CN110011996B - Application authorization method and device based on block chain and electronic equipment - Google Patents

Application authorization method and device based on block chain and electronic equipment Download PDF

Info

Publication number
CN110011996B
CN110011996B CN201910234810.6A CN201910234810A CN110011996B CN 110011996 B CN110011996 B CN 110011996B CN 201910234810 A CN201910234810 A CN 201910234810A CN 110011996 B CN110011996 B CN 110011996B
Authority
CN
China
Prior art keywords
authorization
token
target application
application
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910234810.6A
Other languages
Chinese (zh)
Other versions
CN110011996A (en
Inventor
程龙
李艳鹏
冯志远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201910234810.6A priority Critical patent/CN110011996B/en
Publication of CN110011996A publication Critical patent/CN110011996A/en
Application granted granted Critical
Publication of CN110011996B publication Critical patent/CN110011996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

An embodiment of the specification provides an application authorization method and device based on a block chain and an electronic device, wherein the method comprises the following steps: the authorization system receives an authorization application which is initiated by a target application and aims at a target application platform; submitting an authorization transaction for the entitlement token carried in the authorization application to a blockchain; receiving a call token returned by the block chain and used for calling the target application platform; and sending the call token to a target application so that the target application calls the target application platform to execute a target service through the call token.

Description

Application authorization method and device based on block chain and electronic equipment
Technical Field
The embodiment of the specification relates to the technical field of block chains, in particular to an application authorization method and device based on a block chain and an electronic device.
Background
The block chain technology, also called distributed ledger technology, is an emerging technology in which several computing devices participate in "accounting" together, and a complete distributed database is maintained together. The blockchain technology has characteristics of decentralization, public transparency, participation of each computing device in database recording, and rapid data synchronization among the computing devices, so that the blockchain technology is widely applied in many fields.
Disclosure of Invention
An embodiment of the present specification provides an application authorization method and apparatus based on a block chain, and an electronic device:
according to a first aspect of embodiments herein, there is provided a block chain based application authorization method,
the authorization system receives an authorization application which is initiated by a target application and aims at a target application platform;
submitting an authorization transaction for the entitlement token carried in the authorization application to a blockchain;
receiving a call token returned by the block chain and used for calling the target application platform;
and sending the call token to a target application so that the target application calls the target application platform to execute a target service through the call token.
Optionally, the method further includes:
after receiving a calling token provided by the target application, the target application platform verifies the calling token;
and if the verification is passed, executing the target service of the target application.
Optionally, the verifying the call token specifically includes:
comparing the call token provided by the target application with the call token sent by the blockchain;
and if the two calling tokens are consistent, determining that the verification is passed.
Optionally, the method further includes:
receiving an authority confirming request initiated by a target application;
submitting an entitlement transaction aiming at the application parameters carried in the entitlement request to a block chain;
and sending the confirmation token which is returned by the block chain and generated based on the application parameters to the target application.
Optionally, the method further includes:
receiving a termination authorization request initiated by a target application;
submitting a termination authorization transaction for an entitlement token carried in the termination authorization request to a blockchain to invalidate the entitlement token stored in the blockchain.
According to a second aspect of embodiments herein, there is provided a block chain based application authorization method,
the node equipment of the block chain receives an authorization transaction which is submitted by an authorization system and aims at an entitlement token carried in an authorization application; the authorization application is an authorization request which is initiated by a target application and aims at a target application platform;
in response to the authorization transaction, invoking authorization logic declared in a smart contract issued to the blockchain, querying whether the validation token is stored in the blockchain;
if the confirmation token is inquired, creating a calling token of the target application, and sending the calling token to the authorization system; so that the target application calls the target application platform to execute the target service through the call token.
Optionally, the method further includes:
sending the calling token to the target application platform, so that the target application platform compares the two calling tokens after receiving the calling token provided by the target application;
and if the two calling tokens are consistent, executing the target service of the target application.
Optionally, the method further includes:
receiving an entitlement transaction submitted by the authorization system for a target application;
and in response to the authorization transaction, invoking an authorization logic declared in an intelligent contract issued in the blockchain, creating an authorization token of the target application, and sending the authorization token to the authorization system.
Optionally, the method further includes:
receiving an enrollment transaction submitted by the authorization system for a target application;
in response to the onboarding transaction, invoking onboarding audit logic declared in a smart contract issued on the blockchain; wherein the resident auditing logic is: writing a voting event in a transaction log, auditing qualification information of a target application after an auditor of the block chain monitors the voting event, and submitting voting transaction containing an auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
Optionally, the method further includes:
receiving a termination authorization transaction submitted by the authorization system for a call token;
in response to the termination authorization transaction, terminating authorization logic issued to the blockchain is invoked to change the invocation token stored in the blockchain from a valid state to an invalid state.
Optionally, the method further includes:
and calling the charging logic issued in the block chain, calling a charging party in the block chain to calculate the bill of the target application corresponding to the calling token, and chaining and storing the bill on the charging bill.
Optionally, the blockchain comprises a federation chain.
According to a third aspect of embodiments herein, there is provided a block chain based application authorization apparatus,
the first receiving unit is used for receiving an authorization application which is initiated by a target application and aims at a target application platform by an authorization system;
the transaction submitting unit is used for submitting authorization transaction aiming at the right-confirming token carried in the authorization application to the blockchain;
the second receiving unit is used for receiving a call token which is returned by the block chain and used for calling the target application platform;
and the application authorization unit sends the call token to the target application so that the target application calls the target application platform to execute the target service through the call token.
Optionally, the apparatus further comprises:
the verification subunit is used for verifying the calling token after the target application platform receives the calling token provided by the target application;
and the execution subunit executes the target service of the target application if the verification is passed.
Optionally, the verifying subunit specifically includes:
the comparison subunit compares the call token provided by the target application with the call token sent by the blockchain;
and the determining subunit determines that the check is passed if the two calling tokens are consistent.
Optionally, the apparatus further comprises:
the application authority determining subunit receives an authority determining request initiated by the target application; submitting an entitlement transaction aiming at the application parameters carried in the entitlement request to a block chain; and sending the confirmation token which is returned by the block chain and generated based on the application parameters to the target application.
Optionally, the apparatus further comprises:
the terminal authorization subunit receives a terminal authorization request initiated by the target application; submitting a termination authorization transaction for an entitlement token carried in the termination authorization request to a blockchain to invalidate the entitlement token stored in the blockchain.
According to a fourth aspect of embodiments herein, there is provided a block chain-based application authorization apparatus,
the receiving unit is used for receiving the authorization transaction aiming at the authorization token carried in the authorization application submitted by the authorization system by the node equipment of the block chain; the authorization application is an authorization request which is initiated by a target application and aims at a target application platform;
the query unit is used for responding to the authorized transaction, calling the authorization logic declared in the intelligent contract issued in the block chain and querying whether the confirmation token is stored in the block chain or not;
the authorization unit is used for creating a calling token of the target application and sending the calling token to the authorization system if the confirmation token is inquired; so that the target application calls the target application platform to execute the target service through the call token.
Optionally, the apparatus further comprises:
the service execution unit is used for sending the calling token to the target application platform so that the target application platform compares the two calling tokens after receiving the calling token provided by the target application; and if the two calling tokens are consistent, executing the target service of the target application.
Optionally, the apparatus further comprises:
the application right determining subunit receives right determining transaction which is submitted by the authorization system and aims at the target application; and in response to the authorization transaction, invoking an authorization logic declared in an intelligent contract issued in the blockchain, creating an authorization token of the target application, and sending the authorization token to the authorization system.
Optionally, the apparatus further comprises:
the admission auditing subunit receives admission transaction aiming at the target application submitted by the authorization system; in response to the onboarding transaction, invoking onboarding audit logic declared in a smart contract issued on the blockchain; wherein the resident auditing logic is: writing a voting event in a transaction log, auditing qualification information of a target application after an auditor of the block chain monitors the voting event, and submitting voting transaction containing an auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
Optionally, the apparatus further comprises:
the termination authorization subunit receives a termination authorization transaction for the call token submitted by the authorization system; in response to the termination authorization transaction, terminating authorization logic issued to the blockchain is invoked to change the invocation token stored in the blockchain from a valid state to an invalid state.
Optionally, the apparatus further comprises:
and the charging subunit calls the charging logic issued in the block chain, calls a charging party in the block chain to calculate a bill of the target application corresponding to the calling token, and links the charging bill for storage.
Optionally, the blockchain comprises a federation chain.
According to a fifth aspect of embodiments herein, there is provided an electronic apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform any one of the above block chain based application authorization methods.
The embodiment of the specification provides an application authorization scheme based on a block chain, the block chain is used for confirming and authorizing a target application, the block chain has an open characteristic, so that the open fairness of an application authorization process can be ensured, and the block chain has a non-falsification characteristic, so that the reliability of the application authorization process is ensured.
Drawings
FIG. 1 is a flow diagram illustrating application enrollment and application authorization provided in an embodiment of the present disclosure;
FIG. 2 is a flow chart illustrating application authorization provided in an embodiment of the present disclosure;
FIG. 3 is a flow diagram illustrating application termination authorization provided by an embodiment of the present description;
FIG. 4 is a flowchart of a method for executing an authorization system according to an embodiment of the present disclosure;
FIG. 5 is a flowchart of a method for performing block chaining as an embodiment of the present disclosure;
fig. 6 is a hardware structure diagram of an application authorization apparatus based on a block chain according to an embodiment of the present specification;
fig. 7 is a block diagram of an application authorization apparatus based on a block chain according to an embodiment of the present disclosure;
fig. 8 is a block chain-based module schematic diagram of an application authorization apparatus according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the specification, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
For any open platform, the third-party application can be authorized to promote the service volume, so that the third-party application has the function of calling the platform capacity to execute the related service. For this reason, the development platform needs to have the capability of authorizing third party applications.
Traditional application authorization is typically performed privately, for example, an authorization agreement is privately signed between an application and a platform, the platform provides a token related to the application, and the application can access and invoke a service capability related to the platform by providing the token.
However, although the application authorization can improve the platform traffic and enable the application to have extra business capability, after the actual authorization, the application can access the platform at any time, and the platform can collect application data, so that various benefits such as data security and privacy protection are actually involved.
Because the authorization process is not disclosed, the data of the authorization process is not stored, and the authorization process does not participate in an auditor, the whole process is basically operated in a grey zone, and great difficulty is brought to responsibility tracing and right maintaining in the future. Therefore, it is urgently needed to provide a transparent, fair, traceable, auditable, automatic authorization and emergency damage-stopping application authorization scheme.
The present specification provides an application authorization scheme based on a block chain, which performs authorization and authorization on a target application through the block chain, and performs uplink chain storage and certification on the authorization and authorization process; due to the public characteristic of the blockchain, the public justice of the application authorization process can be ensured, and due to the non-falsifiable characteristic of the blockchain, the reliability of the application authorization process is ensured.
It should be noted that, in an embodiment provided in the present specification, the qualification information of the application applying for authorization is firstly linked to a chain for certification, so as to facilitate subsequent auditing.
On the other hand, the blockchain is provided with logic for application authorization suspension based on the intelligent contract, so that active suspension authorization can be supplied to the application, and the authorization can be suspended in time when the application side sends an emergency (such as risks of data security, privacy disclosure and the like), thereby protecting the benefit of the application side.
On the other hand, the blockchain is provided with an authorization charging logic based on a consensus mechanism, so that a charge bill (including a charging process and obvious charging) generated by application authorization can be calculated, the charge bill is also chained and stored, a charging result is public and transparent, and the accuracy, fairness and reliability of charging are ensured.
