Block chain authority management method and system

A permission management and blockchain technology, applied in the blockchain field, can solve problems such as uncontrollable and flood attacks, and achieve the effect of facilitating auditing

Active Publication Date: 2018-04-13
中钞信用卡产业发展有限公司杭州区块链技术研究院
View PDF10 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The permission information and authentication logic in this scheme are all implemented at the smart contract level, so it is impossible to control the permissions below the smart contract level (such as sending transactions, obtaining blockchain status, etc.)
Applying this kind of scheme needs to bear risks such as transaction flood attack (recording a large number of useless transactions in the blockchain)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain authority management method and system
  • Block chain authority management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0089] Among them, the permission information corresponding to this judgment method is stored in the smart contract. The specific implementation is as follows:

[0090] 1. Writing a smart contract is called a permission smart contract.

[0091] 2. Write the permission smart contract into the genesis block.

[0092] 3. Assign a specific address to the permission smart contract.

[0093] After the above steps, the permission information will be saved in the storage area (storage) of the permission smart contract. Changes to permission information will result in changes to the contract storage area, resulting in changes to the state tree (State Trie), resulting in changes to the hash of the block. In this embodiment, the state tree can be used as verification information of permissions. Due to the adoption of the smart contract, external users can directly call the interface in the smart contract to query the permission information. It is exactly the same as the ordinary sma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain authority management method and system. The method comprises the following steps of identifying an authority change transaction sent by a user, wherein the content of the authority change transaction comprises an initiator, an authority change user, authorities which need to be changed and corresponding change authority values; judging whether the initiator inthe authority change transaction has an authority change authority or not; if the initiator has the authority change authority, modifying an authority value of each authority which needs to be changed of the authority change user into the corresponding authority change value, and recording the executed authority change transaction into a block; and carrying out consensus on the transaction in theblock, and when the consensus passes, making the corresponding authority change transaction in the block take effect. According to the method, the authority management is directly carried out in a block chain without an external facility, and is deeply integrated into the block chain, so that all-directional permission control can be carried out on the block chain, and the authority change needsto pass through the consensus of the whole network and is recorded in the block chain, and thus the change records cannot be tampered and are convenient for auditing.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a block chain rights management method and system. Background technique [0002] The blockchain establishes a corresponding digital identity for each participant through cryptography. The digital identity of each participant consists of a pair of asymmetric public-private key pairs, where the public key can be generated through the private key. Participants use the private key to sign the information and send it to the blockchain. The blockchain recovers the public key based on the signature, and identifies the participant based on the public key (or its abstract), and further authenticates the participant's operation. [0003] When the public blockchain processes the information provided by the participants, it needs to consume a certain fee, which is usually a token in the blockchain. Information can only be entered into the blockchain if the participant has a su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/883H04L9/32H04L49/9015
CPCH04L9/3236H04L49/9015H04L63/20
Inventor 王加楠张一锋
Owner 中钞信用卡产业发展有限公司杭州区块链技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products