CN109299053B - File operation method, device and computer storage medium - Google Patents

File operation method, device and computer storage medium Download PDF

Info

Publication number
CN109299053B
CN109299053B CN201811024883.4A CN201811024883A CN109299053B CN 109299053 B CN109299053 B CN 109299053B CN 201811024883 A CN201811024883 A CN 201811024883A CN 109299053 B CN109299053 B CN 109299053B
Authority
CN
China
Prior art keywords
file
network node
identifier
file operation
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811024883.4A
Other languages
Chinese (zh)
Other versions
CN109299053A (en
Inventor
黄珂
邴建
杜杏兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201811024883.4A priority Critical patent/CN109299053B/en
Publication of CN109299053A publication Critical patent/CN109299053A/en
Application granted granted Critical
Publication of CN109299053B publication Critical patent/CN109299053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention discloses a file operation method, equipment and a computer storage medium, wherein a file operation instruction is broadcasted to each second network node, a file operation request response sent by each second network node is received, the file operation request response comprises a result of whether to approve the file operation, if the file operation request response of each second network node is the result of approving the file operation, the file is operated, and the file is prevented from being randomly tampered, wherein the file is stored on a block chain of any one network node. According to the scheme, files are managed based on the block chain network, the whole file management process does not depend on a server side, the operation of each network node on the files is realized by sending requests to other network nodes and obtaining joint signature agreement of other nodes, and the safety and fairness of a file management system are guaranteed.

Description

File operation method, device and computer storage medium
Technical Field
The present invention relates to the field of file management, and in particular, to a file operating method, device, and computer storage medium.
Background
Due to the continuous development of the internet, people need to store and manage big data to ensure the normal operation of the internet.
At present, a widely adopted file management method is a mode of adding a server side and a client side, all files, state information and authority information are stored in the server side, operations of adding, deleting, modifying, checking, authority management and the like of a user on the files need to be realized by sending a request to the server through the client side, and once a file management system of the server is maliciously tampered or the server is attacked by hackers and viruses, the whole system can be confronted with paralysis and fatal attacks.
Therefore, how to ensure the security of the file management system becomes a technical problem to be solved urgently in the field.
Disclosure of Invention
In view of the above, the present application provides a file operating method, a file operating device, and a computer storage medium, so as to overcome the technical problem in the prior art how to ensure the security of a file management system.
In a first aspect, an embodiment of the present application provides a file operating method, including:
broadcasting a file operation instruction to each second network node, wherein the file operation instruction comprises: the file identifier, the first network node identifier and the operation identifier are used for enabling each second network node to judge whether the first network node has the authority of operating the file corresponding to the file identifier or not according to the file identifier, the first network node identifier and the operation identifier;
receiving a file operation request response sent by each second network node, wherein the file operation request response comprises a result of whether to agree with the file operation;
if the file operation request responses of the second network nodes are the result of the file operation agreement, executing the operation on the file;
the file is stored on a blockchain of any one of the network nodes.
With reference to the first aspect, an embodiment of the present application provides a first possible implementation manner of the first aspect, where if the file operation request responses of the second network nodes are results of the file operation approval, the method further includes:
broadcasting a file operation agreement message to each second network node, so that each second network node modifies the file state information of the file identifier prestored locally from an operable state to a locked state;
correspondingly, after the operation is performed on the file, the method further includes:
and broadcasting a file operation execution completion message to each second network node, so that each second network node modifies the file state information of the file identifier prestored locally from the locking state to the operable state.
With reference to the first aspect or the first possible implementation manner of the first aspect, an embodiment of the present application provides a second possible implementation manner of the first aspect, where broadcasting a file operation instruction to each second network node specifically includes:
acquiring operation authority information and file state information of the first network node on the file of the file identifier;
and if the first network node is determined to have the operation authority for the file according to the operation authority information and the file state information is in an operable state, broadcasting a file operation instruction to each second network node.
With reference to the first aspect, an embodiment of the present application provides a third possible implementation manner of the first aspect, where if the file operation instruction is an add file operation instruction, the performing operation on the file specifically includes:
storing the file into a block and connecting the block to a block chain back end;
if the file operation instruction is a view file operation instruction, the executing operation on the file specifically includes:
acquiring the file from the block chain according to the file identifier;
displaying the file of the file identifier;
if the file operation instruction is a modify file operation instruction, the executing operation on the file specifically includes:
storing the file into a block and connecting the block to a block chain back end;
broadcasting the storage address of the modified file to each second network node.
In a second aspect, an embodiment of the present application provides a file operating method, including:
receiving a file operation instruction sent by a first network node, wherein the file operation instruction comprises: file identification, first network node identification and operation identification;
judging whether the first network node has the authority to operate the file corresponding to the file identifier or not according to the file identifier, the first network node identifier and the operation identifier;
generating a result of agreeing to the file operation and a result of disagreeing with the file operation according to whether the first network node has the authority of operating the file corresponding to the file identifier;
and sending a file operation request response to the first network node, wherein the file operation request response comprises a result of whether the file operation is approved or not.
With reference to the second aspect, an embodiment of the present application provides a first possible implementation manner of the second aspect, where sending a file operation request response to the first network node, where the file operation request response includes a result of whether to approve a file operation, and then the method further includes:
receiving a file operation agreement message sent by the first network node;
and modifying the file state information of the file identifier prestored locally from an operable state into a locked state.
With reference to the first possible implementation manner of the second aspect, the present application provides a second possible implementation manner of the second aspect, and further includes:
receiving a file operation execution completion message broadcast by a first network node;
and modifying the file state information of the file identifier prestored locally from the locking state into the operable state.
With reference to the second aspect to the second possible implementation manner of the second aspect, an embodiment of the present application provides a third possible implementation manner of the second aspect, where before receiving the file operation instruction sent by the first network node, the method further includes:
and locally storing the file operation authority information of each file and the state information of each file by the first network node and each second network node.
In a third aspect, an embodiment of the present application provides a first network node device, including: a memory and a processor;
the memory for storing a computer program;
wherein the processor executes the computer program in the memory to implement the method described in the first to third possible implementation manners of the first aspect.
In a fourth aspect, an embodiment of the present application provides a second network node device, including: a memory and a processor;
the memory for storing a computer program;
wherein the processor executes the computer program in the memory to implement the method described in the third possible implementation manner of the second aspect to the second aspect.
In a fifth aspect, the present application provides a computer storage medium, where a computer program is stored in the computer storage medium, and the computer program is used, when executed by a processor, to implement the method described in the first aspect to the third possible implementation manner of the first aspect.
In a sixth aspect, the present application provides a computer storage medium, where a computer program is stored, and the computer program is used, when executed by a processor, to implement the method described in the second aspect to the third possible implementation manner of the second aspect.
According to the file operation method, the file operation device and the computer storage medium, the file operation instruction is broadcasted to each second network node, and the file operation instruction comprises the following steps: the file operation request response comprises a result of whether the file operation is agreed, if the file operation request response of each second network node is the result of agreeing the file operation, the file operation is executed on the file, the file is prevented from being tampered randomly, and the file is stored in a block chain of any one network node. According to the scheme, files are managed based on the block chain network, the whole file management process does not depend on a server side, the operation of each network node on the files is realized by sending requests to other network nodes and obtaining joint signature agreement of other nodes, and the safety and fairness of a file management system are guaranteed.
Drawings
Fig. 1 is a schematic flowchart of a file operating method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a file operating method according to a second embodiment of the present invention;
fig. 3 is a schematic flowchart of a file operating method according to a third embodiment of the present invention;
fig. 4 is a schematic flowchart of a file operating method according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a first network node device according to a fifth embodiment of the present application;
fig. 6 is a schematic structural diagram of a second network node device according to a sixth embodiment of the present application.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "comprises" and "comprising," and any variations thereof, in the description and claims of this invention, are intended to cover non-exclusive inclusions, e.g., a process or an apparatus that comprises a list of steps is not necessarily limited to those structures or steps expressly listed but may include other steps or structures not expressly listed or inherent to such process or apparatus.
The block chain is a novel decentralized protocol, can safely store files or other data, can not be forged and falsified, can automatically execute intelligent contracts, and does not need to be audited by any centralized mechanism. In conjunction with the blockchain technique, the present invention proposes the following embodiments.
Example one
Fig. 1 is a schematic flowchart of a file operation method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
s101, broadcasting a file operation instruction to each second network node, wherein the file operation instruction comprises: the file identifier, the first network node identifier and the operation identifier are used for enabling each second network node to judge whether the first network node has the authority of operating the file corresponding to the file identifier or not according to the file identifier, the first network node identifier and the operation identifier.
Specifically, the blockchain network of this embodiment includes at least two network nodes, each network node corresponds to a unique identifier, a network node that broadcasts the file operation instruction is referred to as a first network node, and other network nodes except the first network node in the blockchain network are referred to as second network nodes. All files are stored on a blockchain of any one network node and each file pair corresponds to a unique identifier. Each network node is specified to have certain operation authority on the file, the operation authority can comprise addition, deletion, modification, check and the like on the file, and it can be understood that each operation authority corresponds to corresponding operation of the block chain and corresponds to a unique operation identifier. In this step, each second network node determines whether the first network node has the authority to operate the file corresponding to the file identifier according to the file identifier requesting the operation of the first network node and the operation authority of the first network node.
S102, receiving file operation request responses sent by the second network nodes, wherein the file operation request responses comprise results of whether to approve the file operation.
Specifically, after each second network node judges whether the first network node has the authority to operate the file corresponding to the file identifier, if the first network node has the corresponding authority, a result that the first network node agrees with the file operation is returned, and if the first network node does not have the corresponding authority, a result that the first network node does not agree with the file operation is returned.
S103, if the file operation request responses of the second network nodes are the result of the approval of the file operation, executing the operation on the file.
Specifically, if all the second network nodes return the result that the first network node is allowed to operate the file, the first network node performs the operation on the file. It is understood that if all the second network nodes return the result of agreeing to the first network node to operate on the file, the first network node cannot perform the operation on the file, so as to ensure the security of the file management system through the blockchain.
In practical applications, the execution subject of this embodiment may be the first network node device. In practical applications, the first network node device may be implemented by a physical device integrated with the relevant executable code, for example, an intelligent terminal, various computers, and the like.
Examples are made in connection with actual scenarios: taking the execution subject of this embodiment as the first network node device as an example, in practical application, the first network node a is taken as an example to perform a deletion operation on the file 01. The first network node A broadcasts file operation instructions to each second network node, and the file operation instructions comprise: the file identifier 01, the first network node identifier A and the operation identifier SC. And returning a response of agreeing that the first network node A deletes the file 01 if the first network node A has the authority of deleting the file 01 through the judgment of each second network node according to the file identifier 01, the first network node identifier A and the operation identifier SC. And the first network node A receives the file operation request response returned by each second network node. And if the file operation request responses of the second network nodes are the result of agreeing to the deletion of the file 01 by the first network node A, executing the deletion operation on the file 01.
In the file operation method provided in this embodiment, the file operation instruction is broadcast to each second network node, so that each second network node determines whether the first network node has the right to operate the corresponding file, receives the file operation request response sent by each second network node, and if the file operation request response of each second network node is the result of granting the file operation, performs the operation on the file, thereby avoiding the file from being tampered randomly, where the file is stored in the block chain of any one network node. According to the scheme, files are managed based on the block chain network, the whole file management process does not depend on a server side, the operation of each network node on the files is realized by sending requests to other network nodes and obtaining joint signature agreement of other nodes, and the safety and fairness of a file management system are guaranteed.
Example two
Fig. 2 is a schematic flowchart of a file operation method according to a second embodiment of the present invention, and as shown in fig. 2, the method may include the following steps:
s201, obtaining operation authority information and file state information of the file identified by the first network node.
S202, if the first network node is determined to have the operation authority for the file according to the operation authority information and the file state information is in an operable state, broadcasting a file operation instruction to each second network node.
S203, receiving file operation request responses sent by the second network nodes, wherein the file operation request responses include results of whether to approve the file operation.
Specifically, all network nodes in the blockchain network locally pre-store file identifiers and corresponding file state information of all files and operation authority information of each network node on the files. The first network node queries the file state of the file to be operated and the operation authority of the first network node before broadcasting the file operation instruction. And if the first network node is determined to have the operation authority for the file according to the operation authority information and the file state information is in an operable state, broadcasting a file operation instruction to each second network node. And receiving a file operation request response sent by each second network node, wherein the file operation request response comprises a result of whether the file operation is approved or not.
S204, if the file operation request responses of the second network nodes are the result of the file operation agreement, broadcasting the file operation agreement message to the second network nodes so that the second network nodes can modify the file state information of the locally pre-stored file identifier from an operable state to a locked state.
And S205, executing operation on the file.
S206, broadcasting a file operation execution completion message to each second network node, so that each second network node modifies the file state information of the file identifier pre-stored locally from the locking state to the operable state.
Specifically, in order to avoid that when a first network node performs an operation on a file, other network nodes in second network nodes also request to perform the operation on the file, if the file operation request responses of the second network nodes are the result of the operation on the file, the file operation agreement message is firstly broadcast to the second network nodes, so that the second network nodes modify the file state information of the file identifier stored locally from an operable state to a locked state, and when the file is in the locked state, the other network nodes cannot obtain the file operation agreement message, thereby avoiding that the file operation on the file by a plurality of network nodes simultaneously fails on the first network node. Correspondingly, after the file operation is completed, the first network node broadcasts a file operation execution completion message to each second network node, so that each second network node changes the file state information of the corresponding file identifier pre-stored locally from a locking state to an operable state.
Further, the file operation instruction may be specifically adding a file, viewing a file, modifying a file, and the like. Preferably, on the basis of the first embodiment, the method may further include:
a. if the file operation instruction is a step of executing an operation on the file when the file operation instruction is an add file operation instruction, the method may specifically include: the file is stored into the block and the block is connected to the back end of the block chain.
b. If the file operation instruction is a view file operation instruction, executing an operation on the file, which may specifically include: and acquiring a corresponding file from the block chain according to the file identifier, and displaying the file with the file identifier.
c. If the file operation instruction is a modify file operation instruction, the step of executing the operation on the file may specifically include: and storing the file into the block, connecting the block to the rear end of the block chain, and broadcasting the storage address of the modified file to each second network node so that each network node can find the modified file according to the storage address of the file.
In the file operation method provided in this embodiment, the file identifiers and the corresponding file state information of all files and the operation authority information of each network node on the file are locally pre-stored in all network nodes in the blockchain network, and then the first network node may broadcast the file operation agreement message to each second network node, so that each second network node modifies the file state information of the locally pre-stored file identifiers from an operable state to a locked state, thereby preventing the file operation failure of the first network node due to simultaneous file operation by multiple network nodes. According to the scheme, files are managed based on the block chain network, the whole file management process does not depend on a server side, the operation of each network node on the files is realized by sending requests to other network nodes and obtaining joint signature agreement of other nodes, and the safety and fairness of a file management system are guaranteed.
EXAMPLE III
Fig. 3 is a schematic flowchart of a file operation method according to a third embodiment of the present invention, and as shown in fig. 3, the method includes:
s301, receiving a file operation instruction sent by a first network node, wherein the file operation instruction comprises: file identification, first network node identification and operation identification.
S302, judging whether the first network node has the authority of operating the file corresponding to the file identifier according to the file identifier, the first network node identifier and the operation identifier.
S303, generating a result of agreeing to the file operation and a result of disagreeing with the file operation according to whether the first network node has the authority of operating the file corresponding to the file identifier.
S304, sending a file operation request response to the first network node, wherein the file operation request response comprises a result of whether the file operation is approved or not.
In practical applications, the execution subject of this embodiment may be the second network node device. In practical applications, the second network node device may be implemented by a physical device integrated with the relevant executable code, for example, an intelligent terminal, various computers, and the like.
Specifically, the second network node judges whether the first network node has the authority to operate the file corresponding to the file identifier according to the file identifier requested to be operated by the first network node and the operation authority of the first network node, if the first network node has the corresponding authority, the result of agreeing with the file operation by the first network node is returned, and if the first network node does not have the corresponding authority, the result of disagreeing with the file operation by the first network node is returned.
In the file operation method provided in this embodiment, a file operation instruction sent by a first network node is received, where the file operation instruction includes: file identification, first network node identification and operation identification. And judging whether the first network node has the authority of operating the file corresponding to the file identifier or not according to the file identifier, the first network node identifier and the operation identifier. And generating a result of agreeing to the file operation and a result of disagreeing with the file operation according to whether the first network node has the authority of operating the file corresponding to the file identifier. And sending a file operation request response to the first network node, wherein the file operation request response comprises a result of whether the file operation is approved or not. According to the scheme, files are managed based on the block chain network, the whole file management process does not depend on a server side, the operation of each network node on the files is realized by sending requests to other network nodes and obtaining joint signature agreement of other nodes, and the safety and fairness of a file management system are guaranteed.
Example four
Fig. 4 is a flowchart illustrating a file operation method according to a fourth embodiment of the present invention, and based on the third embodiment, as shown in fig. 4, after step S304, the method may further include:
s401, receiving a file operation agreement message sent by a first network node.
S402, changing the file state information of the file identification pre-stored locally from an operable state to a locked state.
S403, receiving a file operation execution completion message broadcasted by the first network node.
S404, changing the file state information of the file identifier pre-stored locally from a locking state to an operable state.
Before step S301, the method may further include:
s405, locally storing the file operation authority information of the first network node and each second network node on each file and the state information of each file.
Specifically, the content of this embodiment is described in detail in the first embodiment and the second embodiment, and is not described herein again.
In the file operation method provided in this embodiment, the file operation permission information of each file and the state information of each file by the first network node and each second network node are locally stored, and then the second network node may modify the file state information of the locally pre-stored file identifier from an operable state to a locked state according to the file operation agreement message broadcast by the first network node by the other second network nodes, so that failure of file operation of the first network node due to simultaneous file operation by multiple network nodes is avoided. According to the scheme, files are managed based on the block chain network, the whole file management process does not depend on a server side, the operation of each network node on the files is realized by sending requests to other network nodes and obtaining joint signature agreement of other nodes, and the safety and fairness of a file management system are guaranteed.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
EXAMPLE five
Fig. 5 is a schematic structural diagram of a first network node device according to a fifth embodiment of the present application. As shown in fig. 5, the first network node device includes: a memory 501 and a processor 502;
a memory 501 for storing a computer program.
The processor 502 executes the computer program in the memory 501 to implement the methods according to the first and second embodiments.
EXAMPLE six
Fig. 6 is a schematic structural diagram of a second network node device according to a sixth embodiment of the present application. As shown in fig. 6, the second network node device includes: a memory 601 and a processor 602;
the memory 601 is used for storing computer programs.
Wherein the processor 602 executes the computer program in the memory 601 to implement the methods as in the third and fourth embodiments.
EXAMPLE seven
A seventh embodiment of the present application provides a computer storage medium, in which a computer program is stored, and the computer program is used for implementing the method according to the first embodiment and the second embodiment when being executed by a processor.
Example eight
An eighth embodiment of the present application provides a computer storage medium, where a computer program is stored in the computer readable storage medium, and the computer program is used for implementing the method according to the third embodiment and the fourth embodiment when executed by a processor.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for operating a file, comprising:
broadcasting a file operation instruction to each second network node, wherein the file operation instruction comprises: the file identifier, the first network node identifier and the operation identifier are used for enabling each second network node to judge whether the first network node has the authority of operating the file corresponding to the file identifier or not according to the file identifier, the first network node identifier and the operation identifier; wherein the second network node is plural;
receiving a file operation request response sent by each second network node, wherein the file operation request response comprises a result of whether to agree with the file operation;
if the file operation request responses of the second network nodes are the result of the file operation agreement, executing the operation on the file;
the file is stored on a blockchain of any one of the network nodes.
2. The method according to claim 1, wherein if the file operation request responses of the second network nodes are the result of granting the file operation, further comprising:
broadcasting a file operation agreement message to each second network node, so that each second network node modifies the file state information of the file identifier prestored locally from an operable state to a locked state;
correspondingly, after the operation is performed on the file, the method further includes:
and broadcasting a file operation execution completion message to each second network node, so that each second network node modifies the file state information of the file identifier prestored locally from the locking state to the operable state.
3. The method according to claim 1 or 2, wherein the broadcasting the file operation instruction to each second network node specifically comprises:
acquiring operation authority information and file state information of the first network node on the file of the file identifier;
and if the first network node is determined to have the operation authority for the file according to the operation authority information and the file state information is in an operable state, broadcasting a file operation instruction to each second network node.
4. The method according to claim 1, wherein if the file operation instruction is an add file operation instruction, the performing the operation on the file specifically includes:
storing the file into a block and connecting the block to a block chain back end;
if the file operation instruction is a view file operation instruction, the executing operation on the file specifically includes:
acquiring the file from the block chain according to the file identifier;
displaying the file of the file identifier;
if the file operation instruction is a modify file operation instruction, the executing operation on the file specifically includes:
storing the file into a block and connecting the block to a block chain back end;
broadcasting the storage address of the modified file to each second network node.
5. A method for operating a file, the method being applied to a second network node, where the second network node is any one network node except a first network node in a blockchain network, and there are multiple second network nodes, and the method includes:
receiving a file operation instruction sent by a first network node, wherein the file operation instruction comprises: file identification, first network node identification and operation identification;
judging whether the first network node has the authority to operate the file corresponding to the file identifier or not according to the file identifier, the first network node identifier and the operation identifier;
generating a result of agreeing to the file operation and a result of disagreeing with the file operation according to whether the first network node has the authority of operating the file corresponding to the file identifier;
sending a file operation request response to the first network node, wherein the file operation request response comprises a result of whether the file operation is approved or not;
the sending a file operation request response to the first network node, where the file operation request response includes a result of whether to approve a file operation, and then further includes:
receiving a file operation agreement message sent by the first network node;
changing the file state information of the file identifier prestored locally from an operable state into a locked state;
receiving a file operation execution completion message broadcast by a first network node;
and modifying the file state information of the file identifier prestored locally from the locking state into the operable state.
6. The method according to claim 5, wherein before receiving the file operation instruction sent by the first network node, further comprising:
and locally storing the file operation authority information of each file and the state information of each file by the first network node and each second network node.
7. A first network node device, comprising: a memory and a processor;
the memory for storing a computer program;
wherein the processor executes the computer program in the memory to implement the method of any one of claims 1-4.
8. A second network node device, comprising: a memory and a processor;
the memory for storing a computer program;
wherein the processor executes the computer program in the memory to implement the method as claimed in claim 5 or 6.
9. A computer storage medium, characterized in that a computer program is stored in the computer readable storage medium, which computer program, when being executed by a processor, is adapted to carry out the method of any one of claims 1-4.
10. A computer storage medium, characterized in that a computer program is stored in the computer readable storage medium, which computer program, when being executed by a processor, is adapted to carry out the method of claim 5 or 6.
CN201811024883.4A 2018-09-04 2018-09-04 File operation method, device and computer storage medium Active CN109299053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811024883.4A CN109299053B (en) 2018-09-04 2018-09-04 File operation method, device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811024883.4A CN109299053B (en) 2018-09-04 2018-09-04 File operation method, device and computer storage medium

Publications (2)

Publication Number Publication Date
CN109299053A CN109299053A (en) 2019-02-01
CN109299053B true CN109299053B (en) 2021-03-02

Family

ID=65166165

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811024883.4A Active CN109299053B (en) 2018-09-04 2018-09-04 File operation method, device and computer storage medium

Country Status (1)

Country Link
CN (1) CN109299053B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019179536A2 (en) 2019-07-03 2019-09-26 Alibaba Group Holding Limited Mutual aid network based on smart contract and blockchain
CN112243008B (en) * 2020-10-16 2023-06-02 中国联合网络通信集团有限公司 Data management method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971033A (en) * 2014-05-23 2014-08-06 武汉华亚兴通信息技术有限公司 Digital rights management method for solving problem of illegal copying
CN106407681A (en) * 2016-09-19 2017-02-15 南京工业大学 Storage and access method for personal health records in cloud system environment
CN106936585A (en) * 2017-03-09 2017-07-07 布比(北京)网络技术有限公司 Method and system that a kind of information voucher to distributed data is split and combined
WO2017202758A1 (en) * 2016-05-23 2017-11-30 Accenture Global Solutions Limited Multiple-link cryptologic blockchain
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10417217B2 (en) * 2016-08-05 2019-09-17 Chicago Mercantile Exchange Inc. Systems and methods for blockchain rule synchronization

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971033A (en) * 2014-05-23 2014-08-06 武汉华亚兴通信息技术有限公司 Digital rights management method for solving problem of illegal copying
WO2017202758A1 (en) * 2016-05-23 2017-11-30 Accenture Global Solutions Limited Multiple-link cryptologic blockchain
CN106407681A (en) * 2016-09-19 2017-02-15 南京工业大学 Storage and access method for personal health records in cloud system environment
CN106936585A (en) * 2017-03-09 2017-07-07 布比(北京)网络技术有限公司 Method and system that a kind of information voucher to distributed data is split and combined
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Also Published As

Publication number Publication date
CN109299053A (en) 2019-02-01

Similar Documents

Publication Publication Date Title
CN113169952B (en) Container cloud management system based on block chain technology
CN110661658B (en) Node management method and device of block chain network and computer storage medium
CN109688186B (en) Data interaction method, device, equipment and readable storage medium
CN110855777B (en) Node management method and device based on block chain
CN111885133B (en) Block chain-based data processing method and device and computer storage medium
CN110324338B (en) Data interaction method, device, fort machine and computer readable storage medium
CN104219316A (en) Method and device for processing call request in distributed system
US8365245B2 (en) Previous password based authentication
CN111343142A (en) Data processing method and device based on block chain network and storage medium
KR20160122254A (en) Method of deploying a set of software application(s)
CN110278192B (en) Method and device for accessing intranet by extranet, computer equipment and readable storage medium
CN111654399B (en) Networking method, device, equipment and storage medium based on SD-WAN
US20110264767A1 (en) Interactive processing method and apparatus between content-id management servers
CN111711711A (en) Block chain-based top-level domain name management and analysis method and system
CN109299053B (en) File operation method, device and computer storage medium
CN112651001A (en) Access request authentication method, device, equipment and readable storage medium
CN111260475A (en) Data processing method, block chain node point equipment and storage medium
US20170063862A1 (en) System and method for authentication
CN112714166A (en) Multi-cluster management method and device for distributed storage system
CN109992298B (en) Examination and approval platform expansion method and device, examination and approval platform and readable storage medium
CN115460075A (en) Multi-network mode implementation method, device, equipment and medium based on cloud-native
WO2016177051A1 (en) Security authentication method and device
CN114567678A (en) Resource calling method and device of cloud security service and electronic equipment
CN110941412B (en) Method, system and terminal for realizing multi-terminal animation collaborative browsing based on pictures
CN111324368B (en) Data sharing method and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant