Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method, device and storage medium

An access control and access control technology, applied in the Internet field, can solve problems such as unsatisfactory, unlocking dependence, and inability to perform electronic unlocking, and achieve the effect of precise control

Active Publication Date: 2022-04-05
HANGZHOU FUZAMEI TECH CO LTD +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the actual access control application is usually a centralized access control system. Due to some defects, the access control application combined with the blockchain is still rarely implemented.
At the same time, the centralized access control system relies on the centralized server for unlocking. Once there is a problem with the centralized server, electronic unlocking will not be possible.
[0003] Among the various blockchain access control application schemes currently proposed, it is still unable to meet the needs of conveniently and accurately controlling the number of access control unlocks in some scenarios.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device and storage medium
  • Access control method, device and storage medium
  • Access control method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0026] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0027] figure 1 It is a flowchart of an access control method provided by an embodiment of the present invention.

[0028] like figure 1 As shown, in this embodiment, the present invention provides an access control method suitable for blockchain nodes, where an access control contract is config...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an access control method, device and storage medium. The method includes: when executing the first access control unlocking transaction through the access control contract, verifying whether the sending address of the transaction is the authorized address of the first access control recorded in the access control contract : No, the execution of the first access control unlocking transaction failed; yes, freeze the first access control unlocking transaction transfer to the first access control points of the access control contract, and verify the number of the first access control points and the sending address recorded in the access control contract Whether the number of unlocking points required to unlock the first access control is the same: if no, unfreeze the first access control points, and the execution of the first access control unlocking transaction fails; if yes, deduct the first access control points, and the first access control unlocking transaction executes successfully for control The access control device of the first gate controls to unlock the first gate after detecting that the unlocking transaction of the first gate is executed successfully. The invention realizes convenient and precise control of the times of access control unlocking without reconfiguring the smart contract.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to an access control method, device and storage medium. Background technique [0002] The current access control applications that are actually implemented are usually centralized access control systems, and the access control applications combined with the blockchain are rarely implemented due to some defects. At the same time, the centralized access control system relies on the centralized server for unlocking. Once there is a problem with the centralized server, electronic unlocking will not be possible. [0003] Among the various blockchain access control application schemes currently proposed, it is still unable to meet the needs of conveniently and accurately controlling the number of access control unlocks in some scenarios. Contents of the invention [0004] In view of the above-mentioned defects or deficiencies in the prior art, it is desired to provide an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/32G07C9/38G07C9/00G06F16/27
CPCG07C9/00309G07C9/32G06F16/27H04L63/10
Inventor 刘业章袁海雷王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD