Permission management method and device of blockchain and computer readable storage medium
A permission management and blockchain technology, applied in the blockchain field, can solve the problem of difficulty in ensuring the equality of the status of blockchain nodes, and achieve the effect of ensuring no leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0084] Based on the first embodiment, a second embodiment of the permission management method of the blockchain of the present invention is proposed. In this embodiment, after step S120, the permission management method of the blockchain further includes:
[0085] Step S150, upon receiving the permission modification instruction, the sovereign node obtains the first subordinate node and the third permission information corresponding to the permission modification instruction;
[0086] In this embodiment, the creator can modify the authority of the subordinate node through the sovereign node. Specifically, the authority of the subordinate node that needs to be modified can be set through the display interface of the terminal of the sovereign node, and the authority modification instruction can be triggered through the button on the display interface .
[0087] In this embodiment, upon receiving the permission modification instruction, the sovereign node obtains the first subordinate n...
no. 2 example
[0092] Based on the second embodiment, a third embodiment of the permission management method of the blockchain of the present invention is proposed. In this embodiment, step S150 includes:
[0093] Step S151, upon receiving the permission editing request, display the permission editing interface on the display interface corresponding to the sovereign node;
[0094] In this embodiment, the creator can trigger the permission editing request through the display interface of the terminal corresponding to the sovereign node. Upon receiving the permission editing request, the permission editing interface is displayed on the display interface corresponding to the sovereign node. The permission editing interface selects the subordinate node that needs to modify the permission and sets the permission information of the subordinate node.
[0095] Step S152, upon receiving a permission modification instruction triggered based on the permission editing interface, the sovereign node obtains the ...
no. 5 example
[0112] Based on the fifth embodiment, a sixth embodiment of the permission management method of the blockchain of the present invention is proposed. In this embodiment, the permission management method of the blockchain further includes:
[0113] Step S210: When receiving a request for service data sent by the third government chain ecological network, the sovereign node performs a permission verification operation on the request to determine whether the third government chain ecological network has the service Access to data;
[0114] In this embodiment, other government affair chain ecological networks can send a request for service data to the first government affair chain ecological network to view or call the business data in the first government affair chain ecological network. After receiving the third government affair chain When requesting the service data sent by the ecological network, the sovereign node performs a permission verification operation on the service data re...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com