CN109948351B - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN109948351B
CN109948351B CN201910152217.7A CN201910152217A CN109948351B CN 109948351 B CN109948351 B CN 109948351B CN 201910152217 A CN201910152217 A CN 201910152217A CN 109948351 B CN109948351 B CN 109948351B
Authority
CN
China
Prior art keywords
file
identity code
signing
block node
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910152217.7A
Other languages
Chinese (zh)
Other versions
CN109948351A (en
Inventor
刘新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201910152217.7A priority Critical patent/CN109948351B/en
Publication of CN109948351A publication Critical patent/CN109948351A/en
Application granted granted Critical
Publication of CN109948351B publication Critical patent/CN109948351B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides an information processing method and device, comprising the following steps: receiving a signing request carrying an identity code and a file identifier; judging whether the user corresponding to the identity code has the authority of the file corresponding to the label file identifier or not; and under the condition that the user corresponding to the identity code is judged to have the authority of the file corresponding to the document identification, the document corresponding to the document identification is signed. According to the embodiment of the application, the working efficiency can be improved.

Description

Information processing method and device
Technical Field
The application relates to the technical field of blockchain, in particular to an information processing method and device.
Background
Engineering change means various changes in the contractual work scope, including the increase or decrease of the contractual work content, the change of the contractual work amount, the design change caused by geological reasons, the change of the size and elevation of the structure caused by practical conditions, any work outside the contract, etc., which are carried out by contractors according to the supervision issuing design file and supervision change instruction. When a change is generated, a person with relevant authority is required to issue a plurality of files, and the change can be used as the generation utility. In actual life, when a file to be issued is encountered during engineering change, related personnel are required to sign or seal, so that time is wasted, and the working efficiency is reduced.
Disclosure of Invention
The embodiment of the application provides an information processing method and device, which are used for improving working efficiency.
A first aspect provides an information processing method, the method being applied to a block link point apparatus, comprising:
receiving a signing request carrying an identity code and a file identifier;
judging whether the user corresponding to the identity code has the authority of the file corresponding to the file identification of the label or not;
and under the condition that the user corresponding to the identity code has the authority of signing the file corresponding to the file identifier, signing the file corresponding to the file identifier.
As a possible implementation manner, the signing request also carries signature information corresponding to the identity code;
the signing the file corresponding to the file identifier comprises the following steps:
and signing the file corresponding to the file identifier according to the signature information.
As a possible implementation manner, the method further comprises:
acquiring signature information corresponding to the identity code;
the signing the file corresponding to the file identifier comprises the following steps:
and signing the file corresponding to the file identifier according to the signature information.
As a possible implementation manner, the method further comprises:
judging whether the identity code belongs to the identity code of the block node in the block chain, and executing the judgment whether the user corresponding to the identity code has the authority to sign the file corresponding to the file identifier under the condition that the identity code is judged to belong to the identity code of the block node in the block chain.
As a possible implementation manner, after the signing is performed on the file corresponding to the file identifier, the method further includes:
and storing the file corresponding to the file identifier after signing.
As a possible embodiment, the method comprises:
and storing the identity code, the time of the signing and the file corresponding to the file identifier before signing.
A second aspect provides an information processing apparatus, the apparatus being a block link point device, comprising:
the receiving unit is used for receiving a signing request carrying an identity code and a file identifier;
the first judging unit is used for judging whether the user corresponding to the identity code received by the receiving unit has the authority of the file corresponding to the file identifier of the label;
and the signing unit is used for signing the file corresponding to the file identifier received by the receiving unit under the condition that the first judging unit judges that the user corresponding to the identity code has the authority to sign the file corresponding to the file identifier.
As a possible implementation manner, the signing request also carries signature information corresponding to the identity code;
the signing unit is specifically configured to sign a document corresponding to the document identifier according to the signature information.
As a possible implementation manner, the device further comprises:
the acquisition unit is used for acquiring signature information corresponding to the identity codes;
the signing unit is specifically configured to sign a document corresponding to the document identifier according to the signature information acquired by the acquiring unit.
As a possible implementation manner, the device further comprises:
and the second judging unit is used for judging whether the identity code of the receiving unit belongs to the identity code of the block node in the block chain, and the first judging unit judges whether the user corresponding to the identity code has the authority of signing the file corresponding to the file identifier under the condition that the second judging unit judges that the identity code belongs to the identity code of the block node in the block chain.
As a possible implementation manner, the device further comprises:
and the storage unit is used for storing the file corresponding to the file identifier after the signing unit signs the file corresponding to the file identifier.
As a possible implementation manner, the storage unit is further configured to store the identity code received by the receiving unit, the time of the receipt, and the file corresponding to the file identifier before the receipt.
