CN110233828B - Mobile office method and device based on block chain - Google Patents

Mobile office method and device based on block chain Download PDF

Info

Publication number
CN110233828B
CN110233828B CN201910399652.XA CN201910399652A CN110233828B CN 110233828 B CN110233828 B CN 110233828B CN 201910399652 A CN201910399652 A CN 201910399652A CN 110233828 B CN110233828 B CN 110233828B
Authority
CN
China
Prior art keywords
information
mobile terminal
file
geographical position
time information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910399652.XA
Other languages
Chinese (zh)
Other versions
CN110233828A (en
Inventor
袁晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ikmak Tech Co ltd
Original Assignee
Shenzhen Ikmak Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ikmak Tech Co ltd filed Critical Shenzhen Ikmak Tech Co ltd
Priority to CN201910399652.XA priority Critical patent/CN110233828B/en
Publication of CN110233828A publication Critical patent/CN110233828A/en
Application granted granted Critical
Publication of CN110233828B publication Critical patent/CN110233828B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain-based mobile office method and a block chain-based mobile office device, wherein the mobile office method comprises the following steps: acquiring user information sent by a mobile terminal, receiving time information and/or geographical position information uploaded by the mobile terminal when a preset editing action is triggered in the file editing process, and correspondingly creating a process block; receiving a file uploaded by a mobile terminal, and if the file contains additional information, extracting time information and/or geographical position information from the additional information; comparing the time information and/or the geographical position information stored in the process block with the time information and/or the geographical position information contained in the additional information; and if the time information and/or the geographical position information stored in the process block is consistent with the time information and/or the geographical position information contained in the additional information, creating a corresponding storage block to store the file. The method and the system ensure the absolute authenticity of the file stored by the cloud server and improve the reliability of block data.

Description

Mobile office method and device based on block chain
Technical Field
The invention relates to the technical field of mobile office, in particular to a block chain-based mobile office method and device.
Background
The mobile office is a new office mode, office staff can process business related affairs at any time and any place through enterprise informatization software installed on terminals such as mobile phones and flat panels, the limitation of office work by fixed equipment in fixed places is eliminated, and great convenience is provided for the office staff, particularly enterprise managers and business people. The security of mobile office is a primary problem because mobile office requires access to intranet through open wireless network and information is spread over the air wirelessly.
In the prior art, a user is directly connected to a background cloud disk through a terminal network, during the network connection, the background can verify the user identity to confirm the authority of the user, but the background cannot confirm files generated in the office process, so that the authenticity of the files uploaded by the mobile terminal is difficult to ensure.
Disclosure of Invention
The invention mainly aims to provide a block chain-based mobile office method, and aims to solve the problem that the authenticity of a file uploaded by a mobile terminal is difficult to ensure in the mobile office process in the prior art.
In order to achieve the above object, the present invention provides a mobile office method based on a block chain, which includes:
acquiring user information sent by a mobile terminal, judging whether the mobile terminal has an access right according to the user information, and accessing the mobile terminal to a mobile office system if the mobile terminal has the access right;
receiving time information and/or geographical position information uploaded by a mobile terminal when a preset editing action is triggered in the file editing process, and creating a process block corresponding to the time information and/or the geographical position information;
receiving a file uploaded by a mobile terminal, and judging whether the file contains additional information or not;
if the file contains additional information, extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the additional information;
comparing the time information and/or the geographical position information stored in the process block with the time information and/or the geographical position information contained in the additional information;
and if the time information and/or the geographical position information stored in the process block is consistent with the time information and/or the geographical position information contained in the additional information, creating a corresponding storage block to store the file.
Preferably, the determining whether the mobile terminal has the access right according to the user information sent by the mobile terminal includes:
receiving user information which is sent by the mobile terminal, encrypted by taking an identity of a cloud server as a public key and signed by a private key of the mobile terminal, wherein the private key of the mobile terminal is generated by encrypting the identity of the mobile terminal;
verifying the signature by taking the identity of the mobile terminal as a public key;
decrypting the user information by using a private key stored in the cloud server, wherein the private key of the cloud server is generated by encrypting the identity of the cloud server;
and judging the access authority of the mobile terminal according to the decrypted user information and the authority setting conditions prestored in the cloud server.
Preferably, the receiving mobile terminal uploads time information and/or geographical location information when triggering a preset editing action in a file editing process, and creates a process block corresponding to the time information and/or geographical location information, where the preset editing action includes: open file, edit content, save file, and close file.
Preferably, the receiving time information and/or geographical location information uploaded by the mobile terminal when a preset editing action is triggered in the file editing process, and creating a process block corresponding to the time information and/or geographical location information includes:
receiving time information and/or geographical position information uploaded through the Internet when the mobile terminal triggers a preset editing action in the file editing process; and/or the presence of a catalyst in the reaction mixture,
and receiving time information and/or geographical position information sent by the mobile terminal through the Beidou satellite short message when the mobile terminal triggers a preset editing action in the file editing process.
Preferably, the extracting, from the additional information, time information and/or geographical location information generated when the file triggers a preset editing action in the editing process includes:
receiving and reading additional information which is encrypted by the mobile terminal through a public key provided by a cloud server and is embedded into the file;
decrypting the additional information with a private key paired with the public key;
and extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the decrypted additional information.
The invention also provides a mobile office device based on the block chain, which comprises:
the authority judging module is used for acquiring user information sent by the mobile terminal, judging whether the mobile terminal has access authority according to the user information, and accessing the mobile terminal to a mobile office system if the mobile terminal has the access authority;
the system comprises a process block creation module, a file editing module and a processing module, wherein the process block creation module is used for receiving time information and/or geographical position information uploaded by a mobile terminal when a preset editing action is triggered in the file editing process, and creating a process block corresponding to the time information and/or the geographical position information;
the information acquisition module is used for receiving the file uploaded by the mobile terminal and judging whether the file contains additional information or not;
the information extraction module is used for extracting time information and/or geographical position information which are saved when the mobile terminal triggers a preset editing action in the file editing process from the additional information when the file contains the additional information;
the information comparison module is used for comparing the time information and/or the geographical position information stored in the process block with the time information and/or the geographical position information contained in the additional information;
and the storage block creating module is used for creating a corresponding storage block to save the file when the time information and/or the geographical position information saved in the process block is consistent with the time information and/or the geographical position information contained in the additional information.
Preferably, the permission determination module includes:
the system comprises a user information receiving unit, a cloud server and a mobile terminal, wherein the user information receiving unit is used for receiving user information which is sent by the mobile terminal, encrypted by taking an identity of the cloud server as a public key and signed by a private key of the mobile terminal, and the private key of the mobile terminal is generated by encrypting the identity of the mobile terminal;
the signature verification unit is used for verifying the signature by taking the identity of the mobile terminal as a public key;
the user information decryption unit is used for decrypting the user information by using a private key stored in the cloud server, wherein the private key of the cloud server is generated by encrypting the identity of the cloud server;
and the permission judging unit is used for judging the access permission of the mobile terminal according to the decrypted user information and permission setting conditions prestored in the cloud server.
Preferably, the process block creation module includes:
the internet information receiving unit is used for receiving time information and/or geographical position information uploaded by the mobile terminal through the internet when a preset editing action is triggered in the file editing process;
and the short message information receiving unit is used for receiving the time information and/or the geographical position information sent by the mobile terminal through the Beidou satellite short message when the mobile terminal triggers the preset editing action in the file editing process.
Preferably, the information extraction module includes:
the additional information receiving unit is used for receiving and reading additional information which is encrypted by the mobile terminal through a public key provided by a cloud server and is embedded into the file;
an additional information decryption unit configured to decrypt the additional information with a private key paired with the public key;
and the information extraction unit is used for extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the decrypted additional information.
In the embodiment of the technical scheme provided by the invention, the access authority of the mobile terminal to the cloud server is firstly verified, on the basis, the time information and/or the geographic position information uploaded when the mobile terminal triggers the preset editing action in the file editing process are compared with the time information and the geographic position information in the received file, the authenticity of the file is judged according to the comparison result, whether the file uploaded by the mobile terminal is received and stored is determined by the double verification means, the absolute authenticity of the file stored by the cloud server is ensured, and the reliability of block data is improved.
Drawings
FIG. 1 is a schematic flow chart of an embodiment of a block chain-based mobile office method according to the present invention;
fig. 2 is a schematic flow chart of a preferred embodiment of an execution process of the mobile office method based on the block chain of the present invention, wherein the step "obtaining user information sent by the mobile terminal, and determining whether the mobile terminal has an access right" according to the user information is performed;
FIG. 3 is a flowchart illustrating a preferred embodiment of an execution process of extracting time information and/or geographical location information generated when a file triggers a preset editing action in an edited process from additional information according to the mobile office method based on a block chain of the present invention;
FIG. 4 is a functional block diagram of the block chain-based mobile office device of the present invention;
FIG. 5 is a functional block diagram of a privilege judging module in the mobile office apparatus based on the block chain according to the present invention;
FIG. 6 is a functional block diagram of a process block creation module in the mobile office device based on block chains according to the present invention:
fig. 7 is a functional block diagram of an information extraction module in the mobile office device based on the block chain according to the present invention.
Detailed Description
Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same elements or elements having the same functions throughout. The embodiments described below with reference to the drawings are exemplary and intended to be illustrative of the present invention and should not be construed as limiting the present invention, and all other embodiments that can be obtained by one skilled in the art based on the embodiments of the present invention without inventive efforts shall fall within the scope of protection of the present invention.
The invention provides a block chain-based mobile office method, as shown in fig. 1, the mobile office method comprises the following steps:
step S10: the method comprises the steps of obtaining user information sent by a mobile terminal, judging whether the mobile terminal has access authority or not according to the user information, and accessing the mobile terminal into a mobile office system if the mobile terminal has the access authority.
The blockchain technology is a brand new distributed infrastructure and computing mode that uses blockchain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to secure data transmission and access, and uses intelligent contracts composed of automated script codes to program and manipulate data. The implementer of the scheme is a cloud server applied in a block chain platform. The mobile terminal is an intelligent mobile device such as a mobile phone, a computer and a tablet computer used by an offline user. Install mobile office system on the high in the clouds server, the mode of accessible account number password between high in the clouds server and the mobile terminal, perhaps as above the mode that the high in the clouds server checks the user information that the mobile terminal uploaded confirms whether this mobile terminal has the access permission, and the latter specifically is: the mobile terminal sends user information to the cloud server, the cloud server judges the access authority of the user information according to the set conditions after reading the user information, if the user information of the mobile terminal meets the set conditions, the mobile terminal is judged to have the access authority, and the mobile terminal is accessed into a mobile office system.
Step S20: receiving time information and/or geographical location information uploaded by a mobile terminal when a preset editing action is triggered in the file editing process, and creating a process block corresponding to the time information and/or the geographical location information.
In the existing files such as word, generally, when a key action, such as exit behavior, is performed, a record is actively generated, a file cached at the time point when the behavior occurs is formed, and the cached file has additional information of 'time'. In this step, a preset editing action is preset on the mobile terminal, such as any time node in the file closing, starting or file editing process, or a preset interval time node in the file editing process, when the preset editing action is triggered, a control instruction for recording time information and/or geographical location information is correspondingly generated, the mobile terminal synchronously uploads the time information and/or geographical location information to the cloud server after the time information and/or geographical location information is generated, and the cloud server can determine the time point at which the preset editing action is triggered and/or the geographical location where the mobile terminal is located at the time point according to the time information and/or geographical location information.
Step S30: receiving a file uploaded by a mobile terminal, and judging whether the file contains additional information or not;
step S40: if the file contains the additional information, extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the additional information; .
The cloud server is provided with a designated program in advance, and is triggered and started by specific additional information contained in a file in the process of receiving the file uploaded by the mobile terminal, wherein the specific additional information can be various, such as characters, codes, watermarks and the like which are embedded in the file content in an encryption mode. If the program is not triggered after the file is received, the file does not contain specific additional information, the file feasibility degree is to be testified, and the cloud server correspondingly refuses to store the file. When the designated program is triggered, namely the cloud server judges that the file contains specific additional information, time information and/or geographical location information are extracted from the additional information, and the time information and/or the geographical location information are generated by triggering the file to be edited due to the fact that a preset editing action is executed.
From the perspective of the mobile terminal, the mobile terminal writes time information and/or geographical location information saved when a preset editing action is triggered in a file editing process into a file as additional information, uploads the file to the cloud server, and if the file does not trigger a specified program in the cloud server, the file uploading fails.
Step S50: comparing the time information and/or the geographical position information stored in the process block with the time information and/or the geographical position information contained in the additional information;
step S60: and if the time information and/or the geographical position information stored in the process block is consistent with the time information and/or the geographical position information contained in the additional information, creating a corresponding storage block to store the file.
The time information and/or the geographical position information which are received by the cloud server and stored when the mobile terminal triggers the preset editing action in the file editing process indicate the time point and the geographical position of the mobile terminal when the preset editing action is triggered, namely indicate that the user executes the preset editing action on the file at the time point and the geographical position. And the cloud server reads certain time information and/or geographical position information from the received file uploaded by the mobile terminal, and the certain time information and/or geographical position information also indicates that the preset editing action is executed on the file at a certain time point and a geographical position. The cloud server compares the time information and/or the geographic position information in the file with the time information and/or the geographic position information uploaded by the cloud server, and aims to judge whether the time and the geographic position of the received file, which are subjected to the preset editing action, are consistent with the file edited by the mobile terminal when the time and the geographic position are uploaded. If the time information and/or the geographical position information stored in the process block is consistent with the time information and/or the geographical position information contained in the additional information, the file uploaded by the mobile terminal is indicated, and the file is edited when the time information and/or the geographical position information is uploaded by the mobile terminal and is reliable in authenticity; if the time information and/or the geographic position information are not consistent, the file is not edited when the mobile terminal uploads the time information and/or the geographic position information, the authenticity of the file is problematic, and the file is possibly mistakenly uploaded, and the cloud server should refuse to receive and store the file.
In the embodiment of the invention, the cloud server firstly verifies the access authority of the mobile terminal to the cloud server, on the basis, the time information and/or the geographic position information uploaded by the mobile terminal when the mobile terminal triggers the preset editing action in the file editing process are compared with the time information and the geographic position information in the received file, the authenticity of the file is judged according to the comparison result, whether the file uploaded by the mobile terminal is received and stored is determined by the double verification means, the absolute authenticity of the file stored by the cloud server is ensured, and the reliability of block data is improved.
In a preferred embodiment, as shown in fig. 2, step S10 includes:
step S11: receiving user information which is sent by a mobile terminal, encrypted by taking an identity of a cloud server as a public key and signed by a private key of the mobile terminal, wherein the private key of the mobile terminal is generated by encrypting the identity of the mobile terminal;
step S12: verifying the signature by taking the identity of the mobile terminal as a public key;
step S13: decrypting the user information by using a private key stored by the cloud server, wherein the private key of the cloud server is generated by encrypting the identity of the cloud server;
step S14: and judging the access authority of the mobile terminal according to the decrypted user information and the authority setting conditions prestored in the cloud server.
In the asymmetric encryption algorithm adopted in this embodiment, the mobile terminal and the cloud server respectively store a pair of asymmetric public and private keys, the public key of the cloud server is formed by the identity of the cloud server, and the private key is generated by encrypting the public key; the public key of the mobile terminal is formed by the identity of the mobile terminal, and the private key is generated by encrypting the public key; other information may be used as the public key.
When the mobile terminal sends the identity information to the cloud server, the public key of the cloud server is used for encrypting the identity information, and then the private key of the mobile terminal is used for signing the encrypted identity information; when the cloud server receives the identity information of the mobile terminal, the public key of the mobile terminal is firstly used for verifying the signature, after the verification is passed, the encrypted identity information is decrypted by using the private key of the mobile terminal, so that the decrypted identity information of the mobile terminal is obtained, and whether the mobile terminal has the access authority to the cloud server or not is judged according to preset authority setting conditions (such as whether the mobile terminal is an account number prestored by the cloud server or whether the mobile terminal can be used as a secret key to unlock the preset encrypted information of the cloud server or not).
The method is applied to the block chain platform, the mobile terminal can send the identity information to the cloud server in any cloud coverage area by adopting the encryption method, and the cloud server of the block chain platform can recognize the identity information and finish the judgment of the access authority of the mobile terminal. In addition, this embodiment uploads after encrypting mobile terminal's identity information, and its aim at prevents that mobile terminal's identity information from revealing, has ensured the security of the account number safety of mobile terminal, data in the cloud server.
In a preferred embodiment, in step S20, the preset editing action includes: open file, edit content, save file, and close file.
The preset editing action may be any one preset action in the file editing process, for example, editing to a specified number of bytes, or any time point in the editing process, for example, editing for five minutes, in this embodiment, opening a file, editing content, saving the file, and closing the file are used as the preset editing actions that trigger generation of time information and/or geographic location information in the file editing process, and the preset editing actions have the advantages that: the time and the flow of file editing may be very long, the opening behavior is recorded, the time node and the position of opening the file can be traced, and the whole editing process can be tracked (can be kept as the file editing evidence) by combining other editing process nodes of the file. The record of the editing behavior can be extended to be used as the judgment of the habit of a person editing the file, and then the identity of the person editing the file is judged.
In a preferred embodiment, step S20 includes:
receiving time information and/or geographical position information uploaded through the Internet when a mobile terminal triggers a preset editing action in the file editing process; and/or the presence of a catalyst in the reaction mixture,
and receiving time information and/or geographical position information sent by the mobile terminal through the Beidou satellite short message when the mobile terminal triggers a preset editing action in the file editing process.
In general, communication is realized between a mobile terminal and a cloud server through the internet, but in the mobile office process, the mobile terminal may occasionally have a network break, so that it is further ensured that time information and/or geographic position information acquired by the mobile terminal is timely and successfully uploaded to the cloud server, and the situation that the time information and the geographic position information cannot be synchronized to the cloud server is prevented.
In a preferred embodiment, as shown in fig. 3, step S40 includes:
step S41: receiving and reading additional information which is encrypted by the mobile terminal through a public key provided by a cloud server and is embedded into a file;
step S42: decrypting the additional information with a private key paired with the public key;
step S43: and extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the decrypted additional information.
The purpose of this embodiment is that the mobile terminal transmits the encrypted additional information to the cloud server, and the cloud server decrypts the encrypted additional information and extracts the time information and/or the geographic location information from the decrypted additional information. The purpose of the encryption of the additional information is to prevent the problem that the additional information is read directly by others and is falsely used.
The additional information encrypted by the mobile terminal through the public key provided by the cloud server is compiled and embedded into the file by the mobile terminal, the form of the additional information can refer to a watermark technology in the prior art, the watermark corresponds to the encrypted additional information, and the specific process of embedding the additional information into the file is as follows: the mobile terminal acquires file metadata, and when receiving the office file metadata, a target interface is created, wherein the target interface is a task object and can be used for performing subsequent processing on additional information; calling a target function through a target interface, and processing the additional information to obtain processed target address information; adding nodes to the file metadata, dividing the target address information into logic blocks, writing the logic blocks into the nodes of the file metadata, or writing the logic blocks into the nodes in a byte stream mode and storing the logic blocks.
The present invention also provides a block chain-based mobile office device, as shown in fig. 4, the mobile office device includes:
the authority judging module 1 is used for acquiring user information sent by the mobile terminal, judging whether the mobile terminal has access authority according to the user information, and accessing the mobile terminal to a mobile office system if the mobile terminal has the access authority;
the process block creation module 2 is used for receiving time information and/or geographical location information uploaded by the mobile terminal when a preset editing action is triggered in the file editing process, and creating a process block corresponding to the time information and/or the geographical location information;
the information acquisition module 3 is used for receiving the file uploaded by the mobile terminal and judging whether the file contains additional information;
the information extraction module 4 is used for extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the additional information when the file contains the additional information;
the information comparison module 5 is used for comparing the time information and/or the geographical position information stored in the process block with the time information and/or the geographical position information contained in the additional information;
and the storage block creating module 6 is used for creating a corresponding storage block to save the file when the time information and/or the geographical position information saved in the process block is consistent with the time information and/or the geographical position information contained in the additional information.
In the embodiment, the permission judging module judges the access permission of the mobile terminal according to the user information of the mobile terminal, and when the mobile terminal with the access permission accesses the cloud server, the process block creating module creates a process block according to the time information and the geographic position information uploaded by the mobile terminal so as to store the time information and the geographic position information; when an information acquisition module receives a file uploaded by a mobile terminal, firstly judging whether the file contains additional information; when the file contains additional information, the information extraction module extracts time information and/or geographical position information which are saved when the mobile terminal triggers a preset editing action in the file editing process from the additional information; the time information and/or the geographic position information stored in the process block is compared with the time information and/or the geographic position information contained in the additional information by the information comparison module, and if the comparison result is inconsistent, the authenticity of the file is proved to be examined; and if the comparison result is consistent, the storage block creating module creates a corresponding storage block to store the file.
In a preferred embodiment, as shown in fig. 5, the permission determination module 1 includes:
the user information receiving unit 11 is configured to receive user information which is sent by the mobile terminal, encrypted by using the identity of the cloud server as a public key, and signed by using a private key of the mobile terminal, where the private key of the mobile terminal is generated by encrypting the identity of the mobile terminal;
the signature verification unit 12 is configured to verify the signature by using the identity of the mobile terminal as a public key;
the user information decryption unit 13 is configured to decrypt the user information with a private key stored in the cloud server, where the private key of the cloud server is generated by encrypting an identity of the cloud server;
and the permission judging unit 14 is configured to judge the access permission of the mobile terminal according to the decrypted user information and permission setting conditions prestored in the cloud server.
In this embodiment, the user information receiving unit receives user information which is uploaded by the mobile terminal and is asymmetrically encrypted and signed, the signature verifying unit verifies the signature, the user information decrypting unit decrypts the encrypted user information verified by the signature, and the permission determining unit determines the access permission of the mobile terminal according to the decrypted user information and a preset permission setting condition. The embodiment carries out encryption protection on the user information of the mobile terminal, can prevent the user information from being leaked, carries out signature verification on the encrypted information on the basis, and further ensures the communication safety between the mobile terminal and the cloud server.
In a preferred embodiment, as shown in fig. 6, the process block creation module 2 comprises:
the internet information receiving unit 21 is configured to receive time information and/or geographical location information uploaded through the internet when the mobile terminal triggers a preset editing action in a file editing process;
and the short message information receiving unit 22 is used for receiving the time information and/or the geographical position information sent by the mobile terminal through the Beidou satellite short message when the mobile terminal triggers the preset editing action in the file editing process.
In a preferred embodiment, as shown in fig. 7, the information extraction module 4 includes:
an additional information receiving unit 41, configured to receive and read additional information that is encrypted by a public key provided by a cloud server and embedded in a file by the mobile terminal;
an additional information decryption unit 42 for decrypting the additional information with a private key paired with the public key;
and an information extraction unit 43, configured to extract, from the decrypted additional information, time information and/or geographical location information generated when the file triggers a preset editing action in the editing process.
In this embodiment, the additional information receiving unit receives a file uploaded by the mobile terminal, the additional information decryption unit decrypts the additional information by using a decryption method corresponding to a method for encrypting the additional information by the mobile terminal, and the information extraction unit extracts, from the decrypted additional information, time information and/or geographical location information generated when the file triggers a preset editing action in an editing process. The encryption method and the decryption method described in this embodiment are both preferably asymmetric key encryption methods.
The above is only a part or preferred embodiment of the present invention, and neither the text nor the drawings should limit the scope of the present invention, and all equivalent structural changes made by the present specification and the contents of the drawings or the related technical fields directly/indirectly using the present specification and the drawings are included in the scope of the present invention.

Claims (9)

1. A block chain-based mobile office method is characterized by comprising the following steps:
acquiring user information sent by a mobile terminal, judging whether the mobile terminal has an access right according to the user information, and accessing the mobile terminal to a mobile office system if the mobile terminal has the access right;
receiving time information and/or geographical position information uploaded by a mobile terminal when a preset editing action is triggered in the file editing process, and creating a process block corresponding to the time information and the geographical position information;
receiving a file uploaded by a mobile terminal, and judging whether the file contains additional information or not;
if the file contains additional information, extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the additional information;
comparing the time information and/or the geographical position information stored in the process block with the time information and/or the geographical position information contained in the additional information;
and if the time information and/or the geographical position information stored in the process block is consistent with the time information and/or the geographical position information contained in the additional information, creating a corresponding storage block to store the file.
2. The method of claim 1, wherein the obtaining user information sent by a mobile terminal and determining whether the mobile terminal has an access right according to the user information comprises:
receiving user information which is sent by the mobile terminal, encrypted by taking an identity of a cloud server as a public key and signed by a private key of the mobile terminal, wherein the private key of the mobile terminal is generated by encrypting the identity of the mobile terminal;
verifying the signature by taking the identity of the mobile terminal as a public key;
decrypting the user information by using a private key stored in the cloud server, wherein the private key of the cloud server is generated by encrypting the identity of the cloud server;
and judging the access authority of the mobile terminal according to the decrypted user information and the authority setting conditions prestored in the cloud server.
3. The block chain-based mobile office method according to claim 1, wherein the receiving mobile terminal uploads time information and/or geographical location information when triggering a preset editing action in a file editing process, and creates a process block corresponding to the time information and/or geographical location information, wherein the preset editing action comprises: open file, edit content, save file, and close file.
4. The block chain-based mobile office method according to claim 3, wherein the receiving time information and/or geographical location information uploaded by the mobile terminal when a preset editing action is triggered in a file editing process, and the creating of the process block corresponding to the time information and/or geographical location information comprises:
receiving time information and/or geographical position information uploaded through the Internet when the mobile terminal triggers a preset editing action in the file editing process; and/or the presence of a catalyst in the reaction mixture,
and receiving time information and/or geographical position information sent by the mobile terminal through the Beidou satellite short message when the mobile terminal triggers a preset editing action in the file editing process.
5. The block chain-based mobile office method according to claim 1, wherein the extracting, from the additional information, time information and/or geographical location information generated when the file triggers a preset editing action in an editing process comprises:
receiving and reading additional information which is encrypted by the mobile terminal through a public key provided by a cloud server and is embedded into the file;
decrypting the additional information with a private key paired with the public key;
and extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the decrypted additional information.
6. A blockchain-based mobile office device, comprising:
the authority judging module is used for acquiring user information sent by the mobile terminal, judging whether the mobile terminal has access authority according to the user information, and accessing the mobile terminal to a mobile office system if the mobile terminal has the access authority;
the system comprises a process block creation module, a file editing module and a processing module, wherein the process block creation module is used for receiving time information and/or geographical position information uploaded by a mobile terminal when a preset editing action is triggered in the file editing process, and creating a process block corresponding to the time information and/or the geographical position information;
the information acquisition module is used for receiving the file uploaded by the mobile terminal and judging whether the file contains additional information or not;
the information extraction module is used for extracting time information and/or geographical position information which are saved when the mobile terminal triggers a preset editing action in the file editing process from the additional information when the file contains the additional information;
the information comparison module is used for comparing the time information and/or the geographical position information stored in the process block with the time information and/or the geographical position information contained in the additional information;
and the storage block creating module is used for creating a corresponding storage block to save the file when the time information and/or the geographical position information saved in the process block is consistent with the time information and/or the geographical position information contained in the additional information.
7. The mobile office apparatus of claim 6, wherein the permission determination module comprises:
the system comprises a user information receiving unit, a cloud server and a mobile terminal, wherein the user information receiving unit is used for receiving user information which is sent by the mobile terminal, encrypted by taking an identity of the cloud server as a public key and signed by a private key of the mobile terminal, and the private key of the mobile terminal is generated by encrypting the identity of the mobile terminal;
the signature verification unit is used for verifying the signature by taking the identity of the mobile terminal as a public key;
the user information decryption unit is used for decrypting the user information by using a private key stored in the cloud server, wherein the private key of the cloud server is generated by encrypting the identity of the cloud server;
and the permission judging unit is used for judging the access permission of the mobile terminal according to the decrypted user information and permission setting conditions prestored in the cloud server.
8. The mobile office apparatus of claim 6, wherein the process block creation module comprises:
the internet information receiving unit is used for receiving time information and/or geographical position information uploaded by the mobile terminal through the internet when a preset editing action is triggered in the file editing process;
and the short message information receiving unit is used for receiving the time information and/or the geographical position information sent by the mobile terminal through the Beidou satellite short message when the mobile terminal triggers the preset editing action in the file editing process.
9. The blockchain-based mobile office device of claim 6, wherein the information extraction module includes:
the additional information receiving unit is used for receiving and reading additional information which is encrypted by the mobile terminal through a public key provided by a cloud server and is embedded into the file;
an additional information decryption unit configured to decrypt the additional information with a private key paired with the public key;
and the information extraction unit is used for extracting time information and/or geographical position information generated when the file triggers a preset editing action in the editing process from the decrypted additional information.
CN201910399652.XA 2019-05-14 2019-05-14 Mobile office method and device based on block chain Active CN110233828B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910399652.XA CN110233828B (en) 2019-05-14 2019-05-14 Mobile office method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910399652.XA CN110233828B (en) 2019-05-14 2019-05-14 Mobile office method and device based on block chain

Publications (2)

Publication Number Publication Date
CN110233828A CN110233828A (en) 2019-09-13
CN110233828B true CN110233828B (en) 2022-01-04

Family

ID=67861290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910399652.XA Active CN110233828B (en) 2019-05-14 2019-05-14 Mobile office method and device based on block chain

Country Status (1)

Country Link
CN (1) CN110233828B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112929178B (en) * 2020-12-29 2024-05-24 合肥达朴汇联科技有限公司 Block chain audit tracing method and system applied to first terminal and electronic equipment
CN115166186A (en) * 2022-08-08 2022-10-11 广东长天思源环保科技股份有限公司 Online automatic monitoring system for water quality of water inlet of sewage treatment enterprise

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196934A (en) * 2017-05-18 2017-09-22 电子科技大学 A kind of cloud data managing method based on block chain
CN107483498A (en) * 2017-09-22 2017-12-15 中国联合网络通信集团有限公司 Academic authentication method and system based on block chain
CN107580196A (en) * 2017-07-28 2018-01-12 国创科视科技股份有限公司 A kind of video data shared system and method
CN107994991A (en) * 2017-10-31 2018-05-04 深圳市轱辘车联数据技术有限公司 A kind of data processing method, data processing server and storage medium
WO2018112946A1 (en) * 2016-12-23 2018-06-28 深圳前海达闼云端智能科技有限公司 Registration and authorization method, device and system
CN108492119A (en) * 2018-04-03 2018-09-04 李艾哲 Information anti-fake authentication method, device, equipment and medium based on block chain
CN108540459A (en) * 2018-03-22 2018-09-14 北京京东尚科信息技术有限公司 Data storage method, device, system, electronic equipment and computer-readable medium
CN108632381A (en) * 2018-05-14 2018-10-09 济南浪潮高新科技投资发展有限公司 A kind of environment measure of supervision and system based on block chain
CN109088871A (en) * 2018-08-14 2018-12-25 深圳市人民政府金融发展服务办公室 Datagram delivery method and system based on block chain technology
CN109326337A (en) * 2018-09-06 2019-02-12 西安电子科技大学 Electronic medical record storage and shared model and method based on block chain
CN109359478A (en) * 2018-12-03 2019-02-19 北京中科晶上科技股份有限公司 Authorization method and system based on encrypted permission file
CN109379360A (en) * 2018-10-19 2019-02-22 平安科技(深圳)有限公司 Auditing method, electronic device and computer readable storage medium
CN109559136A (en) * 2018-11-28 2019-04-02 中国医学科学院药用植物研究所 Information management system and method
CN109685534A (en) * 2019-01-22 2019-04-26 江苏哩咕信息科技有限公司 It is a kind of to encrypt anti-tamper Product quality and safety traceability system and method based on block chain

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018112946A1 (en) * 2016-12-23 2018-06-28 深圳前海达闼云端智能科技有限公司 Registration and authorization method, device and system
CN107196934A (en) * 2017-05-18 2017-09-22 电子科技大学 A kind of cloud data managing method based on block chain
CN107580196A (en) * 2017-07-28 2018-01-12 国创科视科技股份有限公司 A kind of video data shared system and method
CN107483498A (en) * 2017-09-22 2017-12-15 中国联合网络通信集团有限公司 Academic authentication method and system based on block chain
CN107994991A (en) * 2017-10-31 2018-05-04 深圳市轱辘车联数据技术有限公司 A kind of data processing method, data processing server and storage medium
CN108540459A (en) * 2018-03-22 2018-09-14 北京京东尚科信息技术有限公司 Data storage method, device, system, electronic equipment and computer-readable medium
CN108492119A (en) * 2018-04-03 2018-09-04 李艾哲 Information anti-fake authentication method, device, equipment and medium based on block chain
CN108632381A (en) * 2018-05-14 2018-10-09 济南浪潮高新科技投资发展有限公司 A kind of environment measure of supervision and system based on block chain
CN109088871A (en) * 2018-08-14 2018-12-25 深圳市人民政府金融发展服务办公室 Datagram delivery method and system based on block chain technology
CN109326337A (en) * 2018-09-06 2019-02-12 西安电子科技大学 Electronic medical record storage and shared model and method based on block chain
CN109379360A (en) * 2018-10-19 2019-02-22 平安科技(深圳)有限公司 Auditing method, electronic device and computer readable storage medium
CN109559136A (en) * 2018-11-28 2019-04-02 中国医学科学院药用植物研究所 Information management system and method
CN109359478A (en) * 2018-12-03 2019-02-19 北京中科晶上科技股份有限公司 Authorization method and system based on encrypted permission file
CN109685534A (en) * 2019-01-22 2019-04-26 江苏哩咕信息科技有限公司 It is a kind of to encrypt anti-tamper Product quality and safety traceability system and method based on block chain

Also Published As

Publication number Publication date
CN110233828A (en) 2019-09-13

Similar Documents

Publication Publication Date Title
CN110798315B (en) Data processing method and device based on block chain and terminal
CN110719203B (en) Operation control method, device and equipment of intelligent household equipment and storage medium
JP4668619B2 (en) Device key
US11023602B2 (en) Preventing digital forgery
CN111404696B (en) Collaborative signature method, security service middleware, related platform and system
US11972637B2 (en) Systems and methods for liveness-verified, biometric-based encryption
CN102325139A (en) Electronic document processing method, processing system and verification system
CN108171019B (en) Anti-counterfeiting verification method, anti-counterfeiting verification system, anti-counterfeiting verification device and storage medium
CN107124279B (en) Method and device for erasing terminal data
CN113472793A (en) Personal data protection system based on hardware password equipment
CN113365097B (en) Live broadcast information stream processing method, device and system, electronic equipment and storage medium
JP2007028015A (en) Program, system and method for time stamp verification, and time stamp generation request method
CN110233828B (en) Mobile office method and device based on block chain
CN112685786A (en) Financial data encryption and decryption method, system, equipment and storage medium
CN114925141B (en) Cloud primary automation deployment management system and method based on block chain
KR100908100B1 (en) Encrypted image data with matryoshka structure and, system and method for mutual synchronization certificating using the same
CN105809045A (en) Method and device for processing equipment systems during data reset
CN110807210B (en) Information processing method, platform, system and computer storage medium
JP4998314B2 (en) Communication control method and communication control program
CN110287725B (en) Equipment, authority control method thereof and computer readable storage medium
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN106936844B (en) Data interaction method and system for remote access service
CN113542081A (en) Safe intelligent household control method and system
CN113868628A (en) Signature verification method and device, computer equipment and storage medium
CN112671782A (en) File encryption method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant