Block chain rights management method, device and computer-readable storage medium
A technology of rights management and blockchain, applied in the field of blockchain, can solve problems such as difficulty in ensuring the equal status of blockchain nodes, and achieve the effect of ensuring no leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0084] Based on the first embodiment, a second embodiment of the blockchain authority management method of the present invention is proposed. In this embodiment, after step S120, the blockchain authority management method further includes:
[0085] Step S150, when receiving the permission modification instruction, the sovereign node obtains the first slave node and the third permission information corresponding to the permission modification instruction;
[0086] In this embodiment, the creator can modify the authority of the slave node through the sovereign node. Specifically, the authority of the slave node that needs to be modified can be set through the display interface of the terminal of the sovereign node, and the authority modification command can be triggered through the button of the display interface .
[0087] In this embodiment, when receiving the permission modification instruction, the sovereign node obtains the first slave node and the third permission informat...
no. 2 example
[0092] Based on the second embodiment, the third embodiment of the rights management method of the blockchain of the present invention is proposed. In this embodiment, step S150 includes:
[0093] Step S151, when a permission editing request is received, display the permission editing interface on the display interface corresponding to the sovereign node;
[0094] In this embodiment, the creator can trigger a permission editing request through the display interface of the terminal corresponding to the sovereign node. When receiving the permission editing request, the permission editing interface will be displayed on the display interface corresponding to the sovereign node. On the authority editing interface, select the slave node whose authority needs to be modified and set the authority information of the slave node.
[0095] Step S152, after receiving the permission modification instruction triggered based on the permission editing interface, the sovereign node obtains the ...
no. 5 example
[0112] Based on the fifth embodiment, the sixth embodiment of the blockchain authority management method of the present invention is proposed. In this embodiment, the blockchain authority management method further includes:
[0113] Step S210, when receiving the query request for business data sent by the third government chain ecological network, the sovereign node performs authority verification operation on the query request to determine whether the third government chain ecological network has the business data access to data;
[0114] In this embodiment, other government affairs chain ecological networks can send service data query request values to the first government affairs chain ecological network to view or call the business data in the first government affairs chain ecological network. When the ecological network sends a query request for business data, the sovereign node performs a permission verification operation on the business data query request to determine...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com