Industrial Internet identifier analysis access control method based on block chain

An industrial Internet and access control technology, applied in the field of blockchain-based industrial Internet identification resolution access control, can solve problems such as unauthorized copy and dissemination, illegal access, identification analysis server, cache and proxy server errors, etc.

Inactive Publication Date: 2020-05-29
STATE GRID E COMMERCE CO LTD +2
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a blockchain-based industrial Internet identification analysis access control method to solve the problem that the current industrial Internet identification data contains a large amount of sensitive private information, and there are data leakage and illegal access in the process of data storage and use. , unauthorized copying and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial Internet identifier analysis access control method based on block chain
  • Industrial Internet identifier analysis access control method based on block chain
  • Industrial Internet identifier analysis access control method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the invention. Therefore, the present invention will not be limited to the embodiments shown herein...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial Internet identifier analysis access control method based on a block chain. Relevant information of each identifier in the industrial Internet is stored in a target block chain in advance, and the method comprises the steps of verifying whether a user has an access permission or not according to an intelligent contract under the condition of receiving an analysis request of the user for a to-be-accessed identifier; if yes, obtaining mapping information of the to-be-accessed identifier, and calculating a to-be-accessed hash value of the mapping information;comparing the hash value to be accessed with the hash value stored on the target block chain; and if the comparison is successful, sending the mapping information of the identifier to be accessed to the user. According to the method, each identifier is stored in the target block chain, so that credibility of identifier resources is ensured, and whether a user has access permission or not is verified according to the smart contract; if yes, comparing the hash value to be accessed with a hash value stored on the target block chain; and if the comparison is successful, sending the mapping information of the identifier to be accessed to the user, so that distortion of an analysis result is avoided.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a block chain-based industrial Internet identification analysis access control method. Background technique [0002] As the "central nerve" of the Industrial Internet, the Industrial Internet logo analysis system is an important part of the Industrial Internet network architecture. It provides coding and registration for physical resources such as industrial equipment, machines, materials, parts and products, and virtual resources such as algorithms and processes. It is the premise and basis for realizing the precise connection between the global supply chain system and the enterprise production system, product life cycle management and intelligent services. my country actively deploys the construction of global root nodes, auxiliary root nodes, national top-level nodes, and second-level nodes for logo analysis. The number of industrial Internet logos can reach hundreds of b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 王栋杨珂王焕娟玄佳兴秦日臻韩少勤
Owner STATE GRID E COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products