The blockchain described in this specification may specifically include a private chain, a common chain, a federation chain, and the like, and is not particularly limited in this specification.
For example, in one scenario, the block chain may be specifically a federation chain formed by federation members, such as an application of a third party, an authorization system, an application platform, an auditor, and a charging party; the operator of the alliance chain can deploy corresponding business by relying on the alliance chain; the authorization system, the application platform, the auditing party, the charging party, etc. as the above-described coalition members may all be a service node of the above-described service. Each service node can distribute the information related to the service generated or received by itself in the form of transaction in the alliance chain, and after the transaction is processed by the consensus of the consensus nodes in the alliance chain, the information is stored in the distributed database in the alliance chain, so as to complete the uplink certification of the transaction information.
It should be noted that the Transaction (Transaction) described in this specification refers to a piece of data created by a client of a blockchain and needs to be finally issued to a distributed database of the blockchain.
Transactions in a blockchain, generally have a narrow sense of transaction and a broad sense of transaction score. A narrowly defined transaction refers to a transfer of value issued by a user to a blockchain; for example, in a conventional bitcoin blockchain network, the transaction may be a transfer initiated by the user in the blockchain. The broad transaction refers to a piece of business data with business intention, which is issued to the blockchain by a user; for example, an operator may build a federation chain based on actual business requirements, relying on the federation chain to deploy some other types of online business (e.g., a credentialing business, etc.) unrelated to value transfer, and in such federation chain, a transaction may be a business message or business request with a business intent issued by a user in the federation chain.
The client may include any type of upper layer application that uses the bottom layer service data stored in the blockchain as a data support to implement a specific service function.
In block chain techniques, nodes in a block chain typically need to rely on a corresponding Smart contract (Smart contract) to operate on the block. Operations such as storing, modifying, deleting, etc. in a blockchain all need to rely on smart contracts. The intelligent contract may be a computer protocol intended for application to propagate, verify, or execute contracts in an informational manner that may be deployed on a blockchain. Performing the corresponding operation can be realized by declaring the business logic in the smart contract. Smart contracts allow trusted transactions to be conducted without third parties. These transactions are traceable and irreversible. Smart contracts can provide security over traditional contract methodologies and reduce other transaction costs associated with contracts. In general, the intelligent contracts can be deployed locally at the block link points, and when the nodes need to execute a certain action, the corresponding intelligent contracts can be called, and the intelligent contracts are operated to execute the service logic stated in the intelligent contracts, so that the execution result is obtained.
The application platform described in this specification may refer to a service platform that requires an authorized application. The application can acquire the service capability provided by the application platform after authorization.
The auditor can be a block chain node for performing qualification audit aiming at application parking;
the charging party may refer to a blockchain node performing authorized charging after the application termination authorization.
In some embodiments, the auditing party and the charging party may be the same node, i.e. one node may have both auditing logic and charging logic.
The embodiment of the present specification can be divided into 3 parts, which are an application enrollment contract, an application right confirmation and an application authorization, respectively.
A schematic flow chart of the application enrollment subscription and the application authorization in the blockchain is described below as shown in fig. 1.
1.1, the target application submits a parking application to an authorization system, wherein the application carries application qualification information.
The qualification information may refer to some key information of the operator corresponding to the application, for example, company information, business scope, license, approval certificate, and the like, which may indicate that the application has authorization conditions.
And 1.2, the authorization system assembles the qualification information into a resident transaction and submits the resident transaction to a block chain.
1.3, the block chain links the qualification information to the chain for certification.
The block chain can link the qualification information of the target application to a chain for certification, and the qualification information after the chain is linked cannot be tampered, so that audit is facilitated.
And 2.1, informing an auditor in the block chain to audit the qualification information.
And 2.2, receiving an audit result returned by each auditor.
Specifically, qualification audit logic declared in intelligent contracts issued on the blockchain may be invoked; wherein the qualification auditing logic is as follows:
writing a voting event in the transaction log, auditing qualification information after the auditing party of the block chain monitors the voting event, and submitting the voting transaction containing the auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
3. And if the audit result passes, returning successful enrollment to the authorization system.
And if the final auditing result is that the target application is successfully resident, executing the application to be resident. And can return notification of successful target application enrollment to the authorization system, which can also return successful target application enrollment.
4.1, the target application submits an authority confirmation application to the authorization system, wherein the authority confirmation application carries the authority confirmation parameters.
After receiving successful enrollment, the target application may initiate an authorization request to the authorization system, where the authorization request carries authorization parameters.
The authorization parameters may include application information, authorization validity time, necessary request parameter range limits, and the like.
And 4.2, generating an authorized intelligent contract by the authorization system, and submitting the authorized intelligent contract to the blockchain to create a transaction.
The authorization system may create an authorized intelligent contract based on the entitlement parameters in the entitlement application and initiate an authorized intelligent contract creation transaction to the blockchain.
5.1, informing an auditor in the block chain to audit the authorized intelligent contract;
after the block chain creates the authorized intelligent contract, an auditor in the block chain needs to be informed to audit the authorized intelligent contract; to ensure that the authorized intelligent contracts are intelligent contracts that meet preset requirements and can be executed in a blockchain.
And 5.2, receiving audit results returned by each auditor.
Specifically, contract auditing logic declared in intelligent contracts issued on the blockchain may be invoked; wherein the contract auditing logic is:
writing a voting event in a transaction log, auditing an authorized intelligent contract after an auditor of the block chain monitors the voting event, and submitting the voting transaction containing an auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
6. And returning the true right token of the target application to the authorization system.
If the final auditing result is passed, the authorized intelligent contract is in accordance with the preset condition, and can be executed in the block chain; further, a unique corresponding authenticity identifier and an authenticity token (token) may be generated for the target application. And, an entitlement token and an entitlement identification for the target application may be returned to the authorization system.
The authentication token is used for identifying the target application and is used for obtaining the calling token when the target application calls the target application platform each time.
Through the embodiment, the qualification information of the target application is chain-certified, and the qualification information passes the auditing of the auditing party in the block chain, so that the target application is added into the block chain. After the target application successfully enters the block chain, the target application can initiate an authorization application, and the authorization intelligent contract containing the authorization parameters is linked and passes through auditing, so that the authorization token of the only corresponding target application distributed by the block chain is obtained. As such, the target application may perform application authorization based on the authorization token.
A schematic flow chart of application authorization in a blockchain is described as shown in fig. 2.
1.1, the target application initiates an authorization application for acquiring the target service platform to an authorization system.
The authorization application carries an authorization token corresponding to the target application.
1.2, the authorization system submits an authorization transaction aiming at the true right token carried in the authorization application to the blockchain.
And 2.1, executing a corresponding authorization intelligent contract by the blockchain based on the authorization token to generate a calling token.
In response to the authorization transaction, invoking authorization logic (authorization smart contracts) declared in smart contracts issued in the blockchain, querying whether the confirmation tokens are stored in the blockchain; and if the confirmation token is inquired, generating the authorized call token.
2.2, the blockchain provides the call token to a target application platform and an authorization system respectively.
3. The authorization system returns the invocation token to the target application.
4. The target application calls the target application platform to execute the target service through the calling token
After receiving the call token, the target application may call the target application platform to initiate a request for executing the target service, where the request carries the call token.
5.1, the target application platform checks the calling token;
after receiving a calling token provided by the target application, the target application platform verifies the calling token; and if the verification is passed, executing the target service of the target application.
Wherein the verifying the invocation token includes:
comparing the call token provided by the target application with the call token sent by the blockchain and aiming at the target service of the target application; and if the two calling tokens are consistent, determining that the verification is passed.
And 5.2, executing the target service after the verification is passed.
And if the verification is passed, the target application platform executes the target service initiated by the target application.
6. And the target application platform stores the chain of the execution result of the target service.
After the target service is executed, the target application platform can also store the execution result in a block chain in a transaction form; the transaction carries the invocation token.
After the target service is executed, the target application platform can also return an execution result to the target application, and the call token is locally invalidated at the target application platform.
In this manner, when the target application initiates another service again based on the same invocation token, it will not execute because the invocation token has failed. In this way, the target application is prevented from repeatedly making calls based on the same call token.
7. The blockchain invalidates the call token.
After the block chain has the execution result, calling tokens carried by the transaction are used; and performing invalidation treatment on the call token in the block chain.
Through the embodiment, when the target application calls the target application platform each time, the authorized call token for each call is acquired from the block chain; and invoking the target application platform to execute the target service based on the invocation token.
A flow chart of application authorization termination and authorization accounting is presented below as shown in fig. 3.
1.1, the target application initiates a termination authorization application to an authorization system, wherein the application carries an authority confirmation token.
And 1.2, authorizing the invalidation transaction for the right token submitted by the system to the blockchain.
The authorization system receives a termination authorization request initiated by a target application, and further submits a termination authorization transaction aiming at an entitlement token carried in the termination authorization request to the blockchain so as to invalidate the entitlement token stored in the blockchain.
2.1, the blockchain links the termination authorization transaction with a chain credit;
2.2, the blockchain informs the auditor of the termination of the authorized transaction for auditing;
specifically, termination authorization audit logic declared in a smart contract issued on the blockchain may be invoked; wherein the termination authorization audit logic is:
writing a voting event in the transaction log, auditing the termination of authorized transaction after the auditing party of the block chain monitors the voting event, and submitting the voting transaction containing the auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
And 2.3, returning an audit result by each auditor.
The block chain may derive a final audit result based on each audit result.
3.1, block chain failure right token.
If the final auditing result is that the verification result passes, the verification token needs to be subjected to invalidation processing, namely, the block chain calls invalidation logic issued in the block chain, and the valid state of the verification token is changed into an invalidation state.
If the result of the audit is failure, the termination authorization is failed.
And 3.2, returning a termination authorization result to the authorization system by the blockchain.
And 3.3, returning a termination authorization result to the target application by the authorization system.
The blockchain needs to return the termination authorization result to the authorization system.
The blockchain is provided with logic for application authorization suspension based on the intelligent contract, active suspension authorization can be supplied to the application, and the authorization can be suspended in time when an application party sends an emergency (such as risks of data security, privacy disclosure and the like), so that the benefits of the application party are protected.
In an embodiment, after the blockchain fails to use the right-to-determine token, the blockchain may further invoke a charging logic issued in the blockchain, invoke a charging party in the blockchain to calculate a bill of the target application, and chain-store the bill of the charging.
The block chain is provided with an authorization charging logic based on a consensus mechanism, can calculate a charge bill (including a charging process and obvious charging) generated by application authorization, and links the charge bill with a chain for storage, so that the charging result is public and transparent, and the accuracy, fairness and reliability of charging are ensured.
An embodiment of the method for implementing the authorization system proposed in the present specification is described as shown in fig. 4, which corresponds to fig. 2; the method comprises the following steps:
step 210: the authorization system receives an authorization application which is initiated by a target application and aims at a target application platform;
step 220: submitting an authorization transaction for the entitlement token carried in the authorization application to a blockchain;
step 230: receiving a call token returned by the block chain and used for calling the target application platform;
step 240: and sending the call token to a target application so that the target application calls the target application platform to execute a target service through the call token.
After receiving a call token provided by the target application, the application platform needs to verify the call token;
and if the verification is passed, executing the target service of the target application.
Specifically, the verifying the invocation token specifically includes:
comparing the call token provided by the target application with the call token for the target application sent by the blockchain;
if the two calling tokens are consistent, the verification is determined to be passed;
if the two call tokens do not agree, the check is determined to fail.
In an embodiment, as shown in fig. 1, the method further includes the step of applying the right-confirming process:
the authorization system receives an authorization request initiated by a target application;
submitting an entitlement transaction aiming at the application parameters carried in the entitlement request to a block chain;
and sending the confirmation token which is returned by the block chain and generated based on the application parameters to the target application.
In one embodiment, as shown in fig. 3, the method further includes the following steps:
receiving a termination authorization application initiated by a target application;
submitting a termination authorization transaction aiming at the authorization confirming token carried in the termination authorization application to a blockchain so as to invalidate the authorization confirming token stored in the blockchain.
In this embodiment, the authorization system may serve as an intermediary for communication between the target application and the blockchain, and respond to the application of the target application, such as an authorization, a termination authorization, and the like, to initiate a corresponding transaction to the blockchain; after the blockchain returns results in response to each transaction, the results returned by the blockchain may also be provided to the target application.
An embodiment of the method for performing block chaining as proposed in the present specification is described as shown in fig. 5, which corresponds to fig. 2; the method comprises the following steps:
step 310: the node equipment of the block chain receives an authorization transaction which is submitted by an authorization system and aims at an entitlement token carried in an authorization application; the authorization application is an authorization request which is initiated by a target application and aims at a target application platform;
step 320: in response to the authorization transaction, invoking authorization logic declared in a smart contract issued to the blockchain, querying whether the validation token is stored in the blockchain;
step 330: if the confirmation token is inquired, creating a calling token of the target application, and sending the calling token to the authorization system; so that the target application calls the target application platform to execute the target service through the call token.
In an embodiment, the method further comprises:
the node equipment of the block chain can also send the calling token to the target application platform, so that the target application platform compares the two calling tokens after receiving the calling token provided by the target application;
and if the two calling tokens are consistent, executing the target service of the target application.
In one embodiment, the application of the grant process as previously described in FIG. 1:
receiving an entitlement transaction submitted by the authorization system for a target application;
and in response to the authorization transaction, invoking an authorization logic declared in an intelligent contract issued in the blockchain, creating an authorization token of the target application, and sending the authorization token to the authorization system.
In one embodiment, the application enrollment subscription process as previously illustrated in fig. 1:
receiving an enrollment transaction submitted by the authorization system for a target application;
in response to the onboarding transaction, invoking onboarding audit logic declared in a smart contract issued on the blockchain; wherein the resident auditing logic is: writing a voting event in a transaction log, auditing qualification information of a target application after an auditor of the block chain monitors the voting event, and submitting voting transaction containing an auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
In one embodiment, the application termination authorization process as previously shown in FIG. 3:
the node equipment of the block chain receives a termination authorization transaction for the call token submitted by the authorization system;
in response to the termination authorization transaction, terminating authorization logic issued to the blockchain is invoked to change the invocation token stored in the blockchain from a valid state to an invalid state.
Further, the method further comprises:
and calling the charging logic issued in the block chain, calling a charging party in the block chain to calculate the bill of the target application corresponding to the calling token, and chaining and storing the bill on the charging bill.
In summary, in the solution provided in this specification, the block chain is used to perform authorization and authorization on the target application, and the block chain is used to perform chain storage in the authorization and authorization process; due to the public characteristic of the blockchain, the public justice of the application authorization process can be ensured, and due to the non-falsifiable characteristic of the blockchain, the reliability of the application authorization process is ensured. It should be noted that, in an embodiment provided in the present specification, the qualification information of the application applying for authorization is firstly linked to a chain for certification, so as to facilitate subsequent auditing. On the other hand, the blockchain is provided with logic for application authorization suspension based on the intelligent contract, so that active suspension authorization can be supplied to the application, and the authorization can be suspended in time when the application side sends an emergency (such as risks of data security, privacy disclosure and the like), thereby protecting the benefit of the application side. On the other hand, the blockchain is provided with an authorization charging logic based on a consensus mechanism, so that a charge bill (including a charging process and obvious charging) generated by application authorization can be calculated, the charge bill is also chained and stored, a charging result is public and transparent, and the accuracy, fairness and reliability of charging are ensured.
Corresponding to the foregoing embodiments of the method for authorizing an application based on a blockchain, the present specification further provides embodiments of an apparatus for authorizing an application based on a blockchain. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and as a logical device, the device is formed by reading corresponding computer business program instructions in the nonvolatile memory into the memory for operation through the processor of the device in which the device is located. From a hardware aspect, as shown in fig. 6, the hardware structure diagram of the device where the block chain-based application authorization apparatus is located in this specification is shown, except for the processor, the network interface, the memory, and the nonvolatile memory shown in fig. 6, the device where the apparatus is located in the embodiment may generally authorize an actual function according to the block chain-based application, and may further include other hardware, which is not described again.
Referring to fig. 7, a block diagram of an apparatus for block chain based application authorization according to an embodiment of the present disclosure is provided, where the apparatus corresponds to the embodiment shown in fig. 4, and the apparatus includes:
a first receiving unit 410, configured to receive an authorization application initiated by a target application and directed to a target application platform by an authorization system;
a transaction submitting unit 420, which submits an authorization transaction for the entitlement token carried in the authorization application to the blockchain;
a second receiving unit 430, which receives the call token returned by the blockchain for calling the target application platform;
and the application authorization unit 440 is configured to send the call token to a target application, so that the target application calls the target application platform to execute a target service through the call token.
Optionally, the apparatus further comprises:
the verification subunit is used for verifying the calling token after the target application platform receives the calling token provided by the target application;
and the execution subunit executes the target service of the target application if the verification is passed.
Optionally, the verifying subunit specifically includes:
the comparison subunit compares the call token provided by the target application with the call token sent by the blockchain;
and the determining subunit determines that the check is passed if the two calling tokens are consistent.
Optionally, the apparatus further comprises:
the application authority determining subunit receives an authority determining request initiated by the target application; submitting an entitlement transaction aiming at the application parameters carried in the entitlement request to a block chain; and sending the confirmation token which is returned by the block chain and generated based on the application parameters to the target application.
Optionally, the apparatus further comprises:
the terminal authorization subunit receives a terminal authorization request initiated by the target application; submitting a termination authorization transaction for an entitlement token carried in the termination authorization request to a blockchain to invalidate the entitlement token stored in the blockchain.
Referring to fig. 8, a block diagram of an apparatus for block chain based application authorization provided in an embodiment of the present disclosure, the apparatus corresponding to the embodiment shown in fig. 5, the apparatus includes:
the receiving unit is used for receiving the authorization transaction aiming at the authorization token carried in the authorization application submitted by the authorization system by the node equipment of the block chain; the authorization application is an authorization request which is initiated by a target application and aims at a target application platform;
the query unit is used for responding to the authorized transaction, calling the authorization logic declared in the intelligent contract issued in the block chain and querying whether the confirmation token is stored in the block chain or not;
the authorization unit is used for creating a calling token of the target application and sending the calling token to the authorization system if the confirmation token is inquired; so that the target application calls the target application platform to execute the target service through the call token.
Optionally, the apparatus further comprises:
the service execution unit is used for sending the calling token to the target application platform so that the target application platform compares the two calling tokens after receiving the calling token provided by the target application; and if the two calling tokens are consistent, executing the target service of the target application.
Optionally, the apparatus further comprises:
the application right determining subunit receives right determining transaction which is submitted by the authorization system and aims at the target application; and in response to the authorization transaction, invoking an authorization logic declared in an intelligent contract issued in the blockchain, creating an authorization token of the target application, and sending the authorization token to the authorization system.
Optionally, the apparatus further comprises:
the admission auditing subunit receives admission transaction aiming at the target application submitted by the authorization system; in response to the onboarding transaction, invoking onboarding audit logic declared in a smart contract issued on the blockchain; wherein the resident auditing logic is: writing a voting event in a transaction log, auditing qualification information of a target application after an auditor of the block chain monitors the voting event, and submitting voting transaction containing an auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
Optionally, the apparatus further comprises:
the termination authorization subunit receives a termination authorization transaction for the call token submitted by the authorization system; in response to the termination authorization transaction, terminating authorization logic issued to the blockchain is invoked to change the invocation token stored in the blockchain from a valid state to an invalid state.
Optionally, the apparatus further comprises:
and the charging subunit calls the charging logic issued in the block chain, calls a charging party in the block chain to calculate a bill of the target application corresponding to the calling token, and links the charging bill for storage.
Optionally, the blockchain comprises a federation chain.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
Fig. 7 above describes the internal functional modules and the structural schematic of the block chain-based application authorization apparatus, and the substantial execution subject thereof may be an electronic device, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
the authorization system receives an authorization application which is initiated by a target application and aims at a target application platform;
submitting an authorization transaction for the entitlement token carried in the authorization application to a blockchain;
receiving a call token returned by the block chain and used for calling the target application platform;
and sending the call token to a target application so that the target application calls the target application platform to execute a target service through the call token.
Fig. 8 above describes the internal functional modules and the structural schematic of the block chain-based application authorization apparatus, and the substantial execution subject may be an electronic device, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
the node equipment of the block chain receives an authorization transaction which is submitted by an authorization system and aims at an entitlement token carried in an authorization application; the authorization application is an authorization request which is initiated by a target application and aims at a target application platform;
in response to the authorization transaction, invoking authorization logic declared in a smart contract issued to the blockchain, querying whether the validation token is stored in the blockchain;
if the confirmation token is inquired, creating a calling token of the target application, and sending the calling token to the authorization system; so that the target application calls the target application platform to execute the target service through the call token.
In the above embodiments of the electronic device, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. The general-purpose processor may be a microprocessor, or the processor may be any conventional processor, and the aforementioned memory may be a read-only memory (ROM), a Random Access Memory (RAM), a flash memory, a hard disk, or a solid state disk. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the embodiment of the electronic device, since it is substantially similar to the embodiment of the method, the description is simple, and for the relevant points, reference may be made to part of the description of the embodiment of the method.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This specification is intended to cover any variations, uses, or adaptations of the specification following, in general, the principles of the specification and including such departures from the present disclosure as come within known or customary practice within the art to which the specification pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
It will be understood that the present description is not limited to the precise arrangements described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present description is limited only by the appended claims.

Claims (25)

1. A blockchain based application authorization method, the method comprising:
the authorization system receives an authorization application which is initiated by a target application and aims at a target application platform;
submitting an authorization transaction for the entitlement token carried in the authorization application to a blockchain; wherein the entitlement token is generated by the blockchain based on application parameters of the target application;
receiving a call token returned by the block chain and used for calling the target application platform; wherein the call token is generated by the blockchain after executing a corresponding authorized intelligent contract based on the authority-determining token;
and sending the call token to a target application so that the target application calls the target application platform to execute a target service through the call token.
2. The method of claim 1, further comprising:
after receiving a calling token provided by the target application, the target application platform verifies the calling token;
and if the verification is passed, executing the target service of the target application.
3. The method according to claim 2, wherein the verifying the invocation token specifically includes:
comparing the call token provided by the target application with the call token sent by the blockchain;
and if the two calling tokens are consistent, determining that the verification is passed.
4. The method of claim 1, further comprising:
receiving an authority confirming request initiated by a target application;
submitting an entitlement transaction aiming at the application parameters carried in the entitlement request to a block chain;
and sending the confirmation token which is returned by the block chain and generated based on the application parameters to the target application.
5. The method of claim 1, further comprising:
receiving a termination authorization request initiated by a target application;
submitting a termination authorization transaction for an entitlement token carried in the termination authorization request to a blockchain to invalidate the entitlement token stored in the blockchain.
6. A blockchain based application authorization method, the method comprising:
the node equipment of the block chain receives an authorization transaction which is submitted by an authorization system and aims at an entitlement token carried in an authorization application; the authorization application is an authorization request which is initiated by a target application and aims at a target application platform, and the right-confirming token is generated by a blockchain based on application parameters of the target application;
responding to the authorized transaction, calling an authorization logic declared in an intelligent contract issued in the block chain, and inquiring whether the right-confirming token is stored in the block chain;
if the right-confirming token is inquired, creating a calling token of the target application, and sending the calling token to the authorization system; so that the target application calls the target application platform to execute the target service through the call token.
7. The method of claim 6, further comprising:
sending the calling token to the target application platform, so that the target application platform compares the two calling tokens after receiving the calling token provided by the target application;
and if the two calling tokens are consistent, executing the target service of the target application.
8. The method of claim 6, further comprising:
receiving an entitlement transaction submitted by the authorization system for a target application;
and in response to the authorization transaction, invoking an authorization logic declared in an intelligent contract issued in the blockchain, creating an authorization token of the target application, and sending the authorization token to the authorization system.
9. The method of claim 6, further comprising:
receiving an enrollment transaction submitted by the authorization system for a target application;
in response to the onboarding transaction, invoking onboarding audit logic declared in a smart contract issued on the blockchain; wherein the resident auditing logic is: writing a voting event in a transaction log, auditing qualification information of a target application after an auditor of the block chain monitors the voting event, and submitting voting transaction containing an auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
10. The method of claim 6, further comprising:
receiving a termination authorization transaction submitted by the authorization system for a call token;
in response to the termination authorization transaction, terminating authorization logic issued to the blockchain is invoked to change the invocation token stored in the blockchain from a valid state to an invalid state.
11. The method of claim 10, further comprising:
and calling the charging logic issued in the block chain, calling a charging party in the block chain to calculate the bill of the target application corresponding to the calling token, and chaining and storing the bill on the charging bill.
12. The method of any of claims 6-11, the blockchain comprising a federation chain.
13. An apparatus for blockchain-based application authorization, the apparatus comprising:
the first receiving unit is used for receiving an authorization application which is initiated by a target application and aims at a target application platform by an authorization system;
the transaction submitting unit is used for submitting authorization transaction aiming at the right-confirming token carried in the authorization application to the blockchain; wherein the entitlement token is generated by the blockchain based on application parameters of the target application;
the second receiving unit is used for receiving a call token which is returned by the block chain and used for calling the target application platform; wherein the call token is generated by the blockchain after executing a corresponding authorized intelligent contract based on the authority-determining token;
and the application authorization unit sends the call token to the target application so that the target application calls the target application platform to execute the target service through the call token.
14. The apparatus of claim 13, the apparatus further comprising:
the verification subunit is used for verifying the calling token after the target application platform receives the calling token provided by the target application;
and the execution subunit executes the target service of the target application if the verification is passed.
15. The apparatus according to claim 14, wherein the syndrome unit specifically includes:
the comparison subunit compares the call token provided by the target application with the call token sent by the blockchain;
and the determining subunit determines that the check is passed if the two calling tokens are consistent.
16. The apparatus of claim 13, the apparatus further comprising:
the application authority determining subunit receives an authority determining request initiated by the target application; submitting an entitlement transaction aiming at the application parameters carried in the entitlement request to a block chain; and sending the confirmation token which is returned by the block chain and generated based on the application parameters to the target application.
17. The apparatus of claim 13, the apparatus further comprising:
the terminal authorization subunit receives a terminal authorization request initiated by the target application; submitting a termination authorization transaction for an entitlement token carried in the termination authorization request to a blockchain to invalidate the entitlement token stored in the blockchain.
18. An apparatus for blockchain-based application authorization, the apparatus comprising:
the receiving unit is used for receiving the authorization transaction aiming at the authorization token carried in the authorization application submitted by the authorization system by the node equipment of the block chain; the authorization application is an authorization request which is initiated by a target application and aims at a target application platform, and the right-confirming token is generated by a blockchain based on application parameters of the target application;
the query unit is used for responding to the authorized transaction, calling an authorization logic declared in an intelligent contract issued in the block chain and querying whether the block chain stores the right-confirming token or not;
the authorization unit is used for creating a calling token of the target application and sending the calling token to the authorization system if the right-confirming token is inquired; so that the target application calls the target application platform to execute the target service through the call token.
19. The apparatus of claim 18, the apparatus further comprising:
the service execution unit is used for sending the calling token to the target application platform so that the target application platform compares the two calling tokens after receiving the calling token provided by the target application; and if the two calling tokens are consistent, executing the target service of the target application.
20. The apparatus of claim 18, the apparatus further comprising:
the application right determining subunit receives right determining transaction which is submitted by the authorization system and aims at the target application; and in response to the authorization transaction, invoking an authorization logic declared in an intelligent contract issued in the blockchain, creating an authorization token of the target application, and sending the authorization token to the authorization system.
21. The apparatus of claim 18, the apparatus further comprising:
the admission auditing subunit receives admission transaction aiming at the target application submitted by the authorization system; in response to the onboarding transaction, invoking onboarding audit logic declared in a smart contract issued on the blockchain; wherein the resident auditing logic is: writing a voting event in a transaction log, auditing qualification information of a target application after an auditor of the block chain monitors the voting event, and submitting voting transaction containing an auditing result to the intelligent contract; and the intelligent contract collects and sorts the voting transactions to obtain a final auditing result.
22. The apparatus of claim 18, the apparatus further comprising:
the termination authorization subunit receives a termination authorization transaction for the call token submitted by the authorization system; in response to the termination authorization transaction, terminating authorization logic issued to the blockchain is invoked to change the invocation token stored in the blockchain from a valid state to an invalid state.
23. The apparatus of claim 22, the apparatus further comprising:
and the charging subunit calls the charging logic issued in the block chain, calls a charging party in the block chain to calculate a bill of the target application corresponding to the calling token, and links the charging bill for storage.
24. The apparatus of any of claims 18-23, the blockchain comprising a federation chain.
25. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured as the method of any of the preceding claims 1-12.
CN201910234810.6A 2019-03-26 2019-03-26 Application authorization method and device based on block chain and electronic equipment Active CN110011996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910234810.6A CN110011996B (en) 2019-03-26 2019-03-26 Application authorization method and device based on block chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910234810.6A CN110011996B (en) 2019-03-26 2019-03-26 Application authorization method and device based on block chain and electronic equipment

Publications (2)

Publication Number Publication Date
CN110011996A CN110011996A (en) 2019-07-12
CN110011996B true CN110011996B (en) 2021-05-25

Family

ID=67168277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910234810.6A Active CN110011996B (en) 2019-03-26 2019-03-26 Application authorization method and device based on block chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN110011996B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11057189B2 (en) 2019-07-31 2021-07-06 Advanced New Technologies Co., Ltd. Providing data authorization based on blockchain
US11251963B2 (en) 2019-07-31 2022-02-15 Advanced New Technologies Co., Ltd. Blockchain-based data authorization method and apparatus
CN110473096A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Data grant method and device based on intelligent contract
CN110457875B (en) * 2019-07-31 2021-04-27 创新先进技术有限公司 Data authorization method and device based on block chain
US11252166B2 (en) 2019-07-31 2022-02-15 Advanced New Technologies Co., Ltd. Providing data authorization based on blockchain
CN110473099B (en) * 2019-08-12 2021-11-05 安徽中科智链信息科技有限公司 Pre-release platform and method based on block chain intelligent contract
CN110490741B (en) * 2019-08-13 2023-03-24 山大地纬软件股份有限公司 Device and method for managing data validity and controllability in block chain
CN110597924B (en) * 2019-09-29 2021-08-06 腾讯科技(深圳)有限公司 Block chain-based user identification processing method, device, equipment and storage medium
CN110909038B (en) * 2019-10-24 2021-05-11 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain and electronic equipment
CN111210217A (en) * 2020-01-02 2020-05-29 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
US11310051B2 (en) 2020-01-15 2022-04-19 Advanced New Technologies Co., Ltd. Blockchain-based data authorization method and apparatus
CN111880919B (en) * 2020-07-29 2024-04-02 平安国际融资租赁有限公司 Data scheduling method, system and computer equipment
CN113807960A (en) * 2021-03-04 2021-12-17 京东科技控股股份有限公司 Cross-link processing method, device and system between heterogeneous chains and electronic equipment
CN113221093B (en) * 2021-05-25 2022-11-25 成都佰纳瑞信息技术有限公司 Single sign-on system, method, equipment and product based on block chain
CN115484027B (en) * 2021-06-15 2024-06-25 中移动信息技术有限公司 Token application linear consistency method and device based on bos chain
CN113723955A (en) * 2021-08-06 2021-11-30 四川大学 Token-based electronic prescription transfer method based on intelligent contracts
CN114978681B (en) * 2022-05-20 2024-01-30 中国工商银行股份有限公司 Service application authorization method and device based on block chain and processor

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911641A (en) * 2015-12-23 2017-06-30 索尼公司 For authorizing the client terminal device for accessing, server unit and access control system
KR101816653B1 (en) * 2017-02-14 2018-02-21 주식회사 코인플러그 Method for providing login flow via authentication based on public key infrastructure in response to user’s login request for using service provided by service provider server in use of smart contract with blockchain database and server using the same
CN108810006B (en) * 2018-06-25 2021-08-10 百度在线网络技术(北京)有限公司 Resource access method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110011996A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN110011996B (en) Application authorization method and device based on block chain and electronic equipment
CN109583184B (en) Identity verification method and device and electronic equipment
CN108898389B (en) Content verification method and device based on block chain and electronic equipment
CN109639410B (en) Block chain-based data evidence storing method and device and electronic equipment
CN108492180B (en) Asset management method and device and electronic equipment
CN109242675B (en) Asset publishing method and device based on block chain and electronic equipment
CN105956923B (en) Asset transaction system and digital authentication and transaction method of assets
JP6697008B2 (en) System and method for updating distributed ledger based on partial authorization of transaction
US9978094B2 (en) Tokenization revocation list
CN109768983B (en) Block chain-based multi-dimensional dynamic identity recognition method, device and system
CN109981646B (en) Resource transfer method and device based on block chain and electronic equipment
EP3507938A1 (en) Biometric identification and verification among iot devices and applications
CN110046900B (en) Invoice revocation method and device based on block chain and electronic equipment
CN110163755B (en) Block chain-based data compression and query method and device and electronic equipment
CN110163634B (en) Refund method and device based on blockchain and electronic equipment
CN111145023A (en) Cross-chain exchange method, system and medium based on trusted prediction machine
CN111159308B (en) Transaction record sharing method and device based on block chain network and electronic equipment
CN111383114A (en) Asset information management method and device based on block chain
CN112700250B (en) Identity authentication method, device and system in financial scene
CN112700251B (en) Identity confirmation method, device and system in financial scene
CN111402033A (en) Asset information management method and device based on block chain
CN115277122A (en) Cross-border data flow and supervision system based on block chain
CN110674531A (en) Residence information management method, device, server and medium based on block chain
WO2022206433A1 (en) Method and apparatus for pre-executing chaincode in fabric blockchain
CN110599332A (en) Block chain-based user intention determination method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant