CN109299053A - Operating method, equipment and the computer storage medium of file - Google Patents

Operating method, equipment and the computer storage medium of file Download PDF

Info

Publication number
CN109299053A
CN109299053A CN201811024883.4A CN201811024883A CN109299053A CN 109299053 A CN109299053 A CN 109299053A CN 201811024883 A CN201811024883 A CN 201811024883A CN 109299053 A CN109299053 A CN 109299053A
Authority
CN
China
Prior art keywords
file
network node
identification
result
status information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811024883.4A
Other languages
Chinese (zh)
Other versions
CN109299053B (en
Inventor
黄珂
邴建
杜杏兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201811024883.4A priority Critical patent/CN109299053B/en
Publication of CN109299053A publication Critical patent/CN109299053A/en
Application granted granted Critical
Publication of CN109299053B publication Critical patent/CN109299053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of operating method of file, equipment and computer storage mediums, by to each second network node broadcast files operational order, receive the file operation requests response that each second network node is sent, the result of consent document operation is included whether in file operation requests response, if the file operation requests response of each second network node is the result of consent document operation, operation then is executed to file, it avoids file arbitrarily to be distorted, wherein file is stored on the block chain of any one network node.This programme is based on block chain network and is managed to file, entire file management process does not depend on server end, each network node realizes the operation of file by way of sending the coalition signature agreement for requesting and obtaining other nodes to other network nodes, ensure that the safety and fairness of file management system.

Description

Operating method, equipment and the computer storage medium of file
Technical field
The present invention relates to file management fields more particularly to a kind of operating method of file, equipment and computer storage to be situated between Matter.
Background technique
Due to the continuous development of internet, people need to carry out storage and management to big data, to guarantee internet just Often operation.
Currently, the file management method being widely used is the mode that server end adds client, all file and shape State information, authority information are stored in server end, user to the increasing of file, delete, change, look into and the operations such as rights management need it is logical The mode for crossing user end to server transmission request is realized, once the file management system of server is maliciously tampered or server By hacker attack, virus infraction, then whole system can face paralysis and deathblow.
Therefore, the safety for how guaranteeing file management system, the technical issues of becoming this field urgent need to resolve.
Summary of the invention
In view of this, this application provides a kind of operating method of file, equipment and computer storage medium, it is existing to overcome There is the technical issues of safety for how guaranteeing file management system in technology.
In a first aspect, the embodiment of the present application provides a kind of operating method of file, comprising:
To each second network node broadcast files operational order, the file operation instruction includes: file identification, the first net Network node identification, operation mark, so that each second network node is according to the file identification, the first network node mark Know and the operation mark judges whether first network node has the permission for operating the file identification respective file;
The file operation requests response that each second network node is sent is received, includes being in the file operation requests response The result of no consent document operation;
If each second network node file operation requests response be consent document operation as a result, if to the file Execute operation;
The file is stored on the block chain of any one network node.
With reference to first aspect, the embodiment of the present application provides the first possible embodiment of first aspect, if described The file operation requests response of each second network node is consent document operation as a result, then further include:
Consent document operation information is broadcasted to each second network node, so that each second network node is local The file status information of the file identification prestored is revised as lock state by operable state;
Correspondingly, after the execution operation to the file, further includes:
It is executed to each second network node broadcast files operation and completes message, so that each second network node The file status information of the file identification locally prestored is revised as the operable state by the lock state.
With reference to first aspect or the first possible embodiment of first aspect, the embodiment of the present application provide first party The possible embodiment of second of face, it is described to each second network node broadcast files operational order, it specifically includes:
The first network node is obtained to the operation permission information and file status information of the file of the file identification;
If determining that the first network node has the operating right to the file and institute according to the operation permission information Stating file status information is operable state, then to each second network node broadcast files operational order.
With reference to first aspect, the embodiment of the present application provides the third possible embodiment of first aspect, if described File operation instruction is to increase file operation instruction, then described to execute operation to the file, specifically includes:
File storage is connected to block chain rear end into block, and by the block;
If the file operation instruction is checks that file operation instructs, described to execute operation to the file, specific to wrap It includes:
The file is obtained from the block chain according to the file identification;
The file of the file identification is shown;
If the file operation instruction is modification file operation instruction, described to execute operation to the file, specific to wrap It includes:
File storage is connected to block chain rear end into block, and by the block;
The storage address of modified file is broadcasted to each second network node.
Second aspect, the embodiment of the present application provide a kind of operating method of file, comprising:
Receiving the file operation instruction that first network node is sent, file operation instruction includes: file identification, and first Network node mark, operation mark;
According to the file identification, the first network node identification and the operation mark judge the first network section Whether point has the permission for operating the file identification respective file;
Whether there is the permission build consent document for operating the file identification respective file according to the first network node The result of operation and the result for disagreeing file operation;
File operation requests response is sent to the first network node, is included whether in the file operation requests response The result of consent document operation.
In conjunction with second aspect, the embodiment of the present application provides the first possible embodiment of second aspect, it is described to The first network node sends file operation requests response, includes whether that consent document is grasped in the file operation requests response After the result of work, further includes:
Receive the consent document operation information that the first network node is sent;
The file status information of the file identification locally prestored is revised as lock state by operable state.
In conjunction with the first possible embodiment of second aspect, the embodiment of the present application provides second of second aspect Possible embodiment, further includes:
The file operation for receiving first network node broadcasts, which executes, completes message;
The file status information of the file identification locally prestored is revised as described to operate by the lock state State.
In conjunction with second of possible embodiment of second aspect to second aspect, the embodiment of the present application provides second party The third possible embodiment in face, before the file operation instruction for receiving the transmission of first network node, further includes:
The file operation of each file is weighed the first network node and each second network node is locally stored The status information of limit information and each file.
The third aspect, the embodiment of the present application provide a kind of first network node device, comprising: memory and processor;
The memory, for storing computer program;
Wherein, the processor executes the computer program in the memory, to realize above-mentioned first aspect to first Method described in the third possible embodiment of aspect.
Fourth aspect, the embodiment of the present application provide a kind of second apparatus for network node, comprising: memory and processor;
The memory, for storing computer program;
Wherein, the processor executes the computer program in the memory, to realize above-mentioned second aspect to second Method described in the third possible embodiment of aspect.
5th aspect, the embodiment of the present application provide a kind of computer storage medium, the computer readable storage medium In be stored with computer program, for realizing above-mentioned first aspect to first aspect when the computer program is executed by processor The third possible embodiment described in method.
6th aspect, the embodiment of the present application provide a kind of computer storage medium, the computer readable storage medium In be stored with computer program, for realizing above-mentioned second aspect to second aspect when the computer program is executed by processor The third possible embodiment described in method.
Operating method, equipment and the computer storage medium of file provided by the present application, by each second network node Broadcast files operational order, file operation instruction include: file identification, first network node identification, operation mark, so that Whether each second network node judges first network node according to file identification, first network node identification and the operation mark There is the permission for operating the file identification respective file, receives the file operation requests response that each second network node is sent, text Part operation requests response in include whether consent document operation as a result, if the file operation requests of each second network node respond It is that consent document operates as a result, then executing operation to file, avoids file and arbitrarily distorted, file is stored in any one On the block chain of a network node.This programme is based on block chain network and is managed to file, and entire file management process is disobeyed Rely server end, each network node is to the operation of file by sending request to other network nodes and obtaining other nodes The mode that coalition signature is agreed to is realized, ensure that the safety and fairness of file management system.
Detailed description of the invention
Fig. 1 is the flow diagram of the operating method for the file that the embodiment of the present invention one provides;
Fig. 2 is the flow diagram of the operating method of file provided by Embodiment 2 of the present invention;
Fig. 3 is the flow diagram of the operating method for the file that the embodiment of the present invention three provides;
Fig. 4 is the flow diagram of the operating method for the file that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the first network node device that the embodiment of the present application five provides;
Fig. 6 is the structural schematic diagram for the second apparatus for network node that the embodiment of the present application six provides.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail.These attached drawings It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
The term " includes " of description and claims of this specification and " having " and their any deformation, it is intended that Be to cover it is non-exclusive include, for example, the device of the process or structure that contain series of steps is not necessarily limited to clearly arrange Those of out structure or step but may include other steps being not clearly listed or intrinsic for these processes or device Rapid or structure.
Block chain is a kind of novel decentralization agreement, storage file or other data, information can not safely can be forged With distort, can be performed automatically intelligent contract, the audit without any centralization mechanism.In conjunction with block chain technology, the present invention is mentioned Following examples are gone out.
Embodiment one
Fig. 1 is the flow diagram of the operating method for the file that the embodiment of the present invention one provides, as shown in Figure 1, this method The following steps are included:
S101, to each second network node broadcast files operational order, file operation instruction includes: file identification, first Network node mark, operation mark, so that each second network node is according to file identification, first network node identification and operation mark Know the permission for judging whether first network node has operation file mark respective file.
Specifically, two network nodes are included at least in the block chain network of the present embodiment, each network node is corresponding Unique mark, be known as first network node for the network node of broadcast files operational order, by block chain network except the Other network nodes except one network node are known as the second network node.All Files are stored in any one network node On block chain, and each file is to corresponding unique mark.Provide that each network node has certain operating right to file, The operating right may include increasing to file, delete, changes, look into, it will be understood that every kind of operating right all corresponds to the phase of block chain It should operate, and corresponding unique operation mark.In this step, each second network node requests to grasp according to first network node The operating right of the file identification of work and first network node judges whether first network node has operation file mark pair Answer the permission of file.
S102, the file operation requests response that each second network node is sent is received, includes in file operation requests response Whether consent document operation result.
Specifically, each second network node judges whether first network node has the permission of operation file mark respective file Later, if first network node has corresponding authority, return to first network node consent document operation as a result, if the first net Network node does not have corresponding authority, then returns to the result that first network node disagrees file operation.
S103, if each second network node file operation requests response be consent document operation as a result, if to text Part executes operation.
Specifically, if the return of all second network nodes is all the knot agreeing to first network node and being operated to file Fruit, then first network node executes operation to file.It is appreciated that if not the return of all second network nodes is all to agree to First network node to file operated as a result, then first network node cannot execute operation to file, passed through with this The safety of block chain guarantee file management system.
In practical application, the executing subject of the present embodiment can be first network node device.In practical applications, this One apparatus for network node can be realized by being integrated with the related entity apparatus for executing code, for example, intelligent terminal, various computer Deng.
Example is carried out in conjunction with actual scene: practical by taking the executing subject of the present embodiment is first network node device as an example In, by taking first network node A carries out delete operation to file 01 as an example.First network node A is to each second network node Broadcast files operational order, this document operational order include: file identification 01, first network node identification A, operation mark SC. Through each second network node according to file identification 01, the judgement of first network node identification A and operation mark SC, first network section Point A has the permission for deleting file 01, then returns to the response for agreeing to that first network node A deletes file 01.First network node A connects Receive the file operation requests response that each second network node returns.Confirm that the file operation requests response of each second network node is equal It is agreement first network node A deletion file 01 as a result, then executing delete operation to file 01.
The operating method of file provided in this embodiment, by each second network node broadcast files operational order, with So that each second network node is judged whether first network node has the permission of operation corresponding document, receives each second network node hair The file operation requests response sent, if the file operation requests response of each second network node is the knot of consent document operation Fruit then executes operation to file, avoids file and is arbitrarily distorted, wherein file is stored in the block of any one network node On chain.This programme is based on block chain network and is managed to file, and entire file management process does not depend on server end, each net Network node is to the operation of file by sending the side for requesting and obtaining the coalition signature of other nodes and agree to other network nodes Formula is realized, ensure that the safety and fairness of file management system.
Embodiment two
Fig. 2 is the flow diagram of the operating method of file provided by Embodiment 2 of the present invention, as shown in Fig. 2, this method It may comprise steps of:
S201, first network node is obtained to the operation permission information and file status information of the file of file identification.
If S202, determining that first network node has operating right and the file status letter to file according to operation permission information Breath is operable state, then to each second network node broadcast files operational order.
S203, the file operation requests response that each second network node is sent is received, includes in file operation requests response Whether consent document operation result.
Specifically, the all-network node in block chain network locally all prestores the file identification and correspondence of All Files File status information and each network node to the operation permission information of this document.First network node refers in broadcast files operation Before order, the file status and the operating right of itself for treating operation file are inquired.If determining according to operation permission information It is operable state that one network node, which has to the operating right and file status information of file, then broadcasts to each second network node File operation instruction.The file operation requests response that each second network node is sent is received, includes in file operation requests response Whether consent document operation result.
S204, if each second network node file operation requests response be consent document operation as a result, if to each Second network node broadcasts consent document operation information, so that the file for the file identification that each second network node locally prestores Status information is revised as lock state by operable state.
S205, operation is executed to file.
S206, it operates to execute to each second network node broadcast files and completes message, so that each second network node sheet The file status information for the file identification that ground prestores is revised as the operable state by the lock state.
Specifically, in order to avoid other nets when first network node executes file and operates, in the second network node Network node also requests to execute operation to file, if then the file operation requests response of each second network node is consent document behaviour Make as a result, the consent document operation information is broadcasted to each second network node first, so that each second network node is local The file status information of the file identification prestored is revised as lock state by operable state, when file is in the lock state, Other network nodes cannot then obtain consent document operation information, so that multiple network nodes be avoided to operate simultaneously to file Lead to first network node file operation failure.Correspondingly, after the completion of file operation, first network node is to each second network Node broadcasts file operation, which executes, completes message, so that the file for the respective file mark that each second network node locally prestores Status information is revised as operable state by lock state.
Further, file operation instruction can be specially to increase file, check file, modification file etc..Preferably, exist On the basis of above-described embodiment one, this method can also include:
If executing the step of operating to file when a, file operation instruction is increases file operation instruction, specifically can wrap It includes: file storage is connected to block chain rear end into block, and by block.
If b, the file operation instruction executes the step of operating to file, specifically may be used to check that file operation is instructed To include: to obtain respective file from block chain according to file identification, the file of file identification is shown.
If c, file operation instruction is modification file operation instruction, the step of operating, is executed to file, specifically can wrap It includes: file storage being connected to block chain rear end into block, and by block, broadcasts modified text to each second network node The storage address of part, so that each network node can find the modified file according to the storage address of file.
The operating method of file provided in this embodiment is locally prestored by the all-network node in block chain network The file identification of All Files and corresponding file status information and each network node are to the operation permission information of this document, in turn First network node can broadcast consent document operation information to each second network node, so that each second network node is local The file status information of the file identification prestored is revised as lock state by operable state, to avoid multiple network nodes same When to file carry out operation lead to first network node file operation failure.This programme is based on block chain network and carries out pipe to file Reason, entire file management process do not depend on server end, and each network node is to the operation of file by other network nodes The mode for sending the coalition signature agreement for requesting and obtaining other nodes is realized, ensure that the safety and public affairs of file management system Levelling.
Embodiment three
Fig. 3 is the flow diagram of the operating method for the file that the embodiment of the present invention three provides, as shown in figure 3, this method Include:
S301, the file operation instruction that first network node is sent being received, file operation instruction includes: file identification, the One network node mark, operation mark.
S302, judge whether first network node has behaviour according to file identification, first network node identification and operation mark Make the permission of file identification respective file.
S303, the permission build consent document operation for whether having operation file mark respective file according to first network node Result and disagree the result of file operation.
S304, file operation requests response is sent to first network node, include whether in file operation requests response same The result of meaning file operation.
In practical application, the executing subject of the present embodiment can be the second apparatus for network node.In practical applications, this Two apparatus for network node can be realized by being integrated with the related entity apparatus for executing code, for example, intelligent terminal, various computer Deng.
Specifically, file identification and first network node that the second network node is operated according to the request of first network node Operating right come judge first network node whether have operation file mark respective file permission, if first network node has Corresponding authority, then return to the operation of first network node consent document as a result, if first network node does not have corresponding authority, Return to the result that first network node disagrees file operation.
The operating method of file provided in this embodiment receives the file operation instruction that first network node is sent, file Operational order includes: file identification, first network node identification, operation mark.According to file identification, first network node identification And operation mark judges whether first network node has the permission of operation file mark respective file.It is according to first network node The result of the no permission build consent document operation for having operation file mark respective file and the result for disagreeing file operation.To First network node sends file operation requests response, and the knot of consent document operation is included whether in file operation requests response Fruit.This programme is based on block chain network and is managed to file, and entire file management process does not depend on server end, each network Node is to the operation of file by way of sending the coalition signature agreement for requesting and obtaining other nodes to other network nodes It realizes, ensure that the safety and fairness of file management system.
Example IV
Fig. 4 is the flow diagram of the operating method for the file that the embodiment of the present invention four provides, on the basis of embodiment three On, as shown in figure 4, can also include: after step S304
S401, the consent document operation information that first network node is sent is received.
S402, the file status information of the file identification locally prestored is revised as lock state by operable state.
S403, the file operation for receiving first network node broadcasts, which execute, completes message.
S404, the file status information of the file identification locally prestored is revised as operable state by lock state.
Before step S301, can also include:
S405, first network node and each second network node is being locally stored to the file operation permission letter of each file The status information of breath and each file.
Specifically, the content of the present embodiment has detailed narration in above-described embodiment one and embodiment two, herein no longer It repeats.
First network node and each second network node pair is being locally stored in the operating method of file provided in this embodiment The file operation authority information of each file and the status information of each file, and then the second network node can be according to the first net Other second network node consent document operation informations of network node broadcasts believe the file status of the file identification locally prestored Breath is revised as lock state by operable state, so that avoiding multiple network nodes from carrying out operation to file simultaneously leads to the first net Network node file operation failure.This programme is based on block chain network and is managed to file, and entire file management process does not depend on Server end, each network node is to the operation of file by sending request to other network nodes and obtaining the connection of other nodes It closes the mode to consent by signature to realize, ensure that the safety and fairness of file management system.
Following is the application Installation practice, can be used for executing the application embodiment of the method.It is real for the application device Undisclosed details in example is applied, the application embodiment of the method is please referred to.
Embodiment five
Fig. 5 is the structural schematic diagram for the first network node device that the embodiment of the present application five provides.As shown in figure 5, first Apparatus for network node includes: memory 501 and processor 502;
Memory 501, for storing computer program.
Wherein, processor 502 executes the computer program in memory 501, to realize such as embodiment one and embodiment two Method.
Embodiment six
Fig. 6 is the structural schematic diagram for the second apparatus for network node that the embodiment of the present application six provides.As shown in fig. 6, second Apparatus for network node includes: memory 601 and processor 602;
Memory 601, for storing computer program.
Wherein, processor 602 executes the computer program in memory 601, to realize such as embodiment three and example IV Method.
Embodiment seven
The embodiment of the present application seven provides a kind of computer storage medium, is stored in the computer readable storage medium Computer program, for realizing the method for such as embodiment one and embodiment two when computer program is executed by processor.
Embodiment eight
The embodiment of the present application eight provides a kind of computer storage medium, is stored in the computer readable storage medium Computer program, for realizing the method for such as embodiment three and example IV when computer program is executed by processor.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description Specific work process, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or The various media that can store program code such as person's CD.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (12)

1. a kind of operating method of file characterized by comprising
To each second network node broadcast files operational order, the file operation instruction includes: file identification, first network section Point identification, operation mark so that each second network node is according to the file identification, the first network node identification and The operation mark judges whether first network node has the permission for operating the file identification respective file;
The file operation requests response that each second network node is sent is received, is included whether in the file operation requests response same The result of meaning file operation;
If each second network node file operation requests response be consent document operation as a result, if to the file execute Operation;
The file is stored on the block chain of any one network node.
2. the method according to claim 1, wherein if the file operation requests of each second network node are rung It should be consent document operation as a result, then further include:
Consent document operation information is broadcasted to each second network node, so that each second network node locally prestores The file status information of the file identification lock state is revised as by operable state;
Correspondingly, after the execution operation to the file, further includes:
It is executed to each second network node broadcast files operation and completes message, so that each second network node is local The file status information of the file identification prestored is revised as the operable state by the lock state.
3. method according to claim 1 or 2, which is characterized in that described to be operated to each second network node broadcast files Instruction, specifically includes:
The first network node is obtained to the operation permission information and file status information of the file of the file identification;
If determining that the first network node has the operating right to the file and the text according to the operation permission information Part status information is operable state, then to each second network node broadcast files operational order.
4. the method according to claim 1, wherein if file operation instruction refers to increase file operation It enables, then it is described that operation is executed to the file, it specifically includes:
File storage is connected to block chain rear end into block, and by the block;
If the file operation instruction is checks that file operation instructs, described to execute operation to the file, specifically include:
The file is obtained from the block chain according to the file identification;
The file of the file identification is shown;
If the file operation instruction is modification file operation instruction, described to execute operation to the file, specifically include:
File storage is connected to block chain rear end into block, and by the block;
The storage address of modified file is broadcasted to each second network node.
5. a kind of operating method of file characterized by comprising
The file operation instruction that first network node is sent is received, the file operation instruction includes: file identification, first network Node identification, operation mark;
According to the file identification, the first network node identification and the operation mark judge that the first network node is It is no to have the permission for operating the file identification respective file;
Whether there is the permission build consent document operation for operating the file identification respective file according to the first network node Result and disagree the result of file operation;
File operation requests response is sent to the first network node, includes whether to agree in the file operation requests response The result of file operation.
6. according to the method described in claim 5, it is characterized in that, described ask to first network node transmission file operation Response is asked, after the result that consent document operation is included whether in the file operation requests response, further includes:
Receive the consent document operation information that the first network node is sent;
The file status information of the file identification locally prestored is revised as lock state by operable state.
7. according to the method described in claim 6, it is characterized by further comprising:
The file operation for receiving first network node broadcasts, which executes, completes message;
The file status information of the file identification locally prestored is revised as the operable state by the lock state.
8. according to the described in any item methods of claim 5-7, which is characterized in that the text for receiving first network node and sending Before part operational order, further includes:
The file operation permission of each file is believed the first network node and each second network node is locally stored The status information of breath and each file.
9. a kind of first network node device, comprising: memory and processor;
The memory, for storing computer program;
Wherein, the processor executes the computer program in the memory, to realize such as any one of claim 1-4 institute The method stated.
10. a kind of second apparatus for network node, comprising: memory and processor;
The memory, for storing computer program;
Wherein, the processor executes the computer program in the memory, to realize such as any one of claim 5-8 institute The method stated.
11. a kind of computer storage medium, which is characterized in that be stored with computer journey in the computer readable storage medium Sequence, for realizing method such as of any of claims 1-4 when the computer program is executed by processor.
12. a kind of computer storage medium, which is characterized in that be stored with computer journey in the computer readable storage medium Sequence, for realizing the method as described in any one of claim 5-8 when the computer program is executed by processor.
CN201811024883.4A 2018-09-04 2018-09-04 File operation method, device and computer storage medium Active CN109299053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811024883.4A CN109299053B (en) 2018-09-04 2018-09-04 File operation method, device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811024883.4A CN109299053B (en) 2018-09-04 2018-09-04 File operation method, device and computer storage medium

Publications (2)

Publication Number Publication Date
CN109299053A true CN109299053A (en) 2019-02-01
CN109299053B CN109299053B (en) 2021-03-02

Family

ID=65166165

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811024883.4A Active CN109299053B (en) 2018-09-04 2018-09-04 File operation method, device and computer storage medium

Country Status (1)

Country Link
CN (1) CN109299053B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019179536A3 (en) * 2019-07-03 2020-04-30 Alibaba Group Holding Limited Mutual aid network based on smart contract and blockchain
CN112243008A (en) * 2020-10-16 2021-01-19 中国联合网络通信集团有限公司 Data management method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971033A (en) * 2014-05-23 2014-08-06 武汉华亚兴通信息技术有限公司 Digital rights management method for solving problem of illegal copying
CN106407681A (en) * 2016-09-19 2017-02-15 南京工业大学 Cloud system environment personal health record storage access method
CN106936585A (en) * 2017-03-09 2017-07-07 布比(北京)网络技术有限公司 Method and system that a kind of information voucher to distributed data is split and combined
WO2017202758A1 (en) * 2016-05-23 2017-11-30 Accenture Global Solutions Limited Multiple-link cryptologic blockchain
US20180039667A1 (en) * 2016-08-05 2018-02-08 Chicago Mercantile Exchange Inc. Systems and methods for blockchain rule synchronization
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971033A (en) * 2014-05-23 2014-08-06 武汉华亚兴通信息技术有限公司 Digital rights management method for solving problem of illegal copying
WO2017202758A1 (en) * 2016-05-23 2017-11-30 Accenture Global Solutions Limited Multiple-link cryptologic blockchain
US20180039667A1 (en) * 2016-08-05 2018-02-08 Chicago Mercantile Exchange Inc. Systems and methods for blockchain rule synchronization
CN106407681A (en) * 2016-09-19 2017-02-15 南京工业大学 Cloud system environment personal health record storage access method
CN106936585A (en) * 2017-03-09 2017-07-07 布比(北京)网络技术有限公司 Method and system that a kind of information voucher to distributed data is split and combined
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019179536A3 (en) * 2019-07-03 2020-04-30 Alibaba Group Holding Limited Mutual aid network based on smart contract and blockchain
US10783590B1 (en) 2019-07-03 2020-09-22 Alibaba Group Holding Limited Mutual aid network based on smart contract and blockchain
CN112243008A (en) * 2020-10-16 2021-01-19 中国联合网络通信集团有限公司 Data management method and device

Also Published As

Publication number Publication date
CN109299053B (en) 2021-03-02

Similar Documents

Publication Publication Date Title
US11212299B2 (en) System and method for monitoring security attack chains
US7743250B2 (en) Traffic manager for distributed computing environments
CN109361690B (en) Method and system for generating threat handling strategy in network
CN110838065A (en) Transaction data processing method and device
CN110168523A (en) Change monitoring to inquire across figure
CN109919771B (en) Industrial internet transaction device applying hierarchical block chain technology
CN104219316A (en) Method and device for processing call request in distributed system
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN112291264B (en) Security control method, device, server and storage medium
Shao et al. Blockchain-based SDN security guaranteeing algorithm and analysis model
US20180349983A9 (en) A system for periodically updating backings for resource requests
Li et al. A framework of blockchain-based collaborative intrusion detection in software defined networking
CN109299053A (en) Operating method, equipment and the computer storage medium of file
CN110110528A (en) Safety risk estimating method, device and the equipment of information system
CN112256498A (en) Fault processing method and device
CN108390886A (en) Educate big data secure access control system
CN107046546A (en) A kind of network safety control method and device
CN107249192A (en) A kind of method for monitoring state and device of shared network section
US7739328B1 (en) Traffic manager for distributed computing environments
CN115617781A (en) Digital object creating and data management method and device
CN115146943A (en) Method and device for processing alarm work order
CN114329602A (en) Access control method, server, electronic device and storage medium
JP4967056B2 (en) Policy determination apparatus, method, and program
CN116866091B (en) Firewall protection system, method, electronic equipment and storage medium
CN111967968A (en) Vulnerability processing method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant