CN108712423A - Right management method and device - Google Patents
Right management method and device Download PDFInfo
- Publication number
- CN108712423A CN108712423A CN201810483370.3A CN201810483370A CN108712423A CN 108712423 A CN108712423 A CN 108712423A CN 201810483370 A CN201810483370 A CN 201810483370A CN 108712423 A CN108712423 A CN 108712423A
- Authority
- CN
- China
- Prior art keywords
- user
- block chain
- application
- common recognition
- added
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of right management method and devices.This method includes that the addition request for the first user for meeting entry criteria is sent into default block chain;The operating right of the first user is configured according to the Role Identity of first user being added in block chain;Judge whether the operating right comes into force in block chain according to common recognition mechanism;And if judging that the operating right comes into force in block chain according to common recognition mechanism, first user is executed and presets review operation.Present application addresses the rights management on block chain it is less efficient and excessively centralization the technical issues of.The rights management of decentralization is realized by the application, new user or new node can be added to by common recognition mechanism in block chain, without the operative configuration of system manager, while member on chain also be allowed to know the addition of new node immediately.Greatly improve the rights management efficiency on block chain.
Description
Technical field
This application involves computer software fields, in particular to a kind of right management method and device, are suitable for dividing
Cloth system.
Background technology
Judging whether that when that block chain can be added usually requires to determine whether user identity meets and be added in block chain,
And associated user some set scene or under the conditions of whether have relevant operation permission the problem of.
Inventor has found, if it is desired to be typically by possessing administrator's power when increasing a new node in block chain
The system manager of limit directly carries out system configuration, and access approval is then usually audited under chain.Further, under chain
After the approval, the permission that operation possesses newly added node or user is directly configured by administrator to be determined.
For the less efficient problem of the rights management on block chain in the related technology, effective solution is not yet proposed at present
Scheme.
Invention content
The main purpose of the application is to provide a kind of right management method, to solve the rights management efficiency on block chain
Relatively low problem.
To achieve the goals above, according to the one side of the application, a kind of right management method is provided, for handling
Newly added node in target block chain or user.
Include according to the right management method of the application:Receive the addition application of the first user;According to meeting entry criteria
The addition application in Role Identity configure the first user operating right;The operating right is received, and according to institute
The corresponding common recognition strategy of target block chain matching is stated, and if is reached in having authorization privilege node by common recognition strategy
Common recognition, the then operating right for first user of coming into force.
Further, receive the first user addition application include:Information is added in the application for receiving the first user submission;School
It tests the application and information is added;Judge that the application is added whether information meets entry criteria;And it is if it is determined that described
Application is added information and meets entry criteria, then request is added in the application is sent in goal-selling block chain.
Further, the operation of the first user is configured according to the Role Identity met in the addition application of entry criteria
Permission includes:Judge that the Role Identity of target block chain is added in first user;According to the Role Identity of first user
Configure corresponding authority;Wherein, the corresponding authority includes at least:Change permission forbids permission.
Further, the operating right is received, and corresponding common recognition strategy packet is matched according to the target block chain
It includes:Corresponding common recognition strategy is selected to judge whether the operating right comes into force in block chain according to current block chain;If logical
It crosses the common recognition strategy in having authorization privilege node to reach common understanding, then the operating right for first user of coming into force includes:Such as
Fruit judges the operating right in block chain according to current block chain common recognition strategy selected to use, then to first user
Execute the review operation in common recognition strategy.
Further, the operating right is received, and corresponding common recognition strategy is matched also according to the target block chain
Including:Receive configured second user operating right;Judge whether the second user operating right meets default processing item
Part;If it is determined that the second user operating right meets default treatment conditions, then selected in target block chain corresponding total
Know strategy;If reached common understanding in having authorization privilege node by common recognition strategy, the behaviour for the second user that comes into force
Make permission.
To achieve the goals above, according to the another aspect of the application, a kind of rights management device is provided, for handling
Newly added node in target block chain or user.
Include according to the rights management device of the application:Apply for module, the addition application for receiving the first user, and
The addition application for meeting entry criteria is sent to authority management module;Authority management module, for according to the addition
Role Identity in application configures the operating right of the first user;Common recognition module, carries for receiving from the authority management module
The operating right handed over, and corresponding common recognition strategy is matched according to the target block chain, and if by described total
Know strategy in having authorization privilege node to reach common understanding, then the operating rights for first user of coming into force in authority management module
Limit.
Further, the application module includes:Letter is added in receiving unit, the application for receiving the first user submission
Breath;Information is added for verifying the application in verification unit;First judging unit is for judging that information is added in the application
It is no to meet entry criteria;And transmission unit, when for judging that the application addition information meets entry criteria, then by institute
Application addition request is stated to be sent in goal-selling block chain.
Further, the authority management module includes:Second judgment unit, for judging that mesh is added in first user
Mark the Role Identity of block chain;Dispensing unit, for configuring corresponding authority according to the Role Identity of first user;Wherein,
The corresponding authority includes at least:Change permission forbids permission.
Further, the common recognition module includes:First selecting unit, for corresponding altogether according to the selection of current block chain
Know strategy and judges whether the operating right comes into force in block chain;First examination & approval unit, for being selected according to current block chain
The common recognition strategy used judges the operating right in block chain, then the examination & approval in common recognition strategy are executed to first user
Operation.
To achieve the goals above, according to the another aspect of the application, a kind of rights management client is provided, including:
The rights management device.
In the embodiment of the present application, in such a way that application module receives the addition application of the first user, pass through permission pipe
The operating right that module configures the first user according to the Role Identity being added in application is managed, if to realize by described
Common recognition strategy is reached common understanding in having authorization privilege node, then the operating rights for first user of coming into force in authority management module
The technique effect of limit, and then solve the less efficient technical problem of the rights management on block chain.In addition, on block chain chain
It is all there is the node of authorization privilege to reach common understanding after complete examination & approval, after examination & approval pass through, new user or new node can be added
Into block chain, without the operative configuration of system manager, while member on chain also being allowed to know the addition of new node immediately.Pole
The earth improves the rights management efficiency on block chain.
Description of the drawings
The attached drawing constituted part of this application is used for providing further understanding of the present application so that the application's is other
Feature, objects and advantages become more apparent upon.The illustrative examples attached drawing and its explanation of the application is for explaining the application, not
Constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the right management method schematic diagram according to the application first embodiment;
Fig. 2 is the right management method schematic diagram according to the application second embodiment;
Fig. 3 is the right management method schematic diagram according to the application 3rd embodiment;
Fig. 4 is the right management method schematic diagram according to the application fourth embodiment;
Fig. 5 is the right management method schematic diagram according to the 5th embodiment of the application;
Fig. 6 is the rights management schematic device according to the application first embodiment;
Fig. 7 is the rights management schematic device according to the application second embodiment;
Fig. 8 is the rights management schematic device according to the application 3rd embodiment;And
Fig. 9 is the rights management schematic device according to the application fourth embodiment.
Specific implementation mode
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, technical solutions in the embodiments of the present application are clearly and completely described, it is clear that described embodiment is only
The embodiment of the application part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
The every other embodiment that member is obtained without making creative work should all belong to the model of the application protection
It encloses.
It should be noted that term " first " in the description and claims of this application and above-mentioned attached drawing, "
Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that using in this way
Data can be interchanged in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit
Process, method, system, product or equipment those of are not necessarily limited to clearly to list step or unit, but may include without clear
It is listing to Chu or for these processes, method, product or equipment intrinsic other steps or unit.
In this application by the way that new user or the application of new node access and approval process to be put on block chain, applicant will
Application information is dealt on block chain, on chain it is all there is the node of authorization privilege to reach common understanding after i.e. complete examination & approval, examination & approval pass through after,
New user or new node can be added in alliance's chain, without the operative configuration of system manager, while also be allowed on block chain
Member/node knows the addition of new node immediately.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Reconciliation is described in detail to the principle of the application using alliance's chain as specific embodiment in embodiments herein
It releases.
As shown in Figure 1, this method includes following step S102 to step S108:
Step S102 receives the addition application of the first user;
It can be newly added node application or new addition user application that application, which is added,.
It can be access application that application, which is added, and access application solves that user identity can be added in target block chain
Identity problems.It preferably, can be to target block chain for example, applying on alliance's chain.
It can be authority application that application, which is added, authority application be the user that is added in target block chain certain scene/
Under the conditions of the problem of whether allowing some operations/acts.It preferably, can be to target block chain for example, applying on alliance's chain.
Step S104 configures the operation of the first user according to the Role Identity met in the addition application of entry criteria
Permission;
Satisfactory addition application is sent in target block chain.
Preferably, several different target block chains can be docked.Specifically, user is by applying for that module 100 can be to not
Same target block chain, which is submitted, is added application.
Step S106 receives the operating right, and matches corresponding common recognition strategy according to the target block chain,
The operating right of the first user is configured according to the Role Identity being added in application.For example, when new user's first is thought
When being added in target block chain network with certain Role Identity, then related behaviour can be assigned according to the role of newcomer/node
Make permission.
Further, additionally it is possible to according to the operating right that Role Identity the first user of configuration has been added.If for example, it is existing at
Member's application change permission is prohibited from using certain permissions all by this resume module due to breaking the rules.
In addition, operating right is submitted so that further reaching common understanding with authorization privilege node.
Step S108 comes into force described the if reached common understanding in having authorization privilege node by common recognition strategy
The operating right of one user.
Specifically, the judging result of common recognition strategy is exactly to have each of authorization privilege in the target block chain in fact
According to the feedback result of specific common recognition strategy in node.
Different common recognition strategies can be selectively used according to target block chain in the embodiment of the present application, and it is selected
Common recognition strategy be block chain each node compliance common recognition method, each node is reached common understanding, then to target block chain
For i.e. to new node access whether final result reached common recognition.Knowing together to be, permit that common recognition is added or refusal adds
Enter common recognition.Specifically then come into force the operating right of first user.
In addition, different common recognition strategies can be selectively used according to target block chain in the embodiment of the present application, and
Selected common recognition strategy is the method for each node compliance common recognition of block chain, and wholly or largely node feeding back is consistent
Property result is consistent.
In addition, can also be allowed by way of broadcast in the embodiment of the present application member/node on target block chain and
The addition of Shi Zhixiao new nodes/user.
In being different from the prior art, it is typically by possessing admin system manager's permissions that a new node, which is added,
System manager directly carries out system configuration, and the approval as access is by being audited under chain.Under chain after the approval, it wraps
It includes newly added node or permission that user is possessed also determines together, the implementation of operation is directly configured by administrator.
It can be seen from the above description that the application realizes following technique effect:
In the embodiment of the present application, in such a way that application module receives the addition application of the first user, by according to institute
The operating right that the Role Identity being added in application configures the first user is stated, if had by common recognition strategy to realize
Reach common understanding in authorization privilege node, then the technique effect of the operating right for first user of coming into force, and then solve block
The less efficient technical problem of rights management on chain.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in Fig. 2, receiving the addition Shen of the first user
Please include:
Step S202 receives the application that the first user submits and information is added;
The information that applicant submits is received, does preliminary verification and limitation, satisfactory application can be sent to target area
In block chain.
Step S204 verifies the application and information is added;
Carry out the preliminary check that information is added in application.
Step S206 judges that the application is added whether information meets entry criteria;
Judge that the application is added whether information meets entry criteria, such as, if meet each node in alliance's chain
Common recognition mechanism etc..
Step S208 then asks application addition if it is determined that information, which is added, in the application meets entry criteria
It asks and is sent in goal-selling block chain.
The application for meeting entry criteria addition information is sent in target block chain.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 3, according to the institute for meeting entry criteria
State be added application in Role Identity configure the first user operating right include:
Step S302 judges that the Role Identity of target block chain is added in first user;
Step S304 configures corresponding authority according to the Role Identity of first user;
Wherein, the corresponding authority includes at least:Change permission forbids permission.
When new user wants to be added in block chain network with certain Role Identity, this module can be according to the role of newcomer
Assign associated rights.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 4, the operating right is received, and
Matching corresponding common recognition strategy according to the target block chain includes:
Whether step S402 selects corresponding common recognition strategy to judge the operating right in block chain according to current block chain
In come into force;
After receiving new access application in block chain network, common recognition module can be according to this block chain common recognition selected to use
The feedback result of tactful and each node reach whether the common recognition of access.
If reached common understanding in having authorization privilege node by common recognition strategy, the behaviour for first user of coming into force
Include as permission:
Step S404, if judging the operating right in block chain according to current block chain common recognition strategy selected to use
In, then the review operation in common recognition strategy is executed to first user.
If judging the operating right in block chain according to current block chain common recognition strategy selected to use, then it is assumed that
Common recognition comes into force, and the review operation in common recognition strategy is executed to first user.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 5, the operating right is received, and
Matching corresponding common recognition strategy according to the target block chain further includes:
Step S502 receives configured second user operating right;
Second user is the existing user in being present in target block chain.
Step S504, judges whether the second user operating right meets default treatment conditions;
Judge whether the existing user in being present in target block chain has altered or by forbidden permission.
Step S506, if it is determined that the second user operating right meets default treatment conditions, then in target block chain
The middle corresponding common recognition strategy of selection;
The corresponding common recognition strategy of selection, on block chain chain it is all there is the node of authorization privilege to reach common understanding after i.e. completion
Examination & approval, after examination & approval pass through, the existing user in being present in target block chain changes permission or forbids associated rights.
Step S508 comes into force described the if reached common understanding in having authorization privilege node by common recognition strategy
The operating right of two users.
If reached common understanding in having authorization privilege node by common recognition strategy, you can with allow member on block chain/
Node knows that the existing user in being present in target block chain changes permission or forbids associated rights immediately.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions
It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not
The sequence being same as herein executes shown or described step.
According to the embodiment of the present application, a kind of device for implementing above-mentioned right management method is additionally provided, for handling
Newly added node in target block chain or user.As shown in fig. 6, the device includes:Apply for module 100, for receiving first
The addition application of user, and the addition application for meeting entry criteria is sent to authority management module;Rights management mould
Block 200, the operating right for configuring the first user according to the Role Identity being added in application;Common recognition module 300, is used for
The operating right submitted from the authority management module is received, and corresponding common recognition is matched according to the target block chain
Strategy, if reached common understanding in having authorization privilege node by common recognition strategy, institute of coming into force in authority management module
State the operating right of the first user.
In the application module 100 of the embodiment of the present application, the addition application of the first user can be received.Application is added can be with
It is newly added node application or new addition user application.
It can be access application that application, which is added, and access application solves that user identity can be added in target block chain
Identity problems.It preferably, can be to target block chain for example, applying on alliance's chain.
It can be authority application that application, which is added, authority application be the user that is added in target block chain certain scene/
Under the conditions of the problem of whether allowing some operations/acts.It preferably, can be to target block chain for example, applying on alliance's chain.
Application module 100 can handle application and the request of target block chain is added.And it will be conformed in applying for module 100
The addition application asked is sent in target block chain.
Preferably, application module 100 can dock several different target block chains.Specifically, user is by applying for module
100 can submit addition application to different target block chains.
In addition, application module 100 is additionally operable to the addition application for meeting entry criteria being sent to authority management module
200, i.e., if meeting the entry criteria of verification or limitation, the authority management module 200 that can be added in target block chain
Carry out the authority configuration of next step.
According to the Role Identity configuration first being added in application in the authority management module 200 of the embodiment of the present application
The operating right of user.For example, when new user's first is wanted to be added in target block chain network with certain Role Identity, permission
Management module 200 then can assign relevant operation permission according to the role of newcomer/node.
Further, can also match according to Role Identity has been added in the authority management module of the embodiment of the present application 200
Set the operating right of the first user.If for example, existing member apply change permission or due to break the rules be prohibited from using it is certain
Permission all passes through this resume module.
In addition, authority management module 200 is additionally operable to the operating right that the first user is assigned to being committed to common recognition mould
Block 300.Operating right is committed in common recognition module 300 so that further reaching common understanding with authorization privilege node.
The operating rights submitted from the authority management module is received in the common recognition module 300 of the embodiment of the present application
Limit, and corresponding common recognition strategy is matched according to the target block chain.Specifically, the judging result of common recognition strategy is in fact
It is the feedback result of the specific common recognition strategy of basis in each node that the target block chain has authorization privilege.
Different common recognitions can be selectively used in the common recognition module 300 of the embodiment of the present application according to target block chain
Strategy, and selected common recognition strategy is the method for each node compliance common recognition of block chain, each node is reached common understanding, then
Final result whether being to new node access for target block chain has reached common recognition.Common recognition can permit being added altogether
Know or common recognition is added in refusal.Specifically then come into force in module 300 of knowing together the operating right of first user.
In addition, can selectively use difference according to target block chain in the common recognition module 300 of the embodiment of the present application
Common recognition strategy, and selected common recognition strategy is the method for block chain each node compliance common recognition, whole or big portion
It is consistent that partial node feeds back consistency result.
In addition, can also be allowed by way of broadcast in the common recognition module 300 of the embodiment of the present application on target block chain
Member/node know the addition of new node/user in time.
In being different from the prior art, it is typically by possessing admin system manager's permissions that a new node, which is added,
System manager directly carries out system configuration, and the approval as access is by being audited under chain.Under chain after the approval, it wraps
It includes newly added node or permission that user is possessed also determines together, the implementation of operation is directly configured by administrator.
In the embodiment of the present application, in applying for module 100 in such a way that application module receives the addition application of the first user, pass through power
The operating right for configuring the first user in management module 200 according to the Role Identity being added in application is limited, to realize such as
Fruit is reached common understanding by common recognition strategy in having authorization privilege node, then comes into force described the in authority management module 200
The technique effect of the operating right of one user, and then solve the less efficient technical problem of the rights management on block chain.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in fig. 7, the application module 100 includes:
Information is added in receiving unit 1001, the application for receiving the first user submission;Verification unit 1002, for verifying the application
Information is added;First judging unit 1003, for judging that the application is added whether information meets entry criteria;And it sends single
The application when for judging that the application addition information meets entry criteria, is then added request and is sent to by member 1004
In goal-selling block chain.
The information that applicant submits is received in the receiving unit 1001 of the embodiment of the present application, does preliminary verification and limit
System, satisfactory application can be sent in target block chain.
The preliminary check that information is added in application is carried out in the verification unit 1002 of the embodiment of the present application.
Judge that the application is added whether information meets access item in first judging unit 1003 of the embodiment of the present application
Part, such as, if meet the common recognition mechanism of each node etc. in alliance's chain.
The application for meeting entry criteria addition information is sent to target in the transmission unit 1004 of the embodiment of the present application
In block chain.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 8, the authority management module 200 wraps
It includes:Second judgment unit 2001, for judging that the Role Identity of target block chain is added in first user;Dispensing unit
2002, for configuring corresponding authority according to the Role Identity of first user;Wherein, the corresponding authority includes at least:Become
More permission forbids permission.
When new user wants to be added in block chain network with certain Role Identity, this module can be according to the role of newcomer
Assign associated rights.
When existing member applies for change permission or is prohibited from using certain permissions due to breaking the rules and all passes through rights management
Then result is submitted to common recognition module 300 by the processing of module 200, determining after reaching common understanding to come into force.
According to the embodiment of the present application, as preferred in the present embodiment, as shown in figure 9, the common recognition module 300 includes:
First selecting unit 3001, for selecting corresponding common recognition strategy to judge the operating right whether in area according to current block chain
It comes into force in block chain;First examination & approval unit 3002, for judging the operation according to current block chain common recognition strategy selected to use
When permission is in block chain, then the review operation in common recognition strategy is executed to first user.
After receiving new access application in block chain network in the first selecting unit 3001 of the embodiment of the present application, altogether
Know module can be reached according to the feedback result of this block chain common recognition strategy selected to use and each node whether the common recognition of access.
If according to current block chain common recognition plan selected to use in the first examination & approval unit 3002 of the embodiment of the present application
Slightly judge the operating right in block chain, then it is assumed that common recognition comes into force, and examining in common recognition strategy is executed to first user
Batch operation.
Preferably, the common recognition module 300 can support a variety of common recognition strategies, be selected according to different target block chain
It selects.
Obviously, those skilled in the art should be understood that each module of above-mentioned the application or each step can be with general
Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed
Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored
Be performed by computing device in the storage device, either they are fabricated to each integrated circuit modules or by they
In multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the application be not limited to it is any specific
Hardware and software combines.
The foregoing is merely the preferred embodiments of the application, are not intended to limit this application, for the skill of this field
For art personnel, the application can have various modifications and variations.Within the spirit and principles of this application, any made by repair
Change, equivalent replacement, improvement etc., should be included within the protection domain of the application.
Claims (10)
1. a kind of right management method, which is characterized in that it is used for the newly added node in processing target block chain or user, it is described
Method includes:
Receive the addition application of the first user;
The operating right of the first user is configured according to the Role Identity met in the addition application of entry criteria;
The operating right is received, and corresponding common recognition strategy is matched according to the target block chain, and if passes through institute
It states common recognition strategy in having authorization privilege node to reach common understanding, then the operating right for first user of coming into force.
2. right management method according to claim 1, which is characterized in that receive the first user addition application include:
Information is added in the application for receiving the first user submission;
It verifies the application and information is added;
Judge that the application is added whether information meets entry criteria;And
If it is determined that information, which is added, in the application meets entry criteria, then request is added in the application is sent to goal-selling area
In block chain.
3. right management method according to claim 1, which is characterized in that according to the addition Shen for meeting entry criteria
Please in Role Identity configure the first user operating right include:
Judge that the Role Identity of target block chain is added in first user;
Corresponding authority is configured according to the Role Identity of first user;
Wherein, the corresponding authority includes at least:Change permission forbids permission.
4. right management method according to claim 1, which is characterized in that
The operating right is received, and corresponding common recognition strategy is matched according to the target block chain and includes:
Corresponding common recognition strategy is selected to judge whether the operating right comes into force in block chain according to current block chain;
If reached common understanding in having authorization privilege node by common recognition strategy, the operating rights for first user of coming into force
Limit includes:
If judging the operating right in block chain according to current block chain common recognition selected to use strategy, to described the
One user executes the review operation in common recognition strategy.
5. right management method according to claim 1, which is characterized in that receive the operating right, and according to institute
Stating the corresponding common recognition strategy of target block chain matching further includes:
Receive configured second user operating right;
Judge whether the second user operating right meets default treatment conditions;
If it is determined that the second user operating right meets default treatment conditions, then selected in target block chain corresponding total
Know strategy;
If reached common understanding in having authorization privilege node by common recognition strategy, the operating rights for the second user that comes into force
Limit.
6. a kind of rights management device, which is characterized in that it is used for the newly added node in processing target block chain or user, it is described
Device includes:
Apply for module, the addition application for receiving the first user, and the addition application for meeting entry criteria is sent
To authority management module;
Authority management module, the operating right for configuring the first user according to the Role Identity being added in application;
Common recognition module, for receiving the operating right submitted from the authority management module, and according to the target area
The corresponding common recognition strategy of block chain matching, and
If reached common understanding in having authorization privilege node by common recognition strategy, come into force in authority management module described
The operating right of first user.
7. rights management device according to claim 6, which is characterized in that the application module includes:
Information is added in receiving unit, the application for receiving the first user submission;
Information is added for verifying the application in verification unit;
First judging unit, for judging that the application is added whether information meets entry criteria;And
The application is then added and asks when for judging that the application addition information meets entry criteria by transmission unit
It is sent in goal-selling block chain.
8. rights management device according to claim 6, which is characterized in that the authority management module includes:
Second judgment unit, for judging that the Role Identity of target block chain is added in first user;
Dispensing unit, for configuring corresponding authority according to the Role Identity of first user;
Wherein, the corresponding authority includes at least:Change permission forbids permission.
9. rights management device according to claim 6, which is characterized in that the common recognition module includes:
First selecting unit, for selecting corresponding common recognition strategy to judge the operating right whether in area according to current block chain
It comes into force in block chain;
First examination & approval unit, for judging the operating right in block chain according to current block chain common recognition strategy selected to use
In, then the review operation in common recognition strategy is executed to first user.
10. a kind of rights management client, which is characterized in that including:Such as claim 6 to 7 any one of them rights management
Device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810483370.3A CN108712423A (en) | 2018-05-18 | 2018-05-18 | Right management method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810483370.3A CN108712423A (en) | 2018-05-18 | 2018-05-18 | Right management method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108712423A true CN108712423A (en) | 2018-10-26 |
Family
ID=63869135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810483370.3A Pending CN108712423A (en) | 2018-05-18 | 2018-05-18 | Right management method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108712423A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109474584A (en) * | 2018-10-29 | 2019-03-15 | 中化能源科技有限公司 | A kind of rule-based block chain network permits Adding Way automatically |
CN109493063A (en) * | 2018-12-29 | 2019-03-19 | 杭州趣链科技有限公司 | The method of permission control is carried out in a kind of alliance's block chain |
CN109714348A (en) * | 2018-12-29 | 2019-05-03 | 百度在线网络技术(北京)有限公司 | Permission processing method, device, equipment and the medium realized based on block chain |
CN109964452A (en) * | 2018-11-29 | 2019-07-02 | 区链通网络有限公司 | A kind of node administration method, device and the storage device of block catenary system |
CN110572262A (en) * | 2019-09-20 | 2019-12-13 | 中国银行股份有限公司 | Block chain alliance chain construction method, device and system |
CN110598394A (en) * | 2019-03-28 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Authority verification method and device and storage medium |
CN110611647A (en) * | 2019-03-06 | 2019-12-24 | 张超 | Node joining method and device on block chain system |
CN110769274A (en) * | 2019-10-18 | 2020-02-07 | 腾讯科技(深圳)有限公司 | Live broadcast information processing method and device based on block chain network, electronic equipment and storage medium |
CN111262825A (en) * | 2018-12-03 | 2020-06-09 | 富士通株式会社 | Apparatus and method for processing user public key in communication system including plurality of nodes |
CN111385103A (en) * | 2020-05-29 | 2020-07-07 | 腾讯科技(深圳)有限公司 | Authority processing method, system and device and electronic equipment |
WO2020035094A3 (en) * | 2019-11-19 | 2020-09-10 | Alipay (Hangzhou) Information Technology Co., Ltd. | System and method for consensus management |
CN111897795A (en) * | 2020-06-24 | 2020-11-06 | 苏宁金融科技(南京)有限公司 | Management method, device and system of alliance chain |
CN112235251A (en) * | 2020-09-21 | 2021-01-15 | 建信金融科技有限责任公司 | Block chain management method and device, computer equipment and storage medium |
CN112398924A (en) * | 2020-11-03 | 2021-02-23 | 深圳壹账通智能科技有限公司 | Block chain node admission control method, block chain node admission control device, computer equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488431A (en) * | 2015-11-30 | 2016-04-13 | 布比(北京)网络技术有限公司 | Authority management method and device for block chain system |
CN106097101A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain realizes the management method of financial transaction |
US20170046709A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Product tracking and control system |
CN106796688A (en) * | 2016-12-26 | 2017-05-31 | 深圳前海达闼云端智能科技有限公司 | Permission control method, device and system of block chain and node equipment |
CN107332701A (en) * | 2017-06-26 | 2017-11-07 | 中国人民银行数字货币研究所 | The method and system of management node |
CN107426157A (en) * | 2017-04-21 | 2017-12-01 | 杭州趣链科技有限公司 | A kind of alliance's chain authority control method based on digital certificate and ca authentication system |
CN107480555A (en) * | 2017-08-01 | 2017-12-15 | 中国联合网络通信集团有限公司 | Database-access rights control method and equipment based on block chain |
CN107911373A (en) * | 2017-11-24 | 2018-04-13 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of block chain right management method and system |
-
2018
- 2018-05-18 CN CN201810483370.3A patent/CN108712423A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170046709A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Product tracking and control system |
CN105488431A (en) * | 2015-11-30 | 2016-04-13 | 布比(北京)网络技术有限公司 | Authority management method and device for block chain system |
CN106097101A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain realizes the management method of financial transaction |
CN106796688A (en) * | 2016-12-26 | 2017-05-31 | 深圳前海达闼云端智能科技有限公司 | Permission control method, device and system of block chain and node equipment |
CN107426157A (en) * | 2017-04-21 | 2017-12-01 | 杭州趣链科技有限公司 | A kind of alliance's chain authority control method based on digital certificate and ca authentication system |
CN107332701A (en) * | 2017-06-26 | 2017-11-07 | 中国人民银行数字货币研究所 | The method and system of management node |
CN107480555A (en) * | 2017-08-01 | 2017-12-15 | 中国联合网络通信集团有限公司 | Database-access rights control method and equipment based on block chain |
CN107911373A (en) * | 2017-11-24 | 2018-04-13 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of block chain right management method and system |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109474584A (en) * | 2018-10-29 | 2019-03-15 | 中化能源科技有限公司 | A kind of rule-based block chain network permits Adding Way automatically |
CN109964452A (en) * | 2018-11-29 | 2019-07-02 | 区链通网络有限公司 | A kind of node administration method, device and the storage device of block catenary system |
CN109964452B (en) * | 2018-11-29 | 2021-08-10 | 区链通网络有限公司 | Node management method and device for block chain system and storage device |
WO2020107350A1 (en) * | 2018-11-29 | 2020-06-04 | 区链通网络有限公司 | Node management method and apparatus for blockchain system, and storage device |
CN111262825B (en) * | 2018-12-03 | 2022-09-09 | 富士通株式会社 | Apparatus and method for processing user public key in communication system including plurality of nodes |
CN111262825A (en) * | 2018-12-03 | 2020-06-09 | 富士通株式会社 | Apparatus and method for processing user public key in communication system including plurality of nodes |
CN109493063A (en) * | 2018-12-29 | 2019-03-19 | 杭州趣链科技有限公司 | The method of permission control is carried out in a kind of alliance's block chain |
CN109714348A (en) * | 2018-12-29 | 2019-05-03 | 百度在线网络技术(北京)有限公司 | Permission processing method, device, equipment and the medium realized based on block chain |
CN109714348B (en) * | 2018-12-29 | 2021-08-06 | 百度在线网络技术(北京)有限公司 | Authority processing method, device, equipment and medium based on block chain |
CN110611647A (en) * | 2019-03-06 | 2019-12-24 | 张超 | Node joining method and device on block chain system |
CN110598394A (en) * | 2019-03-28 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Authority verification method and device and storage medium |
CN110572262A (en) * | 2019-09-20 | 2019-12-13 | 中国银行股份有限公司 | Block chain alliance chain construction method, device and system |
CN110769274A (en) * | 2019-10-18 | 2020-02-07 | 腾讯科技(深圳)有限公司 | Live broadcast information processing method and device based on block chain network, electronic equipment and storage medium |
CN112513900B (en) * | 2019-11-19 | 2024-03-26 | 支付宝(杭州)信息技术有限公司 | System and method for consensus management |
WO2020035094A3 (en) * | 2019-11-19 | 2020-09-10 | Alipay (Hangzhou) Information Technology Co., Ltd. | System and method for consensus management |
US11270030B2 (en) | 2019-11-19 | 2022-03-08 | Alipay (Hangzhou) Information Technology Co., Ltd. | System and method for consensus management |
CN112513900A (en) * | 2019-11-19 | 2021-03-16 | 支付宝(杭州)信息技术有限公司 | Systems and methods for consensus management |
CN111385103A (en) * | 2020-05-29 | 2020-07-07 | 腾讯科技(深圳)有限公司 | Authority processing method, system and device and electronic equipment |
CN111385103B (en) * | 2020-05-29 | 2020-09-25 | 腾讯科技(深圳)有限公司 | Authority processing method, system and device and electronic equipment |
CN111897795A (en) * | 2020-06-24 | 2020-11-06 | 苏宁金融科技(南京)有限公司 | Management method, device and system of alliance chain |
CN112235251A (en) * | 2020-09-21 | 2021-01-15 | 建信金融科技有限责任公司 | Block chain management method and device, computer equipment and storage medium |
CN112398924A (en) * | 2020-11-03 | 2021-02-23 | 深圳壹账通智能科技有限公司 | Block chain node admission control method, block chain node admission control device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108712423A (en) | Right management method and device | |
CN108881232B (en) | Sign-on access method, apparatus, storage medium and the processor of operation system | |
DE60205289T2 (en) | System and method for secure radio transmission of configuration data | |
CN105069363B (en) | The distribution of intelligent robot account and management method and system based on artificial intelligence | |
CN106656547B (en) | Method and device for updating network configuration of household electrical appliance | |
DE112005002297T5 (en) | A method and system for supporting fast handover of mobile subscriber stations in wireless broadband networks | |
CN106161096A (en) | Port configuration method and device | |
US10003601B1 (en) | Security management application providing proxy for administrative privileges | |
US20080086545A1 (en) | Network configuration using configuration parameter inheritance | |
CN105162608A (en) | Physical address bypass authentication method and device based on software-defined network | |
CN105933245A (en) | Secure and credible access method in software defined network | |
CN107466067A (en) | A kind of group-calling service switching method, system, base station and terminal | |
CN106534082A (en) | User registration method and apparatus | |
CN110263314A (en) | Form processing method and device, storage medium, electronic device | |
CN110430590A (en) | Network is sliced matching process and device | |
CN104219094B (en) | A kind of method and apparatus of AP packet configurations | |
CN106059802A (en) | Terminal access authentication method and device | |
CN201690475U (en) | Application server access system in enterprise local area network | |
CN110139274A (en) | A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium | |
CN107645570A (en) | Client loading method and device | |
CN105809024A (en) | Password setting method and device | |
CN105592141A (en) | Connection number control method and device | |
CN106773797B (en) | A kind of information processing method, system and management platform | |
CN104898472B (en) | terminal control method and device | |
CN110532094B (en) | Load balancing weight value modification method and processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181026 |