CN109858262A - Workflow examination and approval method, apparatus, system and storage medium based on block catenary system - Google Patents

Workflow examination and approval method, apparatus, system and storage medium based on block catenary system Download PDF

Info

Publication number
CN109858262A
CN109858262A CN201910046791.4A CN201910046791A CN109858262A CN 109858262 A CN109858262 A CN 109858262A CN 201910046791 A CN201910046791 A CN 201910046791A CN 109858262 A CN109858262 A CN 109858262A
Authority
CN
China
Prior art keywords
node
approval
application
catenary system
block catenary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910046791.4A
Other languages
Chinese (zh)
Other versions
CN109858262B (en
Inventor
姜翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910046791.4A priority Critical patent/CN109858262B/en
Publication of CN109858262A publication Critical patent/CN109858262A/en
Priority to PCT/CN2019/116473 priority patent/WO2020147383A1/en
Application granted granted Critical
Publication of CN109858262B publication Critical patent/CN109858262B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

Abstract

The invention discloses a kind of workflow examination and approval method, apparatus, system and storage mediums based on block catenary system, the block catenary system includes at least application node, approval node and intelligent contract node, the application node obtains pending application content, application content is saved in block catenary system, and the application content is broadcasted;Approval node is encrypted by encrypting the application content that secret key pair receives, and is generated cryptographic digest, is saved in block catenary system for cryptographic digest as original digest;Approval node examines application content, approval results is fed back to application node, and be sent to intelligent contract node using encryption code key as code key to be verified;Intelligent contract node carries out secondary encryption by secret key pair application content to be verified, if secondary encrypted result is consistent with original digest, approval node authentication success, and then improve safety guarantee of enterprise during office automation workflow examination and approval.

Description

Workflow examination and approval method, apparatus, system and storage medium based on block catenary system
Technical field
The present invention relates to computer information technology field more particularly to a kind of workflow examination and approval sides based on block catenary system Method, device, system and storage medium.
Background technique
Office automation (Office Automation, abbreviation OA) is to combine modern office and computer technology The novel working way of the one kind come.The ununified definition of office automation, it is all in traditional office using various New technology, new engine, new equipment are engaged in office service, belong to the field of office automation.By realization office automation, or Person says realization digital office, can optimize existing management institutional framework, management system is adjusted, on the basis improved efficiency On, increase synergetic office work ability, strengthens the consistency of decision.
And common office automation workflow examination and approval has: financial category approval process (such as expense reimbursement, examination & approval of refunding of borrowing money Process, work and fund payment flow, fund take in process), administrative affair class approval process (application of going on business of such as asking for leave, overtime work Application), business associated class approval process (approval process, the buying approval process, contract approval process of such as order).
In the approval process of the above office automation process, the critically important data of company may be related to, be also simultaneously The secret of company.The examination & approval label reporting system of company is stored data in database now, it is understood that there may be by hacker attacks The hidden danger distorted or stolen can cause no small loss to enterprise in this way, therefore guarantee office automation workflow examination and approval content Safety and can not tamper it is particularly significant.
Summary of the invention
The main purpose of the present invention is to provide a kind of workflow examination and approval method, apparatus based on block catenary system, system and Storage medium, it is intended to which the examination & approval label reporting system for solving how to reduce current enterprise is deposited during office automation workflow examination and approval Security risk the problem of.
To achieve the above object, the present invention provides a kind of workflow examination and approval method based on block catenary system, the block chain System includes at least application node, approval node and intelligent contract node, which comprises
The application node obtains pending application content, and the application content is saved in the block catenary system In block, and the application content is broadcasted in the block catenary system;
The approval node is encrypted by encrypting the application content that secret key pair receives, and generates cryptographic digest, will The cryptographic digest is saved in the block of the block catenary system as original digest;
The approval node examines the application content, approval results is fed back to the application node, and will The encryption code key is sent to the intelligent contract node as code key to be verified;
The intelligence contract node is encrypted to be verified to generate by application content described in the secret key pair to be verified The abstract to be verified is compared with the original digest, comparison result is sent to the application node by abstract, so that The application node is obtained to handle the approval results according to the comparison result.
Preferably, the abstract to be verified is compared the intelligent contract node with the original digest, will compare As a result be sent to the application node so that the application node according to the comparison result to the approval results at The step of reason, comprising:
The abstract to be verified is compared the intelligence contract node with the original digest;
It is described it is to be verified abstract it is identical as the original digest when, comparison result is sent to the application node, with So that the application node receives the approval results.
Preferably, the step of abstract to be verified is compared the intelligent contract node with the original digest it Afterwards, the method also includes:
When the abstract to be verified is with the original digest difference, comparison result is sent to the application node, with So that the application node shields the approval results.
Preferably, the application node obtains pending application content, and the application content is saved in the block In the block of catenary system, and the step of application content is broadcasted in the block catenary system, comprising:
The application node obtains pending application content and the corresponding applying type of the application content, and will The application content is saved in the block of the block catenary system;
Digital certificate corresponding with the applying type is obtained from the block catenary system, by the digital certificate First key the application content is encrypted, obtain application content ciphertext;
The application content ciphertext is broadcasted in the block catenary system.
Preferably, the approval node is encrypted by encrypting the application content that secret key pair receives, and generates encryption Before the step of abstract, comprising:
The approval node receives the application content ciphertext of the application node broadcast;
Digital certificate corresponding with the applying type is obtained from the block catenary system, by the digital certificate The second key pair described in application content ciphertext be decrypted, obtain the application content.
Preferably, the approval node is encrypted by encrypting the application content that secret key pair receives, and generates encryption It makes a summary, after the step that the cryptographic digest is saved in the block of the block catenary system as original digest, further includes:
The intelligence contract node in real time detects the original digest in the block;
When detecting that the original digest changes, in the block catenary system to the original digest after change into Row broadcast.
Preferably, the application node obtains pending application content, and the application content is saved in the block After step in the block of catenary system, further includes:
The intelligence contract node in real time detects the application content in the block;
When detecting that the application content changes, in the block catenary system to the application content after change into Row broadcast.
For the intelligence contract node when detecting that the original digest changes, Xiang Suoshu approval node issues change Confirmation message;
The intelligence contract node is when receiving feedback of the approval node for the change confirmation message, in block The application content after change is broadcasted in catenary system.
In addition, to achieve the above object, the present invention also proposes a kind of workflow examination and approval device based on block catenary system, it is special Sign is that described device includes:
Broadcast module will be described for obtaining pending application content by the application node in the block catenary system Application content is saved in the block of the block catenary system, and is carried out extensively in the block catenary system to the application content It broadcasts;
Summarization generation module, described in being received as the approval node in the block catenary system by encryption secret key pair Application content is encrypted, and is generated cryptographic digest, is saved in the block catenary system for the cryptographic digest as original digest Block in;
Approval results are fed back to institute for being examined by the approval node to the application content by approval module Application node is stated, and is sent to the intelligent contract node for the encryption code key as code key to be verified;
Authentication module, for being passed through described in the secret key pair to be verified as the intelligent contract node in the block catenary system Application content is encrypted to generate abstract to be verified, and the abstract to be verified is compared with the original digest, will be compared The application node is sent to result, so that the application node carries out the approval results according to the comparison result Processing.
In addition, to achieve the above object, the present invention also proposes that a kind of block catenary system, the block catenary system include storage Device, processor and it is stored in the workflow examination and approval program that can be run on the memory and on the processor, the process is examined Batch program is arranged for carrying out the step of workflow examination and approval method based on block catenary system as described above.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, process is stored on the storage medium Examination and approval procedures realize the workflow examination and approval side as described above based on block catenary system when the workflow examination and approval program is executed by processor The step of method.
Block catenary system of the invention includes at least application node, approval node and intelligent contract node, the application section Point obtains pending application content, and application content is saved in block catenary system, and is broadcasted the application content; Approval node is encrypted by encrypting the application content that secret key pair receives, and cryptographic digest is generated, using cryptographic digest as original Abstract is saved in block catenary system;Approval node examines application content, approval results is fed back to application node, and will Code key is encrypted as code key to be verified and is sent to intelligent contract node;Intelligent contract node passes through secret key pair application content to be verified Secondary encryption is carried out, if secondary encrypted result is consistent with original digest, illustrates approval node authentication success, application node The approval results received are normal, and then improve safety of enterprise during office automation workflow examination and approval and protect Barrier.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of the block catenary system for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the another structural schematic diagram of the block catenary system for the hardware running environment that the embodiment of the present invention is related to;
Fig. 3 is a kind of flow diagram of the workflow examination and approval method first embodiment based on block catenary system of the present invention;
Fig. 4 is a kind of flow diagram of the workflow examination and approval method second embodiment based on block catenary system of the present invention;
Fig. 5 is a kind of flow diagram of the workflow examination and approval method 3rd embodiment based on block catenary system of the present invention;
Fig. 6 is a kind of structural block diagram of the workflow examination and approval device based on block catenary system of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, Fig. 1 is the structural representation of the block catenary system for the hardware running environment that the embodiment of the present invention is related to Figure.Block chain is the network system of a decentralization, and the present embodiment block catenary system includes at least application node, approval node With intelligent contract node,
It will be appreciated that " node " of the invention refers to the computer in block chain network, mobile phone, platform can be Formula machine or server etc., each " node " can protect the information of write-in after supporting information write-in, such as a node write-in information It is stored in the block of the node, then the node broadcasts the information after preservation to the whole network of the block chain, so that area Other nodes in block chain network can receive the information that the node is written and saves, each node meeting in block catenary system Common maintenance data, each node have a complete data backup.
" application node " in the present invention can be understood as initiating meter used in the employee of all kinds of approval requests in enterprise Calculation machine (such as mobile phone or desktop computer), correspondingly, " approval node " in the present invention can be understood as having process in enterprise Examine computer (such as mobile phone or desktop computer) used in the personnel of qualification;
And " intelligent contract node " can be an individual server, and " application node " is stored on the server With the intelligent contract used when " approval node " interaction, it will be understood that, in block chain technical field, what intelligent contract referred to It is a set of preset program, that is to say, that when " application node " and " approval node " under the block catenary system is handed over When mutual, " intelligent contract node " can bring into operation, for completing the interactive process of " application node " and " approval node ".
Another embodiment is that " intelligent contract node " can also characterize " application node " and " the examination & approval section Point ", i.e., " intelligent contract node " of the invention are also possible to the concept of a virtual abstraction, and intelligent contract can be deployed in respectively It is " application node " and described " approval node ", when " application node " and " approval node " under the block catenary system needs to carry out When interaction, the intelligent contract that " application node " and " approval node " is respectively disposed can be behaved, for completing " application node " The interactive process of " approval node ".
Further, with reference to Fig. 2, the block catenary system for the hardware running environment that the embodiment of the present invention is related to it is another Structural schematic diagram.As shown in Fig. 2, the block catenary system may include: processor 1001, such as CPU, communication bus 1002 is used Family interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is for realizing the company between these components Connect letter.User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), can be selected Family interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include standard Wireline interface, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable deposit Reservoir (non-volatile memory), such as magnetic disk storage.
It will be appreciated that the hardware of block catenary system of the invention is corresponding by each block node under block catenary system Hardware device (such as server) composition, the processor can be the processor of one of node server, can also incite somebody to action The processor of each block node server regards the processor of a block catenary system collectively regarded as of the invention as.Show in Fig. 2 The hardware configuration of a node under representation block catenary system out;Certainly, structure shown in Figure 2 is not constituted to institute The restriction for stating the hardware configuration of the node under block catenary system may include than illustrating more or fewer components, or difference Component layout.
As shown in Fig. 2, may include operating system, network communication module, Subscriber Interface Module SIM in the memory 1005 And workflow examination and approval program.In structure shown in Fig. 2, network interface 1004 is mainly used for each section under the block catenary system Data communication between point;Block catenary system of the present invention calls the workflow examination and approval journey stored in memory 1005 by processor 1001 Sequence, and the step of executing the workflow examination and approval method based on block catenary system.
It is provided by the invention a kind of based on block catenary system based on the hardware environment of above-mentioned block catenary system referring to Fig. 3 The first embodiment of workflow examination and approval method.
In the present embodiment, the block catenary system includes at least application node, approval node and intelligent contract node, described Method includes:
Step S10: the application node obtains pending application content, and the application content is saved in the block In the block of catenary system, and the application content is broadcasted in the block catenary system.
It will be appreciated that " application node " of the present embodiment can be understood as initiating in various types of applications in enterprise Computer used in the employee of appearance (such as mobile phone or desktop computer, referred to as " application node equipment ");Correspondingly, this implementation Example in " approval node " can be understood as computer used in the personnel for having workflow examination and approval qualification in enterprise (such as mobile phone or Person's desktop computer, referred to as " approval node equipment ").
Specifically, it is desirable to which the employee for initiating office automation workflow examination and approval application will use " application node equipment ", pass through Pending application content is inputted to " application node equipment ", application content can be saved in described by " application node equipment " in this way In " application node " corresponding block, then " application node " can in the block catenary system to the application content into Row broadcast, so that each " approval node " of the block catenary system can receive the copending of " application node " initiation Apply for content.
Step S20: the approval node is encrypted by encrypting the application content that secret key pair receives, and generates encryption Abstract, is saved in the block of the block catenary system using the cryptographic digest as original digest.
It will be appreciated that the office automation approving person of enterprise would generally be copending to what is received based on office system Application content carries out examination & approval processing, but a scene corresponding with security risk of the existing technology is: assuming that " application section Point " A, which transmits pending application a content T, node B to " approval node " B, will apply the result of content T examination & approval (assuming that not having Have and pass through examination & approval) node A is fed back to, since content T belongs to the classified papers (e.g. a contract) of company, it would be possible that meeting Deposit this hidden danger: node B examination & approval by later by the approval results of content T feed back to node A this during, hacker enters It invades that content T intercept and steals, then the approval results of content T are fed back to node A by hacker " approval node " B that disguises oneself as (practical examination & approval not over, but hacker claims T that examination & approval pass through), such node A will have " misunderstanding ", and entire company Not know and is hacked this meeting thing of visitor's invasion, subsequent work can make mistakes again and again, meanwhile, the confidential content T of company is also known by hacker Dawn.
Therefore, hacker attacks system disguises oneself as " approval node " in order to prevent, the office automation of the enterprise of the present embodiment Approving person will use " approval node equipment " to while receiving pending application content T and carry out examination & approval processing, in execution Step S20 is stated " to encrypt the application content T received by encrypting code key s, generate cryptographic digest T`, described will add Close abstract T` is saved in the block of the block catenary system as original digest;
Certainly described " approval node equipment " can also to receive pending application content carry out examination & approval processing it Interior execution above-mentioned steps S20 of a certain period preceding or later.
It will be appreciated that the cryptographic digest T` storage of generation is arrived and " is examined by " approval node " due to the characteristic of block catenary system In the block of batch node " (node B), the node of block catenary system entire in this way can inquire T`.Assuming that node B is by hacker's puppet Dress is that can not be equivalent to hacker by the false abstract storage of encryption into the block of node B if hacker oneself encrypts T Oneself can not save falseness abstract, therefore there is no the false abstract letters that hacker oneself generates in block catenary system Breath, (due to the characteristic of block chain, hacker will not carry out additions and deletions to the block of block catenary system and change, even if by the modification area Ye Huibei Block catenary system the whole network user has found at once).
It should be noted that the present embodiment mode that pending application content is encrypted can there are many form, Can be used MD5 algorithm (Message Digest 5, Message-Digest Algorithm), asymmetric RSA Algorithm can be used, can also To use DES symmetric encipherment algorithm;The present embodiment preferably uses MD5 algorithm to encrypt pending application content, example Such as: MD5 algorithm is grouped to handle pending application content with 512, and each grouping is divided into 16 32 seats point again Group, after have passed through a series of processing, the output of algorithm is formed by four 32, will be incited somebody to action after this four 32 packet concatenations Unique 128 hashed value is generated, 128 hashed values are the cryptographic digest generated.
Step S30: the approval node examines the application content, and approval results are fed back to the application and are saved Point, and the intelligent contract node is sent to using the encryption code key as code key to be verified.
It should be noted that the present embodiment is with the individual clothes that " intelligent contract node " is under the block catenary system It is illustrated for business device.
Specifically, in the present embodiment, " approval node " (node B) carries out examination & approval processing to application content T, by approval results Node A is fed back to, this process may be by hacker's intrusion system due to " approval results are fed back to node A by node B " The case where occur, it is possible to there is the case where hacker disguises oneself as node B to node A feedback information, therefore node B also needs to add Close code key s is sent to " intelligent contract node " as code key s` to be verified, so that " intelligent contract node " executes following step S40 carries out secondary encrypted authentication.
Step S40: the intelligence contract node is encrypted by application content described in the secret key pair to be verified with life At abstract to be verified, the abstract to be verified is compared with the original digest, comparison result is sent to the application Node, so that the application node is handled the approval results according to the comparison result.
In the concrete realization, the cryptographic digest is construed as an identification information of " approval node ".
It will be appreciated that code key s` to be verified is passed to " intelligent contract node " by node B, utilized by " intelligent contract node " Code key s` to be verified carries out secondary encryption to application content T, if obtained abstract to be verified is exactly that T` (obtains to be verified pluck Will be as the cryptographic digest T` stored in the block of block catenary system), then prove that approval node B is not pretended by hacker, because It is unique for cryptographic digest T` here.
The embodiment of the present invention encryption key s can only be encrypted, and can not be decrypted, and " intelligent contract node " is to application content T carries out secondary encryption, if the first time cryptographic digest that the cryptographic digest and block catenary system that obtain after encrypting for second save Equally, then prove that approval node B is not pretended illegally by hacker.
Further, the step of abstract to be verified is compared the intelligent contract node with the original digest Later, it if the abstract to be verified is identical as the original digest, proves that approval node B is not pretended by hacker, will compare As a result it is sent to the application node, so that the application node receives the approval results, i.e. approval node B feedback is examined Batch result is correct, and the approval status of the application content T updated in application node A block is then updated to " passing through state ".
If different from the original digest in the abstract to be verified, comparison result is sent to the application node, To prompt the application node A: approval node B has been pretended by hacker, so that the application node A shields the examination & approval knot Fruit.
" intelligent contract node " passes through its hair of the key pair that is sent by " approval node " under the block catenary system of the present embodiment The pending application content sent carries out secondary encryption, if the abstract to be verified that is generated after encryption and the block catenary system The original digest stored before in block is consistent, then to " approval node " authentication success, what " application node " received is examined Batch the result is that normal, and then improve safety guarantee of enterprise during office automation workflow examination and approval.
According to the above-mentioned workflow examination and approval method based on block catenary system, until examination & approval content is by all under block catenary system " approval node " examination & approval pass through.
It further, is that the present invention is based on the second embodiments of the workflow examination and approval method of block catenary system referring to Fig. 4, Fig. 4 Flow diagram proposes that the present invention is based on block catenary systems based on the first embodiment of above-mentioned workflow examination and approval method shown in Fig. 3 Workflow examination and approval method second embodiment.
In the present embodiment, the step S10 is specifically included:
Step S101: the application node obtains pending application content and the corresponding application of the application content Type, and the application content is saved in the block of the block catenary system;
It will be appreciated that there are many common office automation OA process applying types, such as: financial category approval process, Administrative affair class approval process, business associated class approval process etc..
Step S102: the application node obtains number card corresponding with the applying type from the block catenary system Book encrypts the application content by the first key in the digital certificate, obtains application content ciphertext;
Specifically, in the block catenary system of the present embodiment, different numbers can be preset for different applying types Certificate (Certification Authority), between different digital certificates and each digital certificate and applying type Relationship can be saved in each node of the block catenary system.
The digital certificate includes first key and the second key, and the first key is used for pending application content It is encrypted, and then generates application content ciphertext;And second key is for being decrypted the application content ciphertext.This The digital certificate of embodiment can be for using asymmetric key cipher Encryption Algorithm (RSA), i.e. first key be public key for adding Close, the second key is private key for decrypting.
Step S103: the application node broadcasts the application content ciphertext in the block catenary system.
Step S104: the approval node receives the application content ciphertext of the application node broadcast;From the block chain Digital certificate corresponding with the applying type is obtained in system, by applying described in the second key pair in the digital certificate Content ciphertext is decrypted, and obtains the application content.
Specifically, the approval node obtains the second key from the digital certificate, by the second key from the Shen Characteristic please be extracted in content ciphertext to be decrypted to carry out RSA Algorithm operation, obtain the application content.
The embodiment of the present invention application node broadcasts encrypted application content, can prevent so copending Application content is not eavesdropped in broadcast transmission process by hacker, prevents from being tampered.
It further, is that the present invention is based on the 3rd embodiments of the workflow examination and approval method of block catenary system referring to Fig. 5, Fig. 5 Flow diagram is based on above-mentioned embodiment shown in Fig. 3, proposes that the present invention is based on the of the workflow examination and approval method of block catenary system Three embodiments.
In the present embodiment, after the step S20, the method also includes:
Step S201: the intelligence contract node in real time detects the original digest in the block;
Step S202: the intelligence contract node is when detecting that the original digest changes, in the block chain The original digest after change is broadcasted in system.
It will be appreciated that the present embodiment the original digest saved in block catenary system can be detected in real time (such as Monitoring scanning can be carried out to the original digest being just saved in the block catenary system before step S30), if hacker enters It invades block catenary system and the original digest in block is carried out and distorted, then the original digest scanned is certainly former with storage before The content made a summary that begins is not identical, once data are distorted by hacker to be found at once by the whole network node users under block catenary system, Node users each in this way can enhance your vigilance, and user can voluntarily select software antivirus to avoid bigger risk.
The present embodiment utilizes the characteristic of block catenary system, can prevent simultaneously to find what hacker stored block catenary system in time The phenomenon that original digest is distorted, so be avoided that be tampered original digest due to cause hacker disguise oneself as " examination & approval Do not have after node " the case where being found by user (such as hacker oneself generate one camouflage key f, with key f to application Content T is encrypted, and ciphertext L is obtained, and then the cryptographic digest T` that node B is stored is distorted into L by hacker, and then hacker is further Node B disguise oneself as to node A transmission information, while being sent to " intelligent contract section for the key f of camouflage as key to be verified again Point " forces " intelligent contract node " to carry out secondary encryption to application content T using the key f of camouflage, after encryption secondary in this way To abstract just with the abstract L being tampered as, such hacker is successfully made primary camouflage and operates, but user does not know but Road).
Further, it is based on above-mentioned embodiment shown in Fig. 3, proposes that the present invention is based on the workflow examination and approval sides of block catenary system The fourth embodiment of method.
In the present embodiment, before the step S30, the method also includes:
Step: the intelligence contract node is when detecting that the application content changes, Xiang Suoshu application node hair Confirmation message is changed out;
It will be appreciated that the present embodiment the application content saved in block catenary system can be detected in real time (such as The material file important to the company of block catenary system preservation carries out monitoring scanning within every 5 minutes), if hacker attacks block Catenary system to the pending application content tampering stored in block, then the application content that scans certainly with store before Content is not identical.
Specifically, can by the application Content Transformation be binary data, if below discovery scanning binary data and Difference before then illustrates that application contents have been tampered, and then executes following step S032:
Step: it is described intelligence contract node receive the application node for it is described change confirmation message feedback when, The step of execution broadcasts the application content after change in block catenary system.
The present embodiment utilizes the characteristic of block catenary system, prevents hacker from carrying out additions and deletions to the data that block catenary system stores Change, once data are distorted by hacker to be found at once by the whole network node users under block catenary system, node users each in this way It will enhance your vigilance, user can voluntarily select software antivirus to avoid bigger risk.
Further, in one embodiment, described " intelligent contract node " is also possible to " applicant's node ", i.e., intelligence is closed It is about deployed on " applicant's node ", if intelligent contract is deployed in " application node ", then above-mentioned first implements The executing subject of the step S40 of example is " application node ".
Alternatively, intelligent contract can be deployed in respectively it is " application node " and described " approval node ", when the block catenary system Under " application node " and " approval node " when needing to interact data, " application node " and " approval node " is respectively disposed Intelligent contract can behave, for completing the interactive process of " application node " and " approval node ".
In addition, the embodiment of the present invention also proposes a kind of workflow examination and approval device based on block catenary system, described with reference to Fig. 6 Device includes:
Broadcast module 10, for obtaining pending application content by the application node in the block catenary system, by institute It states application content to be saved in the block of the block catenary system, and the application content is carried out in the block catenary system Broadcast;
Summarization generation module 20, the institute for being received by the approval node in the block catenary system by encrypting secret key pair It states application content to be encrypted, generates cryptographic digest, be saved in the block linkwork for the cryptographic digest as original digest In the block of system;
Approval module 30 feeds back to approval results for being examined by the approval node to the application content The application node, and the intelligent contract node is sent to using the encryption code key as code key to be verified;
Authentication module 40, for passing through the secret key pair institute to be verified by the intelligent contract node in the block catenary system It states application content to be encrypted to generate abstract to be verified, the abstract to be verified is compared with the original digest, it will Comparison result is sent to the application node so that the application node according to the comparison result to the approval results into Row processing.
It will be appreciated that the workflow examination and approval device based on block catenary system of the present embodiment can be a kind of be used for based on area The application software of the workflow examination and approval of block catenary system, and in each node device being loaded into the block catenary system, this The specific embodiment of the workflow examination and approval device based on block catenary system of embodiment please refers to above-mentioned based on block catenary system Workflow examination and approval embodiment of the method, it will not be described here for the present embodiment.
In addition, the embodiment of the present invention also proposes a kind of storage medium, it is stored on the storage medium based on block linkwork The workflow examination and approval program of system realizes the stream as described above based on block catenary system when the workflow examination and approval program is executed by processor The step of journey measures and procedures for the examination and approval.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of workflow examination and approval method based on block catenary system, which is characterized in that the block catenary system includes at least application Node, approval node and intelligent contract node, which comprises
The application node obtains pending application content, and the application content is saved in the block of the block catenary system In, and the application content is broadcasted in the block catenary system;
The approval node is encrypted by encrypting the application content that secret key pair receives, and generates cryptographic digest, will be described Cryptographic digest is saved in the block of the block catenary system as original digest;
The approval node examines the application content, approval results is fed back to the application node, and will be described Encryption code key is sent to the intelligent contract node as code key to be verified;
The intelligence contract node is encrypted by application content described in the secret key pair to be verified to generate abstract to be verified, The abstract to be verified is compared with the original digest, comparison result is sent to the application node, so that institute It states application node and the approval results is handled according to the comparison result.
2. the method as described in claim 1, which is characterized in that it is described intelligence contract node will it is described it is to be verified make a summary with it is described Original digest is compared, and comparison result is sent to the application node, so that the application node is according to the comparison As a result the step of approval results being handled, comprising:
The abstract to be verified is compared the intelligence contract node with the original digest;
It is described it is to be verified abstract it is identical as the original digest when, comparison result is sent to the application node so that The application node receives the approval results.
3. method according to claim 2, which is characterized in that it is described intelligence contract node will it is described it is to be verified make a summary with it is described After the step of original digest is compared, the method also includes:
When the abstract to be verified is with the original digest difference, comparison result is sent to the application node, so that The application node shields the approval results.
4. the method according to claim 1, which is characterized in that the application node obtains in pending application Hold, the application content is saved in the block of the block catenary system, and to the application in the block catenary system The step of content is broadcasted, comprising:
The application node obtains pending application content and the corresponding applying type of the application content, and will be described Application content is saved in the block of the block catenary system;
Corresponding with applying type digital certificate is obtained from the block catenary system, passes through the in the digital certificate Application content described in one key pair is encrypted, and application content ciphertext is obtained;
The application content ciphertext is broadcasted in the block catenary system.
5. method as claimed in claim 4, which is characterized in that the Shen that the approval node is received by encrypting secret key pair Please content encrypted, generate cryptographic digest the step of before, comprising:
The approval node receives the application content ciphertext of the application node broadcast;
Corresponding with applying type digital certificate is obtained from the block catenary system, passes through the in the digital certificate Application content ciphertext described in two key pairs is decrypted, and obtains the application content.
6. the method according to claim 1, which is characterized in that the approval node is received by encrypting secret key pair The application content encrypted, generate cryptographic digest, be saved in the block for the cryptographic digest as original digest After step in the block of catenary system, further includes:
The intelligence contract node in real time detects the original digest in the block;
When detecting that the original digest changes, the original digest after change is carried out in the block catenary system wide It broadcasts.
7. the method according to claim 1, which is characterized in that the application node obtains in pending application Hold, after the step that the application content is saved in the block of the block catenary system, further includes:
The intelligence contract node in real time detects the application content in the block;
When detecting that the application content changes, the application content after change is carried out in the block catenary system wide It broadcasts;
For the intelligence contract node when detecting that the original digest changes, Xiang Suoshu approval node issues change confirmation Information;
The intelligence contract node is when receiving feedback of the approval node for the change confirmation message, in block linkwork The application content after change is broadcasted in system.
8. a kind of workflow examination and approval device based on block catenary system, which is characterized in that described device includes:
Broadcast module, for obtaining pending application content by the application node in the block catenary system, by the application Content is saved in the block of the block catenary system, and is broadcasted in the block catenary system the application content;
Summarization generation module, the application for being received by the approval node in the block catenary system by encrypting secret key pair Content is encrypted, and generates cryptographic digest, the area of the block catenary system is saved in using the cryptographic digest as original digest In block;
Approval results are fed back to the Shen for being examined by the approval node to the application content by approval module Please node, and be sent to the intelligent contract node for the encryption code key as code key to be verified;
Authentication module, for passing through application described in the secret key pair to be verified as the intelligent contract node in the block catenary system Content is encrypted to generate abstract to be verified, and the abstract to be verified is compared with the original digest, is tied comparing Fruit is sent to the application node so that the application node according to the comparison result to the approval results at Reason.
9. a kind of block catenary system, which is characterized in that the block catenary system includes memory, processor and is stored in described deposit On reservoir and the workflow examination and approval program that can run on the processor, the workflow examination and approval program are arranged for carrying out right such as and want The step of workflow examination and approval method described in asking any one of 1 to 7 based on block catenary system.
10. a kind of storage medium, which is characterized in that be stored with workflow examination and approval program, the workflow examination and approval on the storage medium It realizes as described in any one of claims 1 to 7 when program is executed by processor based on the workflow examination and approval method of block catenary system The step of.
CN201910046791.4A 2019-01-17 2019-01-17 Process approval method, device and system based on block chain system and storage medium Active CN109858262B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910046791.4A CN109858262B (en) 2019-01-17 2019-01-17 Process approval method, device and system based on block chain system and storage medium
PCT/CN2019/116473 WO2020147383A1 (en) 2019-01-17 2019-11-08 Process examination and approval method, device and system employing blockchain system, and non-volatile storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910046791.4A CN109858262B (en) 2019-01-17 2019-01-17 Process approval method, device and system based on block chain system and storage medium

Publications (2)

Publication Number Publication Date
CN109858262A true CN109858262A (en) 2019-06-07
CN109858262B CN109858262B (en) 2022-06-17

Family

ID=66895286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910046791.4A Active CN109858262B (en) 2019-01-17 2019-01-17 Process approval method, device and system based on block chain system and storage medium

Country Status (2)

Country Link
CN (1) CN109858262B (en)
WO (1) WO2020147383A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430194A (en) * 2019-08-06 2019-11-08 腾讯科技(深圳)有限公司 A kind of method of Information Authentication, the method and device of chess and card Information Authentication
CN110570198A (en) * 2019-10-12 2019-12-13 链农(深圳)信息科技有限公司 account book security reinforcement method and device based on intelligent contract nodes of block chains
CN110598479A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Data processing method and device and computer readable storage medium
CN110798489A (en) * 2020-01-06 2020-02-14 成都四方伟业软件股份有限公司 Data approval method and system based on block chain
CN110941674A (en) * 2019-11-26 2020-03-31 北京海益同展信息科技有限公司 Block chain-based compliance audit method, device, system and storage medium
CN111047300A (en) * 2019-12-19 2020-04-21 江西宜月鑫网络科技有限公司 Block chain-based online examination and approval method, terminal and readable storage medium
WO2020147383A1 (en) * 2019-01-17 2020-07-23 平安科技(深圳)有限公司 Process examination and approval method, device and system employing blockchain system, and non-volatile storage medium
CN111988421A (en) * 2020-08-28 2020-11-24 清华大学 Method and system for recording DDoS attack log abstract based on block chain
CN112052033A (en) * 2020-09-02 2020-12-08 江苏省电力试验研究院有限公司 Power distribution automation master station version management method and system based on process and block chain
CN112261035A (en) * 2020-10-20 2021-01-22 中国联合网络通信集团有限公司 Information management method based on block chain, prevention and control center node and rework platform
WO2021012500A1 (en) * 2019-07-23 2021-01-28 平安科技(深圳)有限公司 Blockchain-based parallel system deployment method and apparatus, and computer device
CN112434609A (en) * 2020-11-23 2021-03-02 滁州学院 Block chain-based test reagent use track tracing method
CN112732676A (en) * 2021-01-12 2021-04-30 成都库珀区块链科技有限公司 Data migration method, device, equipment and storage medium based on block chain
CN113256257A (en) * 2021-05-28 2021-08-13 北京瑞卓喜投科技发展有限公司 Transaction signing method and device based on block chain and electronic equipment
CN113379377A (en) * 2021-06-02 2021-09-10 南方电网能源发展研究院有限责任公司 Power grid engineering construction approval processing method and device
CN113837880A (en) * 2021-09-14 2021-12-24 杭州链城数字科技有限公司 Data transaction method and device and electronic equipment

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112115497B (en) * 2020-09-28 2023-06-27 上海对外经贸大学 Block chain-based public opinion storage information erasable treatment method
CN112187948B (en) * 2020-10-09 2023-04-25 中国农业银行股份有限公司四川省分行 Approval file encryption batch uploading method and device based on SpringBoot framework
CN112633858A (en) * 2021-01-05 2021-04-09 润联软件系统(深圳)有限公司 Process approval processing method and system
CN115170096A (en) * 2022-09-08 2022-10-11 中国电子科技集团公司第十五研究所 Data auditing processing system, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107341702A (en) * 2017-03-08 2017-11-10 阿里巴巴集团控股有限公司 A kind of method and device of business processing
CN107633469A (en) * 2017-08-18 2018-01-26 暨南大学 A kind of scholarship management method and system based on block chain technology
WO2018076762A1 (en) * 2016-10-27 2018-05-03 上海亿账通区块链科技有限公司 Block chain-based transaction verification method and system, electronic device, and medium
US9992022B1 (en) * 2017-02-06 2018-06-05 Northern Trust Corporation Systems and methods for digital identity management and permission controls within distributed network nodes
WO2018126858A1 (en) * 2017-01-06 2018-07-12 中国银联股份有限公司 Blockchain technology-based robust atm network system and information processing method therefor
US20180330343A1 (en) * 2017-05-11 2018-11-15 Microsoft Technology Licensing, Llc Cryptlet smart contract
US20180337771A1 (en) * 2017-05-19 2018-11-22 International Business Machines Corporation Policy enforcement via peer devices using a blockchain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150019871A1 (en) * 2013-07-10 2015-01-15 Transcend Information, Inc. Certification method and electronic device
CN107292621B (en) * 2017-06-22 2020-10-27 丁江 Method and node for determining authority and storing certificate of mass data
US10135607B1 (en) * 2017-08-11 2018-11-20 Dragonchain, Inc. Distributed ledger interaction systems and methods
CN109858262B (en) * 2019-01-17 2022-06-17 平安科技(深圳)有限公司 Process approval method, device and system based on block chain system and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018076762A1 (en) * 2016-10-27 2018-05-03 上海亿账通区块链科技有限公司 Block chain-based transaction verification method and system, electronic device, and medium
WO2018126858A1 (en) * 2017-01-06 2018-07-12 中国银联股份有限公司 Blockchain technology-based robust atm network system and information processing method therefor
US9992022B1 (en) * 2017-02-06 2018-06-05 Northern Trust Corporation Systems and methods for digital identity management and permission controls within distributed network nodes
CN107341702A (en) * 2017-03-08 2017-11-10 阿里巴巴集团控股有限公司 A kind of method and device of business processing
US20180330343A1 (en) * 2017-05-11 2018-11-15 Microsoft Technology Licensing, Llc Cryptlet smart contract
US20180337771A1 (en) * 2017-05-19 2018-11-22 International Business Machines Corporation Policy enforcement via peer devices using a blockchain
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107633469A (en) * 2017-08-18 2018-01-26 暨南大学 A kind of scholarship management method and system based on block chain technology

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020147383A1 (en) * 2019-01-17 2020-07-23 平安科技(深圳)有限公司 Process examination and approval method, device and system employing blockchain system, and non-volatile storage medium
WO2021012500A1 (en) * 2019-07-23 2021-01-28 平安科技(深圳)有限公司 Blockchain-based parallel system deployment method and apparatus, and computer device
CN110430194B (en) * 2019-08-06 2022-04-15 腾讯科技(深圳)有限公司 Information verification method, chess and card information verification method and device
CN110430194A (en) * 2019-08-06 2019-11-08 腾讯科技(深圳)有限公司 A kind of method of Information Authentication, the method and device of chess and card Information Authentication
CN110598479A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Data processing method and device and computer readable storage medium
CN110570198A (en) * 2019-10-12 2019-12-13 链农(深圳)信息科技有限公司 account book security reinforcement method and device based on intelligent contract nodes of block chains
CN110941674A (en) * 2019-11-26 2020-03-31 北京海益同展信息科技有限公司 Block chain-based compliance audit method, device, system and storage medium
CN111047300A (en) * 2019-12-19 2020-04-21 江西宜月鑫网络科技有限公司 Block chain-based online examination and approval method, terminal and readable storage medium
CN111047300B (en) * 2019-12-19 2023-04-18 深圳天玑数据有限公司 Block chain-based online examination and approval method, terminal and readable storage medium
CN110798489A (en) * 2020-01-06 2020-02-14 成都四方伟业软件股份有限公司 Data approval method and system based on block chain
CN111988421A (en) * 2020-08-28 2020-11-24 清华大学 Method and system for recording DDoS attack log abstract based on block chain
CN111988421B (en) * 2020-08-28 2021-04-16 清华大学 Method and system for recording DDoS attack log abstract based on block chain
CN112052033A (en) * 2020-09-02 2020-12-08 江苏省电力试验研究院有限公司 Power distribution automation master station version management method and system based on process and block chain
CN112261035A (en) * 2020-10-20 2021-01-22 中国联合网络通信集团有限公司 Information management method based on block chain, prevention and control center node and rework platform
CN112434609A (en) * 2020-11-23 2021-03-02 滁州学院 Block chain-based test reagent use track tracing method
CN112732676A (en) * 2021-01-12 2021-04-30 成都库珀区块链科技有限公司 Data migration method, device, equipment and storage medium based on block chain
CN112732676B (en) * 2021-01-12 2023-12-05 库珀科技集团有限公司 Block chain-based data migration method, device, equipment and storage medium
CN113256257A (en) * 2021-05-28 2021-08-13 北京瑞卓喜投科技发展有限公司 Transaction signing method and device based on block chain and electronic equipment
CN113379377A (en) * 2021-06-02 2021-09-10 南方电网能源发展研究院有限责任公司 Power grid engineering construction approval processing method and device
CN113837880A (en) * 2021-09-14 2021-12-24 杭州链城数字科技有限公司 Data transaction method and device and electronic equipment

Also Published As

Publication number Publication date
WO2020147383A1 (en) 2020-07-23
CN109858262B (en) 2022-06-17

Similar Documents

Publication Publication Date Title
CN109858262A (en) Workflow examination and approval method, apparatus, system and storage medium based on block catenary system
US10547444B2 (en) Cloud encryption key broker apparatuses, methods and systems
Kissel Glossary of key information security terms
CN109840771A (en) A kind of block chain intimacy protection system and its method based on homomorphic cryptography
US20170026343A1 (en) Anonymous Account Security Exchange
CN109902494A (en) Data encryption storage method, device and document storage system
Lu et al. Reducing automotive counterfeiting using blockchain: Benefits and challenges
CN105812334B (en) A kind of method for network authorization
CN107948152A (en) Information storage means, acquisition methods, device and equipment
CN110719176A (en) Logistics privacy protection method and system based on block chain and readable storage medium
CN110210249A (en) The system and method for track query function of hideing are realized based on data obfuscation
CN111737715A (en) Decentralized electronic contract online signing method and system
CN112632574A (en) Multi-mechanism data processing method and device based on alliance chain and related equipment
Silva et al. Calculating the trust of providers through the construction weighted Sec-SLA
Mukte et al. Smart Data Transfer for Data Monetization
Gupta et al. Cloud computing: Security threats & control strategy using tri-mechanism
CN104618306A (en) Novel integrated mobile phone data transmission key signal encryption method
CN107689867B (en) Key protection method and system under open environment
Paul et al. A cryptographic method for defense against mitm cyber attack in the electricity grid supply chain
Radanliev Cyber-attacks on Public Key Cryptography
Zhou et al. Towards blockchain-based auditing of data exchanges
Zhang et al. Controlling Information Risk in E-commerce
Zhang et al. Controlling Network Risk in E-commerce
KR100638265B1 (en) method for secure for exchanging e-document in the internet
Singh et al. Comparative Analysis of Web Application Based Encryption Methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant