Unlock instant, AI-driven research and patent intelligence for your innovation.

Blockchain-based Trusted Capability Access Control Method

An access control, blockchain technology, applied in the field of access control and data sharing, blockchain, to avoid vulnerability, reduce management costs and maintenance costs, and ensure security.

Active Publication Date: 2021-09-17
BEIJING UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to propose a data sharing method in a distributed environment, aiming at solving the data management and control problems existing in data sharing in a distributed environment. The system structure diagram is as follows figure 1 shown

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based Trusted Capability Access Control Method
  • Blockchain-based Trusted Capability Access Control Method
  • Blockchain-based Trusted Capability Access Control Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to describe the content and object of the present invention more concisely and clearly, the present invention will be further described below in conjunction with the accompanying drawings. The specific steps to implement the case are as follows:

[0066] Step 001: User registration, other steps will verify whether the account address is registered, such as Figure 7 shown.

[0067] Step 002: User A registers the data information owned by user A and registers capabilities, such as Figure 9 shown.

[0068] Step 003: User B views the published data, such as Figure 10 shown.

[0069] Step 004: User B discovers the required data, registers the data request, and the system automatically adds the request to the requested data request list. Such as Figure 11 shown.

[0070] Step 005: User A reviews user B's request on the capability control page, and clicks Commit if he agrees, and Deny if he disagrees.

[0071] Step 006: If user A agrees to the request, use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted authority access control method based on a block chain. The method is realized based on a data system in a distributed environment. The system is composed of two parts, a front-end web page and a block chain. Due to the characteristics of the blockchain, its storage performance is weak, and this platform only stores data access addresses, but does not provide data storage functions. The front end is composed of Vue framework and Web3.Js that calls the blockchain interface. The blockchain platform uses the Ethereum platform, and the solidity language is used to write the logic of the smart contract on the Ethereum platform, because the Solidity language realizes Turing's complete intelligence. Contract programming, this method is based on the private chain deployed on the Ethereum platform. This method solves the differences and conflicts that may arise between users after exchanging data through the power exchange operation on the chain, quickly locates the problem and provides objective, true and effective proof; greatly reduces management costs and maintenance costs, and also avoids centralized management. Risks such as vulnerability to attacks and privacy leaks.

Description

technical field [0001] The invention relates to the fields of block chain, access control and data sharing, and in particular to a data sharing method based on authority access control. Background technique [0002] With the continuous development of the Internet of Things, the Internet of Things is widely used in various industries. Sensors are an important part of the Internet of Things and the most important source of data for the Internet of Things system. Perception data collected by a single sensor often cannot meet user needs. The real value of the Internet of Things lies in the comprehensive utilization of various data and information. However, due to the mass and diversity of sensing devices, the mass and heterogeneity of sensing data has resulted in massive heterogeneous data. The characteristics of these heterogeneous data also increase the difficulty of data transmission and processing, hindering Data sharing has the problem of data islands. The Internet of Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62H04L29/06H04L29/08
CPCG06F21/604G06F21/6218H04L63/10H04L67/02H04L67/12
Inventor 黄志清谷超张亚川解鲁阳任浩方
Owner BEIJING UNIV OF TECH