Credible power access control method based on block chain

An access control and block chain technology, applied in the direction of instruments, electrical digital data processing, digital data protection, etc., to achieve the effect of ensuring security, simple implementation method, and data authenticity

Active Publication Date: 2019-09-10
BEIJING UNIV OF TECH
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to propose a data sharing method in a distributed environment, aiming at solving the data mana

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible power access control method based on block chain
  • Credible power access control method based on block chain
  • Credible power access control method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to describe the content and object of the present invention more concisely and clearly, the present invention will be further described below in conjunction with the accompanying drawings. The specific steps to implement the case are as follows:

[0066] Step 001: User registration, other steps will verify whether the account address is registered, such as Figure 7 shown.

[0067] Step 002: User A registers the data information owned by user A and registers capabilities, such as Figure 9 shown.

[0068] Step 003: User B views the published data, such as Figure 10 shown.

[0069] Step 004: User B discovers the required data, registers the data request, and the system automatically adds the request to the requested data request list. Such as Figure 11 shown.

[0070] Step 005: User A reviews user B's request on the capability control page, and clicks Commit if he agrees, and Deny if he disagrees.

[0071] Step 006: If user A agrees to the request, use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible power access control method based on a block chain, the method is realized based on a data system in a distributed environment, and the system consists of a front-end web page and the block chain. Due to the characteristics of the block chain, the storage performance of the platform is weak, and the platform only stores the data access address without providing adata storage function. Wherein the front end consists of a Vue framework and Web3.Js for calling a block link port; the block chain platform uses an Ethereum platform, the Solidity language is used on the Ethereum platform to compile the logic of the intelligent contract, and as the Solidity language realizes the complete intelligent contract programming of the graph, the method is based on the private chain deployed by the Ethereum platform. According to the method, the problem that divergence and conflicts may be generated after data exchange among users is solved through power and energy exchange operation chaining, the problem is rapidly positioned, and objective, real and effective proof is provided; and the management cost and the maintenance cost are greatly reduced, and meanwhile,the risks of attacks, privacy leakage and the like caused by centralized management are also avoided.

Description

technical field [0001] The invention relates to the fields of block chain, access control and data sharing, and in particular to a data sharing method based on authority access control. Background technique [0002] With the continuous development of the Internet of Things, the Internet of Things is widely used in various industries. Sensors are an important part of the Internet of Things and the most important source of data for the Internet of Things system. Perception data collected by a single sensor often cannot meet user needs. The real value of the Internet of Things lies in the comprehensive utilization of various data and information. However, due to the mass and diversity of sensing devices, the mass and heterogeneity of sensing data has resulted in massive heterogeneous data. The characteristics of these heterogeneous data also increase the difficulty of data transmission and processing, hindering Data sharing has the problem of data islands. The Internet of Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62H04L29/06H04L29/08
CPCG06F21/604G06F21/6218H04L63/10H04L67/02H04L67/12
Inventor 黄志清谷超张亚川解鲁阳任浩方
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products