WO2022142514A1 - Chaîne de blocs de consortium souveraine de chaînes de blocs cone - Google Patents

Chaîne de blocs de consortium souveraine de chaînes de blocs cone Download PDF

Info

Publication number
WO2022142514A1
WO2022142514A1 PCT/CN2021/120066 CN2021120066W WO2022142514A1 WO 2022142514 A1 WO2022142514 A1 WO 2022142514A1 CN 2021120066 W CN2021120066 W CN 2021120066W WO 2022142514 A1 WO2022142514 A1 WO 2022142514A1
Authority
WO
WIPO (PCT)
Prior art keywords
block
cone
sovereign
chain
node
Prior art date
Application number
PCT/CN2021/120066
Other languages
English (en)
Chinese (zh)
Inventor
李俊
李晶宇
武少华
张琴
Original Assignee
山西特信环宇信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 山西特信环宇信息技术有限公司 filed Critical 山西特信环宇信息技术有限公司
Publication of WO2022142514A1 publication Critical patent/WO2022142514A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Definitions

  • the invention belongs to the technical field of blockchain, and in particular relates to a sovereign alliance chain of a cone blockchain.
  • the essence of blockchain is an open source distributed ledger. It is the core technology of Bitcoin and other virtual currencies. It can efficiently record the transactions of buyers and sellers, and ensure that these records are verifiable and permanent. At the same time, the blockchain itself has the characteristics of decentralization, disintermediation, information transparency, immutability and security. The blockchain has problems such as no government supervision and low security.
  • Blockchain is divided into public chain, private chain and alliance chain.
  • the Bitcoin we are familiar with is the public chain, which refers to a consensus blockchain that anyone in the world can read, send transactions and obtain valid confirmation. Any node of the public chain is open to anyone, everyone can participate in the calculation in this blockchain, and anyone can download and obtain the complete blockchain data, that is, the entire ledger.
  • the alliance chain is jointly maintained by the member nodes in the alliance, and the nodes can join the alliance network after authorization, and only open all or part of the functions for alliance members. Some nodes are pre-designated as bookkeepers. The generation of each block is jointly decided by all bookkeepers. Other nodes can trade, but have no bookkeeping rights.
  • the alliance chain has the characteristics of partial decentralization, strong controllability, data will not be disclosed by default, and the transaction speed is very fast. However, the alliance chain has some defects:
  • the alliance chain is still highly dependent on the center.
  • the alliance chain is controlled by multiple centers, and the system is jointly distributed and recorded by several authoritative institutions, and these nodes coordinate their work according to the consensus mechanism. Validating transactions requires an internal decision by the consortium.
  • Each node corresponds to an entity. If any entity node wants to join the alliance chain, it needs to obtain the permission of the alliance chain, which will increase the power of the alliance leader node, which is not conducive to the equal transaction and verification of all nodes, resulting in the lack of consensus in the alliance chain. Safe and secure.
  • Membership verification of the existing consortium chain is determined by the inside of the consortium chain, lack of government supervision, and the lack of mutual communication and authentication between the existing consortium chains, which makes the consortium chain transactions lack security guarantees, which is not conducive to the fairness of the internal transactions of the consortium chain.
  • the present invention provides a sovereign consortium chain of a cone block chain, which can solve the lack of security of the existing consortium chain consensus, the lack of supervision of the identity authentication of the consortium chain members, the mutual authentication of the consortium chain and the communication, etc.
  • the technical scheme adopted in the present invention is:
  • each cone blockchain is a cone sovereign chain, and a consensus is reached between each cone sovereign chain to form a sovereign alliance chain; Multiple consensus blocks transmit and authenticate information; each cone sovereign chain conducts point-to-point data communication through standard transmission units, and sends broadcast information to consensus blocks.
  • the human-identity-machine authentication node block code hash value of the base layer of the sovereign cone block chain is the hash value of the block code
  • the block code hash value of the personal identity authentication node is the hash value of the block code
  • Legal person identity authentication node block code hash value corresponding to the human-identity-machine-integration authentication node block code hash value, personal identity authentication node block code hash value, and legal person identity authentication node block that store the consensus block respectively.
  • Encoded hash value; the terminal code of the sovereign cone blockchain stores the consensus block terminal code.
  • the consensus blocks of the cone blockchain include the consensus blocks of the respective sovereign cone blockchains and the consensus blocks of the sovereign alliance chain.
  • the consensus blocks of the sovereign alliance chain include but are not limited to the two sovereign cone blockchains. Consensus block.
  • the information of the standard transmission unit includes: the cone block chain terminal code, the registered person-identity-machine-integration authentication node block code, the personal identity authentication node block code, and the legal person identity authentication node block code.
  • the block code of the consensus block of different cone blockchains is obtained according to the block code, and the block generation is sent to the consensus blocks in other cone blockchains broadcast information.
  • the consensus block in the sovereign cone blockchain verifies the information after receiving the broadcast; the verified information includes: verifying the broadcast block code, broadcast content, block content and administrator information; The hash value completes the verification.
  • the node is registered on the cone block chain, and passes the authentication of the block chain of the person-identity-machine-integration authentication node block, the personal identity authentication node block, and the legal person identity authentication node block;
  • the consensus block includes the consensus block of the sovereign cone chain and the consensus block of the non-sovereign cone chain; the consensus block receives the broadcast information, and stores the coding information of the node block and the administrator information in the corresponding position.
  • the two-way identity authentication process for different sovereign cone blockchain nodes is as follows:
  • the authentication and authenticated node blocks are registered on the cone block chain, and the node block code hash value is stored in the total cone block corresponding to the cone sovereign chain;
  • the authentication node block initiates an authentication request for the authenticated node block, the authentication node block passes the authentication of the cone blockchain, and the authentication result is sent to the authenticated node block.
  • the authenticated node block needs to pass the authorization and authentication of this cone blockchain, and the authorization authentication result is sent to the authentication node block;
  • the authentication node block obtains the coded address, network address and server identification of the authenticated node block through the total cone block, so as to realize the authentication of the relevant information of the authenticated node block by the authentication node block;
  • the certified node block can also obtain the encoded address, network address and server identifier of the certified node block from the total block of the sovereign cone blockchain where the certified node block is located to realize different sovereign cones. Two-way authentication between blockchain blocks.
  • the present invention has the following beneficial effects:
  • the cone alliance chain is formed through the consensus of multiple sovereign cone blockchains, and the information transmission and information authentication of multiple consensus blocks between the sovereign cone blockchains can be constructed through the standard transmission unit of the cone blockchain.
  • Equal and free, government-regulated sovereign cone blockchain and sovereign consortium chain which can realize mutual verification and communication of sovereign consortium chains.
  • Figure 1 is a schematic diagram of the overall structure of the present invention.
  • Fig. 2 is the standard transmission unit structural diagram of the present invention
  • Fig. 3 is the flow chart of the identity verification method of the node access sovereign alliance chain of the present invention.
  • Fig. 4 is the structure diagram of mutual authentication of sovereign alliance chain of the present invention.
  • FIG. 5 is a flow chart of the mutual authentication method of the sovereign alliance chain of the present invention.
  • Fig. 6 is the structure schematic diagram of the cone block of the present invention.
  • FIG. 7 is a schematic diagram of the structure of the pyramid block chain of the present invention.
  • each cone blockchain is a cone sovereign chain, and a consensus is reached between each cone sovereign chain to form a sovereign alliance chain; Information transmission and authentication are carried out through multiple consensus blocks; point-to-point data communication is carried out between each cone sovereign chain through standard transmission units, and broadcast information is sent to the consensus blocks.
  • the human-identity-machine authentication node block code hash value of the base layer of the sovereign cone block chain is the hash value of the block code
  • the block code hash value of the personal identity authentication node is the hash value of the block code
  • Legal person identity authentication node block code hash value corresponding to the human-identity-machine-integration authentication node block code hash value, personal identity authentication node block code hash value, and legal person identity authentication node block that store the consensus block respectively.
  • Encoded hash value; the terminal code of the sovereign cone blockchain stores the consensus block terminal code.
  • the consensus blocks of the cone blockchain include the consensus blocks of the respective sovereign cone blockchains and the consensus blocks of the sovereign alliance chain.
  • the consensus blocks of the sovereign alliance chain include but are not limited to the two sovereign cone blockchains. Consensus block.
  • the information of the standard transmission unit includes: the cone block chain terminal code, the registered person-identity-machine-integration authentication node block code, the personal identity authentication node block code, and the legal person identity authentication node block code.
  • the block code of the consensus block of different cone blockchains is obtained according to the block code, and the block generation is sent to the consensus blocks in other cone blockchains broadcast information.
  • the consensus block in the sovereign cone blockchain verifies the information after receiving the broadcast; the verified information includes: verifying the broadcast block code, broadcast content, block content and administrator information; The hash value completes the verification.
  • the node is registered on the cone block chain, and passes the authentication of the block chain of the person-identity-machine-integration authentication node block, the personal identity authentication node block, and the legal person identity authentication node block;
  • Nodes include but are not limited to individual user blocks, legal person user blocks, as well as some institutions and organizations.
  • the specific implementation steps of the identity verification of the individual user block or the legal person user block are:
  • Cone blockchain terminal client user opens the client through his biometric authentication, and sends an authentication request to the registered human-identity-machine authentication node block and personal identity authentication node block;
  • the authentication node block for the integration of human, ID and machine authenticates the sent terminal identification, terminal number and the bound ID card number. After the authentication is passed, it sends a message to the identity authentication node block corresponding to the ID number that the integration of human and ID card has passed. news;
  • the identity authentication node block receives the authentication request sent by the terminal client of the cone blockchain and the message that the authentication node block of the integration of the human and the machine is authenticated.
  • the biometric information is compared with the information retained in the identity authentication node block. After the comparison is successful, the authentication is completed.
  • the consensus block includes the consensus block of the sovereign cone chain and the consensus block of the non-sovereign cone chain; after the consensus block receives the broadcast information, the coding information of the node block, administrator information, etc. are stored in the corresponding position .
  • the authentication and authenticated node blocks are registered on the cone block chain, and the node block code hash value is stored in the total cone block corresponding to the sovereign cone chain;
  • the authentication node block and the authenticated node block are in two cone blockchains respectively.
  • the authentication node block code is saved in the total cone block of its own cone blockchain through verification, and the authenticated node block code After verification, it is stored in the total cone blocks of this cone block chain.
  • the authentication node block initiates an authentication request for the authenticated node block, the authentication node block passes the authentication of this cone blockchain, and the authentication result is sent to the authenticated node block;
  • the authenticated node block needs to pass the authorization and authentication of this cone block chain, and the authorization authentication result is sent to the authentication node block;
  • the authentication node block receives the authorization authentication information of the authenticated node block, and obtains the encoded address and network address of the authenticated node block through the total cone block of the cone block chain located by the authenticated node block. And the server identifier, to realize the authentication of the relevant information of the authenticated node block by the authentication node block.
  • the certified node block can also obtain the code address, network address and server ID of the certified node block from the total block of the sovereign cone blockchain where the certified node block is located to realize different sovereign cone blockchains. Two-way authentication between blocks.
  • a and B are two terminal client users of the cone blockchain, and the mutual verification steps of A and B in the cone blockchain are as follows:
  • the authentication QR code is generated by the authentication result and timestamp and sent to B-cone blockchain terminal client;
  • a Cone blockchain terminal client user broadcasts the authentication result to the Cone Consortium chain network at the same time, and sends the standard transmission unit to the B Cone blockchain terminal client user;
  • the user login of the B-cone blockchain terminal client is similar to that of A.
  • scan the authentication QR code sent by the A-cone blockchain terminal client user to obtain the A-cone block.
  • the block code of the authentication node, personal identity authentication node block code, legal person identity authentication node block code, and terminal code registered by the chain terminal client are obtained through the total cone block of the Cone blockchain.
  • the terminal client user of the A-cone blockchain can also authenticate the terminal client user of the B-cone blockchain.
  • A-cone blockchain terminal client users and B-cone blockchain terminal client users can verify each other, and can also transmit information to each other, conduct real-time communication, etc.
  • a and B are users of the two cone blockchains, respectively, and may also be some institutions, organizations, etc. that access the cone blockchains.
  • User C of the sovereign cone blockchain receives the broadcast, and at the same time initiates an authorization authentication request to the total cone block of the sovereign cone blockchain where user C is located;
  • the sovereign cone blockchain where user C is located will verify the block code information of the agency D, and send the authorization and authentication results to the agency D;
  • Cone blockchain terminal client C users and sovereign alliance chain institutions can authenticate each other and transmit information in real time.
  • the consensus block of the pyramid block chain in the present invention includes the consensus block of this pyramid block chain and the consensus block of the alliance chain.
  • An authentication node block which has a consensus with the upper and lower node blocks in the same row of this node block, and is unified with the witness machine of the general cone block of the alliance chain.
  • the unified authentication node block stores the consensus block code of this cone blockchain and the code of the consensus block of the alliance chain, including: the upper and lower block codes of the sovereign cone blockchain human-identity machine authentication node block Hash value, consortium chain human-certificate-machine-integrated authentication node block code hash value, each sovereign consortium chain country code hash value, etc.
  • the node block is the top-level block of the pyramid block
  • the itemized unit block is the middle-level block of the pyramid block, which belongs to the classification block of the node block and belongs to the node block.
  • Sub-block the user block is the bottom block of the pyramid block.
  • the user block can apply for a secondary unit block and a secondary user block according to its own service content, such as providing a public platform; the user block, the secondary unit block and the secondary user block also form a cone area piece.
  • Some institutions also have no user block, or no sub-unit block.
  • node block The hierarchical relationship from top to bottom is: node block, itemized unit block, user block, secondary unit block, secondary user block, and microblock.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

La présente invention se rapporte au domaine technique des chaînes de blocs, et concerne spécifiquement une chaîne de blocs de consortium souveraine de chaînes de bloc Cone. Chaque chaîne de blocs Cone est une chaîne de blocs souveraine Cone, et un consensus est obtenu entre des chaînes de blocs souveraines Cone de façon à former la chaîne de blocs de consortium souveraine ; la transmission et l'authentification d'informations sont effectuées entre les chaînes de blocs souveraines Cone au moyen d'une pluralité de blocs de consensus ; et une communication de données point à point est effectuée entre les chaînes de blocs souveraines Cone au moyen d'unités de transmission standard, et des informations de diffusion sont envoyées aux blocs de consensus. Au moyen d'un consensus entre des chaînes de blocs d'une pluralité de chaînes de blocs souveraines Cone, une chaîne de blocs de consortium Cone est formée, et la transmission d'informations et l'authentification d'informations d'une pluralité de blocs de consensus entre les chaînes de blocs souveraines Cone sont effectuées au moyen d'unités de transmission standard de chaînes de blocs Cone, de sorte que des chaînes de blocs souveraines et des chaînes de bloc de consortium égales, libres et régulées par le gouvernement puissent être construites, et la vérification mutuelle et la communication des chaînes de blocs de consortium peuvent être réalisées.
PCT/CN2021/120066 2020-12-31 2021-09-24 Chaîne de blocs de consortium souveraine de chaînes de blocs cone WO2022142514A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011616843.6A CN112769917B (zh) 2020-12-31 2020-12-31 一种锥体区块链的主权联盟链
CN202011616843.6 2020-12-31

Publications (1)

Publication Number Publication Date
WO2022142514A1 true WO2022142514A1 (fr) 2022-07-07

Family

ID=75697810

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/120066 WO2022142514A1 (fr) 2020-12-31 2021-09-24 Chaîne de blocs de consortium souveraine de chaînes de blocs cone

Country Status (2)

Country Link
CN (1) CN112769917B (fr)
WO (1) WO2022142514A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112769917B (zh) * 2020-12-31 2022-08-02 山西特信环宇信息技术有限公司 一种锥体区块链的主权联盟链
CN114153375B (zh) * 2021-08-13 2022-07-22 北京天德科技有限公司 一种基于区块链技术的块存储系统及块存储方法

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107146087A (zh) * 2017-04-11 2017-09-08 广东网金控股股份有限公司 一种基于区块链联盟链的快速共识记账方法及系统
CN108052530A (zh) * 2017-11-10 2018-05-18 杭州云象网络技术有限公司 一种基于联盟链的去中心化ca构建方法及其系统
CN108124502A (zh) * 2017-03-31 2018-06-05 北京大学深圳研究生院 一种基于联盟链的顶级域名管理方法及系统
CN109510876A (zh) * 2018-12-20 2019-03-22 弗洛格(武汉)信息科技有限公司 一种基于pbft的联盟链分片方法及相应的联盟链
CN110110498A (zh) * 2019-05-10 2019-08-09 中南大学 一种基于联盟链的数字版权确权方法与系统
US20200059369A1 (en) * 2017-05-16 2020-02-20 Peking University Shenzhen Graduate School Determining consensus by parallel proof of voting in consortium blockchain
WO2020189927A1 (fr) * 2019-03-15 2020-09-24 주식회사 코인플러그 Procédé et serveur de gestion de l'identité d'un utilisateur à l'aide d'un réseau de chaîne de blocs, et procédé et terminal d'authentification d'utilisateur à l'aide d'une identité d'utilisateur sur la base d'un réseau de chaîne de blocs
CN112148787A (zh) * 2020-08-10 2020-12-29 山西特信环宇信息技术有限公司 一种锥体区块、锥体区块链结构和方法
CN112149073A (zh) * 2020-09-25 2020-12-29 山西特信环宇信息技术有限公司 一种锥体区块链管理方法及系统
CN112769917A (zh) * 2020-12-31 2021-05-07 山西特信环宇信息技术有限公司 一种锥体区块链的主权联盟链

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MX2019004657A (es) * 2018-11-07 2019-08-12 Alibaba Group Holding Ltd Agilizacion de consenso de cadena de bloques de tolerancia a faltas bizantinas practica y sincronizacion de nodo.
CN110245951B (zh) * 2019-06-19 2021-04-20 西南交通大学 一种基于树形结构的联盟链主从多链共识方法
CN110572819B (zh) * 2019-07-27 2023-03-24 中国人民解放军战略支援部队信息工程大学 基于区块链的多域无线Mesh网络跨域认证方法及系统
CN110489493A (zh) * 2019-08-27 2019-11-22 山东浪潮人工智能研究院有限公司 一种基于区块链的多云数据中心服务质量认定方法
CN111654465A (zh) * 2020-04-17 2020-09-11 全球能源互联网研究院有限公司 一种基于区块链的电力业务跨域可信认证系统及方法

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124502A (zh) * 2017-03-31 2018-06-05 北京大学深圳研究生院 一种基于联盟链的顶级域名管理方法及系统
CN107146087A (zh) * 2017-04-11 2017-09-08 广东网金控股股份有限公司 一种基于区块链联盟链的快速共识记账方法及系统
US20200059369A1 (en) * 2017-05-16 2020-02-20 Peking University Shenzhen Graduate School Determining consensus by parallel proof of voting in consortium blockchain
CN108052530A (zh) * 2017-11-10 2018-05-18 杭州云象网络技术有限公司 一种基于联盟链的去中心化ca构建方法及其系统
CN109510876A (zh) * 2018-12-20 2019-03-22 弗洛格(武汉)信息科技有限公司 一种基于pbft的联盟链分片方法及相应的联盟链
WO2020189927A1 (fr) * 2019-03-15 2020-09-24 주식회사 코인플러그 Procédé et serveur de gestion de l'identité d'un utilisateur à l'aide d'un réseau de chaîne de blocs, et procédé et terminal d'authentification d'utilisateur à l'aide d'une identité d'utilisateur sur la base d'un réseau de chaîne de blocs
CN110110498A (zh) * 2019-05-10 2019-08-09 中南大学 一种基于联盟链的数字版权确权方法与系统
CN112148787A (zh) * 2020-08-10 2020-12-29 山西特信环宇信息技术有限公司 一种锥体区块、锥体区块链结构和方法
CN112149073A (zh) * 2020-09-25 2020-12-29 山西特信环宇信息技术有限公司 一种锥体区块链管理方法及系统
CN112769917A (zh) * 2020-12-31 2021-05-07 山西特信环宇信息技术有限公司 一种锥体区块链的主权联盟链

Also Published As

Publication number Publication date
CN112769917A (zh) 2021-05-07
CN112769917B (zh) 2022-08-02

Similar Documents

Publication Publication Date Title
CN109787815B (zh) 基于区块链的政务信息资源共享系统
US7406594B2 (en) Method and apparatus for certification and authentication of users and computers over networks
CN100542092C (zh) 分布式多级安全访问控制方法
WO2022142514A1 (fr) Chaîne de blocs de consortium souveraine de chaînes de blocs cone
CN109962890B (zh) 一种区块链的认证服务装置及节点准入、用户认证方法
CN112217807B (zh) 一种锥体区块链密钥生成方法、认证方法及系统
CN107426157A (zh) 一种基于数字证书以及ca认证体系的联盟链权限控制方法
CN108109257A (zh) 一种基于区块链的匿名电子投票方法
CN105162606B (zh) 一种基于电子法定身份证件实体证生成网络映射证件的方法
CN110069908A (zh) 一种区块链的权限控制方法及装置
CN109493063A (zh) 一种联盟区块链中进行权限控制的方法
CN109040139A (zh) 一种基于区块链与智能合约的身份认证系统及方法
CN104363207B (zh) 多因子安全增强授权与认证方法
CN110278462A (zh) 一种基于区块链的流动放映授权管理方法
WO2008022585A1 (fr) Procédé, système et dispositif de certification
CN108964885A (zh) 鉴权方法、装置、系统和存储介质
US11487892B2 (en) Financial data secure sharing method, device and system based on cloud server
CN102420690A (zh) 一种工业控制系统中身份与权限的融合认证方法及系统
CN105184725A (zh) 一种基于电子法定身份证件实体证生成的网络映射证件
CN109886675A (zh) 基于区块链的资源访问令牌的分发和资源使用监控方法
WO2022100291A1 (fr) Architecture hiérarchique d'une chaîne de blocs de pyramide
CN110417790A (zh) 区块链实名制排队系统及方法
CN108322468A (zh) 身份认证系统
WO2019101156A1 (fr) Procédé de commande de dispositif, et son dispositif associé
CN111585762A (zh) 一种基于零知识证明的服务器登录认证系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21913259

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21913259

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 21913259

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 151223)