CN117272278B - Decentralization management method and device for digital asset platform - Google Patents

Decentralization management method and device for digital asset platform Download PDF

Info

Publication number
CN117272278B
CN117272278B CN202311547839.2A CN202311547839A CN117272278B CN 117272278 B CN117272278 B CN 117272278B CN 202311547839 A CN202311547839 A CN 202311547839A CN 117272278 B CN117272278 B CN 117272278B
Authority
CN
China
Prior art keywords
network
information
grade
verification
operation end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311547839.2A
Other languages
Chinese (zh)
Other versions
CN117272278A (en
Inventor
吴要毛
丁伟斌
金翔
杨玲
张德奇
杨君佳
薛舒婷
林丽
金衍珍
王韦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Electric Power Co Ltd
Priority to CN202311547839.2A priority Critical patent/CN117272278B/en
Publication of CN117272278A publication Critical patent/CN117272278A/en
Application granted granted Critical
Publication of CN117272278B publication Critical patent/CN117272278B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a decentralization management method and a device for a digital asset platform, which update initial grade information according to a reverse update strategy to obtain current grade information of each digital asset, and determine an allowable network group corresponding to each digital asset based on the current grade information; responding to an operation request of an operation end, performing primary verification on the operation end, and sending a trigger network of a preset network group to the operation end according to a primary verification result, wherein the trigger network is the lowest-level network in the preset network group; acquiring secondary verification information of the triggering network by the operation end, and invoking a step-by-step switching strategy according to the secondary verification information to process an upgrading request and grade configuration information of the operation end so as to obtain a current network of the operation end; and determining operation assets according to the current network and the allowed network groups corresponding to the digital assets, receiving operation data of the operation assets by the operation end, and storing the operation data in an uplink mode to corresponding asset block chains.

Description

Decentralization management method and device for digital asset platform
Technical Field
The present invention relates to data processing technology, and in particular, to a method and apparatus for decentralized management of a digital asset platform.
Background
Digital assets are non-monetary assets that are owned or controlled by an enterprise or individual, exist in electronic data form, are held in daily activities for sale or are in the process of being produced.
In the prior art, when digital assets are managed, a management end is generally used for managing the digital assets, and when the digital assets are more, the digital assets can not be correspondingly operated and processed by combining authority information of a plurality of management ends in a mode in the prior art, so that the management efficiency of the digital assets is low.
Therefore, how to combine the authority information of multiple management ends to manage the digital assets, so as to improve the management efficiency of the digital assets, and the problem to be solved is urgent.
Disclosure of Invention
The embodiment of the invention provides a decentralization management method and device for a digital asset platform, which can be used for managing digital assets by combining authority information of a plurality of management ends, and improves the management efficiency of the digital assets.
In a first aspect of an embodiment of the present invention, there is provided a decentralized management method for a digital asset platform, including:
receiving initial grade information configured by a management end for each digital asset, updating the initial grade information according to a reverse updating strategy to obtain current grade information of each digital asset, and determining an allowed network group corresponding to each digital asset based on the current grade information;
Performing primary verification on an operation terminal in response to an operation request of the operation terminal to obtain a primary verification result, and sending a trigger network of a preset network group to the operation terminal according to the primary verification result, wherein the trigger network is the lowest-level network in the preset network group;
acquiring secondary verification information of the triggering network by the operation end, and invoking a step-by-step switching strategy according to the secondary verification information to process an upgrading request and grade configuration information of the operation end so as to obtain a current network of the operation end;
and determining an operation asset according to the current network and the allowed network group corresponding to each digital asset, generating an operation interface corresponding to the operation asset, sending the operation interface to the operation end, receiving operation data of the operation end on the operation asset, and storing the operation data in an uplink manner to a corresponding asset block chain.
Optionally, in one possible implementation manner of the first aspect, receiving initial level information configured by the management end for each digital asset, updating the initial level information according to a reverse updating policy to obtain current level information of each digital asset, determining an allowed network group corresponding to each digital asset based on the current level information, and including:
Receiving initial grade information configured by a management end for each digital asset, and obtaining initial grade corresponding to the corresponding digital asset according to the initial grade information;
obtaining preset grades corresponding to all preset networks in the preset network group, and arranging all the preset grades from low grade to high grade to obtain a reverse grade sequence;
selecting a preset grade corresponding to the initial grade in the reverse grade sequence as a first target grade, and selecting a preset grade located behind the first target grade in the reverse grade sequence as a second target grade;
obtaining current grade information of the corresponding digital asset according to the first target grade and the second target grade;
and acquiring a preset network corresponding to the current grade information in the preset network group as an allowed network, and generating an allowed network group corresponding to the digital asset according to the allowed network.
Optionally, in one possible implementation manner of the first aspect, in response to an operation request of an operation end, performing primary verification on the operation end to obtain a primary verification result, and sending a trigger network of a preset network group to the operation end according to the primary verification result, where the trigger network is a lowest-level network in the preset network group, including:
Responding to an operation request of an operation end, acquiring identity information of the operation end, calling a preset identity table, and performing primary verification on the operation end according to the identity information and the preset identity table;
if the preset identity information corresponding to the identity information exists in the preset identity table, verification passing information is generated, and the primary verification result comprises verification passing information;
and acquiring the lowest-level network with the lowest preset level in the preset network group as a trigger network based on the verification passing information, and sending the trigger network to the operation terminal.
Optionally, in one possible implementation manner of the first aspect, obtaining second-level verification information of the operation end on the trigger network, invoking a step-by-step switching policy according to the second-level verification information, and processing an upgrade request and level configuration information of the operation end to obtain a current network of the operation end, where the method includes:
acquiring a network key input by the operation end to the trigger network, and acquiring secondary verification information according to key passing information of the network key;
and acquiring an upgrading request of the operation end based on the secondary verification information, determining a verification network corresponding to the upgrading request, and performing step-by-step switching verification on the verification network according to the grade configuration information and the upgrading request to obtain a current network corresponding to the operation end.
Optionally, in one possible implementation manner of the first aspect, the obtaining, based on the second-level verification information, an upgrade request of the operation end, determining a verification network corresponding to the upgrade request, and performing step-by-step verification on the verification network according to the level configuration information and the upgrade request to obtain a current network corresponding to the operation end, where the step-by-step verification includes:
responding to the upgrading request, acquiring a preset network with a preset level on the trigger network in the preset network group as a verification network, and determining the preset level of the verification network as a verification level;
if the configuration level corresponding to the verification level exists in the level configuration information, the verification network is sent to the operation end, and the level configuration information comprises a plurality of configuration levels corresponding to the operation end;
acquiring three-level verification information of the operation end on the verification network, acquiring an upgrade request of the operation end based on the three-level verification information, and determining a preset network which is positioned at a preset level on the verification network in the preset network group as a next verification network;
repeating the steps until the operation end stops inputting the upgrading request or the configuration level corresponding to the verification level does not exist in the level configuration information, stopping repeating, and acquiring the verification network corresponding to the last upgrading request of the operation end as the current network.
Optionally, in one possible implementation manner of the first aspect, before the processing the upgrade request and the level configuration information of the operation end according to the level-by-level switching policy extracted by the second-level verification information, the method further includes:
acquiring authorization information of a dynamic configuration end to the operation end, and acquiring authorization data corresponding to the operation end according to the authorization information;
determining a position column corresponding to a preset locating word in the authorization data as a target column, acquiring target information of the target column, and performing grade analysis on the target information to obtain the highest grade;
updating the highest level based on a forward updating strategy to obtain a plurality of configuration levels, and obtaining level configuration information corresponding to the operation end according to the configuration levels;
invoking an authorization key table configured by the dynamic configuration end, and acquiring a grade interception line corresponding to each configuration grade in the grade configuration information in the authorization key table, wherein the authorization key table comprises a plurality of grade interception lines corresponding to preset grades;
intercepting configuration keys of each configuration level in the authorization key table according to the level intercepting line to obtain a plurality of sub-key information, summarizing the plurality of sub-key information to obtain key information, and sending the key information to the corresponding operation end;
And generating summary information according to the grade configuration information corresponding to each operation end and sending the summary information to the dynamic configuration end.
Optionally, in one possible implementation manner of the first aspect, updating the highest level based on a forward updating policy to obtain a plurality of configuration levels, and obtaining level configuration information corresponding to the operation end according to the configuration levels, including;
the preset grades of all preset networks in the preset network group are arranged according to the grades from high to low to obtain a forward grade sequence;
selecting a preset grade corresponding to the highest grade in the forward grade sequence and a preset grade positioned behind the highest grade in the forward grade sequence as configuration grades;
and obtaining grade configuration information corresponding to the operation end according to the configuration grade.
Optionally, in one possible implementation manner of the first aspect, generating summary information according to the level configuration information corresponding to each operation end, and sending the summary information to the dynamic configuration end includes:
a preset information filling table is called, wherein the information filling table comprises a plurality of main body filling areas, and a grade filling area and an authorized filling area corresponding to each main body filling area;
Acquiring main body information corresponding to each operation end, and filling each main body information in the main body filling area;
filling the grade configuration information corresponding to each operation end into a grade filling area corresponding to the corresponding main body filling area;
filling the authorization data corresponding to each operation end into the authorization filling area corresponding to the corresponding main body filling area to obtain an information summary table, obtaining summary information according to the information summary table, and sending the summary information to the dynamic configuration end.
Optionally, in one possible implementation manner of the first aspect, determining an operation asset according to the current network and the allowed network group corresponding to each digital asset, generating an operation interface corresponding to the operation asset, and sending the operation interface to the operation end, including:
acquiring the current grade of the current network, and taking the digital asset corresponding to the allowed network group as an operation asset if the allowed network corresponding to the current grade exists in the allowed network group;
and calling an initial interface, updating the initial interface based on the operation asset to obtain an operation interface, and sending the operation interface to the operation terminal.
In a second aspect of an embodiment of the present invention, there is provided a decentralized management device for a digital asset platform, comprising:
The configuration module is used for receiving initial grade information configured by the management end on each digital asset, updating the initial grade information according to a reverse updating strategy to obtain current grade information of each digital asset, and determining an allowed network group corresponding to each digital asset based on the current grade information;
the verification module is used for responding to an operation request of an operation end, carrying out primary verification on the operation end to obtain a primary verification result, and sending a trigger network of a preset network group to the operation end according to the primary verification result, wherein the trigger network is the lowest-level network in the preset network group;
the switching module is used for acquiring the secondary verification information of the triggering network by the operation end, invoking a step-by-step switching strategy according to the secondary verification information, and processing the upgrading request and the grade configuration information of the operation end to obtain the current network of the operation end;
and the operation module is used for determining operation assets according to the current network and the allowed network groups corresponding to the digital assets, generating an operation interface corresponding to the operation assets, sending the operation interface to the operation end, receiving operation data of the operation end on the operation assets, and storing the operation data in a uplink mode to a corresponding asset block chain.
In a third aspect of an embodiment of the present invention, there is provided an electronic device including: a memory, a processor and a computer program stored in the memory, the processor running the computer program to perform the first aspect of the invention and the methods that the first aspect may relate to.
In a fourth aspect of embodiments of the present invention, there is provided a readable storage medium having stored therein a computer program for implementing the method of the first aspect and the various possible aspects of the first aspect when executed by a processor.
The beneficial effects of the invention are as follows:
1. the invention can combine the authority information of a plurality of management ends to manage the digital asset, and improves the management efficiency of the digital asset. Specifically, the invention determines the corresponding allowed network group according to the current grade information of each digital asset, so that the network group can be used for determining the network which can access each digital asset, then after receiving the operation request of the operation end, the invention performs primary authentication on the operation end, and after the authentication is passed, the invention sends the lowest-grade network to the operation end for secondary authentication, after the secondary authentication is passed, the invention sequentially performs step-by-step switching authentication on the networks of a plurality of grades according to the upgrading request and the grade configuration information of the operation end, thereby obtaining the current network finally selected by the operation end, and further improving the security when the operation end accesses the digital asset. And finally, the invention can determine the operation assets through the current network and the allowed network group, send the operation assets to the operation terminals for corresponding operation, and store the operation data of the operation terminals in the corresponding asset block chains in an uplink manner, thereby being capable of tracing the operation data of each operation terminal.
2. When the invention sequentially performs step-by-step switching verification on the networks of a plurality of grades according to the upgrading request and the grade configuration information of the operation end, firstly, the key information input by the lowest grade network is verified by the operation end, after the key information verification is passed, if the upgrading request is input by the operation end, the invention can determine whether the preset network of the next grade is in the grade configuration information corresponding to the operation end, if the preset network of the next grade exists, the invention can continuously send the preset network of the next grade to the operation end for key verification, and the verification is performed on the preset networks step by step in the same way as the steps until the operation end does not send the upgrading request any more or the grade of the preset network of the next grade does not exist in the grade configuration information, and in this way, the safety of the operation end for acquiring the corresponding digital asset can be improved. In this way, a plurality of operation terminals can simultaneously perform corresponding operations, and the efficiency of digital asset operation processing can be improved.
3. When the level configuration information corresponding to each operation end is acquired, the highest level in the authorization data corresponding to each operation end is acquired, and then the forward updating strategy is called to update the highest level to acquire the level configuration information corresponding to the operation end, so that the configuration level corresponding to each operation end can be automatically updated through the highest level, and further the level configuration information corresponding to each operation end can be acquired quickly according to the configuration level. The invention also intercepts the key information corresponding to the operation end in the authorization key table according to the grade configuration information and then sends the key information to the corresponding operation end, so that the operation end can know the key of the corresponding network through the key information. And the invention also generates summary information according to the grade configuration information of each operation end and sends the summary information to the dynamic configuration end, so that the dynamic configuration end can check and trace the grade information of a plurality of operation ends.
Drawings
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an decentralized management device for a digital asset platform according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, an application scenario is shown in the embodiment of the present invention, where the present invention can combine authority information of multiple operation ends to perform corresponding operation processing on digital assets. Specifically, the invention determines the corresponding allowed network group according to the current grade information of each digital asset, then after receiving the operation request of the operation end, the invention performs primary verification on the operation end, and after the verification is passed, sends the lowest-grade network to the operation end for secondary verification, after the secondary verification is passed, the invention sequentially performs step-by-step switching verification on the networks of a plurality of grades according to the upgrading request and the grade configuration information of the operation end, thereby obtaining the current network finally selected by the operation end, and determines the operation asset to be sent to the operation end for corresponding operation through the current network and the allowed network group, thereby improving the security of the digital asset, and a plurality of operation ends can simultaneously perform corresponding asset operation, and improving the efficiency of digital asset processing.
The execution bodies of the present application may include, but are not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, computers, smart phones, personal digital assistants (Personal Digital Assistant, abbreviated as PDA), and the above-mentioned electronic devices. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of a large number of computers or network servers based on cloud computing, where cloud computing is one of distributed computing, and a super virtual computer consisting of a group of loosely coupled computers. This embodiment is not limited thereto. The method comprises the steps S1 to S4, and specifically comprises the following steps:
s1, receiving initial grade information configured by a management end for each digital asset, updating the initial grade information according to a reverse updating strategy to obtain current grade information of each digital asset, and determining an allowed network group corresponding to each digital asset based on the current grade information.
It should be noted that the scheme corresponds to different network interfaces for different digital assets, namely, the above-mentioned network group permission, so that different access rights are provided when different network levels are accessed. The scheme is based on an enterprise scene, wherein the network refers to a network in the coverage area of a company, such as a WiFi network, so that the limitation of operation can be performed on the range, and an operation terminal can only access the network to perform operation within the range of the company. In addition, the scheme considers that the more important the digital asset is, the higher the limit level of the operation is required, and the scheme considers the defect that the single network password is easy to crack in the prior art, so that the scheme of upgrading verification is further arranged, and the more important digital asset is more complicated to verify.
According to the scheme, the current grade information corresponding to each digital asset is determined according to the initial grade information, and then the corresponding allowed network group is determined according to the current grade information, so that the digital asset corresponding to the corresponding operation end can be obtained from the current network accessed by the operation end and the allowed network group corresponding to each digital asset, and the digital asset is sent to the corresponding operation end to perform corresponding operation.
It can be understood that the access right in the scheme is determined through the current network corresponding to the operation end, so in order to determine the digital asset corresponding to the current network, the scheme configures an allowed network group corresponding to each digital asset, determines the network capable of accessing the digital asset through the allowed network group, and then sends the digital asset capable of accessing to the operation end through the current network and the allowed network group to the operation end for corresponding operation processing.
The specific implementation manner of step S1 based on the above embodiment may be:
s11, receiving initial grade information configured by a management end for each digital asset, and obtaining an initial grade corresponding to the corresponding digital asset according to the initial grade information.
In practical application, the management end may configure a corresponding initial level for each digital asset, where the initial level may be a preset level corresponding to a certain preset network in the preset network group. For example, if the preset network groups share 1-10 levels of preset networks, the initial level information may be 3 levels of 1-10 levels, so it can be understood that the user only needs to configure one initial level information, and automatic deduction can be performed subsequently, so as to improve configuration efficiency.
S12, obtaining preset grades corresponding to all preset networks in the preset network group, and arranging all the preset grades from low grade to high grade to obtain a reverse grade sequence.
In practical application, a worker may configure corresponding preset levels for a plurality of preset networks in the preset network in advance. When the initial grade information is updated according to the reverse updating strategy, the scheme can arrange all preset grades from low to high, and then correspondingly update the initial grade information according to the obtained reverse grade sequence to obtain the current grade information.
S13, selecting a preset grade corresponding to the initial grade in the reverse grade sequence as a first target grade, and selecting a preset grade located behind the first target grade in the reverse grade sequence as a second target grade.
It will be appreciated that the present solution operates by accessing digital assets via network access. The network group corresponding to the digital asset is a network which can access the digital asset, the higher the level of the network is, the more the digital asset can be accessed, the higher the digital asset which can be accessed by the lower level network is generally accessible, but the lower level network generally cannot access all the digital assets which can be accessed by the higher level network due to the limited access authority of the lower level network.
Since the levels in the reverse level sequence are progressively increased, the preset network corresponding to the preset level located at the rear in the reverse level sequence is capable of accessing the digital asset of the preset network corresponding to the preset level located at the front, so that the initial level can be used as a first target level capable of accessing the digital asset, and the preset level after the first target level can be used as a second target level capable of accessing the digital asset.
S14, obtaining current grade information of the corresponding digital asset according to the first target grade and the second target grade.
Wherein the current tier information includes all tiers that are capable of performing access operations on the digital asset.
S15, acquiring a preset network corresponding to the current grade information in the preset network group as an allowed network, and generating an allowed network group corresponding to the digital asset according to the allowed network.
When the allowed network is acquired, a preset network with preset grades consistent with the first target grade and the second target grade in the current grade information in the preset network group can be acquired as the allowed network.
By the method, the current grade information of each data asset can be automatically acquired according to the initial grade information, so that an allowed network group capable of accessing the corresponding digital asset can be obtained according to the current grade information, and the efficiency of configuring the rights of the digital asset is improved.
S2, performing primary verification on an operation end in response to an operation request of the operation end to obtain a primary verification result, and sending a trigger network of a preset network group to the operation end according to the primary verification result, wherein the trigger network is the lowest-level network in the preset network group.
After receiving an operation request of an operation end, the scheme performs first-stage verification on the operation end, and after the first-stage verification is passed, the trigger network is sent to the operation end for subsequent verification. The primary verification refers to identity verification, whether the identity of the operation end accords with the operation condition can be judged through the primary verification, and when the identity accords with the operation condition, the scheme can continue the subsequent operation steps, so that the security of the digital asset access can be improved.
It can be understood that, in order to improve the security of the digital asset access, the scheme performs verification step by step when verifying the network, so after passing the first-level verification, the scheme sends the lowest-level network in the preset network group to the operation end for verification, and then performs subsequent step by step verification on the networks of each level, thereby obtaining the current network corresponding to the operation end.
In some embodiments, the operation end may be subjected to primary verification, and the trigger network of the preset network group is sent to the operation end through the primary verification result by:
s21, acquiring identity information of an operation end in response to an operation request of the operation end, calling a preset identity table, and performing primary verification on the operation end according to the identity information and the preset identity table.
In practical application, the preset identity information in the preset identity table may be entered in advance, which may be the identity information of the operating end capable of being accessed.
S22, if preset identity information corresponding to the identity information exists in the preset identity table, verification passing information is generated, and the primary verification result comprises verification passing information.
If the preset identity information corresponding to the identity information exists in the preset identity table, the identity information of the corresponding operation end is indicated to be in accordance with the condition.
S23, acquiring the lowest-level network with the lowest preset level in the preset network group as a trigger network based on the verification passing information, and sending the trigger network to the operation end.
After the identity information of the operation end passes, the triggering network can be called to be sent to the operation end for subsequent verification.
By the method, the identity information of the operation end can be verified, so that the safety of the digital asset can be improved.
S3, acquiring secondary verification information of the triggering network by the operation end, invoking a step-by-step switching strategy according to the secondary verification information, and processing upgrading request and grade configuration information of the operation end to obtain a current network of the operation end.
In practical application, after the first-level verification information passes, a network code can be sent to the operation end, and after the operation end scans the network code, a trigger network is sent to the operation end to perform corresponding login operation.
The specific implementation manner of step S3 based on the above embodiment may be:
S31, acquiring a network key input by the operation end to the trigger network, and acquiring secondary verification information according to the key passing information of the network key.
In practical application, if the network key is input incorrectly, a prompt message can be generated to remind the user to re-input the key, and only when the network key is correct, the subsequent upgrading step can be continued or the corresponding digital asset is called and sent to the operation end for operation.
S32, acquiring an upgrade request of the operation end based on the secondary verification information, determining a verification network corresponding to the upgrade request, and performing step-by-step switching verification on the verification network according to the grade configuration information and the upgrade request to obtain a current network corresponding to the operation end.
In practical application, the user may want to continue to log in the network with higher level to operate the digital asset, so after the key information passes, if the upgrade request of the operation end is received, the corresponding verification network may be switched and verified step by step according to the grade configuration information and the upgrade request, so as to obtain the current network corresponding to the operation end finally, and the corresponding digital asset is invoked through the current network at a later time.
Specifically, step S32 may be implemented through steps S321 to S324, which are specifically as follows:
s321, responding to the upgrading request, acquiring a preset network with a preset level on the trigger network in the preset network group as a verification network, and determining the preset level of the verification network as a verification level.
For example, if there are three levels of low, medium and high, the level corresponding to the trigger network is low, and the level corresponding to the authentication network is medium.
S322, if the configuration level corresponding to the verification level exists in the level configuration information, the verification network is sent to the operation end, and the level configuration information comprises a plurality of configuration levels corresponding to the operation end.
It can be understood that the operation ends are different, and the corresponding authority information may be different, so that the scheme can configure the corresponding level configuration information for each operation end, determine whether the verification level of the verification network is in the configuration level corresponding to the operation end according to the level configuration information, and if the configuration level corresponding to the verification level exists in the level configuration information, the operation end can access the verification network, so that the verification network can be sent to the operation end to continue the subsequent verification operation.
Similarly, when the verification network is sent to the operation end, a network code can be sent to the operation end, and after the operation end scans the network code, the verification network is sent to the operation end for corresponding login operation.
S323, acquiring three-level verification information of the operation end on the verification network, acquiring an upgrade request of the operation end based on the three-level verification information, and determining a preset network which is positioned at a preset level on the verification network in the preset network group as a next verification network.
The third-level verification information is key verification information, and similarly, only when the key input by the operation end to the verification network is correct, the scheme can continuously acquire the upgrade request of the operation end or take the current verification network as the current network which is corresponding to the operation end last.
S324, repeating the steps until the operation end stops inputting the upgrade request or the configuration level corresponding to the verification level does not exist in the level configuration information, stopping repeating, and acquiring the verification network corresponding to the last upgrade request of the operation end as the current network.
It will be appreciated that if the operator ceases to input an upgrade request, it is indicated that the operator may want to invoke the corresponding digital asset for operational processing via the current authentication network, and thus the corresponding authentication network may be the current network in this case.
It may be further understood that if the configuration level corresponding to the verification level does not exist in the level configuration information, it indicates that the operation end does not have corresponding authority to access the network of the next level, so that in this case, the corresponding verification network may also be used as the current network.
By the method, the multiple networks can be switched and verified step by step, so that the security of the operation terminal when accessing the digital asset through the current network can be improved.
In addition, before the upgrade request and the level configuration information of the operation end are processed according to the secondary verification information calling step-by-step switching strategy, the scheme further comprises the following embodiments:
a1, acquiring authorization information of a dynamic configuration end to the operation end, and acquiring authorization data corresponding to the operation end according to the authorization information.
In practical application, the authorization data may be an authorization document, in which the authorization document may have level information corresponding to the operation end and authorization description corresponding to the level information, and the authorization level corresponding to each operation end may be determined by the authorization data.
The dynamic configuration terminal is a terminal for carrying out key configuration on a preset network, and after the dynamic configuration terminal carries out key configuration on the preset network, the dynamic configuration terminal can send corresponding keys to corresponding operation terminals for checking according to the authorization data of each operation terminal. Specifically, the operation end can send the authorization data to the dynamic configuration end for checking, and the dynamic configuration end can input the authorization information to the corresponding operation end after determining that the information in the authorization data is correct, so that the corresponding key information can be obtained according to the authorization information later and sent to the corresponding operation end for checking.
A2, determining a position column corresponding to a preset locating word in the authorization data as a target column, acquiring target information of the target column, and performing grade analysis on the target information to obtain the highest grade.
In practical application, the authorization data may have a plurality of location columns corresponding to data information, where each location column may correspond to different data information, for example, may correspond to level information, authorization information, etc., and the preset positioning word may be a phrase related to the level information, so that the location column where the level information in the authorization data is located may be locked by the preset positioning word.
When the grade analysis is carried out on the target information, the data related to the grade in the target information can be extracted, and the highest grade corresponding to the corresponding operation end is obtained through the extracted data. The highest level may be a level configured by the management end for each operation end.
A3, updating the highest level based on a forward updating strategy to obtain a plurality of configuration levels, and obtaining level configuration information corresponding to the operation end according to the configuration levels.
After the highest level of the operation end is obtained, the forward updating strategy is also called to update the highest level, so that the complete level corresponding to the operation end, namely the configuration levels, can be obtained, and then the level configuration information corresponding to the operation end is obtained according to the configuration levels.
In some embodiments, the above-described level configuration information may be obtained by:
a31, arranging preset grades of all preset networks in the preset network group according to the grades from high to low to obtain a forward grade sequence.
It can be understood that the high level may generally include a low level, so when the level configuration information of the operation end is obtained, the scheme may arrange each preset level from high to low according to the level, so as to obtain a forward level sequence, and thus all the configuration levels corresponding to the operation end may be screened out through the forward level sequence.
A32, selecting a preset grade corresponding to the highest grade in the forward grade sequence and a preset grade positioned behind the highest grade in the forward grade sequence as a configuration grade.
It will be appreciated that, since the levels in the forward level sequence are progressively decreasing, the preset levels in the forward level sequence preceding may include the preset levels in the backward position, and thus the preset level corresponding to the highest level in the forward level sequence and the preset level following the highest level may be used as the configuration level.
A33, obtaining grade configuration information corresponding to the operation end according to the configuration grade.
By the mode, the configuration level corresponding to each operation end can be automatically updated through the highest level, so that the complete level corresponding to each operation end can be obtained quickly.
And A4, calling an authorization key table configured by the dynamic configuration end, and acquiring a grade interception line corresponding to each configuration grade in the grade configuration information in the authorization key table, wherein the authorization key table comprises a plurality of grade interception lines corresponding to preset grades.
In practical application, the authorization key table may include keys corresponding to a plurality of preset levels of preset networks, where each level of keys may correspond to a preset level interception line, and the level interception lines may be an upper edge line and a lower edge line corresponding to a line where the keys are located.
And A5, intercepting configuration keys of each configuration grade in the authorization key table according to the grade intercepting line to obtain a plurality of sub-key information, summarizing the plurality of sub-key information to obtain key information, and sending the key information to the corresponding operation end.
When the plurality of sub-key information is summarized, the plurality of sub-key information can be spliced after being arranged according to the level, so that the key information is obtained and sent to the corresponding operation terminal.
A6, generating summary information according to the grade configuration information corresponding to each operation end and sending the summary information to the dynamic configuration end.
It can be understood that, since there may be many operation ends, the level configuration information of each operation end may be different, in order to trace the level configuration information of each operation end, summary information may be generated and sent to the dynamic configuration end, so that the dynamic configuration end may look in and out and trace the level information corresponding to each operation end according to the summary information.
In some embodiments, step A6 may be implemented by steps a61 to a64, specifically as follows:
and A61, calling a preset information filling table, wherein the information filling table comprises a plurality of main body filling areas, and a grade filling area and an authorized filling area corresponding to each main body filling area.
The main body filling area is used for filling main body information corresponding to each operation end, the grade filling area is used for filling grade configuration information corresponding to each operation end, the authorization filling area is used for filling authorization data corresponding to each operation end, and the grade information corresponding to each operation end can be filled correspondingly through the information filling table.
A62, acquiring the main body information corresponding to each operation end, and filling each main body information in the main body filling area.
In practical application, the main body information of each operation end may correspond to the identity information of each operation end.
And A63, filling the grade configuration information corresponding to each operation end into the grade filling area corresponding to the corresponding main body filling area.
It is understood that, in order to be able to correspond the gradation information to the corresponding operation terminal, the gradation configuration information may be filled into the gradation filling area corresponding to the main body filling area when the gradation configuration information is filled.
A64, filling the authorization data corresponding to each operation end into the authorization filling area corresponding to the corresponding main body filling area to obtain an information summary table, obtaining summary information according to the information summary table, and sending the summary information to the dynamic configuration end.
By the method, the grade information of the plurality of operation terminals can be summarized, so that the dynamic configuration terminal can check and trace the grade information of the plurality of operation terminals.
S4, determining operation assets according to the current network and the allowed network groups corresponding to the digital assets, generating an operation interface corresponding to the operation assets, sending the operation interface to the operation end, receiving operation data of the operation end on the operation assets, and storing the operation data in a uplink mode to corresponding asset block chains.
After the current network and the allowed network group of each digital asset are obtained, the operation asset corresponding to the operation end can be determined to be sent to the operation end for corresponding operation, when the operation is performed, an operation interface corresponding to the operation asset can be generated and sent to the operation end for operation, and in order to trace the operation data of each operation end, the scheme can further store the operation data in a corresponding asset block chain in a uplink mode.
The specific implementation manner of step S4 based on the above embodiment may be:
s41, acquiring the current grade of the current network, and taking the digital asset corresponding to the allowed network group as an operation asset if the allowed network corresponding to the current grade exists in the allowed network group.
It will be appreciated that if there is a permitted network corresponding to the current level in the permitted network group, the current network is described as being capable of access operations to the corresponding digital asset, and thus the digital asset corresponding to the corresponding permitted network group may be used as the operation asset.
S42, the initial interface is called, and the initial interface is updated based on the operation asset to obtain an operation interface and the operation interface is sent to the operation end.
In practical application, the operation interface may include a plurality of operation assets, so that the operation end may perform corresponding operation processing on the corresponding operation assets through the operation interface.
By the method, the operation assets corresponding to the operation ends can be obtained quickly, efficiency in acquiring the operation assets is improved, and operation data of a plurality of operation ends can be traced.
Referring to fig. 2, a schematic structural diagram of a decentralized management device for a digital asset platform according to an embodiment of the invention is provided, where the decentralized management device for a digital asset platform includes:
the configuration module is used for receiving initial grade information configured by the management end on each digital asset, updating the initial grade information according to a reverse updating strategy to obtain current grade information of each digital asset, and determining an allowed network group corresponding to each digital asset based on the current grade information;
the verification module is used for responding to an operation request of an operation end, carrying out primary verification on the operation end to obtain a primary verification result, and sending a trigger network of a preset network group to the operation end according to the primary verification result, wherein the trigger network is the lowest-level network in the preset network group;
the switching module is used for acquiring the secondary verification information of the triggering network by the operation end, invoking a step-by-step switching strategy according to the secondary verification information, and processing the upgrading request and the grade configuration information of the operation end to obtain the current network of the operation end;
And the operation module is used for determining operation assets according to the current network and the allowed network groups corresponding to the digital assets, generating an operation interface corresponding to the operation assets, sending the operation interface to the operation end, receiving operation data of the operation end on the operation assets, and storing the operation data in a uplink mode to a corresponding asset block chain.
The invention also provides an electronic device, comprising: a processor, a memory and a computer program; the memory is used for storing the computer program, and the memory can also be a flash memory (flash). Such as application programs, functional modules, etc. implementing the methods described above.
And the processor is used for executing the computer program stored in the memory to realize each step executed by the equipment in the method. Reference may be made in particular to the description of the embodiments of the method described above.
In the alternative, the memory may be separate or integrated with the processor.
When the memory is a device separate from the processor, the apparatus may further include:
and the bus is used for connecting the memory and the processor.
The present invention also provides a readable storage medium having stored therein a computer program for implementing the methods provided by the various embodiments described above when executed by a processor.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media can be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. In the alternative, the readable storage medium may be integral to the processor. The processor and the readable storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuits, ASIC for short). In addition, the ASIC may reside in a user device. The processor and the readable storage medium may reside as discrete components in a communication device. The readable storage medium may be read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tape, floppy disk, optical data storage device, etc.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, the execution instructions being executed by the at least one processor to cause the device to implement the methods provided by the various embodiments described above.
In the above embodiment of the apparatus, it should be understood that the processor may be a central processing unit (english: central Processing Unit, abbreviated as CPU), or may be other general purpose processors, digital signal processors (english: digital Signal Processor, abbreviated as DSP), application specific integrated circuits (english: application Specific Integrated Circuit, abbreviated as ASIC), or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.

Claims (8)

1. A method for decentralized management of a digital asset platform, comprising:
receiving initial grade information configured by a management end for each digital asset, updating the initial grade information according to a reverse updating strategy to obtain current grade information of each digital asset, and determining an allowed network group corresponding to each digital asset based on the current grade information;
performing primary verification on an operation terminal in response to an operation request of the operation terminal to obtain a primary verification result, and sending a trigger network of a preset network group to the operation terminal according to the primary verification result, wherein the trigger network is the lowest-level network in the preset network group;
acquiring secondary verification information of the triggering network by the operation end, and invoking a step-by-step switching strategy according to the secondary verification information to process an upgrading request and grade configuration information of the operation end so as to obtain a current network of the operation end;
determining an operation asset according to the current network and the allowed network group corresponding to each digital asset, generating an operation interface corresponding to the operation asset, sending the operation interface to the operation end, receiving operation data of the operation end on the operation asset, and storing the operation data in an uplink to a corresponding asset block chain;
Receiving initial grade information configured by a management end for each digital asset, updating the initial grade information according to a reverse updating strategy to obtain current grade information of each digital asset, and determining an allowed network group corresponding to each digital asset based on the current grade information, wherein the method comprises the following steps:
receiving initial grade information configured by a management end for each digital asset, and obtaining initial grade corresponding to the corresponding digital asset according to the initial grade information;
obtaining preset grades corresponding to all preset networks in the preset network group, and arranging all the preset grades from low grade to high grade to obtain a reverse grade sequence;
selecting a preset grade corresponding to the initial grade in the reverse grade sequence as a first target grade, and selecting a preset grade located behind the first target grade in the reverse grade sequence as a second target grade;
obtaining current grade information of the corresponding digital asset according to the first target grade and the second target grade;
acquiring a preset network corresponding to the current grade information in the preset network group as an allowed network, and generating an allowed network group corresponding to the digital asset according to the allowed network;
Responding to an operation request of an operation end, performing primary verification on the operation end to obtain a primary verification result, and sending a trigger network of a preset network group to the operation end according to the primary verification result, wherein the trigger network is the lowest-level network in the preset network group, and the method comprises the following steps:
responding to an operation request of an operation end, acquiring identity information of the operation end, calling a preset identity table, and performing primary verification on the operation end according to the identity information and the preset identity table;
if the preset identity information corresponding to the identity information exists in the preset identity table, verification passing information is generated, and the primary verification result comprises verification passing information;
acquiring a lowest-level network with a lowest preset level in the preset network group as a trigger network based on the verification passing information, and sending the trigger network to the operation end;
acquiring secondary verification information of the triggering network by the operation end, invoking a step-by-step switching strategy according to the secondary verification information, and processing upgrading request and grade configuration information of the operation end to obtain a current network of the operation end, wherein the method comprises the following steps:
acquiring a network key input by the operation end to the trigger network, and acquiring secondary verification information according to key passing information of the network key;
Acquiring an upgrade request of the operation end based on the secondary verification information, determining a verification network corresponding to the upgrade request, and performing step-by-step switching verification on the verification network according to the grade configuration information and the upgrade request to obtain a current network corresponding to the operation end;
acquiring an upgrade request of the operation end based on the secondary verification information, determining a verification network corresponding to the upgrade request, and performing step-by-step verification on the verification network according to the grade configuration information and the upgrade request to obtain a current network corresponding to the operation end, wherein the step-by-step verification comprises the steps of:
responding to the upgrading request, acquiring a preset network with a preset level on the trigger network in the preset network group as a verification network, and determining the preset level of the verification network as a verification level;
if the configuration level corresponding to the verification level exists in the level configuration information, the verification network is sent to the operation end, and the level configuration information comprises a plurality of configuration levels corresponding to the operation end;
acquiring three-level verification information of the operation end on the verification network, acquiring an upgrade request of the operation end based on the three-level verification information, and determining a preset network which is positioned at a preset level on the verification network in the preset network group as a next verification network;
Repeating the step of obtaining the next verification network until the operation end stops inputting the upgrading request or the configuration level corresponding to the verification level does not exist in the level configuration information, stopping repeating, and obtaining the verification network corresponding to the last upgrading request of the operation end as the current network.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
before the upgrade request and the grade configuration information of the operation end are processed by retrieving the step-by-step switching strategy according to the second-level verification information, the method further comprises the following steps:
acquiring authorization information of a dynamic configuration end to the operation end, and acquiring authorization data corresponding to the operation end according to the authorization information;
determining a position column corresponding to a preset locating word in the authorization data as a target column, acquiring target information of the target column, and performing grade analysis on the target information to obtain the highest grade;
updating the highest level based on a forward updating strategy to obtain a plurality of configuration levels, and obtaining level configuration information corresponding to the operation end according to the configuration levels;
invoking an authorization key table configured by the dynamic configuration end, and acquiring a grade interception line corresponding to each configuration grade in the grade configuration information in the authorization key table, wherein the authorization key table comprises a plurality of grade interception lines corresponding to preset grades;
Intercepting configuration keys of each configuration level in the authorization key table according to the level intercepting line to obtain a plurality of sub-key information, summarizing the plurality of sub-key information to obtain key information, and sending the key information to the corresponding operation end;
and generating summary information according to the grade configuration information corresponding to each operation end and sending the summary information to the dynamic configuration end.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
updating the highest level based on a forward updating strategy to obtain a plurality of configuration levels, and obtaining level configuration information corresponding to the operation end according to the configuration levels, wherein the level configuration information comprises;
the preset grades of all preset networks in the preset network group are arranged according to the grades from high to low to obtain a forward grade sequence;
selecting a preset grade corresponding to the highest grade in the forward grade sequence and a preset grade positioned behind the highest grade in the forward grade sequence as configuration grades;
and obtaining grade configuration information corresponding to the operation end according to the configuration grade.
4. The method of claim 2, wherein the step of determining the position of the substrate comprises,
generating summary information according to the grade configuration information corresponding to each operation end, and sending the summary information to the dynamic configuration end, wherein the method comprises the following steps:
A preset information filling table is called, wherein the information filling table comprises a plurality of main body filling areas, and a grade filling area and an authorized filling area corresponding to each main body filling area;
acquiring main body information corresponding to each operation end, and filling each main body information in the main body filling area;
filling the grade configuration information corresponding to each operation end into a grade filling area corresponding to the corresponding main body filling area;
filling the authorization data corresponding to each operation end into the authorization filling area corresponding to the corresponding main body filling area to obtain an information summary table, obtaining summary information according to the information summary table, and sending the summary information to the dynamic configuration end.
5. The method of claim 1, wherein the step of determining the position of the substrate comprises,
determining operation assets according to the current network and the allowed network group corresponding to each digital asset, generating an operation interface corresponding to the operation assets, and sending the operation interface to the operation terminal, wherein the operation interface comprises:
acquiring the current grade of the current network, and taking the digital asset corresponding to the allowed network group as an operation asset if the allowed network corresponding to the current grade exists in the allowed network group;
and calling an initial interface, updating the initial interface based on the operation asset to obtain an operation interface, and sending the operation interface to the operation terminal.
6. A decentralized management device for a digital asset platform, comprising:
the configuration module is used for receiving initial grade information configured by the management end on each digital asset, updating the initial grade information according to a reverse updating strategy to obtain current grade information of each digital asset, and determining an allowed network group corresponding to each digital asset based on the current grade information;
the verification module is used for responding to an operation request of an operation end, carrying out primary verification on the operation end to obtain a primary verification result, and sending a trigger network of a preset network group to the operation end according to the primary verification result, wherein the trigger network is the lowest-level network in the preset network group;
the switching module is used for acquiring the secondary verification information of the triggering network by the operation end, invoking a step-by-step switching strategy according to the secondary verification information, and processing the upgrading request and the grade configuration information of the operation end to obtain the current network of the operation end;
the operation module is used for determining operation assets according to the current network and the allowed network groups corresponding to the digital assets, generating an operation interface corresponding to the operation assets, sending the operation interface to the operation end, receiving operation data of the operation end on the operation assets, and storing the operation data in a uplink mode to a corresponding asset block chain;
Receiving initial grade information configured by a management end for each digital asset, updating the initial grade information according to a reverse updating strategy to obtain current grade information of each digital asset, and determining an allowed network group corresponding to each digital asset based on the current grade information, wherein the method comprises the following steps:
receiving initial grade information configured by a management end for each digital asset, and obtaining initial grade corresponding to the corresponding digital asset according to the initial grade information;
obtaining preset grades corresponding to all preset networks in the preset network group, and arranging all the preset grades from low grade to high grade to obtain a reverse grade sequence;
selecting a preset grade corresponding to the initial grade in the reverse grade sequence as a first target grade, and selecting a preset grade located behind the first target grade in the reverse grade sequence as a second target grade;
obtaining current grade information of the corresponding digital asset according to the first target grade and the second target grade;
acquiring a preset network corresponding to the current grade information in the preset network group as an allowed network, and generating an allowed network group corresponding to the digital asset according to the allowed network;
Responding to an operation request of an operation end, performing primary verification on the operation end to obtain a primary verification result, and sending a trigger network of a preset network group to the operation end according to the primary verification result, wherein the trigger network is the lowest-level network in the preset network group, and the method comprises the following steps:
responding to an operation request of an operation end, acquiring identity information of the operation end, calling a preset identity table, and performing primary verification on the operation end according to the identity information and the preset identity table;
if the preset identity information corresponding to the identity information exists in the preset identity table, verification passing information is generated, and the primary verification result comprises verification passing information;
acquiring a lowest-level network with a lowest preset level in the preset network group as a trigger network based on the verification passing information, and sending the trigger network to the operation end;
acquiring secondary verification information of the triggering network by the operation end, invoking a step-by-step switching strategy according to the secondary verification information, and processing upgrading request and grade configuration information of the operation end to obtain a current network of the operation end, wherein the method comprises the following steps:
acquiring a network key input by the operation end to the trigger network, and acquiring secondary verification information according to key passing information of the network key;
Acquiring an upgrade request of the operation end based on the secondary verification information, determining a verification network corresponding to the upgrade request, and performing step-by-step switching verification on the verification network according to the grade configuration information and the upgrade request to obtain a current network corresponding to the operation end;
acquiring an upgrade request of the operation end based on the secondary verification information, determining a verification network corresponding to the upgrade request, and performing step-by-step verification on the verification network according to the grade configuration information and the upgrade request to obtain a current network corresponding to the operation end, wherein the step-by-step verification comprises the steps of:
responding to the upgrading request, acquiring a preset network with a preset level on the trigger network in the preset network group as a verification network, and determining the preset level of the verification network as a verification level;
if the configuration level corresponding to the verification level exists in the level configuration information, the verification network is sent to the operation end, and the level configuration information comprises a plurality of configuration levels corresponding to the operation end;
acquiring three-level verification information of the operation end on the verification network, acquiring an upgrade request of the operation end based on the three-level verification information, and determining a preset network which is positioned at a preset level on the verification network in the preset network group as a next verification network;
Repeating the step of obtaining the next verification network until the operation end stops inputting the upgrading request or the configuration level corresponding to the verification level does not exist in the level configuration information, stopping repeating, and obtaining the verification network corresponding to the last upgrading request of the operation end as the current network.
7. An electronic device, comprising: a memory, a processor and a computer program stored in the memory, the processor running the computer program to perform the method of any one of claims 1 to 5.
8. A readable storage medium, characterized in that the readable storage medium has stored therein a computer program for implementing the method of any of claims 1 to 5 when being executed by a processor.
CN202311547839.2A 2023-11-20 2023-11-20 Decentralization management method and device for digital asset platform Active CN117272278B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311547839.2A CN117272278B (en) 2023-11-20 2023-11-20 Decentralization management method and device for digital asset platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311547839.2A CN117272278B (en) 2023-11-20 2023-11-20 Decentralization management method and device for digital asset platform

Publications (2)

Publication Number Publication Date
CN117272278A CN117272278A (en) 2023-12-22
CN117272278B true CN117272278B (en) 2024-01-26

Family

ID=89217996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311547839.2A Active CN117272278B (en) 2023-11-20 2023-11-20 Decentralization management method and device for digital asset platform

Country Status (1)

Country Link
CN (1) CN117272278B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1636175A (en) * 2000-07-14 2005-07-06 阿塔博克公司 Controlling and managing digital assets
CN108683672A (en) * 2018-05-21 2018-10-19 华为技术有限公司 A kind of method and device of rights management
CN110750595A (en) * 2019-10-16 2020-02-04 西安交通大学 Double-layer Internet of things architecture based on credit degree-block chain
CN114826780A (en) * 2022-06-24 2022-07-29 中铱数字科技有限公司 Block chain based multi-level authority management system and method
CN116049875A (en) * 2022-12-29 2023-05-02 北京八分量信息科技有限公司 Block chain data security and privacy protection system based on decentralization technology
CN116938521A (en) * 2023-06-09 2023-10-24 北京理工大学 Distributed digital identity trusted authentication method based on hierarchical storage

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9253151B2 (en) * 2006-05-25 2016-02-02 International Business Machines Corporation Managing authentication requests when accessing networks
US10833861B2 (en) * 2017-11-28 2020-11-10 International Business Machines Corporation Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system
CN114866323B (en) * 2022-04-29 2023-09-29 华中科技大学 User-controllable privacy data authorization sharing system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1636175A (en) * 2000-07-14 2005-07-06 阿塔博克公司 Controlling and managing digital assets
CN108683672A (en) * 2018-05-21 2018-10-19 华为技术有限公司 A kind of method and device of rights management
CN110750595A (en) * 2019-10-16 2020-02-04 西安交通大学 Double-layer Internet of things architecture based on credit degree-block chain
CN114826780A (en) * 2022-06-24 2022-07-29 中铱数字科技有限公司 Block chain based multi-level authority management system and method
CN116049875A (en) * 2022-12-29 2023-05-02 北京八分量信息科技有限公司 Block chain data security and privacy protection system based on decentralization technology
CN116938521A (en) * 2023-06-09 2023-10-24 北京理工大学 Distributed digital identity trusted authentication method based on hierarchical storage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
多级数字文档安全管理***设计;戴江山, 肖军模, 尹鹏飞;情报科学(第09期);全文 *

Also Published As

Publication number Publication date
CN117272278A (en) 2023-12-22

Similar Documents

Publication Publication Date Title
CN110096857B (en) Authority management method, device, equipment and medium for block chain system
CN108305072B (en) Method, apparatus, and computer storage medium for deploying a blockchain network
CN110414268B (en) Access control method, device, equipment and storage medium
CN110310205B (en) Block chain data monitoring method, device, equipment and medium
CN111695156A (en) Service platform access method, device, equipment and storage medium
CN110008665B (en) Authority control method and device for blockchain
CN110839014B (en) Authentication method, authentication device, computer equipment and readable storage medium
US10379894B1 (en) Lineage-based trust for virtual machine images
CN111290742A (en) Parameter verification method and device, electronic equipment and readable storage medium
CN110532025B (en) Data processing method, device and equipment based on micro-service architecture and storage medium
CN110138767B (en) Transaction request processing method, device, equipment and storage medium
CN111431753A (en) Asset information updating method, device, equipment and storage medium
CN112073374B (en) Information interception method, device and equipment
CN104363112A (en) Parameter management method and parameter management device
CN113076248A (en) Application processing method, device and equipment and readable storage medium
CN117272278B (en) Decentralization management method and device for digital asset platform
US9800585B2 (en) Restricting access by services deployed on an application server
CN109582454A (en) Permission releasing control method, device and equipment in a kind of distributed storage cluster
CN113132114B (en) Method, device, medium and equipment for realizing multi-cloud-pipe unified interface gateway
CN111698227B (en) Information synchronization management method, device, computer system and readable storage medium
CN113592645A (en) Data verification method and device
CN108462713B (en) Method and system for client to perform credibility verification
CN117034210B (en) Event image generation method and device, storage medium and electronic equipment
US20220405195A1 (en) Secured code assignment and review engine
CN109446056B (en) Code verification method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant