first intelligent contract to inquire a target digital certificate matched with the first public key, and matches target identity information with the target digital certificate. It is worth noting that, in the process of creating the identity, the public key provided by the user and the identity information are packaged into a digital certificate and stored in the blockchain, and the first intelligent contract performs identity verification on the user by inquiring the target digital certificate matched with the first public key provided by the user and matching the information recorded in the target digital certificate with the target identity information provided by the user.
If the matching is successful, the first intelligent contract generates a signature authentication text based on the request time of the interconnection data access request and the pseudo-random number generator, the signature authentication text is encrypted through the first public key and then sent to the user side, specifically, the signature authentication text can be in the form of a time stamp and a random text, the time stamp is the request time corresponding to the interconnection data access request, the content in the random text is generated by the pseudo-random number generator according to the preset number of characters and forms the signature authentication text together with the time stamp, the signature authentication text is encrypted through the first public key, and decryption can be carried out only through the first private key corresponding to the first public key, so that the interconnection data access request is proved to be really initiated by the user.
After receiving a target text obtained by decrypting a first private key of a user side, matching the target text with a signature authentication text, if the matching is successful, indicating that the authentication of a user passes, in the process, decrypting the encrypted authentication text by the user through the first private key held by the user and sending the encrypted authentication text to an access management terminal, and matching the received information with the generated signature authentication text by the access management terminal, if the matching is successful, preventing the risk of data leakage of interconnection data in a park due to the identity information leakage of the user, and guaranteeing the safety of the interconnection data.
In an optional embodiment, in step S30, the data management terminal invokes a second smart contract and performs access rights authentication on the user based on the access authentication information, specifically including:
The second intelligent contract decrypts the first authentication signature information in the access authentication information through the second private key, if the identity management identification of the access management terminal is checked correctly, the target data access authority corresponding to the target access data identification is inquired based on the data storage list, the set access authority of the user is inquired based on the user authority list, and the set access authority of the user is matched with the target data access authority.
In this embodiment, the data management terminal decrypts the received access authentication information by the second private key, if decryption is successful, checks the identity management identifier of the access management terminal recorded in the access authentication information by the related information recorded in advance about the access management terminal, and performs access right authentication on the user under the condition of no error, where the right authentication process specifically verifies whether the identity of the user has access rights to the data corresponding to the target access data identifier through the data storage list and the user right list, where the data storage list includes data access rights corresponding to a plurality of data identifiers, for example, supply chain management data, production data, equipment data, video monitoring data, etc., each type of data access needs a right level, the user right list includes set access rights initially configured for a plurality of users, specific setting of set access rights can be set by a manager in the campus data according to actual conditions for different users, the specific setting is not limited in this embodiment, the data storage list is queried to find whether the data to be accessed by the user needs to have access rights to the data corresponding to the target access data identifier, and if the current access rights corresponding to the target access rights can be determined if the target access rights to the user identifier has the target access rights which can be set up successfully.
In an alternative embodiment, for the digital certificate of the user, the user can register the identity in the system, provide relevant identity information (such as name, email, biological identification information and the like), after the information is primarily verified and confirmed to be accurate, the system creates a digital certificate for the user, which contains the public key provided by the user, the identity information and other contents, the system for registering the identity for the user can be deployed in a blockchain, the automatic issuance of the certificate is realized through a preset intelligent contract, the digital certificates of different users are stored through the blockchain, the safety and the authenticity of the identity information of the user are ensured, and the public key mechanism of the data party and the user party is combined for the users with the interconnection data access requirement in the park, so that the automatic intelligent contract reduces the need of manual verification, improves the efficiency, and also ensures the safety of the user information and the interconnection data.
The embodiment of the invention also provides an interconnection data security management system based on the block chain, which comprises a user side, an access management terminal and a data management terminal, wherein communication connection is established among the user side, the access management terminal and the data management terminal, and the user side, the access management terminal and the data management terminal jointly realize the interconnection data security management method based on the block chain;
the access management terminal comprises a second communication module and an identity verification module, wherein the second communication module is used for communicating with the user side and the data management terminal, and the identity verification module is used for carrying out identity verification on the user;
Specifically, the identity verification module performs identity verification on a user based on a data access request, and comprises a step of calling a first intelligent contract to inquire a target digital certificate matched with a first public key, and performs identity verification on the user based on the target digital certificate and target identity information, wherein the interconnection data access request comprises the target identity information, the first public key and a target access data identifier.
The data management terminal comprises a third communication module, a right authentication module and a data management module, wherein the third communication module is used for communicating with the user terminal and the access management terminal, the right authentication module is used for authenticating the right of the user, and the data management module is used for adjusting the data access right of the user.
The foregoing is merely exemplary of embodiments of the present invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art. Parts of the specification not described in detail belong to the prior art known to those skilled in the art.
Claims (8)
1. The method for managing the interconnection data security based on the block chain is characterized by comprising the following steps of:
The access management terminal receives an interconnection data access request sent by a user based on a user terminal, wherein the interconnection data access request comprises target identity information, a first public key and a target access data identifier, the access management terminal performs identity verification on the user based on the data access request, and the access management terminal comprises calling a first intelligent contract to inquire a target digital certificate matched with the first public key, and performs identity verification on the user based on the target digital certificate and the target identity information;
responding to the passing of the identity verification of the user, the access management terminal generates first authentication signature information based on a first intelligent contract, generates access authentication information based on the first authentication signature information and a target access data identifier, and sends the access authentication information to the data management terminal through the first intelligent contract;
The data management terminal calls a second intelligent contract and authenticates the access authority of the user based on the access authentication information, generates second authentication signature information and an access execution instruction by calling the second intelligent contract in response to the access authority authentication of the user, processes the access authentication information, the second authentication signature information and the access execution instruction by calling a third intelligent contract, comprises sending a request processing result to the user and granting the user access authority of corresponding data to a target access data identifier, and records the request behavior of the user based on the first authentication signature information and the second authentication signature information of the interconnection data access request.
2. The blockchain-based interconnection data security management method of claim 1, wherein the access management terminal performs authentication on the user based on the data access request, further comprising:
The access management terminal calls a first intelligent contract to inquire a target digital certificate matched with a first public key, matches target identity information with the target digital certificate, generates a signature authentication text based on the request time of an interconnection data access request and a pseudo-random number generator if the matching is successful, encrypts the signature authentication text through the first public key and then sends the encrypted signature authentication text to a user side, and matches the target text with the signature authentication text after receiving the target text decrypted by the user side through the first private key, and indicates that the identity verification of the user passes if the matching is successful.
3. The blockchain-based interconnection data security management method of claim 1, further comprising, for the first authentication signature information:
The first authentication signature information comprises a target identity of a user, an identity management identity of an access management terminal and an identity verification time stamp, and is obtained by encrypting the target identity of the user, the identity management identity of the access management terminal and the identity verification time stamp through a second public key by a first intelligent contract.
4. A blockchain-based interconnection data security management method as in claim 3, wherein the data management terminal invokes a second smart contract and authenticates the user for access rights based on the access authentication information, comprising:
The second intelligent contract decrypts the first authentication signature information in the access authentication information through the second private key, if the identity management identification of the access management terminal is checked correctly, the target data access right corresponding to the target access data identification is queried based on the data storage list, the set access right of the user is queried based on the user right list, the set access right of the user is matched with the target data access right, if the matching is successful, the access right authentication of the user is passed, wherein the data storage list comprises the data access rights corresponding to the plurality of data identifications, and the user right list comprises the set access rights initially configured for the plurality of users.
5. The blockchain-based interconnection data security management method of claim 4, further comprising, for the second authentication signature information:
The second authentication signature information comprises a target identity of the user, an identity management identity of the data management terminal and an access right authentication time stamp, and is generated by encrypting the target identity of the user, the identity management identity of the data management terminal and the access right authentication time through a second public key by a second intelligent contract.
6. The blockchain-based interconnection data security management method of claim 5, wherein the signature authentication text comprises a time stamp and a random text, the time stamp is a request time corresponding to the interconnection data access request, and the random text is generated by a pseudo random number generator according to a preset number of characters.
7. The system is used for realizing the block chain-based interconnection data security management method according to any one of claims 1-6, and the user side, the access management terminal and the data management terminal are in communication connection with each other;
The user terminal comprises a first communication module which is used for communicating with the access management terminal and the data management terminal;
the access management terminal comprises a second communication module and an identity verification module, wherein the second communication module is used for communicating with the user side and the data management terminal, and the identity verification module is used for carrying out identity verification on the user;
the data management terminal comprises a third communication module, a right authentication module and a data management module, wherein the third communication module is used for communicating with the user terminal and the access management terminal, the right authentication module is used for authenticating the right of the user, and the data management module is used for adjusting the data access right of the user.
8. The blockchain-based interconnection data security management system of claim 7, further comprising, for the authentication module:
the identity verification module performs identity verification on the user based on a data access request, and comprises a step of calling a first intelligent contract to inquire a target digital certificate matched with a first public key, performs identity verification on the user based on the target digital certificate and target identity information, and the interconnection data access request comprises the target identity information, the first public key and a target access data identifier.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410370916.XA CN118282738A (en) | 2024-03-29 | 2024-03-29 | Interconnection data security management method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410370916.XA CN118282738A (en) | 2024-03-29 | 2024-03-29 | Interconnection data security management method and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118282738A true CN118282738A (en) | 2024-07-02 |
Family
ID=91639357
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410370916.XA Pending CN118282738A (en) | 2024-03-29 | 2024-03-29 | Interconnection data security management method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118282738A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970299A (en) * | 2012-11-27 | 2013-03-13 | 西安电子科技大学 | File safe protection system and method thereof |
WO2020048241A1 (en) * | 2018-09-04 | 2020-03-12 | 阿里巴巴集团控股有限公司 | Blockchain cross-chain authentication method and system, and server and readable storage medium |
CN113901432A (en) * | 2021-09-30 | 2022-01-07 | 致信互链(北京)科技有限公司 | Block chain identity authentication method, equipment, storage medium and computer program product |
CN116055225A (en) * | 2023-03-30 | 2023-05-02 | 中国信息通信研究院 | Power data access method, device and system based on block chain |
-
2024
- 2024-03-29 CN CN202410370916.XA patent/CN118282738A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970299A (en) * | 2012-11-27 | 2013-03-13 | 西安电子科技大学 | File safe protection system and method thereof |
WO2020048241A1 (en) * | 2018-09-04 | 2020-03-12 | 阿里巴巴集团控股有限公司 | Blockchain cross-chain authentication method and system, and server and readable storage medium |
CN113901432A (en) * | 2021-09-30 | 2022-01-07 | 致信互链(北京)科技有限公司 | Block chain identity authentication method, equipment, storage medium and computer program product |
CN116055225A (en) * | 2023-03-30 | 2023-05-02 | 中国信息通信研究院 | Power data access method, device and system based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107566116B (en) | Method and apparatus for digital asset weight registration | |
CN102217277B (en) | Method and system for token-based authentication | |
JP6586446B2 (en) | Method for confirming identification information of user of communication terminal and related system | |
CN111181928B (en) | Vehicle diagnosis method, server, and computer-readable storage medium | |
CN107742212B (en) | Asset verification method, device and system based on block chain | |
CN104798083B (en) | For the method and system of authentication-access request | |
CN109040026A (en) | A kind of authorization method of digital asset, device, equipment and medium | |
CN110990827A (en) | Identity information verification method, server and storage medium | |
US11228438B2 (en) | Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device | |
CN112565265B (en) | Authentication method, authentication system and communication method between terminal devices of Internet of things | |
CN106953732B (en) | Key management system and method for chip card | |
CN105162797A (en) | Bidirectional authentication method based on video surveillance system | |
JP2007028015A (en) | Program, system and method for time stamp verification, and time stamp generation request method | |
CN112685786A (en) | Financial data encryption and decryption method, system, equipment and storage medium | |
CN114666064B (en) | Digital asset management method, device, storage medium and equipment based on blockchain | |
CN115913677A (en) | Block chain-based collaboration edge storage data privacy protection system and method | |
CN109743283B (en) | Information transmission method and equipment | |
CN111399980A (en) | Safety authentication method, device and system for container organizer | |
CN114338201A (en) | Data processing method and device, electronic device and storage medium | |
CN113709734A (en) | Unmanned aerial vehicle distributed identity authentication method based on block chain | |
CN110445774B (en) | Security protection method, device and equipment for IoT (Internet of things) equipment | |
CN110807210B (en) | Information processing method, platform, system and computer storage medium | |
CN113872986B (en) | Power distribution terminal authentication method and device and computer equipment | |
CN114036490B (en) | Plug-in software interface calling security authentication method, USBKey driving device and authentication system | |
CN118282738A (en) | Interconnection data security management method and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |