Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain access authentication method and device, storage medium and electronic device

A blockchain and authentication technology, applied in the Internet field, can solve problems such as easy tampering, inability to change security level or object security attributes, and low efficiency of authority control, so as to improve security and reliability, and ensure non-tampering and traceability effects

Active Publication Date: 2019-12-20
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Authority management is the core content of the blockchain system. Due to the huge number of users and the large number of blocks in the blockchain system, the authority management technology in related technologies has problems such as large resource consumption, low authority control efficiency, and low security. For example, The access list control method manages rights through the list. A simple access list is an array composed of users and resources. When the amount of data is huge, the rights management is inefficient and easy to be tampered with; , the access control of user behavior is enforced, the user cannot change the security level or the security attribute of the object, the resource consumption is large, and the authority control efficiency is low
[0005] For the above problems, no effective solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain access authentication method and device, storage medium and electronic device
  • Block chain access authentication method and device, storage medium and electronic device
  • Block chain access authentication method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0031] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain access authentication method and device, a storage medium and an electronic device. The method comprises the following steps: the control center acquires an access request sent by the first account for requesting to access the block chain data, verifies a user certificate carried in the access request, obtains the position of the authority information of the first account in the block chain from an index system, and sends the position of the permission information in the block chain to the permission management smart contract, the permission management smart contract reads permission information of the first account at the position of the permission information in the block chain, and authenticates a first function to be accessed by the first account by using the permission information, sends an obtained authentication result to the control center, and allows the first account to access the first function by the control center according to the authentication result or refuses the first account to access the first function by the control center according to the authentication result. According to the method and the apparatus, the technical problem of relatively low security of permission data in related technologies is solved.

Description

[0001] This case is a divisional case of the application with the application number 2018104047452, the application date is April 28, 2018, and the invention title is "Sound method and device, storage medium, and electronic device for blockchain access". technical field [0002] The present invention relates to the field of the Internet, in particular, to an authentication method and device for blockchain access, a storage medium, and an electronic device. Background technique [0003] Since the launch of the Bitcoin system, decentralized cryptocurrencies represented by Bitcoin and its derivative altcoins have received widespread attention. The feature of this currency system is to build a distributed shared ledger based on the block chain, so as to ensure the safety, reliability and decentralization of the system operation. Blockchain refers to a technical solution for collectively maintaining a reliable database through decentralization and trustlessness. This technical s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/27
CPCH04L63/10G06F16/27
Inventor 吴非周洪飞胡利明王慧星
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products