Access control method for node resources

A node and resource technology, applied in the blockchain field, can solve problems such as out of control

Pending Publication Date: 2020-12-22
北京智融云河科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the reproducibility of data resources, once

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method for node resources
  • Access control method for node resources
  • Access control method for node resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0070] Aiming at the trusted computing problem in the big data scenario, the embodiment of the present invention is oriented to the big data scenario, and establishes a set of theory and trusted computing framework. It is assumed that the framework system consists of multiple participants to form a trusted computing network, including: data There are three roles: provider, node provider, and data user. Data users use the data of data providers through a network formed together. At the same time, assume: (1) There is a scalable distributed ledger that does not support double spending and cannot be tampered with. (2) Participants participate in the network with the motivation of "maximizing their own interests", that is, data provid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an access control method for node resources, and relates to the technical field of blockchains, and the method comprises the steps that a first node in a pre-constructed P2P network initiates a call task for an intelligent contract to a second node, so as to enable the second node to execute the intelligent contract; wherein the second node is a node whichstarts the intelligent contract in advance in the P2P network; before executing the intelligent contract, the second node judges whether the first node has the access permission of the calling task ornot and judges the authorization step state of the access permission according to the calling task; and when the first node has the access permission of the calling task, the second node executes ordoes not execute the intelligent contract according to the authorization step state of the access permission, so that dynamic management of access control of data resources can be realized in a distributed and weak trust environment. And excessive consumption of node resources by a certain intelligent contract is effectively avoided.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to an access control method for node resources. Background technique [0002] The blockchain originated from Satoshi Nakamoto's Bitcoin, which is essentially a technical solution for collectively maintaining a reliable database through decentralization and trustlessness. It relies on cryptography and mathematically ingenious distributed algorithms to enable participants to reach a consensus on the Internet where no trust relationship can be established and without any trust center, and complete the reliable transfer of trust and value. The program running on the blockchain, that is, the smart contract, provides trusted computing services through redundant computing. Typical blockchain platforms that provide trusted computing are all oriented to financial scenarios, including Ethereum, Hyperledger, etc. Trusted computing generally includes four dimensions: availability, reliab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38H04L29/08
CPCG06Q20/3829G06Q20/389H04L67/104
Inventor 蔡华谦朱晓旻张舒汇郭京申舒俊宜
Owner 北京智融云河科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products