Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission access control method for alliance chain cross-chain

A technology of access control and authority control, applied in the cross-chain field of alliance chain, it can solve the problems of difficult security interaction, uncontrollable data access, and difficulty in implementing authority access interfaces, so as to ensure security, prevent unauthorized operations, and divide functions. clear effect

Pending Publication Date: 2022-01-28
HANGZHOU YUNXIANG NETWORK TECH
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when performing this function, due to the limitations of the underlying architecture, data structure, and network links, there are usually differences in user data structures and formats between blockchains of different commercial users, making it difficult to perform secure interactions and interoperability. Implementing a general permission access interface has the problem of uncontrollable data access, which cannot satisfy applications, data and users to implement permission access control on different platforms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission access control method for alliance chain cross-chain
  • Permission access control method for alliance chain cross-chain
  • Permission access control method for alliance chain cross-chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to clearly explain the present invention and make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the drawings in the embodiments of the present invention, in order to Those skilled in the art can implement it by referring to the text of the description. The technology of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0048] Glossary:

[0049] CCTP: Cross Chain Transport Protocol, a cross-chain protocol that realizes data transmission between cross-chain gateways and cross-chain networks.

[0050] Namespace, namespace: A form of code organization is classified by namespace to distinguish different code functions.

[0051] Session: session control. When the user jumps between the web pages of the ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a permission access control method for alliance chain cross-chain. The method comprises the following steps: setting three types of user roles of an administrator, a common user and a supervision user in a cross-chain network; dividing according to user roles and setting permissions; enabling an authority management module to set authority control strategies for all operations in the cross-chain network; respectively setting corresponding permissions of the administrator, the common user and the supervision user according to the permission control strategy; setting an operation of the user management module or a mapping relation mode of an operation object and a user, and obtaining the identity of the user from the server session for judgment; setting operation of cards and order numbers, setting a server to perform unauthorized verification on object information used for business operation, verifying whether the information belongs to a current user, and if the verification is not passed, reporting an error so as to prevent the card numbers and order numbers of other people from being operated by tampering and unauthorized. According to the invention, role permission access control can be realized, so that the safety of cross-chain access is realized.

Description

technical field [0001] The invention belongs to the field of consortium chain cross-chain technology, and in particular relates to a permission access control method for consortium chain cross-chain. Background technique [0002] At present, cross-chain technology serves as a bridge between platforms that open up different blockchain underlying architectures, data structures, network links, and technical interfaces. Architecture, data structure, link network, interface technology, etc. lead to key issues such as inability to interconnect and interoperate. Among them, cross-chain technology to achieve data interoperability between different platforms is usually achieved through interface technology. [0003] However, when performing this function, due to the limitations of the underlying architecture, data structure, and network links, there are usually differences in user data structures and formats between blockchains of different commercial users, making it difficult to pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/08H04L63/02
Inventor 黄步添罗春凤何钦铭邵辉沈玮刘振广
Owner HANGZHOU YUNXIANG NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products