A third aspect provides a block link point device, a processor, a memory, and a transceiver, wherein:
the transceiver is used for receiving a signing request carrying an identity code and a file identifier;
the memory has a set of program code stored therein, and the processor is configured to invoke the program code stored in the memory to:
judging whether the user corresponding to the identity code has the authority of the file corresponding to the file identification of the label or not;
and under the condition that the user corresponding to the identity code has the authority of signing the file corresponding to the file identifier, signing the file corresponding to the file identifier.
As a possible implementation manner, the signing request also carries signature information corresponding to the identity code;
the signing the file corresponding to the file identifier by the processor comprises the following steps:
and signing the file corresponding to the file identifier according to the signature information.
As a possible implementation, the processor is further configured to call the program code stored in the memory to perform the following operations:
acquiring signature information corresponding to the identity code;
the signing the file corresponding to the file identifier by the processor comprises the following steps:
and signing the file corresponding to the file identifier according to the signature information.
As a possible implementation, the processor is further configured to call the program code stored in the memory to perform the following operations:
judging whether the identity code belongs to the identity code of the block node in the block chain, and executing the judgment whether the user corresponding to the identity code has the authority to sign the file corresponding to the file identifier under the condition that the identity code is judged to belong to the identity code of the block node in the block chain.
As a possible implementation, the processor is further configured to call the program code stored in the memory to perform the following operations:
after signing the file corresponding to the file identifier, storing the file corresponding to the file identifier after signing.
As a possible implementation, the processor is further configured to call the program code stored in the memory to perform the following operations:
and storing the identity code, the time of the signing and the file corresponding to the file identifier before signing.
A fourth aspect provides a readable storage medium storing a computer program comprising program code which when executed by a processor causes the processor to perform the information processing method provided by the first aspect or any one of the possible implementation manners of the first aspect.
A fifth aspect provides an application for executing the information processing method provided by the first aspect or any one of the possible implementation manners of the first aspect at runtime.
In the embodiment of the application, the receipt request carrying the identity code and the file identifier is received, and the receipt is carried out on the file corresponding to the file identifier under the condition that the user corresponding to the identity code has the authority of the file corresponding to the receipt file identifier, so that the remote receipt can be realized through the receipt request without the need of a person to sign on site, thereby improving the working efficiency.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present application;
fig. 2 is a schematic flow chart of an information processing method according to an embodiment of the present application;
FIG. 3 is a flowchart of another information processing method according to an embodiment of the present application;
fig. 4 is a schematic structural view of an information processing apparatus according to an embodiment of the present application;
fig. 5 is a schematic diagram of the structure of another information processing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a blockchain node device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The embodiment of the application provides an information processing method and device, which are used for improving working efficiency. The following will describe in detail.
In order to better understand the information processing method and device provided by the embodiment of the present application, the network architecture of the embodiment of the present application is described below. Referring to fig. 1, fig. 1 is a schematic diagram of a network architecture according to an embodiment of the application. As shown in fig. 1, the network architecture may include a plurality of block link point devices (only 3 are shown schematically in fig. 1). The plurality of block link point devices can be connected through a network. The plurality of block chain node devices form a block chain, the plurality of block chain node devices are block nodes in the block chain respectively, and each block node corresponds to an identity code and is used for uniquely identifying the block chain link point device in the block chain. The block link point device may be provided with a display screen, i.e. may display information. A plurality of block link point devices may communicate with each other.
Referring to fig. 2, fig. 2 is a flow chart of an information processing method according to an embodiment of the application based on the network architecture shown in fig. 1. The information processing method is applied to block link point equipment. As shown in fig. 2, the information processing method may include the following steps.
201. A ticket request carrying an identity code and a file identification is received.
In this embodiment, when an engineering change occurs, a user may determine a file to be changed by means of a conference or the like, and then the user may operate a first block node in the block chain, so that the first block node stores the determined file. Under the condition that the determined file needs other users to make a ticket, the authority of the file can be set, namely, only the users with the authority can make the ticket on the file, and the users without the authority cannot make the ticket on the file, wherein the users can be in one-to-one correspondence with block nodes in a block chain. The first block node is any block node in the blockchain.
In this embodiment, after the determined file is stored in the first block node and the permission is set, the first block node may first send an approval request for approving the file to the second block node, the second block node receives the approval request from the first block node, then the second block node responds to the approval request and sends a ticket request carrying the identity code and the file identifier to the first block node, and then the first block node receives the ticket request from the second block node. The first block node sends an approval request for approving the file to the second block node, or the first block node automatically sends an approval request for approving the file to the second block node, or the user operates the first block node, so that the first block node sends an approval request for approving the file to the second block node. The second block node responds to the approval request, or the second block node automatically responds, or a user corresponding to the second block node operates the second block node so that the second block node responds. The second block node is any block node in the block chain corresponding to the user with authority to sign the file.
In this embodiment, after the determined file is stored in the first block node and the permission is set, the second block node may directly send a ticket signing request carrying the identity code and the file identifier to the first block node. The second block node here is any block node in the blockchain other than the first block node.
202. Judging whether the user corresponding to the identity code has the authority of the file corresponding to the label file identifier, and executing step 203 when judging that the user corresponding to the identity code has the authority of the file corresponding to the label file identifier.
In this embodiment, after receiving the ticket signing request carrying the identity code and the file identifier, it may be determined whether the user corresponding to the identity code has the authority of the file corresponding to the ticket signing file identifier, and step 203 is executed if it is determined that the user corresponding to the identity code has the authority of the file corresponding to the ticket signing file identifier. When the user corresponding to the identity code is judged to have no authority of the file corresponding to the label file identifier, the label request can be discarded, and in addition, prompt information for prompting that the user does not have the authority of the file corresponding to the label file identifier can be sent to the second block node corresponding to the identity code.
203. And signing the file corresponding to the file identifier.
In this embodiment, when it is determined that the user corresponding to the identification code has the authority of the file corresponding to the document identification of the ticket, the ticket may be signed for the file corresponding to the document identification. The signing request can also carry signature information corresponding to the identity codes, and signing can be carried out on the files corresponding to the file identifications according to the signature information. Under the condition that the signing request does not carry the signature information corresponding to the identity code, the signature information corresponding to the identity code can be acquired first, and then the signing is carried out on the file corresponding to the file identification according to the acquired signature information. The signature information corresponding to the acquired identity code can be acquired locally, can be acquired from a server, and can be acquired from a second block node.
The first block node and the second block node are block link point devices in the network architecture.
In the information processing method described in fig. 2, a ticket signing request carrying an identity code and a file identifier is received, and when a user corresponding to the identity code has the authority of a file corresponding to the ticket signing file identifier, the ticket signing is performed on the file corresponding to the file identifier, so that a remote ticket signing can be realized through the ticket signing request, and a person who signs a ticket does not need to go to a field ticket signing, thereby improving the working efficiency.
Referring to fig. 3, fig. 3 is a flow chart of another information processing method according to an embodiment of the application based on the network architecture shown in fig. 1. The information processing method is applied to block link point equipment. As shown in fig. 3, the information processing method may include the following steps.
301. A ticket request carrying an identity code and a file identification is received.
In this embodiment, when an engineering change occurs, a user may determine a file to be changed by means of a conference or the like, and then the user may operate a first block node in the block chain, so that the first block node stores the determined file. Under the condition that the determined file needs other users to make a ticket, the authority of the file can be set, namely, only the users with the authority can make the ticket on the file, and the users without the authority cannot make the ticket on the file, wherein the users can be in one-to-one correspondence with block nodes in a block chain. The first block node is any block node in the blockchain.
In this embodiment, after the determined file is stored in the first block node and the permission is set, the first block node may first send an approval request for approving the file to the second block node, the second block node receives the approval request from the first block node, then the second block node responds to the approval request and sends a ticket request carrying the identity code and the file identifier to the first block node, and then the first block node receives the ticket request from the second block node. The first block node sends an approval request for approving the file to the second block node, or the first block node automatically sends an approval request for approving the file to the second block node, or the user operates the first block node, so that the first block node sends an approval request for approving the file to the second block node. The second block node responds to the approval request, or the second block node automatically responds, or a user corresponding to the second block node operates the second block node so that the second block node responds. The second block node is any block node in the block chain corresponding to the user with authority to sign the file.
In this embodiment, after the determined file is stored in the first block node and the permission is set, the second block node may directly send a ticket signing request carrying the identity code and the file identifier to the first block node. The second block node here is any block node in the blockchain other than the first block node.
302. If it is determined that the identification code belongs to the identification code of the block node in the blockchain, step 303 is executed.
In this embodiment, after receiving a ticket signing request carrying an identity code and a file identifier, the first block node may first determine whether the identity code belongs to the identity code of a block node in the blockchain, i.e. determine whether the second block node is a block node in the blockchain, i.e. perform identity authentication. In the event that the identification code is determined to belong to the identification code of a block node in the blockchain, the second block node is indicated as the block node in the blockchain, and step 303 is performed. In the event that the identity code is determined not to belong to the identity code of a block node in the blockchain, indicating that the second block node is not a block node in the blockchain, the order request may be discarded.
303. Judging whether the user corresponding to the identity code has the authority of the file corresponding to the label file identifier, and executing step 304 under the condition that the user corresponding to the identity code has the authority of the file corresponding to the label file identifier.
In this embodiment, after the first block node receives the ticket request carrying the identity code and the file identifier, or if it is determined that the identity code belongs to the identity code of the block node in the blockchain, it may be determined whether the user corresponding to the identity code has the authority of the file corresponding to the ticket file identifier, and if it is determined that the user corresponding to the identity code has the authority of the file corresponding to the ticket file identifier, step 304 is executed. When the user corresponding to the identity code is judged to have no authority of the file corresponding to the label file identifier, the label request can be discarded, and in addition, prompt information for prompting that the user does not have the authority of the file corresponding to the label file identifier can be sent to the second block node corresponding to the identity code.
304. And signing the file corresponding to the file identifier.
In this embodiment, when it is determined that the user corresponding to the identification code has the authority of the file corresponding to the document identification of the ticket, the ticket may be signed for the file corresponding to the document identification. The signing request can also carry signature information corresponding to the identity codes, and signing can be carried out on the files corresponding to the file identifications according to the signature information. Under the condition that the signature request does not carry the signature information corresponding to the identity code, the signature information corresponding to the identity code can be obtained, and then the signature is carried out on the file corresponding to the file identification according to the obtained signature information. The signature information corresponding to the acquired identity code can be acquired locally, can be acquired from a server, and can be acquired from a second block node.
305. And storing the file corresponding to the file identifier after signing.
In this embodiment, after a document corresponding to a document identifier is signed, a document corresponding to a document identifier after signing may be stored, and an identity code, a signing time and a document corresponding to a document identifier before signing may also be stored, where the identity code and the signing time may record which user has signed. So that calls can be made later.
The first block node and the second block node are block link point devices in the network architecture.
For example, taking a specific engineering change as an example, during the research and development process of a project, the company needs to adjust the contract content and the additional cost due to the great increase of the workload of the partner caused by the unreliability factor, and the change of the contract is involved, at this time, the engineering change is performed in the company, and a plurality of files are required to be signed by a person with contract checking and signing authority, so that the change can be used as effective information. In general, contract auditors can be project managers, corporate managers, presidents, etc.; the specific authority level setting is performed according to the relevant regulations of each company. After the change file of the contract passes through the ticket, the file can be archived, and in the subsequent project engineering, the operation is performed according to the changed information.
In the information processing method described in fig. 3, remote ticket signing can be realized through a ticket signing request, and a ticket signing person is not required to go to a field ticket signing, so that the working efficiency can be improved.
Referring to fig. 4, fig. 4 is a schematic diagram of an information processing apparatus according to an embodiment of the present application. The information processing device may be a block link point device. As shown in fig. 4, the information processing apparatus may include:
a receiving unit 401, configured to receive a ticket request carrying an identity code and a file identifier;
a first judging unit 402, configured to judge whether the user corresponding to the identity code received by the receiving unit 401 has the authority of the file corresponding to the label file identifier;
the ticket signing unit 403 is configured to, when the first determining unit 402 determines that the user corresponding to the identity code has the authority of the file corresponding to the ticket signing file identifier, sign the file corresponding to the file identifier received by the receiving unit 401.
The information processing apparatus of the present embodiment may correspond to the block node described in the method embodiment of the present application, and the above and other operations and/or functions of each unit in the information processing apparatus are respectively for implementing the corresponding flows in each method in fig. 2 to 3, which are not described herein for brevity.
Referring to fig. 5, fig. 5 is a schematic diagram of an information processing apparatus according to another embodiment of the present application. The information processing device may be a block link point device. The information processing apparatus shown in fig. 5 is optimized by the information processing apparatus shown in fig. 4. Wherein:
the signing request also carries signature information corresponding to the identity code;
the signing unit 403 is specifically configured to sign a document corresponding to the document identifier according to the signature information.
