CN109858262A - Workflow examination and approval method, apparatus, system and storage medium based on block catenary system - Google Patents
Workflow examination and approval method, apparatus, system and storage medium based on block catenary system Download PDFInfo
- Publication number
- CN109858262A CN109858262A CN201910046791.4A CN201910046791A CN109858262A CN 109858262 A CN109858262 A CN 109858262A CN 201910046791 A CN201910046791 A CN 201910046791A CN 109858262 A CN109858262 A CN 109858262A
- Authority
- CN
- China
- Prior art keywords
- node
- approval
- application
- catenary system
- block catenary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
Abstract
The invention discloses a kind of workflow examination and approval method, apparatus, system and storage mediums based on block catenary system, the block catenary system includes at least application node, approval node and intelligent contract node, the application node obtains pending application content, application content is saved in block catenary system, and the application content is broadcasted;Approval node is encrypted by encrypting the application content that secret key pair receives, and is generated cryptographic digest, is saved in block catenary system for cryptographic digest as original digest;Approval node examines application content, approval results is fed back to application node, and be sent to intelligent contract node using encryption code key as code key to be verified;Intelligent contract node carries out secondary encryption by secret key pair application content to be verified, if secondary encrypted result is consistent with original digest, approval node authentication success, and then improve safety guarantee of enterprise during office automation workflow examination and approval.
Description
Technical field
The present invention relates to computer information technology field more particularly to a kind of workflow examination and approval sides based on block catenary system
Method, device, system and storage medium.
Background technique
Office automation (Office Automation, abbreviation OA) is to combine modern office and computer technology
The novel working way of the one kind come.The ununified definition of office automation, it is all in traditional office using various
New technology, new engine, new equipment are engaged in office service, belong to the field of office automation.By realization office automation, or
Person says realization digital office, can optimize existing management institutional framework, management system is adjusted, on the basis improved efficiency
On, increase synergetic office work ability, strengthens the consistency of decision.
And common office automation workflow examination and approval has: financial category approval process (such as expense reimbursement, examination & approval of refunding of borrowing money
Process, work and fund payment flow, fund take in process), administrative affair class approval process (application of going on business of such as asking for leave, overtime work
Application), business associated class approval process (approval process, the buying approval process, contract approval process of such as order).
In the approval process of the above office automation process, the critically important data of company may be related to, be also simultaneously
The secret of company.The examination & approval label reporting system of company is stored data in database now, it is understood that there may be by hacker attacks
The hidden danger distorted or stolen can cause no small loss to enterprise in this way, therefore guarantee office automation workflow examination and approval content
Safety and can not tamper it is particularly significant.
Summary of the invention
The main purpose of the present invention is to provide a kind of workflow examination and approval method, apparatus based on block catenary system, system and
Storage medium, it is intended to which the examination & approval label reporting system for solving how to reduce current enterprise is deposited during office automation workflow examination and approval
Security risk the problem of.
To achieve the above object, the present invention provides a kind of workflow examination and approval method based on block catenary system, the block chain
System includes at least application node, approval node and intelligent contract node, which comprises
The application node obtains pending application content, and the application content is saved in the block catenary system
In block, and the application content is broadcasted in the block catenary system;
The approval node is encrypted by encrypting the application content that secret key pair receives, and generates cryptographic digest, will
The cryptographic digest is saved in the block of the block catenary system as original digest;
The approval node examines the application content, approval results is fed back to the application node, and will
The encryption code key is sent to the intelligent contract node as code key to be verified;
The intelligence contract node is encrypted to be verified to generate by application content described in the secret key pair to be verified
The abstract to be verified is compared with the original digest, comparison result is sent to the application node by abstract, so that
The application node is obtained to handle the approval results according to the comparison result.
Preferably, the abstract to be verified is compared the intelligent contract node with the original digest, will compare
As a result be sent to the application node so that the application node according to the comparison result to the approval results at
The step of reason, comprising:
The abstract to be verified is compared the intelligence contract node with the original digest;
It is described it is to be verified abstract it is identical as the original digest when, comparison result is sent to the application node, with
So that the application node receives the approval results.
Preferably, the step of abstract to be verified is compared the intelligent contract node with the original digest it
Afterwards, the method also includes:
When the abstract to be verified is with the original digest difference, comparison result is sent to the application node, with
So that the application node shields the approval results.
Preferably, the application node obtains pending application content, and the application content is saved in the block
In the block of catenary system, and the step of application content is broadcasted in the block catenary system, comprising:
The application node obtains pending application content and the corresponding applying type of the application content, and will
The application content is saved in the block of the block catenary system;
Digital certificate corresponding with the applying type is obtained from the block catenary system, by the digital certificate
First key the application content is encrypted, obtain application content ciphertext;
The application content ciphertext is broadcasted in the block catenary system.
Preferably, the approval node is encrypted by encrypting the application content that secret key pair receives, and generates encryption
Before the step of abstract, comprising:
The approval node receives the application content ciphertext of the application node broadcast;
Digital certificate corresponding with the applying type is obtained from the block catenary system, by the digital certificate
The second key pair described in application content ciphertext be decrypted, obtain the application content.
Preferably, the approval node is encrypted by encrypting the application content that secret key pair receives, and generates encryption
It makes a summary, after the step that the cryptographic digest is saved in the block of the block catenary system as original digest, further includes:
The intelligence contract node in real time detects the original digest in the block;
When detecting that the original digest changes, in the block catenary system to the original digest after change into
Row broadcast.
Preferably, the application node obtains pending application content, and the application content is saved in the block
After step in the block of catenary system, further includes:
The intelligence contract node in real time detects the application content in the block;
When detecting that the application content changes, in the block catenary system to the application content after change into
Row broadcast.
For the intelligence contract node when detecting that the original digest changes, Xiang Suoshu approval node issues change
Confirmation message;
The intelligence contract node is when receiving feedback of the approval node for the change confirmation message, in block
The application content after change is broadcasted in catenary system.
In addition, to achieve the above object, the present invention also proposes a kind of workflow examination and approval device based on block catenary system, it is special
Sign is that described device includes:
Broadcast module will be described for obtaining pending application content by the application node in the block catenary system
Application content is saved in the block of the block catenary system, and is carried out extensively in the block catenary system to the application content
It broadcasts;
Summarization generation module, described in being received as the approval node in the block catenary system by encryption secret key pair
Application content is encrypted, and is generated cryptographic digest, is saved in the block catenary system for the cryptographic digest as original digest
Block in;
Approval results are fed back to institute for being examined by the approval node to the application content by approval module
Application node is stated, and is sent to the intelligent contract node for the encryption code key as code key to be verified;
Authentication module, for being passed through described in the secret key pair to be verified as the intelligent contract node in the block catenary system
Application content is encrypted to generate abstract to be verified, and the abstract to be verified is compared with the original digest, will be compared
The application node is sent to result, so that the application node carries out the approval results according to the comparison result
Processing.
In addition, to achieve the above object, the present invention also proposes that a kind of block catenary system, the block catenary system include storage
Device, processor and it is stored in the workflow examination and approval program that can be run on the memory and on the processor, the process is examined
Batch program is arranged for carrying out the step of workflow examination and approval method based on block catenary system as described above.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, process is stored on the storage medium
Examination and approval procedures realize the workflow examination and approval side as described above based on block catenary system when the workflow examination and approval program is executed by processor
The step of method.
Block catenary system of the invention includes at least application node, approval node and intelligent contract node, the application section
Point obtains pending application content, and application content is saved in block catenary system, and is broadcasted the application content;
Approval node is encrypted by encrypting the application content that secret key pair receives, and cryptographic digest is generated, using cryptographic digest as original
Abstract is saved in block catenary system;Approval node examines application content, approval results is fed back to application node, and will
Code key is encrypted as code key to be verified and is sent to intelligent contract node;Intelligent contract node passes through secret key pair application content to be verified
Secondary encryption is carried out, if secondary encrypted result is consistent with original digest, illustrates approval node authentication success, application node
The approval results received are normal, and then improve safety of enterprise during office automation workflow examination and approval and protect
Barrier.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of the block catenary system for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the another structural schematic diagram of the block catenary system for the hardware running environment that the embodiment of the present invention is related to;
Fig. 3 is a kind of flow diagram of the workflow examination and approval method first embodiment based on block catenary system of the present invention;
Fig. 4 is a kind of flow diagram of the workflow examination and approval method second embodiment based on block catenary system of the present invention;
Fig. 5 is a kind of flow diagram of the workflow examination and approval method 3rd embodiment based on block catenary system of the present invention;
Fig. 6 is a kind of structural block diagram of the workflow examination and approval device based on block catenary system of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, Fig. 1 is the structural representation of the block catenary system for the hardware running environment that the embodiment of the present invention is related to
Figure.Block chain is the network system of a decentralization, and the present embodiment block catenary system includes at least application node, approval node
With intelligent contract node,
It will be appreciated that " node " of the invention refers to the computer in block chain network, mobile phone, platform can be
Formula machine or server etc., each " node " can protect the information of write-in after supporting information write-in, such as a node write-in information
It is stored in the block of the node, then the node broadcasts the information after preservation to the whole network of the block chain, so that area
Other nodes in block chain network can receive the information that the node is written and saves, each node meeting in block catenary system
Common maintenance data, each node have a complete data backup.
" application node " in the present invention can be understood as initiating meter used in the employee of all kinds of approval requests in enterprise
Calculation machine (such as mobile phone or desktop computer), correspondingly, " approval node " in the present invention can be understood as having process in enterprise
Examine computer (such as mobile phone or desktop computer) used in the personnel of qualification;
And " intelligent contract node " can be an individual server, and " application node " is stored on the server
With the intelligent contract used when " approval node " interaction, it will be understood that, in block chain technical field, what intelligent contract referred to
It is a set of preset program, that is to say, that when " application node " and " approval node " under the block catenary system is handed over
When mutual, " intelligent contract node " can bring into operation, for completing the interactive process of " application node " and " approval node ".
Another embodiment is that " intelligent contract node " can also characterize " application node " and " the examination & approval section
Point ", i.e., " intelligent contract node " of the invention are also possible to the concept of a virtual abstraction, and intelligent contract can be deployed in respectively
It is " application node " and described " approval node ", when " application node " and " approval node " under the block catenary system needs to carry out
When interaction, the intelligent contract that " application node " and " approval node " is respectively disposed can be behaved, for completing " application node "
The interactive process of " approval node ".
Further, with reference to Fig. 2, the block catenary system for the hardware running environment that the embodiment of the present invention is related to it is another
Structural schematic diagram.As shown in Fig. 2, the block catenary system may include: processor 1001, such as CPU, communication bus 1002 is used
Family interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is for realizing the company between these components
Connect letter.User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), can be selected
Family interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include standard
Wireline interface, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable deposit
Reservoir (non-volatile memory), such as magnetic disk storage.
It will be appreciated that the hardware of block catenary system of the invention is corresponding by each block node under block catenary system
Hardware device (such as server) composition, the processor can be the processor of one of node server, can also incite somebody to action
The processor of each block node server regards the processor of a block catenary system collectively regarded as of the invention as.Show in Fig. 2
The hardware configuration of a node under representation block catenary system out;Certainly, structure shown in Figure 2 is not constituted to institute
The restriction for stating the hardware configuration of the node under block catenary system may include than illustrating more or fewer components, or difference
Component layout.
As shown in Fig. 2, may include operating system, network communication module, Subscriber Interface Module SIM in the memory 1005
And workflow examination and approval program.In structure shown in Fig. 2, network interface 1004 is mainly used for each section under the block catenary system
Data communication between point;Block catenary system of the present invention calls the workflow examination and approval journey stored in memory 1005 by processor 1001
Sequence, and the step of executing the workflow examination and approval method based on block catenary system.
It is provided by the invention a kind of based on block catenary system based on the hardware environment of above-mentioned block catenary system referring to Fig. 3
The first embodiment of workflow examination and approval method.
In the present embodiment, the block catenary system includes at least application node, approval node and intelligent contract node, described
Method includes:
Step S10: the application node obtains pending application content, and the application content is saved in the block
In the block of catenary system, and the application content is broadcasted in the block catenary system.
It will be appreciated that " application node " of the present embodiment can be understood as initiating in various types of applications in enterprise
Computer used in the employee of appearance (such as mobile phone or desktop computer, referred to as " application node equipment ");Correspondingly, this implementation
Example in " approval node " can be understood as computer used in the personnel for having workflow examination and approval qualification in enterprise (such as mobile phone or
Person's desktop computer, referred to as " approval node equipment ").
Specifically, it is desirable to which the employee for initiating office automation workflow examination and approval application will use " application node equipment ", pass through
Pending application content is inputted to " application node equipment ", application content can be saved in described by " application node equipment " in this way
In " application node " corresponding block, then " application node " can in the block catenary system to the application content into
Row broadcast, so that each " approval node " of the block catenary system can receive the copending of " application node " initiation
Apply for content.
Step S20: the approval node is encrypted by encrypting the application content that secret key pair receives, and generates encryption
Abstract, is saved in the block of the block catenary system using the cryptographic digest as original digest.
It will be appreciated that the office automation approving person of enterprise would generally be copending to what is received based on office system
Application content carries out examination & approval processing, but a scene corresponding with security risk of the existing technology is: assuming that " application section
Point " A, which transmits pending application a content T, node B to " approval node " B, will apply the result of content T examination & approval (assuming that not having
Have and pass through examination & approval) node A is fed back to, since content T belongs to the classified papers (e.g. a contract) of company, it would be possible that meeting
Deposit this hidden danger: node B examination & approval by later by the approval results of content T feed back to node A this during, hacker enters
It invades that content T intercept and steals, then the approval results of content T are fed back to node A by hacker " approval node " B that disguises oneself as
(practical examination & approval not over, but hacker claims T that examination & approval pass through), such node A will have " misunderstanding ", and entire company
Not know and is hacked this meeting thing of visitor's invasion, subsequent work can make mistakes again and again, meanwhile, the confidential content T of company is also known by hacker
Dawn.
Therefore, hacker attacks system disguises oneself as " approval node " in order to prevent, the office automation of the enterprise of the present embodiment
Approving person will use " approval node equipment " to while receiving pending application content T and carry out examination & approval processing, in execution
Step S20 is stated " to encrypt the application content T received by encrypting code key s, generate cryptographic digest T`, described will add
Close abstract T` is saved in the block of the block catenary system as original digest;
Certainly described " approval node equipment " can also to receive pending application content carry out examination & approval processing it
Interior execution above-mentioned steps S20 of a certain period preceding or later.
It will be appreciated that the cryptographic digest T` storage of generation is arrived and " is examined by " approval node " due to the characteristic of block catenary system
In the block of batch node " (node B), the node of block catenary system entire in this way can inquire T`.Assuming that node B is by hacker's puppet
Dress is that can not be equivalent to hacker by the false abstract storage of encryption into the block of node B if hacker oneself encrypts T
Oneself can not save falseness abstract, therefore there is no the false abstract letters that hacker oneself generates in block catenary system
Breath, (due to the characteristic of block chain, hacker will not carry out additions and deletions to the block of block catenary system and change, even if by the modification area Ye Huibei
Block catenary system the whole network user has found at once).
It should be noted that the present embodiment mode that pending application content is encrypted can there are many form,
Can be used MD5 algorithm (Message Digest 5, Message-Digest Algorithm), asymmetric RSA Algorithm can be used, can also
To use DES symmetric encipherment algorithm;The present embodiment preferably uses MD5 algorithm to encrypt pending application content, example
Such as: MD5 algorithm is grouped to handle pending application content with 512, and each grouping is divided into 16 32 seats point again
Group, after have passed through a series of processing, the output of algorithm is formed by four 32, will be incited somebody to action after this four 32 packet concatenations
Unique 128 hashed value is generated, 128 hashed values are the cryptographic digest generated.
Step S30: the approval node examines the application content, and approval results are fed back to the application and are saved
Point, and the intelligent contract node is sent to using the encryption code key as code key to be verified.
It should be noted that the present embodiment is with the individual clothes that " intelligent contract node " is under the block catenary system
It is illustrated for business device.
Specifically, in the present embodiment, " approval node " (node B) carries out examination & approval processing to application content T, by approval results
Node A is fed back to, this process may be by hacker's intrusion system due to " approval results are fed back to node A by node B "
The case where occur, it is possible to there is the case where hacker disguises oneself as node B to node A feedback information, therefore node B also needs to add
Close code key s is sent to " intelligent contract node " as code key s` to be verified, so that " intelligent contract node " executes following step
S40 carries out secondary encrypted authentication.
Step S40: the intelligence contract node is encrypted by application content described in the secret key pair to be verified with life
At abstract to be verified, the abstract to be verified is compared with the original digest, comparison result is sent to the application
Node, so that the application node is handled the approval results according to the comparison result.
In the concrete realization, the cryptographic digest is construed as an identification information of " approval node ".
It will be appreciated that code key s` to be verified is passed to " intelligent contract node " by node B, utilized by " intelligent contract node "
Code key s` to be verified carries out secondary encryption to application content T, if obtained abstract to be verified is exactly that T` (obtains to be verified pluck
Will be as the cryptographic digest T` stored in the block of block catenary system), then prove that approval node B is not pretended by hacker, because
It is unique for cryptographic digest T` here.
The embodiment of the present invention encryption key s can only be encrypted, and can not be decrypted, and " intelligent contract node " is to application content
T carries out secondary encryption, if the first time cryptographic digest that the cryptographic digest and block catenary system that obtain after encrypting for second save
Equally, then prove that approval node B is not pretended illegally by hacker.
Further, the step of abstract to be verified is compared the intelligent contract node with the original digest
Later, it if the abstract to be verified is identical as the original digest, proves that approval node B is not pretended by hacker, will compare
As a result it is sent to the application node, so that the application node receives the approval results, i.e. approval node B feedback is examined
Batch result is correct, and the approval status of the application content T updated in application node A block is then updated to " passing through state ".
If different from the original digest in the abstract to be verified, comparison result is sent to the application node,
To prompt the application node A: approval node B has been pretended by hacker, so that the application node A shields the examination & approval knot
Fruit.
" intelligent contract node " passes through its hair of the key pair that is sent by " approval node " under the block catenary system of the present embodiment
The pending application content sent carries out secondary encryption, if the abstract to be verified that is generated after encryption and the block catenary system
The original digest stored before in block is consistent, then to " approval node " authentication success, what " application node " received is examined
Batch the result is that normal, and then improve safety guarantee of enterprise during office automation workflow examination and approval.
According to the above-mentioned workflow examination and approval method based on block catenary system, until examination & approval content is by all under block catenary system
" approval node " examination & approval pass through.
It further, is that the present invention is based on the second embodiments of the workflow examination and approval method of block catenary system referring to Fig. 4, Fig. 4
Flow diagram proposes that the present invention is based on block catenary systems based on the first embodiment of above-mentioned workflow examination and approval method shown in Fig. 3
Workflow examination and approval method second embodiment.
In the present embodiment, the step S10 is specifically included:
Step S101: the application node obtains pending application content and the corresponding application of the application content
Type, and the application content is saved in the block of the block catenary system;
It will be appreciated that there are many common office automation OA process applying types, such as: financial category approval process,
Administrative affair class approval process, business associated class approval process etc..
Step S102: the application node obtains number card corresponding with the applying type from the block catenary system
Book encrypts the application content by the first key in the digital certificate, obtains application content ciphertext;
Specifically, in the block catenary system of the present embodiment, different numbers can be preset for different applying types
Certificate (Certification Authority), between different digital certificates and each digital certificate and applying type
Relationship can be saved in each node of the block catenary system.
The digital certificate includes first key and the second key, and the first key is used for pending application content
It is encrypted, and then generates application content ciphertext;And second key is for being decrypted the application content ciphertext.This
The digital certificate of embodiment can be for using asymmetric key cipher Encryption Algorithm (RSA), i.e. first key be public key for adding
Close, the second key is private key for decrypting.
Step S103: the application node broadcasts the application content ciphertext in the block catenary system.
Step S104: the approval node receives the application content ciphertext of the application node broadcast;From the block chain
Digital certificate corresponding with the applying type is obtained in system, by applying described in the second key pair in the digital certificate
Content ciphertext is decrypted, and obtains the application content.
Specifically, the approval node obtains the second key from the digital certificate, by the second key from the Shen
Characteristic please be extracted in content ciphertext to be decrypted to carry out RSA Algorithm operation, obtain the application content.
The embodiment of the present invention application node broadcasts encrypted application content, can prevent so copending
Application content is not eavesdropped in broadcast transmission process by hacker, prevents from being tampered.
It further, is that the present invention is based on the 3rd embodiments of the workflow examination and approval method of block catenary system referring to Fig. 5, Fig. 5
Flow diagram is based on above-mentioned embodiment shown in Fig. 3, proposes that the present invention is based on the of the workflow examination and approval method of block catenary system
Three embodiments.
In the present embodiment, after the step S20, the method also includes:
Step S201: the intelligence contract node in real time detects the original digest in the block;
Step S202: the intelligence contract node is when detecting that the original digest changes, in the block chain
The original digest after change is broadcasted in system.
It will be appreciated that the present embodiment the original digest saved in block catenary system can be detected in real time (such as
Monitoring scanning can be carried out to the original digest being just saved in the block catenary system before step S30), if hacker enters
It invades block catenary system and the original digest in block is carried out and distorted, then the original digest scanned is certainly former with storage before
The content made a summary that begins is not identical, once data are distorted by hacker to be found at once by the whole network node users under block catenary system,
Node users each in this way can enhance your vigilance, and user can voluntarily select software antivirus to avoid bigger risk.
The present embodiment utilizes the characteristic of block catenary system, can prevent simultaneously to find what hacker stored block catenary system in time
The phenomenon that original digest is distorted, so be avoided that be tampered original digest due to cause hacker disguise oneself as " examination & approval
Do not have after node " the case where being found by user (such as hacker oneself generate one camouflage key f, with key f to application
Content T is encrypted, and ciphertext L is obtained, and then the cryptographic digest T` that node B is stored is distorted into L by hacker, and then hacker is further
Node B disguise oneself as to node A transmission information, while being sent to " intelligent contract section for the key f of camouflage as key to be verified again
Point " forces " intelligent contract node " to carry out secondary encryption to application content T using the key f of camouflage, after encryption secondary in this way
To abstract just with the abstract L being tampered as, such hacker is successfully made primary camouflage and operates, but user does not know but
Road).
Further, it is based on above-mentioned embodiment shown in Fig. 3, proposes that the present invention is based on the workflow examination and approval sides of block catenary system
The fourth embodiment of method.
In the present embodiment, before the step S30, the method also includes:
Step: the intelligence contract node is when detecting that the application content changes, Xiang Suoshu application node hair
Confirmation message is changed out;
It will be appreciated that the present embodiment the application content saved in block catenary system can be detected in real time (such as
The material file important to the company of block catenary system preservation carries out monitoring scanning within every 5 minutes), if hacker attacks block
Catenary system to the pending application content tampering stored in block, then the application content that scans certainly with store before
Content is not identical.
Specifically, can by the application Content Transformation be binary data, if below discovery scanning binary data and
Difference before then illustrates that application contents have been tampered, and then executes following step S032:
Step: it is described intelligence contract node receive the application node for it is described change confirmation message feedback when,
The step of execution broadcasts the application content after change in block catenary system.
The present embodiment utilizes the characteristic of block catenary system, prevents hacker from carrying out additions and deletions to the data that block catenary system stores
Change, once data are distorted by hacker to be found at once by the whole network node users under block catenary system, node users each in this way
It will enhance your vigilance, user can voluntarily select software antivirus to avoid bigger risk.
Further, in one embodiment, described " intelligent contract node " is also possible to " applicant's node ", i.e., intelligence is closed
It is about deployed on " applicant's node ", if intelligent contract is deployed in " application node ", then above-mentioned first implements
The executing subject of the step S40 of example is " application node ".
Alternatively, intelligent contract can be deployed in respectively it is " application node " and described " approval node ", when the block catenary system
Under " application node " and " approval node " when needing to interact data, " application node " and " approval node " is respectively disposed
Intelligent contract can behave, for completing the interactive process of " application node " and " approval node ".
In addition, the embodiment of the present invention also proposes a kind of workflow examination and approval device based on block catenary system, described with reference to Fig. 6
Device includes:
Broadcast module 10, for obtaining pending application content by the application node in the block catenary system, by institute
It states application content to be saved in the block of the block catenary system, and the application content is carried out in the block catenary system
Broadcast;
Summarization generation module 20, the institute for being received by the approval node in the block catenary system by encrypting secret key pair
It states application content to be encrypted, generates cryptographic digest, be saved in the block linkwork for the cryptographic digest as original digest
In the block of system;
Approval module 30 feeds back to approval results for being examined by the approval node to the application content
The application node, and the intelligent contract node is sent to using the encryption code key as code key to be verified;
Authentication module 40, for passing through the secret key pair institute to be verified by the intelligent contract node in the block catenary system
It states application content to be encrypted to generate abstract to be verified, the abstract to be verified is compared with the original digest, it will
Comparison result is sent to the application node so that the application node according to the comparison result to the approval results into
Row processing.
It will be appreciated that the workflow examination and approval device based on block catenary system of the present embodiment can be a kind of be used for based on area
The application software of the workflow examination and approval of block catenary system, and in each node device being loaded into the block catenary system, this
The specific embodiment of the workflow examination and approval device based on block catenary system of embodiment please refers to above-mentioned based on block catenary system
Workflow examination and approval embodiment of the method, it will not be described here for the present embodiment.
In addition, the embodiment of the present invention also proposes a kind of storage medium, it is stored on the storage medium based on block linkwork
The workflow examination and approval program of system realizes the stream as described above based on block catenary system when the workflow examination and approval program is executed by processor
The step of journey measures and procedures for the examination and approval.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of workflow examination and approval method based on block catenary system, which is characterized in that the block catenary system includes at least application
Node, approval node and intelligent contract node, which comprises
The application node obtains pending application content, and the application content is saved in the block of the block catenary system
In, and the application content is broadcasted in the block catenary system;
The approval node is encrypted by encrypting the application content that secret key pair receives, and generates cryptographic digest, will be described
Cryptographic digest is saved in the block of the block catenary system as original digest;
The approval node examines the application content, approval results is fed back to the application node, and will be described
Encryption code key is sent to the intelligent contract node as code key to be verified;
The intelligence contract node is encrypted by application content described in the secret key pair to be verified to generate abstract to be verified,
The abstract to be verified is compared with the original digest, comparison result is sent to the application node, so that institute
It states application node and the approval results is handled according to the comparison result.
2. the method as described in claim 1, which is characterized in that it is described intelligence contract node will it is described it is to be verified make a summary with it is described
Original digest is compared, and comparison result is sent to the application node, so that the application node is according to the comparison
As a result the step of approval results being handled, comprising:
The abstract to be verified is compared the intelligence contract node with the original digest;
It is described it is to be verified abstract it is identical as the original digest when, comparison result is sent to the application node so that
The application node receives the approval results.
3. method according to claim 2, which is characterized in that it is described intelligence contract node will it is described it is to be verified make a summary with it is described
After the step of original digest is compared, the method also includes:
When the abstract to be verified is with the original digest difference, comparison result is sent to the application node, so that
The application node shields the approval results.
4. the method according to claim 1, which is characterized in that the application node obtains in pending application
Hold, the application content is saved in the block of the block catenary system, and to the application in the block catenary system
The step of content is broadcasted, comprising:
The application node obtains pending application content and the corresponding applying type of the application content, and will be described
Application content is saved in the block of the block catenary system;
Corresponding with applying type digital certificate is obtained from the block catenary system, passes through the in the digital certificate
Application content described in one key pair is encrypted, and application content ciphertext is obtained;
The application content ciphertext is broadcasted in the block catenary system.
5. method as claimed in claim 4, which is characterized in that the Shen that the approval node is received by encrypting secret key pair
Please content encrypted, generate cryptographic digest the step of before, comprising:
The approval node receives the application content ciphertext of the application node broadcast;
Corresponding with applying type digital certificate is obtained from the block catenary system, passes through the in the digital certificate
Application content ciphertext described in two key pairs is decrypted, and obtains the application content.
6. the method according to claim 1, which is characterized in that the approval node is received by encrypting secret key pair
The application content encrypted, generate cryptographic digest, be saved in the block for the cryptographic digest as original digest
After step in the block of catenary system, further includes:
The intelligence contract node in real time detects the original digest in the block;
When detecting that the original digest changes, the original digest after change is carried out in the block catenary system wide
It broadcasts.
7. the method according to claim 1, which is characterized in that the application node obtains in pending application
Hold, after the step that the application content is saved in the block of the block catenary system, further includes:
The intelligence contract node in real time detects the application content in the block;
When detecting that the application content changes, the application content after change is carried out in the block catenary system wide
It broadcasts;
For the intelligence contract node when detecting that the original digest changes, Xiang Suoshu approval node issues change confirmation
Information;
The intelligence contract node is when receiving feedback of the approval node for the change confirmation message, in block linkwork
The application content after change is broadcasted in system.
8. a kind of workflow examination and approval device based on block catenary system, which is characterized in that described device includes:
Broadcast module, for obtaining pending application content by the application node in the block catenary system, by the application
Content is saved in the block of the block catenary system, and is broadcasted in the block catenary system the application content;
Summarization generation module, the application for being received by the approval node in the block catenary system by encrypting secret key pair
Content is encrypted, and generates cryptographic digest, the area of the block catenary system is saved in using the cryptographic digest as original digest
In block;
Approval results are fed back to the Shen for being examined by the approval node to the application content by approval module
Please node, and be sent to the intelligent contract node for the encryption code key as code key to be verified;
Authentication module, for passing through application described in the secret key pair to be verified as the intelligent contract node in the block catenary system
Content is encrypted to generate abstract to be verified, and the abstract to be verified is compared with the original digest, is tied comparing
Fruit is sent to the application node so that the application node according to the comparison result to the approval results at
Reason.
9. a kind of block catenary system, which is characterized in that the block catenary system includes memory, processor and is stored in described deposit
On reservoir and the workflow examination and approval program that can run on the processor, the workflow examination and approval program are arranged for carrying out right such as and want
The step of workflow examination and approval method described in asking any one of 1 to 7 based on block catenary system.
10. a kind of storage medium, which is characterized in that be stored with workflow examination and approval program, the workflow examination and approval on the storage medium
It realizes as described in any one of claims 1 to 7 when program is executed by processor based on the workflow examination and approval method of block catenary system
The step of.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910046791.4A CN109858262B (en) | 2019-01-17 | 2019-01-17 | Process approval method, device and system based on block chain system and storage medium |
PCT/CN2019/116473 WO2020147383A1 (en) | 2019-01-17 | 2019-11-08 | Process examination and approval method, device and system employing blockchain system, and non-volatile storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910046791.4A CN109858262B (en) | 2019-01-17 | 2019-01-17 | Process approval method, device and system based on block chain system and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109858262A true CN109858262A (en) | 2019-06-07 |
CN109858262B CN109858262B (en) | 2022-06-17 |
Family
ID=66895286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910046791.4A Active CN109858262B (en) | 2019-01-17 | 2019-01-17 | Process approval method, device and system based on block chain system and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109858262B (en) |
WO (1) | WO2020147383A1 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110430194A (en) * | 2019-08-06 | 2019-11-08 | 腾讯科技(深圳)有限公司 | A kind of method of Information Authentication, the method and device of chess and card Information Authentication |
CN110570198A (en) * | 2019-10-12 | 2019-12-13 | 链农(深圳)信息科技有限公司 | account book security reinforcement method and device based on intelligent contract nodes of block chains |
CN110598479A (en) * | 2019-09-20 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Data processing method and device and computer readable storage medium |
CN110798489A (en) * | 2020-01-06 | 2020-02-14 | 成都四方伟业软件股份有限公司 | Data approval method and system based on block chain |
CN110941674A (en) * | 2019-11-26 | 2020-03-31 | 北京海益同展信息科技有限公司 | Block chain-based compliance audit method, device, system and storage medium |
CN111047300A (en) * | 2019-12-19 | 2020-04-21 | 江西宜月鑫网络科技有限公司 | Block chain-based online examination and approval method, terminal and readable storage medium |
WO2020147383A1 (en) * | 2019-01-17 | 2020-07-23 | 平安科技(深圳)有限公司 | Process examination and approval method, device and system employing blockchain system, and non-volatile storage medium |
CN111988421A (en) * | 2020-08-28 | 2020-11-24 | 清华大学 | Method and system for recording DDoS attack log abstract based on block chain |
CN112052033A (en) * | 2020-09-02 | 2020-12-08 | 江苏省电力试验研究院有限公司 | Power distribution automation master station version management method and system based on process and block chain |
CN112261035A (en) * | 2020-10-20 | 2021-01-22 | 中国联合网络通信集团有限公司 | Information management method based on block chain, prevention and control center node and rework platform |
WO2021012500A1 (en) * | 2019-07-23 | 2021-01-28 | 平安科技(深圳)有限公司 | Blockchain-based parallel system deployment method and apparatus, and computer device |
CN112434609A (en) * | 2020-11-23 | 2021-03-02 | 滁州学院 | Block chain-based test reagent use track tracing method |
CN112732676A (en) * | 2021-01-12 | 2021-04-30 | 成都库珀区块链科技有限公司 | Data migration method, device, equipment and storage medium based on block chain |
CN113256257A (en) * | 2021-05-28 | 2021-08-13 | 北京瑞卓喜投科技发展有限公司 | Transaction signing method and device based on block chain and electronic equipment |
CN113379377A (en) * | 2021-06-02 | 2021-09-10 | 南方电网能源发展研究院有限责任公司 | Power grid engineering construction approval processing method and device |
CN113837880A (en) * | 2021-09-14 | 2021-12-24 | 杭州链城数字科技有限公司 | Data transaction method and device and electronic equipment |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115497B (en) * | 2020-09-28 | 2023-06-27 | 上海对外经贸大学 | Block chain-based public opinion storage information erasable treatment method |
CN112187948B (en) * | 2020-10-09 | 2023-04-25 | 中国农业银行股份有限公司四川省分行 | Approval file encryption batch uploading method and device based on SpringBoot framework |
CN112633858A (en) * | 2021-01-05 | 2021-04-09 | 润联软件系统(深圳)有限公司 | Process approval processing method and system |
CN115170096A (en) * | 2022-09-08 | 2022-10-11 | 中国电子科技集团公司第十五研究所 | Data auditing processing system, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107341702A (en) * | 2017-03-08 | 2017-11-10 | 阿里巴巴集团控股有限公司 | A kind of method and device of business processing |
CN107633469A (en) * | 2017-08-18 | 2018-01-26 | 暨南大学 | A kind of scholarship management method and system based on block chain technology |
WO2018076762A1 (en) * | 2016-10-27 | 2018-05-03 | 上海亿账通区块链科技有限公司 | Block chain-based transaction verification method and system, electronic device, and medium |
US9992022B1 (en) * | 2017-02-06 | 2018-06-05 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
WO2018126858A1 (en) * | 2017-01-06 | 2018-07-12 | 中国银联股份有限公司 | Blockchain technology-based robust atm network system and information processing method therefor |
US20180330343A1 (en) * | 2017-05-11 | 2018-11-15 | Microsoft Technology Licensing, Llc | Cryptlet smart contract |
US20180337771A1 (en) * | 2017-05-19 | 2018-11-22 | International Business Machines Corporation | Policy enforcement via peer devices using a blockchain |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150019871A1 (en) * | 2013-07-10 | 2015-01-15 | Transcend Information, Inc. | Certification method and electronic device |
CN107292621B (en) * | 2017-06-22 | 2020-10-27 | 丁江 | Method and node for determining authority and storing certificate of mass data |
US10135607B1 (en) * | 2017-08-11 | 2018-11-20 | Dragonchain, Inc. | Distributed ledger interaction systems and methods |
CN109858262B (en) * | 2019-01-17 | 2022-06-17 | 平安科技(深圳)有限公司 | Process approval method, device and system based on block chain system and storage medium |
-
2019
- 2019-01-17 CN CN201910046791.4A patent/CN109858262B/en active Active
- 2019-11-08 WO PCT/CN2019/116473 patent/WO2020147383A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018076762A1 (en) * | 2016-10-27 | 2018-05-03 | 上海亿账通区块链科技有限公司 | Block chain-based transaction verification method and system, electronic device, and medium |
WO2018126858A1 (en) * | 2017-01-06 | 2018-07-12 | 中国银联股份有限公司 | Blockchain technology-based robust atm network system and information processing method therefor |
US9992022B1 (en) * | 2017-02-06 | 2018-06-05 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
CN107341702A (en) * | 2017-03-08 | 2017-11-10 | 阿里巴巴集团控股有限公司 | A kind of method and device of business processing |
US20180330343A1 (en) * | 2017-05-11 | 2018-11-15 | Microsoft Technology Licensing, Llc | Cryptlet smart contract |
US20180337771A1 (en) * | 2017-05-19 | 2018-11-22 | International Business Machines Corporation | Policy enforcement via peer devices using a blockchain |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107633469A (en) * | 2017-08-18 | 2018-01-26 | 暨南大学 | A kind of scholarship management method and system based on block chain technology |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020147383A1 (en) * | 2019-01-17 | 2020-07-23 | 平安科技(深圳)有限公司 | Process examination and approval method, device and system employing blockchain system, and non-volatile storage medium |
WO2021012500A1 (en) * | 2019-07-23 | 2021-01-28 | 平安科技(深圳)有限公司 | Blockchain-based parallel system deployment method and apparatus, and computer device |
CN110430194B (en) * | 2019-08-06 | 2022-04-15 | 腾讯科技(深圳)有限公司 | Information verification method, chess and card information verification method and device |
CN110430194A (en) * | 2019-08-06 | 2019-11-08 | 腾讯科技(深圳)有限公司 | A kind of method of Information Authentication, the method and device of chess and card Information Authentication |
CN110598479A (en) * | 2019-09-20 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Data processing method and device and computer readable storage medium |
CN110570198A (en) * | 2019-10-12 | 2019-12-13 | 链农(深圳)信息科技有限公司 | account book security reinforcement method and device based on intelligent contract nodes of block chains |
CN110941674A (en) * | 2019-11-26 | 2020-03-31 | 北京海益同展信息科技有限公司 | Block chain-based compliance audit method, device, system and storage medium |
CN111047300A (en) * | 2019-12-19 | 2020-04-21 | 江西宜月鑫网络科技有限公司 | Block chain-based online examination and approval method, terminal and readable storage medium |
CN111047300B (en) * | 2019-12-19 | 2023-04-18 | 深圳天玑数据有限公司 | Block chain-based online examination and approval method, terminal and readable storage medium |
CN110798489A (en) * | 2020-01-06 | 2020-02-14 | 成都四方伟业软件股份有限公司 | Data approval method and system based on block chain |
CN111988421A (en) * | 2020-08-28 | 2020-11-24 | 清华大学 | Method and system for recording DDoS attack log abstract based on block chain |
CN111988421B (en) * | 2020-08-28 | 2021-04-16 | 清华大学 | Method and system for recording DDoS attack log abstract based on block chain |
CN112052033A (en) * | 2020-09-02 | 2020-12-08 | 江苏省电力试验研究院有限公司 | Power distribution automation master station version management method and system based on process and block chain |
CN112261035A (en) * | 2020-10-20 | 2021-01-22 | 中国联合网络通信集团有限公司 | Information management method based on block chain, prevention and control center node and rework platform |
CN112434609A (en) * | 2020-11-23 | 2021-03-02 | 滁州学院 | Block chain-based test reagent use track tracing method |
CN112732676A (en) * | 2021-01-12 | 2021-04-30 | 成都库珀区块链科技有限公司 | Data migration method, device, equipment and storage medium based on block chain |
CN112732676B (en) * | 2021-01-12 | 2023-12-05 | 库珀科技集团有限公司 | Block chain-based data migration method, device, equipment and storage medium |
CN113256257A (en) * | 2021-05-28 | 2021-08-13 | 北京瑞卓喜投科技发展有限公司 | Transaction signing method and device based on block chain and electronic equipment |
CN113379377A (en) * | 2021-06-02 | 2021-09-10 | 南方电网能源发展研究院有限责任公司 | Power grid engineering construction approval processing method and device |
CN113837880A (en) * | 2021-09-14 | 2021-12-24 | 杭州链城数字科技有限公司 | Data transaction method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2020147383A1 (en) | 2020-07-23 |
CN109858262B (en) | 2022-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109858262A (en) | Workflow examination and approval method, apparatus, system and storage medium based on block catenary system | |
US10547444B2 (en) | Cloud encryption key broker apparatuses, methods and systems | |
Kissel | Glossary of key information security terms | |
CN109840771A (en) | A kind of block chain intimacy protection system and its method based on homomorphic cryptography | |
US20170026343A1 (en) | Anonymous Account Security Exchange | |
CN109902494A (en) | Data encryption storage method, device and document storage system | |
Lu et al. | Reducing automotive counterfeiting using blockchain: Benefits and challenges | |
CN105812334B (en) | A kind of method for network authorization | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
CN110719176A (en) | Logistics privacy protection method and system based on block chain and readable storage medium | |
CN110210249A (en) | The system and method for track query function of hideing are realized based on data obfuscation | |
CN111737715A (en) | Decentralized electronic contract online signing method and system | |
CN112632574A (en) | Multi-mechanism data processing method and device based on alliance chain and related equipment | |
Silva et al. | Calculating the trust of providers through the construction weighted Sec-SLA | |
Mukte et al. | Smart Data Transfer for Data Monetization | |
Gupta et al. | Cloud computing: Security threats & control strategy using tri-mechanism | |
CN104618306A (en) | Novel integrated mobile phone data transmission key signal encryption method | |
CN107689867B (en) | Key protection method and system under open environment | |
Paul et al. | A cryptographic method for defense against mitm cyber attack in the electricity grid supply chain | |
Radanliev | Cyber-attacks on Public Key Cryptography | |
Zhou et al. | Towards blockchain-based auditing of data exchanges | |
Zhang et al. | Controlling Information Risk in E-commerce | |
Zhang et al. | Controlling Network Risk in E-commerce | |
KR100638265B1 (en) | method for secure for exchanging e-document in the internet | |
Singh et al. | Comparative Analysis of Web Application Based Encryption Methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |