Multi-node user authentication method based on block chain technology

文档序号:190833 发布日期:2021-11-02 浏览:25次 中文

阅读说明:本技术 一种基于区块链技术的多节点用户认证方法 (Multi-node user authentication method based on block chain technology ) 是由 余鸿忠 于 2021-08-17 设计创作,主要内容包括:本发明公开了一种基于区块链技术的多节点用户认证方法,包括N个网状构建分布式区块链访问区块,且分为N-1个等级进行区块链访问,其中,每一个等级为N-2个区块链访问区块构成,每个子等级的区块链访问区块对应相邻的两个上等级区块链访问区块,其中,访问界面的等级区块链访问区块为初级访问区1;其通过初级访问区1进行访问时,初级访问区1将签订两个区块链智能合约并同步至上一级别的区块链访问区块进行访问。通过设置N个网状构建分布式区块链访问区块,并且将每块区块链进行等级区别访问,进而解决了传统的只有一个区块链访问区块进行访问,进而分担数据,避免易造成区块链数据紊乱,彻底解决了用户访问的隐患。(The invention discloses a multi-node user authentication method based on a block chain technology, which comprises N netlike constructed distributed block chain access blocks, wherein the block chain access blocks are divided into N-1 levels for block chain access, each level is formed by N-2 block chain access blocks, each sub-level block chain access block corresponds to two adjacent superior block chain access blocks, and the level block chain access block of an access interface is a primary access block 1; when the access is performed through the primary access area 1, the primary access area 1 will sign two block chain intelligent contracts and synchronize to the block chain access block of the previous level for access. The distributed block chain access blocks are constructed by setting N meshes, and each block chain is subjected to level distinguishing access, so that the problem that only one block chain access block is subjected to access in the prior art, data is shared, the problem that block chain data disorder is easily caused is solved, and the hidden danger of user access is thoroughly solved.)

1. A multi-node user authentication method based on a block chain technology is characterized by comprising N netlike constructed distributed block chain access blocks, wherein the block chain access is divided into N-1 levels, each level is formed by N-2 block chain access blocks, each sub-level block chain access block corresponds to two adjacent superior block chain access blocks, and the level block chain access block of an access interface is a primary access area 1;

when accessing through the primary access area 1, the primary access area 1 signs two block chain intelligent contracts and synchronizes to a block chain access block of the previous level for accessing;

when the last level receives two intelligent block chain contracts of the primary access area 1, the former level decrypts the stored resources according to the levels, the decrypted level has a corresponding resource database, the resource data corresponding to the intelligent contracts are compressed and sent to the primary access area 1, if the level has no corresponding resource database after decompression, the level resynthesizes a new intelligent block chain contract, and the contract is sent to the block chain access block of the last level for access in the same way.

2. A multi-node user authentication method based on blockchain technology according to claim 1, wherein the blockchain access blocks of each level include different databases and different blockchains, and the database and blockchain information corresponding to each previous level is greater than the database and blockchain information of the next level.

3. A multi-node user authentication method based on blockchain technology according to claim 1, wherein each blockchain access block of each level is provided with an independent blockchain storage module for storing accessed data information.

4. A multi-node user authentication method based on blockchain technology as claimed in claim 1, wherein each level blockchain access block is provided with exclusive rights, and each blockchain access block cannot directly access a higher level blockchain access block across the above level rights.

5. The multi-node user authentication method based on the block chain technology as claimed in claim 1, wherein the primary access area 1 includes a logging module of user information for logging information data of the access user, the logging module includes identification card recognition right, face recognition right, writing right;

the identification authority of the identity card is used for recording the identity information of the access user;

the face recognition authority is associated with the identification card recognition authority, access user information is recorded through face recognition, and the access user information can be synchronized to the identification card recognition authority through face brushing;

the writing authority is synchronously associated with the identification card identification authority, and the user accesses the user to input own identity information through writing and synchronizes the user information to the identification card identification authority.

6. A multi-node user authentication method based on a blockchain technology according to claim 1, wherein N different levels of access rights are set inside each blockchain access block, and each access right operates independently to generate an individual blockchain intelligent contract;

and each access right runs independently to generate an independent block chain intelligent contract and can only send the block chain intelligent contract of the type corresponding to the upper level for access.

7. A multi-node user authentication method based on blockchain technology according to claim 1, wherein each level of blockchain access block includes a blockchain reject block therein, and each level of reject block is independently existed and operated, wherein each level of reject block corresponds to the corresponding authority of the blockchain access block of the next level and can be directly authorized as the level access area 1.

8. A multi-node user authentication method based on blockchain technology according to claim 7,

when the block chain intelligent contract which is not the block chain access block appears in the level, the block chain intelligent contract is refuted back to the block chain access block corresponding to the next level through a block chain refute block;

when the block chain intelligent contract does not find the block chain access blocks corresponding to the next level through the block chain reject block, the block chain intelligent contract is directly rejected to the level access block 1 through the block chain reject block.

Technical Field

The invention relates to the technical field of block chain user authentication, in particular to a multi-node user authentication method based on a block chain technology.

Background

The block chain technology is a novel distributed technology which uses a block type and chain type storage structure to authenticate and store data, uses a consensus algorithm to realize generation of a new block, uses an asymmetric encryption algorithm to ensure the safe transmission of the data in a channel, uses an intelligent contract to process the data, is divided into a private chain, a alliance chain and a public chain, is essentially a decentralized distributed database, and any user can participate in the block chain, the router equipment around the user is a node, each node has a backup of a whole set of data, and the same consensus mechanism is used among all the nodes, block chains are generated or updated through over-competition calculation, and based on the characteristics of the block chain results, if any node fails, other nodes can still work normally, and which node fails can be distinguished.

User Authentication (CA) is an Authentication mechanism based on the IP address of a user's Client host, which allows a system administrator to customize access rights for authorized users having a particular IP address. The CA is associated with an IP address and does not impose a direct restriction on the protocol accessed. The server and the client do not need to add or modify any software. The system administrator may decide the authorization of each user, the server resources allowed to be accessed, the applications, the access time, and the number of sessions allowed to be established, etc.

However, when the user authentication is performed by using the blockchain at present, one blockchain access block is used for accessing, and then the access task borne by the blockchain access block is various, the information data is huge, the data disorder of the blockchain is easily caused, and the hidden danger exists in the user access.

Disclosure of Invention

The invention aims to provide a multi-node user authentication method based on a block chain technology, and aims to solve the problems that when a block chain is applied to user authentication at present, a block chain access block is accessed, and then the block chain access block bears a plurality of access tasks, information data are large, the data of the block chain are easy to be disordered, and hidden dangers exist in user access.

In order to achieve the purpose, the invention provides the following technical scheme: a multi-node user authentication method based on a block chain technology comprises N netlike constructed distributed block chain access blocks, wherein the block chain access blocks are divided into N-1 levels for block chain access, each level is formed by N-2 block chain access blocks, each sub-level block chain access block corresponds to two adjacent superior block chain access blocks, and the level block chain access block of an access interface is a primary access block 1;

when accessing through the primary access area 1, the primary access area 1 signs two block chain intelligent contracts and synchronizes to a block chain access block of the previous level for accessing;

when the last level receives two intelligent block chain contracts of the primary access area 1, the former level decrypts the stored resources according to the levels, the decrypted level has a corresponding resource database, the resource data corresponding to the intelligent contracts are compressed and sent to the primary access area 1, if the level has no corresponding resource database after decompression, the level resynthesizes a new intelligent block chain contract, and the contract is sent to the block chain access block of the last level for access in the same way.

Further, the blockchain access blocks of each level comprise different databases and different blockchains, and the database and blockchain information corresponding to each previous level is greater than the database and blockchain information of the next level.

Furthermore, each blockchain access block of each level is provided with an independent blockchain storage module for storing the accessed data information.

Furthermore, each level of blockchain access block is provided with exclusive authority, and each blockchain access block cannot directly access a high-level blockchain access block by crossing the upper level of authority.

Further, the primary access area 1 includes a recording module of user information for recording information data of the access user, and the recording module includes identification card identification authority, face identification authority, and writing authority;

the identification authority of the identity card is used for recording the identity information of the access user;

the face recognition authority is associated with the identification card recognition authority, access user information is recorded through face recognition, and the access user information can be synchronized to the identification card recognition authority through face brushing;

the writing authority is synchronously associated with the identification card identification authority, and the user accesses the user to input own identity information through writing and synchronizes the user information to the identification card identification authority.

Furthermore, N different levels of access authorities are set in each block chain access block, and each access authority operates independently to generate an independent block chain intelligent contract;

and each access right runs independently to generate an independent block chain intelligent contract and can only send the block chain intelligent contract of the type corresponding to the upper level for access.

Further, each level of blockchain access block comprises a blockchain reject block, and each level of reject block is independently existed and operated, wherein each level of reject block corresponds to the corresponding authority of the blockchain access block of the lower level, and can be directly authorized as the level access area 1.

Further, when the block chain intelligent contract which is not the block chain access block appears at the level, the block chain intelligent contract is refuted back to the block chain access block corresponding to the next level through the block chain refute block;

when the block chain intelligent contract does not find the block chain access blocks corresponding to the next level through the block chain reject block, the block chain intelligent contract is directly rejected to the level access block 1 through the block chain reject block.

Compared with the prior art, the invention has the beneficial effects that:

according to the multi-node user authentication method based on the block chain technology, the distributed block chain access blocks are constructed by setting N meshes, and each block chain is subjected to level difference access, so that the problem that only one block chain access block is subjected to access in the traditional method, data are shared, the problem that data disorder of the block chain is easily caused is avoided, and the hidden danger of user access is thoroughly solved.

Drawings

FIG. 1 is a flowchart illustrating a multi-node user authentication method based on a blockchain technique according to the present invention.

Detailed Description

The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

In the first embodiment, the first step is,

referring to fig. 1, in an embodiment of the present invention, a multi-node user authentication method based on a block chain technology includes N mesh-structured distributed block chain access blocks, and performs block chain access in N-1 levels, where each level is formed by N-2 block chain access blocks, each block chain access block of a sub-level corresponds to two adjacent block chain access blocks of an upper level, and a level block chain access block of an access interface is a primary access block 1.

When the access is performed through the primary access area 1, the primary access area 1 will sign two block chain intelligent contracts and synchronize to the block chain access block of the previous level for access.

When the last level receives two intelligent block chain contracts of the primary access area 1, the former level decrypts the stored resources according to the levels, the decrypted level has a corresponding resource database, the resource data corresponding to the intelligent contracts are compressed and sent to the primary access area 1, if the level has no corresponding resource database after decompression, the level resynthesizes a new intelligent block chain contract, and the contract is sent to the block chain access block of the last level for access in the same way.

In this embodiment, in the multi-node user authentication method based on the blockchain technology, the distributed blockchain access blocks are constructed by setting N meshes, and each blockchain is subjected to level-differentiated access, so that the problem that only one blockchain access block is subjected to access in the conventional method, and then data is shared is solved, the problem that data disorder of blockchain is easily caused is avoided, and the hidden danger of user access is thoroughly solved.

Example II,

A multi-node user authentication method based on a block chain technology comprises N mesh-structured distributed block chain access blocks, wherein the block chain access blocks are divided into N-1 levels for block chain access, each level is formed by N-2 block chain access blocks, each sub-level block chain access block corresponds to two adjacent superior block chain access blocks, and the level block chain access block of an access interface is a primary access block 1.

When the access is performed through the primary access area 1, the primary access area 1 will sign two block chain intelligent contracts and synchronize to the block chain access block of the previous level for access.

When the last level receives two intelligent block chain contracts of the primary access area 1, the former level decrypts the stored resources according to the levels, the decrypted level has a corresponding resource database, the resource data corresponding to the intelligent contracts are compressed and sent to the primary access area 1, if the level has no corresponding resource database after decompression, the level resynthesizes a new intelligent block chain contract, and the contract is sent to the block chain access block of the last level for access in the same way.

The blockchain access block of each level comprises different databases and different blockchains, and the database and blockchain information corresponding to each previous level is greater than the database and blockchain information of the next level.

And each block chain access block of each grade is provided with an independent block chain storage module for storing the accessed data information.

The block chain storage module of each level directly authorizes with the primary access area 1, and an access user can directly refer to the information data of the access user through the primary access area 1.

And the block chain storage module is associated with the recording module in authority, when a user accesses the secondary access through any one of the identification card authority, the face identification authority and the writing authority, the block chain storage module synchronously feeds back information to the primary access area 1, and the user can conveniently and correspondingly check the information.

Each grade of block chain access block is provided with exclusive authority, and each block chain access block cannot directly access the high-grade block chain access block with the grade authority.

The primary access area 1 comprises a recording module of user information, which is used for recording information data of access users, and the recording module comprises identification card identification authority, face identification authority and writing authority;

the identification authority of the identity card is used for recording the identity information of the access user;

the face recognition authority is associated with the identification card recognition authority, access user information is recorded through face recognition, and the access user information can be synchronized to the identification card recognition authority through face brushing;

the writing authority is synchronously associated with the identification card identification authority, and the user accesses the user to input own identity information through writing and synchronizes the user information to the identification card identification authority.

Example III,

The following embodiments can be obtained by combining the first embodiment with the second embodiment:

a multi-node user authentication method based on a block chain technology comprises N mesh-structured distributed block chain access blocks, wherein the block chain access blocks are divided into N-1 levels for block chain access, each level is formed by N-2 block chain access blocks, each sub-level block chain access block corresponds to two adjacent superior block chain access blocks, and the level block chain access block of an access interface is a primary access block 1.

When the access is performed through the primary access area 1, the primary access area 1 will sign two block chain intelligent contracts and synchronize to the block chain access block of the previous level for access.

When the last level receives two intelligent block chain contracts of the primary access area 1, the former level decrypts the stored resources according to the levels, the decrypted level has a corresponding resource database, the resource data corresponding to the intelligent contracts are compressed and sent to the primary access area 1, if the level has no corresponding resource database after decompression, the level resynthesizes a new intelligent block chain contract, and the contract is sent to the block chain access block of the last level for access in the same way.

N different levels of access authorities are set in each block chain access block, and each access authority runs independently to generate an independent block chain intelligent contract;

and each access right runs independently to generate an independent block chain intelligent contract and can only send the block chain intelligent contract of the type corresponding to the upper level for access.

Each level of blockchain access block comprises a blockchain reject block, and each level of reject block is independently existed and operated, wherein each level of reject block corresponds to the corresponding authority of the blockchain access block of the lower level, and can be directly authorized as the level access area 1.

When the block chain intelligent contract which is not the block chain access block appears in the level, the block chain intelligent contract is refuted back to the block chain access block corresponding to the next level through a block chain refute block;

when the block chain intelligent contract does not find the block chain access blocks corresponding to the next level through the block chain reject block, the block chain intelligent contract is directly rejected to the level access block 1 through the block chain reject block.

In summary, according to the multi-node user authentication method based on the block chain technology, the distributed block chain access blocks are constructed by setting N meshes, and each block chain is subjected to level-differentiated access, so that the problem that only one block chain access block is subjected to access in the traditional method, data is shared, the problem that data disorder of the block chain is easily caused is avoided, and the hidden danger of user access is thoroughly solved.

It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

9页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种电子档案全生命周期信息保全系统及方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类