In one embodiment, the information processing apparatus may further include:
an obtaining unit 404, configured to obtain signature information corresponding to the identity code received by the receiving unit 401;
the ticket signing unit 403 is specifically configured to sign a document corresponding to the document identifier according to the signature information acquired by the acquiring unit 404.
In one embodiment, the information processing apparatus may further include:
the second determining unit 405 is configured to determine whether the identity code of the receiving unit 401 belongs to the identity code of the blockchain block node, and if the second determining unit 405 determines that the identity code belongs to the identity code of the blockchain block node, the first determining unit 402 determines whether the user corresponding to the identity code has authority of the file corresponding to the tag file identifier.
In one embodiment, the information processing apparatus may further include:
the storage unit 406 is configured to store the file corresponding to the file identifier after the signing unit 403 signs the file corresponding to the file identifier.
In one embodiment, the storage unit 406 is further configured to store the identity code received by the receiving unit 401, the time of the ticket, and the file corresponding to the file identifier before the ticket.
The information processing apparatus of the present embodiment may correspond to the block node described in the method embodiment of the present application, and the above and other operations and/or functions of each unit in the information processing apparatus are respectively for implementing the corresponding flows in each method in fig. 2 to 3, which are not described herein for brevity.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a blockchain node device according to an embodiment of the present application, based on the network architecture shown in fig. 1. As shown in fig. 6, the blockchain node device may include a processor 601, a memory 602, a transceiver 603, and a bus 604. The processor 601 may be a general purpose Central Processing Unit (CPU), a plurality of CPUs, a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the present application. The Memory 602 may be, but is not limited to, a read-Only Memory (ROM) or other type of static storage device that can store static information and instructions, a random access Memory (random access Memory, RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), a compact disc read-Only Memory (Compact Disc Read-Only Memory) or other optical disk storage, a compact disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 602 may be separate or integrated with the processor 601. Bus 604 is coupled to processor 601. Bus 604 carries information among the components described above. Wherein:
a transceiver 603 for receiving a ticket request carrying an identity code and a file identifier;
the memory 602 stores a set of program codes, and the processor 601 is configured to call the program codes stored in the memory 602 to perform the following operations:
judging whether the user corresponding to the identity code has the authority of the file corresponding to the label file identifier or not;
and under the condition that the user corresponding to the identity code is judged to have the authority of the file corresponding to the document identification, the document corresponding to the document identification is signed.
In one embodiment, the signing request also carries signature information corresponding to the identity code;
the signing of the file corresponding to the file identifier by the processor 601 includes:
and signing the file corresponding to the file identifier according to the signature information.
In one embodiment, the processor 601 is further configured to invoke the program code stored in the memory 602 to:
acquiring signature information corresponding to the identity codes;
the signing of the file corresponding to the file identifier by the processor 601 includes:
and signing the file corresponding to the file identifier according to the signature information.
In one embodiment, the processor 601 is further configured to invoke the program code stored in the memory 602 to:
judging whether the identity code belongs to the identity code of the block node in the block chain, and executing the judgment of whether the user corresponding to the identity code has the authority of the file corresponding to the label file identifier under the condition that the identity code is judged to belong to the identity code of the block node in the block chain.
As a possible implementation, the processor 601 is further configured to call the program code stored in the memory 602 to perform the following operations:
after signing the file corresponding to the file identifier, storing the file corresponding to the file identifier after signing.
As a possible implementation, the processor 601 is further configured to call the program code stored in the memory 602 to perform the following operations:
and storing the file corresponding to the identity code, the time of the signing and the file identification before the signing.
Wherein steps 202-203 and steps 302-305 may be performed by a processor 601 and memory 602 in the blockchain node device, and steps 201 and 301 may be performed by a transceiver 603 in the blockchain node device.
The first determining unit 402, the ticket issuing unit 403, the acquiring unit 404, the second determining unit 405 and the storage unit 406 may be implemented by the processor 601 and the memory 602 in the blockchain node device, and the receiving unit 401 may be implemented by the transceiver 603 in the blockchain node device.
The blockchain node device may also be used to execute various methods executed by the blocknode in the foregoing method embodiments, which are not described in detail.
In one embodiment, a storage medium is provided for storing an application program for executing the information processing method of fig. 2-3 at runtime.
In one embodiment, an application for executing the information processing method of fig. 2-3 at runtime is provided.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of the above embodiments may be implemented by a program to instruct related hardware, the program may be stored in a computer readable storage medium, and the storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic or optical disk, and the like.
The foregoing has outlined rather broadly the more detailed description of embodiments of the application, wherein the principles and embodiments of the application are explained in detail using specific examples, the above examples being provided solely to facilitate the understanding of the method and core concepts of the application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (6)

1. An information processing method, characterized in that the method is applied to an engineering change scene, the engineering change being various types of changes within a contractual work scope, the method being applied to a block link point apparatus, the method comprising:
receiving a signing request carrying an identity code, a file identifier and signature information corresponding to the identity code, wherein the signing request is a request sent by a second block node to a first block node in response to an approval request, and the approval request is an approval request sent by the first block node and used for approving the file; wherein the first block node and the second block node are block chain node devices in a network frame;
judging whether the identity code belongs to the identity code of the block node in the block chain, and judging whether a user corresponding to the identity code has the authority to sign the file corresponding to the file identifier under the condition that the identity code belongs to the identity code of the block node in the block chain;
under the condition that the user corresponding to the identity code is judged to have the authority of the file corresponding to the file identification, the signing of the file corresponding to the file identification comprises the following steps: signing a document corresponding to the document identification according to the signature information;
and discarding the signing request under the condition that the user corresponding to the identity code does not have the authority of the file corresponding to the file identifier, and sending prompt information for prompting that the user does not have the authority of the file corresponding to the file identifier to the second block node corresponding to the identity code.
2. The method of claim 1, wherein after signing the file corresponding to the file identifier, the method further comprises:
and storing the file corresponding to the file identifier after signing.
3. The method according to claim 2, characterized in that the method comprises:
and storing the identity code, the time of the signing and the file corresponding to the file identifier before signing.
4. An information processing apparatus, the apparatus being a blockchain node device applied in an engineering change scenario, the engineering change being a change of various types within a contractual scope, the apparatus comprising:
the receiving unit is used for receiving a signing request carrying signature information corresponding to the identity code, the file identifier and the identity code; the signing request is a request sent by the second block node to the first block node in response to the approval request, and the approval request is an approval request sent by the first block node for approving the file; wherein the first block node and the second block node are block chain node devices in a network frame;
the second judging unit is used for judging whether the identity code belongs to the identity code of the block node in the block chain or not;
the first judging unit is used for judging whether the user corresponding to the identity code received by the receiving unit has the authority to sign the file corresponding to the file identifier or not under the condition that the second judging unit judges that the identity code belongs to the identity code of the block node in the block chain;
the signing unit is configured to, when the first determining unit determines that the user corresponding to the identity code has authority to sign the file corresponding to the file identifier, sign the file corresponding to the file identifier received by the receiving unit, where the signing unit includes: signing a document corresponding to the document identification according to the signature information;
the signing unit is further configured to discard a signing request and send prompt information for prompting that the user corresponding to the identity code does not have the authority of the file corresponding to the file identifier when the user corresponding to the identity code does not have the authority of the file corresponding to the file identifier.
5. A block link point device comprising a processor, a memory, and a transceiver, wherein:
the memory has a set of program codes stored therein, and the processor is operative to implement the information processing method as claimed in any one of claims 1 to 3 when the program codes stored in the memory are invoked for execution.
6. A readable storage medium, characterized in that the readable storage medium has stored thereon a program which, when executed, implements the information processing method according to any one of claims 1 to 3.
CN201910152217.7A 2019-02-28 2019-02-28 Information processing method and device Active CN109948351B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910152217.7A CN109948351B (en) 2019-02-28 2019-02-28 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910152217.7A CN109948351B (en) 2019-02-28 2019-02-28 Information processing method and device

Publications (2)

Publication Number Publication Date
CN109948351A CN109948351A (en) 2019-06-28
CN109948351B true CN109948351B (en) 2023-12-05

Family

ID=67008212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910152217.7A Active CN109948351B (en) 2019-02-28 2019-02-28 Information processing method and device

Country Status (1)

Country Link
CN (1) CN109948351B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2005242135B1 (en) * 2005-12-07 2006-03-16 Ronald Neville Langford Verifying the Identity of a User by Authenticating a File
CN105577385A (en) * 2015-12-21 2016-05-11 东莞酷派软件技术有限公司 Method and device of obtaining signature authority
CN108920976A (en) * 2018-06-14 2018-11-30 张绪宝 A kind of contract signing method, apparatus and system
CN108960825A (en) * 2018-06-26 2018-12-07 阿里巴巴集团控股有限公司 Electric endorsement method and device, electronic equipment based on block chain
CN109271802A (en) * 2018-09-25 2019-01-25 深圳市元征科技股份有限公司 A kind of user information management method, system, equipment and computer storage medium
CN109344572A (en) * 2018-10-11 2019-02-15 广州鼎甲计算机科技有限公司 The Licensing Methods and system of distributed objects

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10129032B2 (en) * 2016-02-16 2018-11-13 Xerox Corporation Secure revisioning auditing system for electronic document files

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2005242135B1 (en) * 2005-12-07 2006-03-16 Ronald Neville Langford Verifying the Identity of a User by Authenticating a File
CN105577385A (en) * 2015-12-21 2016-05-11 东莞酷派软件技术有限公司 Method and device of obtaining signature authority
CN108920976A (en) * 2018-06-14 2018-11-30 张绪宝 A kind of contract signing method, apparatus and system
CN108960825A (en) * 2018-06-26 2018-12-07 阿里巴巴集团控股有限公司 Electric endorsement method and device, electronic equipment based on block chain
CN109271802A (en) * 2018-09-25 2019-01-25 深圳市元征科技股份有限公司 A kind of user information management method, system, equipment and computer storage medium
CN109344572A (en) * 2018-10-11 2019-02-15 广州鼎甲计算机科技有限公司 The Licensing Methods and system of distributed objects

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CIER区块链系统应用分析与技术选择;王晓通;;兰台世界(11);85-88 *
Potentials of Blockchain Technology for Construction Management;Žiga Turk 等;《Procedia Engineering》;638-645 *

Also Published As

Publication number Publication date
CN109948351A (en) 2019-06-28

Similar Documents

Publication Publication Date Title
CN109669690B (en) Business workflow generation method, device, equipment and computer readable storage medium
CN105207996A (en) Account merging method and apparatus
CN107908680A (en) Management method, electronic device and the computer-readable recording medium of wechat public platform
CN111971943B (en) Trusted platform module based prepaid access token for commercial IoT online services
CN104598513A (en) Data flow control method and system based on webpage frame
CN110677383B (en) Firewall wall opening method and device, storage medium and computer equipment
CN102420902A (en) Method for classification management over right of using functions and mobile terminal
CN110222535B (en) Processing device, method and storage medium for block chain configuration file
CN110895606B (en) Internal system management method and device suitable for newly-built account and storage medium
CN107026871A (en) Web vulnerability scanning method based on cloud computing
CN109246769A (en) A kind of PDU session establishing method and device
CN112835808A (en) Interface testing method and device, computer equipment and storage medium
CN107861765B (en) Product configuration method, apparatus, and computer-readable storage medium
CN113872951B (en) Hybrid cloud security policy issuing method and device, electronic equipment and storage medium
CN103164324A (en) Microblog test method and device
CN109948351B (en) Information processing method and device
CN111260421B (en) Electronic invoice management and control method and device based on block chain
CN116152992B (en) Processing method and device of charging request and start code for charging service
CN111813518A (en) Robot early warning method and device, computer equipment and storage medium
CN112182606A (en) Access request processing method and device, electronic equipment and readable storage medium
CN113364820A (en) Equipment control method and device of Internet of things service system
CN111817878A (en) Networking method and device of intelligent equipment and cloud server
CN113721922B (en) Big data Internet of things management system based on micro-service
CN109993406B (en) Information processing method and device
CN113469588A (en) Safety positioning management method, device, equipment and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant