Authority verification method and device and storage medium

A verification method and permission technology, applied in the computer field, can solve problems such as insecurity, system destructive attacks, and poor data security

Active Publication Date: 2019-12-20
TENCENT TECH (SHENZHEN) CO LTD
View PDF12 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the management authority is too centralized, it is very insecure and untrustworthy in the system. It is very likely that the administrator will tamper with the authority to seek improper benefits and conduct destructive attacks on the entire system, resulting in poor data security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority verification method and device and storage medium
  • Authority verification method and device and storage medium
  • Authority verification method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0061] Before explaining the embodiments of the present invention in detail, some terms involved in the embodiments of the present invention will be explained first.

[0062] Authority management: Management operations related to authority in the blockchain system, for example, including user authority operations, user role operations, etc. in the blockchain system. For example, authority verification, authority transfer, authority delegation, role assignment, auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authority verification method and device and a storage medium. According to the embodiment of the invention, the permission operation request can be received, and the permission operation request is forwarded to the second node equipment in the blockchain; wherein the second node equipment is node equipment except the first node equipment in the block chain; a permission operation type needing to be operated is determined according to the permission operation request, wherein the permission operation type is user permission verification; verification logic corresponding to the permission operation type is executed based on the permission management contract; when the verification is passed, an authority operation corresponding to the authority operation type is executed to obtain a first contract execution result, a second contract execution result broadcasted by the second node equipment is received based on the permission operation request; and when the first contract execution result is consistent with the second contract execution result, that the user permission verification is passed is determined. According to the scheme, the datasecurity can be improved.

Description

[0001] This application requires a divisional application of a patent application with an application date of March 28, 2019, an application number of 201910245109.4, and an invention title of "A Method, Device, and Storage Medium for Rights Management". The entire content of the parent application is incorporated by reference incorporated in this application. technical field [0002] The present invention relates to the field of computer technology, in particular to a rights management and verification method, device and storage medium. Background technique [0003] The current traditional user rights management methods are centralized management, which grants different rights to different roles, and the management rights are too centralized. Because the management authority is too centralized, it is very insecure and untrustworthy in the system. It is very likely that the administrator will tamper with the authority to seek improper benefits and conduct destructive attacks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/62G06F21/64
CPCG06F21/6218G06F21/64G06F21/46G06F2221/2141H04L63/126H04L63/105H04L63/10H04L63/0853
Inventor 刘攀
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products