CN112069529B - Block chain-based volume management method and device, computer and storage medium - Google Patents

Block chain-based volume management method and device, computer and storage medium Download PDF

Info

Publication number
CN112069529B
CN112069529B CN202011250726.2A CN202011250726A CN112069529B CN 112069529 B CN112069529 B CN 112069529B CN 202011250726 A CN202011250726 A CN 202011250726A CN 112069529 B CN112069529 B CN 112069529B
Authority
CN
China
Prior art keywords
volume
file
block
node
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011250726.2A
Other languages
Chinese (zh)
Other versions
CN112069529A (en
Inventor
王乐庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202011250726.2A priority Critical patent/CN112069529B/en
Publication of CN112069529A publication Critical patent/CN112069529A/en
Application granted granted Critical
Publication of CN112069529B publication Critical patent/CN112069529B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Abstract

The embodiment of the application discloses a block chain-based file management method, a block chain-based file management device, a computer and a storage medium, and relates to a data transmission technology in big data, wherein the method comprises the following steps: a first mechanism node acquires file information; the file information comprises a file identifier and first file content; if the first mechanism node has the recording authority of the file corresponding to the file identifier, searching a first file block associated with the file identifier from a file block chain; the first volume block is provided by the second organization node; acquiring second volume content from the first volume block, and acquiring a first key phrase of the first volume content and a second key phrase of the second volume content; and if the first key phrase is matched with the second key phrase, generating a second file block according to the file information, and adding the second file block into the file block chain. By the method and the device, the storage safety of the files can be improved, and the file circulation management efficiency is improved.

Description

Block chain-based volume management method and device, computer and storage medium
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method and an apparatus for managing volume based on blockchain, a computer, and a storage medium.
Background
In criminal case handling, a plurality of mechanisms such as public inspection, public inspection and law (public security, inspection institute and court) are commonly cooperated. The electronic files of a case need to be circulated among a plurality of mechanisms, and currently, when each mechanism completes one file, the names of the files may be inconsistent or the specifications of the files may be inconsistent, so that a barrier is generated to the cooperative work among the mechanisms. In addition, the conventional information system has the possibility of internal tampering, and the file can be tampered or stolen, so that the storage security of the file is low. Meanwhile, the authorization and management are difficult when the files around the same case are circulated among the mechanisms.
Disclosure of Invention
The embodiment of the application provides a block chain-based volume management method and device, computer equipment and a storage medium, which can improve the security of volume storage, the efficiency of volume circulation management and the cooperativity among all mechanisms.
An embodiment of the present application provides a block chain-based volume management method, including:
a first mechanism node acquires file information; the file information comprises a file identifier and first file content;
if the first mechanism node has the recording authority of the file corresponding to the file identifier, searching a first file block associated with the file identifier from a file block chain; the first volume block is provided by a second mechanism node, and the first mechanism node and the second mechanism node belong to a block chain network where a volume block chain is located;
acquiring second volume content from the first volume block, and acquiring a first key phrase of the first volume content and a second key phrase of the second volume content;
and if the first key phrase is matched with the second key phrase, generating a second file block according to the file information, and adding the second file block into the file block chain.
Wherein, the method also comprises:
calling a first intelligent contract to obtain a file authority block from a file block chain, and obtaining a recording mechanism identification set associated with recording authority from the file authority block based on the first intelligent contract;
and acquiring a mechanism identifier of the first mechanism node, and if the mechanism identifier belongs to the recording mechanism identifier set, determining that the first mechanism node has the recording authority of the file corresponding to the file identifier.
Wherein, the method also comprises:
acquiring a file recording process corresponding to the file identification; the file recording process comprises at least two mechanisms and the execution sequence of each mechanism;
determining the authority of each mechanism according to the execution sequence of each mechanism, and generating a file authority block according to the authority of each mechanism;
if the common identification of the file permission blocks passes, adding the file permission blocks to a file block chain;
and determining a block calling interface according to the file authority block, determining an authority logic function of each mechanism according to the authority of each mechanism, and generating a first intelligent contract according to the block calling interface and the authority logic function.
Wherein, the method also comprises:
acquiring a file type corresponding to the file identification, and acquiring a file recording process corresponding to the file type;
and acquiring a second mechanism node associated with the first volume block, and if the processing position of the second mechanism node in the volume recording flow is located before the processing position of the first mechanism node in the volume recording flow, executing a process of acquiring the content of the second volume from the first volume block.
Wherein, the first volume block comprises a first volume signature;
obtaining the content of the second volume from the block of the first volume, including:
acquiring a first volume signature from the first volume block, acquiring a second mechanism node associated with the first volume block, and verifying the first volume signature by adopting a public key of the second mechanism node;
and if the signature verification of the first volume is passed, acquiring the content of the second volume from the block of the first volume.
Wherein, the first organization node obtains the file information, including:
the method comprises the steps that a first mechanism node obtains a first volume processing template sent by a core node, and an information obtaining interface is generated based on the first volume processing template;
responding to input submission operation aiming at the information acquisition interface, and acquiring the file information submitted by the information acquisition interface; the first volume processing template is a volume processing template of the first mechanism node, the volume processing template is determined by the core node according to service types respectively managed by at least two mechanism nodes in the block chain network, and the block chain network is a network where the volume block chain is located.
The file processing template provided by the core node further comprises a second file processing template corresponding to the second mechanism node; the first volume processing template comprises a first key phrase position of a first mechanism node; the second file processing template comprises a second key phrase position of a second mechanism node;
acquiring a first key phrase of the first volume content and a second key phrase of the second volume content, including:
acquiring a first key phrase position corresponding to a first mechanism node based on a first volume processing template;
acquiring a second mechanism node associated with the first volume block, and acquiring a second key phrase position corresponding to the second mechanism node based on a second volume processing template corresponding to the second mechanism node;
and acquiring a first key phrase from a first key phrase position in the first volume content, and acquiring a second key phrase from a second key phrase position in the second volume content.
The obtaining of the first key phrase of the first volume content and the second key phrase of the second volume content includes:
acquiring a key information name, searching the key information name from the first volume content, and determining the content corresponding to the key information name in the first volume content as a first key phrase of the first volume content;
and searching the key information name from the second file content, and determining the content corresponding to the key information name in the second file content as a second key phrase of the second file content.
Generating a second file block according to the file information, and adding the second file block into the file block chain, wherein the method comprises the following steps:
acquiring a public key of a first mechanism node, and encrypting the file information by adopting the public key of the first mechanism node to generate a first file ciphertext;
acquiring a private key of a first mechanism node, and generating a second volume signature of the first volume ciphertext by adopting the private key of the first mechanism node;
and generating a second volume block according to the first volume ciphertext and the second volume signature, and if the second volume block is identified and passed, adding the second volume block to the volume block chain.
Wherein, the method also comprises:
acquiring a data access request sent by a third mechanism node; the data access request comprises a file identification;
acquiring file information based on the file identification, and encrypting the file information by adopting a public key of a third organization node to generate a second file ciphertext;
generating a third file signature of the second file ciphertext by adopting a private key of the first mechanism node, and sending access data to the third mechanism node; the access data includes a second volume ciphertext and a third volume signature.
Wherein, the method also comprises:
the first mechanism node acquires modification information; the modification information comprises data before updating, data after updating and block height;
acquiring a third file block corresponding to the block height from the file block chain, and acquiring a modification permission set corresponding to the third file block;
if the organization identifier of the first organization node belongs to the modification authority set, generating a signature of the modification information by using a private key of the first organization node, and generating a file update block according to the signature of the modification information, the data before the update, the data after the update and the block height;
if the consensus on the file update block passes, the file update block is added to the file block chain.
An aspect of an embodiment of the present application provides a block chain-based file management apparatus, where the apparatus includes:
the information acquisition module is used for acquiring the file information by the first mechanism node; the file information comprises a file identifier and first file content;
the block searching module is used for searching a first volume block associated with the volume identification from the volume block chain if the first mechanism node has the recording authority of the volume corresponding to the volume identification; the first volume block is provided by a second mechanism node, and the first mechanism node and the second mechanism node belong to a block chain network where a volume block chain is located;
the phrase acquisition module is used for acquiring second volume contents from the first volume block and acquiring a first key phrase of the first volume contents and a second key phrase of the second volume contents;
and the information matching module is used for generating a second file block according to the file information and adding the second file block into the file block chain if the first key phrase is matched with the second key phrase.
Wherein, the device still includes:
the collection obtaining module is used for calling a first intelligent contract to obtain a file authority block from a file block chain and obtaining a recording mechanism identification collection related to the recording authority from the file authority block based on the first intelligent contract;
and the authority determining module is used for acquiring the mechanism identifier of the first mechanism node, and if the mechanism identifier belongs to the recording mechanism identifier set, determining that the first mechanism node has the recording authority of the file corresponding to the file identifier.
Wherein, the device still includes:
the flow acquisition module is used for acquiring the file recording flow corresponding to the file identification; the file recording process comprises at least two mechanisms and the execution sequence of each mechanism;
the authority generation module is used for determining the authority of each mechanism according to the execution sequence of each mechanism and generating a file authority block according to the authority of each mechanism;
the block adding module is used for adding the file authority block to the file block chain if the file authority block is identified and passed;
and the contract generation module is used for determining a block calling interface according to the file authority block, determining an authority logic function of each mechanism according to the authority of each mechanism, and generating a first intelligent contract according to the block calling interface and the authority logic function.
Wherein, the device still includes:
the process obtaining module is further configured to obtain a file type corresponding to the file identifier, and obtain a file recording process corresponding to the file type;
and the position comparison module is used for acquiring a second mechanism node associated with the first volume block, and executing the process of acquiring the content of the second volume from the first volume block if the processing position of the second mechanism node in the volume recording flow is positioned before the processing position of the first mechanism node in the volume recording flow.
Wherein, the first volume block comprises a first volume signature;
in terms of acquiring the content of the second volume from the first volume block, the phrase acquiring module includes:
the signature verification unit is used for acquiring a first volume signature from the first volume block, acquiring a second mechanism node associated with the first volume block, and verifying and signing the first volume signature by adopting a public key of the second mechanism node;
and the content acquisition unit is used for acquiring the content of the second volume from the first volume block if the signature of the first volume is verified to pass.
Wherein, this information acquisition module includes:
the interface generating unit is used for the first mechanism node to obtain a first volume processing template sent by the core node and generate an information obtaining interface based on the first volume processing template;
the information acquisition unit is used for responding to input submission operation aiming at the information acquisition interface and acquiring the file information submitted by the information acquisition interface; the first volume processing template is a volume processing template of the first mechanism node, the volume processing template is determined by the core node according to service types respectively managed by at least two mechanism nodes in the block chain network, and the block chain network is a network where the volume block chain is located.
The file processing template provided by the core node further comprises a second file processing template corresponding to the second mechanism node; the first volume processing template comprises a first key phrase position of a first mechanism node; the second file processing template comprises a second key phrase position of a second mechanism node;
in terms of obtaining a first key phrase of a first volume content and a second key phrase of a second volume content, the phrase obtaining module includes:
the first position determining unit is used for acquiring a first key phrase position corresponding to the first mechanism node based on the first volume processing template;
a second position obtaining unit, configured to obtain a second mechanism node associated with the first volume block, and obtain a second keyword group position corresponding to the second mechanism node based on a second volume processing template corresponding to the second mechanism node;
and the keyword group obtaining unit is used for obtaining a first keyword group from a first keyword group position in the first volume content and obtaining a second keyword group from a second keyword group position in the second volume content.
In obtaining a first keyword group of a first volume content and a second keyword group of a second volume content, the phrase obtaining module includes:
the first name searching unit is used for acquiring a key information name, searching the key information name from the first volume content, and determining the content corresponding to the key information name in the first volume content as a first key phrase of the first volume content;
and the second name searching unit is used for searching the key information name from the second file content and determining the content corresponding to the key information name in the second file content as a second key phrase of the second file content.
In the aspect of generating a second file block according to the file information and adding the second file block to the file block chain, the information matching module includes:
the ciphertext generating unit is used for acquiring a public key of the first mechanism node, encrypting the file information by adopting the public key of the first mechanism node and generating a first file ciphertext;
the signature generation unit is used for acquiring a private key of the first mechanism node and generating a second volume signature of the first volume ciphertext by adopting the private key of the first mechanism node;
and the block generating unit is used for generating a second file block according to the first file ciphertext and the second file signature, and if the second file block is identified and passed, adding the second file block to the file block chain.
Wherein, the device still includes:
the request acquisition module is used for acquiring a data access request sent by a third mechanism node; the data access request comprises a file identification;
the information encryption module is used for acquiring the file information based on the file identification, encrypting the file information by adopting a public key of a third organization node and generating a second file ciphertext;
the signature generation module is used for generating a third file signature of the second file ciphertext by adopting a private key of the first mechanism node and sending access data to the third mechanism node; the access data includes a second volume ciphertext and a third volume signature.
Wherein, the device still includes:
the modification acquisition module is used for acquiring modification information by the first mechanism node; the modification information comprises data before updating, data after updating and block height;
the permission acquisition module is used for acquiring a third file block corresponding to the block height from the file block chain and acquiring a modification permission set corresponding to the third file block;
the updating block generating module is used for generating a signature of the modification information by adopting a private key of the first mechanism node if the mechanism identifier of the first mechanism node belongs to the modification authority set, and generating a file updating block according to the signature of the modification information, the data before the updating, the data after the updating and the block height;
and the update block chaining module is used for adding the file update block to the file block chain if the common identification of the file update block passes.
One aspect of the embodiments of the present application provides a computer device, including a processor, a memory, and an input/output interface;
the processor is respectively connected to the memory and the input/output interface, where the input/output interface is used for performing data interaction between nodes in a block chain, the memory is used for storing a program code, and the processor is used for calling the program code to execute the block chain-based volume management method implemented in one aspect of the embodiment of the present application.
An aspect of an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored, where the computer program includes program instructions, and when the program instructions are executed by a processor, the method for block chain based volume management implemented in the aspect of the embodiment of the present application is performed.
An aspect of an embodiment of the present application provides a computer program product or a computer program, which includes computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the method provided in the various alternatives in one aspect of the embodiments of the application.
The embodiment of the application has the following beneficial effects:
in the embodiment of the application, the first mechanism node acquires the file information; the file information comprises a file identifier and first file content; if the first organization node has the recording authority of the volume corresponding to the volume identification, searching a first volume block associated with the volume identification from a volume block chain, wherein the first volume block is provided by a second organization node, and the first organization node and the second organization node belong to a block chain network where the volume block chain is located; acquiring second volume content from the first volume block, and acquiring a first key phrase of the first volume content and a second key phrase of the second volume content; and if the first key phrase is matched with the second key phrase, generating a second file block according to the file information, and adding the second file block into the file block chain. The volume is managed through the block chain, and the block chain has the properties of decentralization, incapability of being tampered and the like, so that the storage safety of the volume is improved; by comparing the respective key phrases of the second volume content and the first volume content in the first volume block, the standards between the first volume content and the second volume content are unified, such as consistent names and specifications, and the like, so that the volume circulation management efficiency and the cooperativity between mechanisms are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a block chain-based network architecture diagram for volume management according to an embodiment of the present application;
fig. 2 is a block chain network architecture diagram according to an embodiment of the present application;
FIG. 3 is a flowchart of a block chain-based volume management method according to an embodiment of the present disclosure;
FIG. 4 is a schematic diagram of a file information acquisition scenario provided in an embodiment of the present application;
FIG. 5 is a schematic diagram of a file block generation scenario provided by an embodiment of the present application;
FIG. 6 is a schematic diagram illustrating a file access scenario provided by an embodiment of the present application;
FIG. 7 is a schematic diagram of a volume update scenario provided by an embodiment of the present application;
FIG. 8 is a schematic diagram of a portfolio flow scenario provided by an embodiment of the present application;
FIG. 9 is a block chain-based volume management apparatus according to an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application can store and transmit the volume block chain mentioned in the application and data and the like between each mechanism node in the block chain network based on a cloud technology, and can use a data transmission technology in the field of big data.
The Cloud technology (Cloud technology) is a hosting technology for unifying series resources such as hardware, software, network and the like in a wide area network or a local area network to realize calculation, storage, processing and sharing of data.
Cloud technology (Cloud technology) is based on a general term of network technology, information technology, integration technology, management platform technology, application technology and the like applied in a Cloud computing business model, can form a resource pool, is used as required, and is flexible and convenient. Cloud computing technology will become an important support. Background services of the technical network system require a large amount of computing and storage resources, such as video websites, picture-like websites and more web portals. With the high development and application of the internet industry, each article may have its own identification mark and needs to be transmitted to a background system for logic processing, data in different levels are processed separately, and various industrial data need strong system background support and can only be realized through cloud computing.
In other words, a large amount of data may be generated in the blockchain network, and at this time, the scheme in the present application may be implemented by using a big data technology, so as to improve the efficiency of managing the blocks in the blockchain.
The Big data (Big data) refers to a data set which cannot be captured, managed and processed by a conventional software tool within a certain time range, and is a massive, high-growth-rate and diversified information asset which can have stronger decision-making power, insight discovery power and flow optimization capability only by a new processing mode. With the advent of the cloud era, big data has attracted more and more attention, and the big data needs special technology to effectively process a large amount of data within a tolerance elapsed time. The method is suitable for the technology of big data, and comprises a large-scale parallel processing database, data mining, a distributed file system, a distributed database, a cloud computing platform, the Internet and an extensible storage system. When a plurality of block chains (including a block main chain and a plurality of block sub chains) exist in the block chain network, the scheme of the application can generate a large amount of data, a big data technology can be adopted, and the implementation efficiency of the scheme of the application is improved.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer. And the Block chain comprises a series of blocks (blocks) which are mutually connected according to the generated chronological order, new blocks cannot be removed once being added into the Block chain, and recorded data submitted by nodes in the Block chain system are recorded in the blocks.
Referring to fig. 1, fig. 1 is a network architecture diagram of block chain-based volume management according to an embodiment of the present disclosure. As shown in fig. 1, the blockchain network includes at least two mechanism nodes and a blockchain 101 (i.e., a volume blockchain) maintained by each mechanism node, wherein the at least two mechanism nodes may include a mechanism node 102a, a mechanism node 102b, a mechanism node 102c, and the like. It is assumed that the organization node 102a is a first organization node and the organization node 102b is a second organization node, where the organization node 102b generates a first volume block for a volume corresponding to the volume identifier and uploads the first volume block to the volume block chain 101. When the organization node 102a acquires the portfolio information associated with the portfolio identifier, the organization node 102a verifies the recording authority of the portfolio corresponding to the portfolio identifier, if the organization node 102a has the recording authority of the portfolio corresponding to the portfolio identifier, a first portfolio block is acquired from the portfolio block chain 101, a first keyword group of the first portfolio content in the portfolio information is compared with a second keyword group of the second portfolio content in the first portfolio block, when the first keyword group is matched with the second keyword group, the organization node 102a can generate a second portfolio block according to the portfolio information, and the second portfolio block is added into the portfolio block chain 101. The file is managed through the block chain network, the safety of file storage is improved based on the characteristics of decentralization and non-falsification of the block chain network, and meanwhile, when the fact that key phrases recorded by a first mechanism node and a second mechanism node aiming at the same file are matched is guaranteed, file information recorded by the first mechanism node is added to the file block chain, such as the name of the file, the occurrence time of the file, the location of the file and the like, so that the situation that in the block chain network, standards aiming at the same file are consistent is guaranteed, the cooperativity among all mechanism nodes is improved, and the efficiency of file management is improved.
The above mechanism node may be a server or a terminal device, or a system composed of a server and a terminal device, where the above mentioned terminal device may be an electronic device, including but not limited to a mobile phone, a tablet computer, a desktop computer, a notebook computer, a palmtop computer, a wearable device (e.g., a smart watch, a smart bracelet, etc.), an Augmented Reality/Virtual Reality (AR/VR) device, a helmet display, a smart speaker, a digital camera, a camera, and other Mobile Internet Devices (MID) with network access capability. The above-mentioned server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), a big data and artificial intelligence platform, and the like.
Further, referring to fig. 2, fig. 2 is a block chain network architecture diagram according to an embodiment of the present disclosure, where the block chain network may include a core node network, a mechanism node network, and a volume block chain maintained by each node in the block chain network. As shown in fig. 2, the core node network includes at least two core nodes, and the core node may be considered as a network node that can manage other organization nodes, in other words, the authority possessed by the core node is greater than the authority possessed by other organization nodes, for example, the core node may be a network node corresponding to a country-level organization, the organization node may be a network node corresponding to a provincial-level or other-level (e.g., city-level, etc.) organization, and the like, that is, the organization node may be a network node corresponding to an organization other than a country-level organization. As shown in fig. 2, the core node network includes at least two core nodes, such as an a mechanism, a B mechanism, a C mechanism, a D mechanism, an E mechanism, and an F mechanism, and it is assumed that the core node network includes 6 core nodes. The organization node network includes organization nodes managed by each core node, for example, organization nodes 11 to 1n managed by organization a, organization nodes 21 to 2n managed by organization B, organization nodes 31 to 3n managed by organization C, organization nodes 41 to 4n managed by organization D, organization nodes 51 to 5n managed by organization E, organization nodes 61 to 6n managed by organization F, and the like, where n is a positive integer. At least two core nodes and the organization node managed by each core node can read or write the volume block chain. For example, if the enterprise node is a network node corresponding to a provincial enterprise, then n may be the number of provinces.
Specifically, the core node may perform consensus on data in managed organization nodes, may also generate a portfolio processing template, and sends the portfolio processing template to a corresponding organization node, so that the organization node may obtain portfolio information based on the portfolio processing template, so as to unify recording standards of each organization node on the portfolio, improve cooperativity between each organization node, and improve efficiency of portfolio management. For example, organization a in fig. 2 may be central political commission, organization B may be the highest national court, organization C may be department of justice, organization D may be the highest national institute of inspection, organization E may be department of public security, organization F may be department of national security, and so on. The organization node 11 included in the organization nodes managed by the organization a may be a political organization of province 1, and the organization node 1n may be a political organization of province n; the organization node 21 included in the organization nodes managed by the organization B may be a courtroom organization of province 1, and the organization node 2n may be a courtroom organization of province n; the organization node 31 included in the organization nodes managed by the C organization may be the judicial division of the province 1, and the organization node 3n may be the judicial division of the province n; the organization node 41 included in the organization nodes managed by the D organization may be a hospital institution organization of province 1, and the organization node 4n may be a hospital institution organization of province n; the organization node 51 included in the organization nodes managed by the E organization may be the police division of province 1, and the organization node 5n may be the police division of province n; the facility nodes managed by the F facility may include a facility node 61 that may be a security subsection of province 1 and a facility node 6n that may be a security subsection of province n.
Alternatively, as shown in fig. 2, in the organization node network, organization nodes belonging to the same network partition may be regarded as a block sub-network, and the network partition means that the organization nodes belonging to the same network partition may manage data for the same volume. For example, the organization node 11 in the organization a, the organization node 21 in the organization B, the organization node 31 in the organization C, the organization node 41 in the organization D, the organization node 51 in the organization E, and the organization node 61 in the organization F may constitute one block sub-network, and it is considered that, taking the above-mentioned organizations as examples, the political organization, the court organization, the division of justice, the division of inspection and study, the division of public security, and the division of security in province 1 may constitute one block sub-network, and data generated in province 1 is collectively managed.
In other words, each country-level organization (i.e., core node) may manage organizations (i.e., organization nodes) in each province or city, etc., such that in the blockchain network, the respective network nodes are layered, i.e., a two-layer chain structure is used, the number of network nodes included in the core portion (i.e., core node network) in the blockchain network is controlled, and simultaneously, the province-level network nodes are added for the members in the blockchain network to use, thereby improving the performance of the blockchain network. Optionally, the core node network and the mechanism node network may be divided according to needs, and are not limited to the division of the above country-level network nodes and provincial-city-level network nodes, for example, a main department in a company may serve as a core node, and sub-departments under each main department may serve as mechanism nodes, and the like, which is not limited herein. In short, under different scenarios, each network node may be divided into a core node and a mechanism node according to the authority owned by each network node. Optionally, in this application, a network structure of at least two layers of chains may also be used, that is, the network structure is not limited to a two-layer chain structure, where the number of layers included in at least two layers of chains may be determined according to the number of network nodes included in the block chain network, and the like; or, the number of layers included in the at least two layers of chains may be determined according to the authority level of each network node, and taking a country-level organization and a provincial-level organization as an example, the number of layers included in the at least two layers of chains may be divided into a network composed of country-level organizations, a network composed of provincial organizations, and a network three-layer chain structure composed of city-level organizations, which is not limited herein.
Further, please refer to fig. 3, wherein fig. 3 is a flowchart of a block chain-based volume management method according to an embodiment of the present disclosure. As shown in fig. 3, with any organization node in the blockchain network as an execution subject, the process of block-chain-based volume management includes the following steps:
in step S301, a first organization node obtains volume information, where the volume information includes a volume identifier and a first volume content.
In the embodiment of the application, a first mechanism node acquires a first volume processing template sent by a core node, and generates an information acquisition interface based on the first volume processing template; responding to input submission operation aiming at the information acquisition interface, and acquiring the file information submitted by the information acquisition interface; the first volume processing template is a volume processing template of the first mechanism node, the volume processing template is determined by the core node according to service types respectively managed by at least two mechanism nodes in the block chain network, and the block chain network is a network where the volume block chain is located. Specifically, the core node in the blockchain network may generate at least two portfolio processing templates, and send the at least two portfolio processing templates to the corresponding organization nodes, optionally, the block chain network comprises a core node network, the core node network comprises at least two core nodes, each core node can generate a file processing template corresponding to a mechanism node managed by the core node, and broadcasts the generated file processing template to other core nodes, the at least two core nodes are used for carrying out consensus on the volume processing templates generated in the core node network, if the consensus passes, the volume processing templates passing the consensus are uploaded to the template block chain or the volume block chain, that is, the volume processing template may be stored in the same chain as the data of the volume or in a different chain from the data of the volume, which is not limited herein.
For example, referring to fig. 2, an organization a in the core node network generates a folder processing template for an organization node 11 to an organization node 1n, broadcasts the folder processing template to an organization B, an organization C, an organization D, an organization E, and an organization F, the organization B, the organization C, the organization D, the organization E, and the organization F perform consensus on the received folder processing template sent by the organization a, and the organization a determines whether to chain the folder processing template according to the consensus result, wherein if the folder processing template passes the consensus, a template block is generated according to the folder processing template and the organization a, the template block is added to a template block chain or a folder block chain, and the folder processing template is sent to a corresponding organization node, such as the organization node 11 and the organization node 1 n. When the template block is generated, the a organization may obtain the private key of the a organization, sign the file processing template by using the private key of the a organization, generate a template signature, and generate the template block according to the file processing template and the template signature, where the template block may further include an organization node (i.e., an organization node that may use the file processing template) corresponding to the stored file processing template, such as an organization node 11 and an organization node 1n managed by the a organization. Similarly, other core nodes (e.g., B to F entities, etc.) in the core node network may generate a volume processing template, and add the volume processing template to the template block chain or the volume block chain after the consensus on the volume processing template passes.
Wherein, the first mechanism node may obtain the first volume processing template sent by the core node, generate an information obtaining interface based on the first volume processing template, please refer to fig. 4, fig. 4 is a schematic diagram of a volume information obtaining scenario provided in an embodiment of the present application, as shown in fig. 4, assuming that there exists a blockchain volume management system, a user may log in the blockchain volume management system through a node log-in page 401 of the blockchain volume management system, for example, the user may enter a organization name, an account, a password, etc. in the node login page 401, assuming that the organization name is the organization name corresponding to the first organization node, the first organization node obtains the account and the password, the user is authenticated, and if the user passes the authentication, an information acquisition interface 402 is displayed for the user, wherein the user may be authenticated according to the account and the password. For example, whether the account and the password are matched or not is detected, whether the account has the authority to access the first mechanism node or not is detected, and when the account and the password are matched and the account has the authority to access the first mechanism node, an information acquisition interface 402 is displayed for the user; if the account does not have the authority of accessing the first mechanism node, displaying an account abnormity prompting message; and if the account is not matched with the password, displaying a password error prompt message and the like. The user may input the file information based on the information obtaining interface 402, and the first organization node responds to the input submission operation for the information obtaining interface 402 to obtain the file information submitted in the information obtaining interface 402. The file information may include a file identifier, a file name, a mechanism to which the file belongs, a category to which the file belongs, and the like, where the file identifier may be an identifier of the file; the name of the volume is used for representing the name of the volume, the names of the same volume need to be kept consistent, and the organization to which the volume belongs can represent the recording organization of the volume, and the organization to which the volume belongs can be the first organization node; the class to which a volume belongs may refer to a volume type of the volume, such as a litigation type or a case type, wherein the volume type may be used to indicate a flow of circulation (i.e., a volume record flow) of the volume in an organization node included in the blockchain network. The file information may further include file content, file attachments, file time, access rights, recording rights, and the like, where the file content may be used to represent specific content of the file; the volume time may be used to indicate the time when the data of the volume was generated when the data was recorded; the access right is used for representing an organization node which can access the file; the recording authority is used to indicate an organization node that can record the related data of the volume. Wherein the volume information may further include a modification right for indicating an organization node that may modify the volume information. Optionally, the file information may be added or subtracted as needed, and is not limited herein. The file identifier may be a character string, such as a letter, a number, or a symbol.
For example, the case refers to a file of a case, the name of the file of the case is acquired as "XX ground kidnapping case", the organization to which the file belongs is a first organization node, the organization belongs to the case type, the content of the file is a specific description of the "XX ground kidnapping case", for example, "XX ground, a user is kidnapped, a family member is lanyard XXX money, etc., the file attachment may include relevant evidence of the corresponding case, and the format of the file attachment may be an electronic file, an image, a video, etc.
The first mechanism node can call a first intelligent contract to acquire a file authority block from a file block chain, and acquire a recording mechanism identification set associated with recording authority from the file authority block based on the first intelligent contract; acquiring a mechanism identifier of a first mechanism node, and if the mechanism identifier belongs to a recording mechanism identifier set, determining that the first mechanism node has the recording authority of the file corresponding to the file identifier; and if the mechanism identifier does not belong to the recording mechanism identifier set, determining that the first mechanism node does not have the recording authority of the file corresponding to the file identifier. Optionally, the file authority block may also include a recording mechanism name set, and may obtain a mechanism node name of the first mechanism node, and if the mechanism node name belongs to the recording mechanism name set, it is determined that the first mechanism node has a recording authority for the file corresponding to the file identifier; and if the organization node does not belong to the recording organization name set, determining that the first organization node does not have the recording authority of the file corresponding to the file identification. And if the first mechanism node does not have the recording authority of the file corresponding to the file identification, displaying a file information submission failure message.
The first organization node can acquire a file recording process corresponding to the file identification; the file recording process comprises at least two mechanisms and the execution sequence of each mechanism; determining the authority of each mechanism according to the execution sequence of each mechanism, and generating a file authority block according to the authority of each mechanism; if the common identification of the file permission blocks passes, adding the file permission blocks to a file block chain; and determining a block calling interface according to the file authority block, determining an authority logic function of each mechanism according to the authority of each mechanism, and generating a first intelligent contract according to the block calling interface and the authority logic function. For example, as shown in fig. 2, the execution sequence of each mechanism may be "police department- > court- > judicial department" or "court- > police department- > judicial department", and the authority of the mechanism may be the authority of the mechanism to modify or access data of other mechanisms, or the authority of the mechanism to record files, and the like, wherein the authority of each mechanism, the execution sequence of each mechanism, and the like may be adjusted as needed, or set by a core node, and the like, and the execution sequence is not limited herein.
Step S302, if the first mechanism node has the recording authority of the file corresponding to the file identifier, searching a first file block associated with the file identifier from the file block chain.
In the embodiment of the application, if the first mechanism node has the recording authority of the file corresponding to the file identifier, searching a first file block associated with the file identifier from a file block chain; optionally, the first volume block may be a block with a largest timestamp among blocks associated with the volume identification. The first mechanism node can acquire the file type corresponding to the file identification and acquire the file recording process corresponding to the file type; and acquiring a second mechanism node associated with the first volume block, and if the processing position of the second mechanism node in the volume recording flow is located before the processing position of the first mechanism node in the volume recording flow, executing a process of acquiring the content of the second volume from the first volume block. If the first volume block is the block with the largest timestamp in the blocks associated with the volume identifier, it is further required to ensure that the processing position of the second mechanism node in the volume recording flow is adjacent to the processing position of the first mechanism node in the volume recording flow. Through the file recording process, the file circulation process is guaranteed to meet the case processing process, and the file processing normalization is improved.
If the first volume block associated with the volume identifier is not searched from the volume block chain, a step S304 of generating a second volume block according to the volume information and adding the second volume block to the volume block chain is performed.
For example, please refer to fig. 5, fig. 5 is a schematic diagram of a file block generation scene according to an embodiment of the present disclosure. As shown in FIG. 5, a first organization node obtains a first volume block 502 associated with a volume identification from a chain of volume blocks 501, wherein the first volume block 502 comprises a block header and a block body.
Step S303, obtain the second file content from the first file block, and obtain the first key phrase of the first file content and the second key phrase of the second file content.
In an embodiment of the present application, the first volume block may include a first volume signature therein. The first organization node can acquire a first volume signature from the first volume block, acquire a second organization node associated with the first volume block, and adopt a public key of the second organization node to check and sign the first volume signature; if the signature of the first volume passes the verification, acquiring the content of the second volume from the block of the first volume; and if the first volume signature verification fails, sending a first volume block exception message to the second organization node.
The file processing template provided by the core node further comprises a second file processing template corresponding to the second mechanism node; the first volume processing template comprises a first key phrase position of a first mechanism node; the second portfolio processing template includes a second keyword set location for a second organization node. The first mechanism node can acquire a first keyword group position corresponding to the first mechanism node based on the first volume processing template; acquiring a second mechanism node associated with the first volume block, and acquiring a second key phrase position corresponding to the second mechanism node based on a second volume processing template corresponding to the second mechanism node; and acquiring a first key phrase from a first key phrase position in the first volume content, and acquiring a second key phrase from a second key phrase position in the second volume content. As shown in fig. 4, when the file information submitted through the information obtaining interface 402 is uploaded to the file block chain, the file information may be directly stored based on the information obtaining interface 402, such as "file id: XXX; file name: XXX; the mechanism to which the file belongs: XXX; classification of the file belongs to: XXX; … ", in other words, when generating a volume block, the volume block is generated based on the corresponding volume processing template and the obtained volume information, the position of the keyword in the volume content of the volume block is fixed, and the corresponding keyword can be obtained from the position of the keyword in the volume content. For example, the keyword group is a content corresponding to the name and the category of the file, and the first mechanism node may obtain the first keyword group from a first keyword group position in the first file content, and obtain the second keyword group from a second keyword group position in the second file content.
Or the first mechanism node may obtain the key information name, search the key information name from the first volume content, and determine the content corresponding to the key information name in the first volume content as a first key phrase of the first volume content; and searching the key information name from the second file content, and determining the content corresponding to the key information name in the second file content as a second key phrase of the second file content. As shown in fig. 4, when the file information submitted through the information obtaining interface 402 is uploaded to the file block chain, the file information may be directly stored based on the information obtaining interface 402, such as "file id: XXX; file name: XXX; the mechanism to which the file belongs: XXX; classification of the file belongs to: XXX; …' and the like, assuming that the keyword group is the content corresponding to the file name and the belonged classification and the like, that is, the key information name is the file name and the belonged classification and the like, determining the content corresponding to the file name and the content corresponding to the belonged classification which are obtained from the first file content as the first keyword group of the first file content; and determining the content corresponding to the acquired file name and the content corresponding to the belonged classification in the second file content as a second key phrase of the second file content.
As shown in FIG. 5, the first organization node obtains the second volume content 5032 from the zone block of the first volume block 502. A first keyword group is obtained from the first volume content 5031, a second keyword group is obtained from the second volume content 5032, and the first keyword group and the second keyword group are compared.
Step S304, if the first key phrase is matched with the second key phrase, a second file block is generated according to the file information, and the second file block is added into the file block chain.
In the embodiment of the application, if the first key phrase is matched with the second key phrase, a second file block is generated according to file information, and the second file block is added to a file block chain; if the first keyword group is not matched with the second keyword group, outputting an information exception message, for example, if the name of the file in the first keyword group is not consistent with the name of the file in the second keyword group, the information exception message includes a file name exception message and the name of the file in the second keyword group. Acquiring a public key of a first mechanism node, and encrypting the file information by adopting the public key of the first mechanism node to generate a first file ciphertext; acquiring a private key of a first mechanism node, and generating a second volume signature of the first volume ciphertext by adopting the private key of the first mechanism node; and generating a second file block according to the first file ciphertext and the second file signature, if the second file block is identified and passed, adding the second file block to a file block chain, and if the second file block is identified and not passed, outputting a file block abnormal message to prompt a user submitting file information in the first mechanism node to modify the file information and re-verify the file information. As shown in fig. 5, if the first keyword group matches the second keyword group, a second volume block 504 is generated, and the second volume block 504 is added to the volume block chain 501.
In the present application, each organization node may also view or modify a block in the volume block chain, and the process may be as follows:
the first mechanism node acquires a data access request sent by a third mechanism node; the data access request includes a volume identification. Acquiring file information based on the file identification, and encrypting the file information by adopting a public key of a third organization node to generate a second file ciphertext; generating a third file signature of the second file ciphertext by adopting a private key of the first mechanism node, and sending access data to the third mechanism node; the access data includes a second volume ciphertext and a third volume signature. The first organization node may include data of a plurality of files, and the first organization node acquires a data access request sent by a third organization node and acquires file information corresponding to a file identifier from the data of the plurality of files. Optionally, the file access block may be generated according to the mechanism identifier of the third mechanism node, the mechanism identifier of the first mechanism node, the file identifier, the second file ciphertext, and the like, and if the common identification of the file access block passes, the file access block is added to the file block chain.
For example, referring to fig. 6, fig. 6 is a schematic diagram of a file access scenario provided by an embodiment of the present application. As shown in fig. 6, the first organization node 601 obtains the data access request of the third organization node 604, obtains the file information requested by the data access request, and encrypts the file information by using the public key 602 of the third organization node 604 to generate a second file ciphertext; and generating a third volume signature of the second volume ciphertext by using a private key 603 of the first mechanism node 601, and sending access data to a third mechanism node 604, wherein the access data comprises the second volume ciphertext and the third volume signature. The third mechanism node 604 obtains the access data, adopts the public key 605 of the first mechanism node 601 to check the third volume signature in the access data to generate a verification ciphertext, compares the verification ciphertext with the second volume ciphertext in the access data, and determines that the access data is sent by the first mechanism node if the verification ciphertext is matched with the second volume ciphertext, so that the data is reliable and the data security is improved. And if the third organization node 604 passes the signature verification of the third volume signature, the private key 606 of the third organization node 604 is adopted to decrypt the second volume ciphertext to obtain the volume information.
The first mechanism node acquires modification information; the modification information includes pre-update data, post-update data, and block height. Acquiring a third file block corresponding to the block height from the file block chain, and acquiring a modification permission set corresponding to the third file block; if the organization identifier of the first organization node belongs to the modification authority set, generating a signature of the modification information by using a private key of the first organization node, and generating a file update block according to the signature of the modification information, the data before the update, the data after the update and the block height; if the consensus on the file update block passes, the file update block is added to the file block chain.
Referring to fig. 7, fig. 7 is a schematic diagram of a volume update scene according to an embodiment of the present application. As shown in fig. 7, the first mechanism node 701 obtains modification information 702, where the modification information 702 includes pre-update data, post-update data, and a block height, and obtains a third volume block 704 corresponding to the block height from the volume block chain 703. The first mechanism node 701 acquires a modification permission set 705 corresponding to the third volume block 704, acquires a mechanism identifier of the first mechanism node, if the mechanism identifier of the first mechanism node belongs to the modification permission set 705, a signature of modification information 702 is generated by using a private key 706 of the first mechanism node 701, a volume update block 707 is generated according to the signature of the modification information, pre-update data, post-update data and block height, and if the volume update block 707 is identified to pass, the volume update block 707 is added to the volume block chain 703.
For example, referring to fig. 8, fig. 8 is a schematic diagram of a volume flow scenario provided by an embodiment of the present application. As shown in fig. 8, the portfolio circulation process includes the following steps:
in step S801, the police department obtains portfolio information.
In the embodiment of the present application, the public security branch 8a acquires the file information, and at this time, the public security branch 8a may be regarded as a first mechanism node, and the process may be shown as step S301 in fig. 3. For example, the public security division 8a records the case 1, collects the case 1, and generates the file information according to the collection result, wherein the file information is generated when the public security division 8a responds to the triggering operation for generating the file information, and the public security division 8a receives the report for the case 1, or finds the case-sending site of the case 1, and the like, and the public security division 8a can be considered to acquire the triggering operation for generating the file information.
In step S802, the public security division chains the file information.
In the embodiment of the present application, the public security division 8a verifies the file information, generates a file block according to the file information after the verification is passed, and uploads the file block to a file block chain, which may be shown in steps S302 to S304 in fig. 3, where the file block is equivalent to the second file block in fig. 3.
And step S803, the patient is complained and arrested to a detection department, and the detection department obtains the file information.
In the embodiment of the present application, the police department 8a transfers the case 1 to the inspection shop 8b, starts to complain and catches the case to the inspection shop 8b, and the inspection shop 8b obtains the file block generated in step S802 to obtain the file information in the file block.
Step S804, the inspection shop increases the inspection opinions.
In the embodiment of the present application, the auditorium 8b adds examination opinions to the case 1 based on the portfolio information provided by the public security subsection 8a, and adds the examination opinions to the portfolio block chain, wherein the steps can also be seen in FIG. 3, in which case the auditorium 8b corresponds to the first organization node in FIG. 3 and the examination opinions correspond to the portfolio information in FIG. 3, and the public security subsection 8a can be considered as the second organization node relative to the auditorium 8 b.
And step S805, acceptance by the court, and acquisition of file information.
In the embodiment of the present application, the court 8c accepts the case 1, and acquires the file information associated with the case 1 from the file block chain, that is, acquires the file information associated with the file identifier of the case 1, for example, the file information uploaded by the public security division 8a and the file information uploaded by the inspection yard 8 b.
Step S806, the court generates approval information, and links the approval information.
In the embodiment of the present application, the court 8c generates the approval information for the case 1 according to the acquired file information, and adds the approval information to the file block chain, where the step may also be shown in fig. 3, in this case, the court 8c corresponds to the first organization node in fig. 3, the approval information corresponds to the file information in fig. 3, and when the court 8c is used as the first organization node, both the public security division 8a and the inspection yard 8b may be considered as the second organization node relative to the court 8 c.
In step S807, the judicial bureau acquires portfolio information.
In the embodiment of the present application, the judicial bureau 8d obtains the file information associated with the case 1 from the file block chain, that is, obtains the file information associated with the file identifier of the case 1, for example, the file information uploaded by the police department 8a, the file information uploaded by the inspection yard 8b, the file information uploaded by the court 8c, and the like.
Step S808, the judicial bureau generates information such as under deposit, filled in, or released, and chains the information such as under deposit, filled in, or released.
In the embodiment of the present application, the judicial bureau 8d generates information such as under deposit, under punt, or release for the case 1 based on the portfolio information acquired in step S807, and adds the information such as under deposit, under punt, or release to the portfolio block chain, wherein the step can also be referred to as shown in fig. 3, in which case, the judicial bureau 8d corresponds to the first organization node in fig. 3, the information such as under deposit, under punt, or release can correspond to the portfolio information in fig. 3, and when the judicial bureau 8d serves as the first organization node, the public security bureau 8a, the inspection yard 8b, the court 8c, and the like can all be considered as the second organization node relative to the judicial bureau 8 d.
The above police department 8a, the inspection yard 8b, the court 8c and the judicial bureau 8d all belong to a blockchain network and are organization nodes in the blockchain network, wherein, in the execution process of the above steps S801 to S808, the notarization organization 8e can notarize the execution process of the steps S801 to S808 and data and the like generated in the execution process, so as to improve the security of the management of the file, and improve the authority of the data (such as the related data of the file) generated in the embodiment of the present application.
In the embodiment of the application, the first mechanism node acquires the file information; the file information comprises a file identifier and first file content; if the first organization node has the recording authority of the volume corresponding to the volume identification, searching a first volume block associated with the volume identification from a volume block chain, wherein the first volume block is provided by a second organization node, and the first organization node and the second organization node belong to a block chain network where the volume block chain is located; acquiring second volume content from the first volume block, and acquiring a first key phrase of the first volume content and a second key phrase of the second volume content; and if the first key phrase is matched with the second key phrase, generating a second file block according to the file information, and adding the second file block into the file block chain. The volume is managed through the block chain, and the block chain has the properties of decentralization, incapability of being tampered and the like, so that the storage safety of the volume is improved; the mechanism nodes can generate corresponding blocks when storing, accessing or modifying the related data of the file, and the blocks are added into the file block chain, so that the file can be traced from generation to modification to access, the file is managed through the file block chain, the efficiency of circulation of the file among all the mechanism nodes is improved, the processing efficiency of cases is improved, meanwhile, the safety of file management is improved, when problems occur in the circulation process of the file, responsibility tracing can be found from the file block chain, and the safety of file management is further improved. By comparing the respective key phrases of the second volume content and the first volume content in the first volume block, the standards between the first volume content and the second volume content are unified, such as consistent names and specifications, and the like, so that the volume circulation management efficiency and the cooperativity between mechanisms are improved.
Further, referring to fig. 9, fig. 9 is a schematic diagram of a block chain-based volume management apparatus according to an embodiment of the present application. The block chain based volume management apparatus may be a computer program (including program code) running on a computer device, for example, the block chain based volume management apparatus is an application software; the apparatus may be used to perform the corresponding steps in the methods provided by the embodiments of the present application. As shown in fig. 9, the block chain-based volume management apparatus 900 may be used in the computer device in the embodiment corresponding to fig. 3, specifically, the block chain-based volume management apparatus 900 may include: the system comprises an information acquisition module 11, a block search module 12, a phrase acquisition module 13 and an information matching module 14.
The information acquisition module 11 is used for acquiring the file information by the first mechanism node; the file information comprises a file identifier and first file content;
the block searching module 12 is configured to search a first volume block associated with the volume identifier from the volume block chain if the first mechanism node has a recording right to the volume corresponding to the volume identifier; the first volume block is provided by a second mechanism node, and the first mechanism node and the second mechanism node belong to a block chain network where a volume block chain is located;
the phrase obtaining module 13 is configured to obtain second volume content from the first volume block, and obtain a first keyword phrase of the first volume content and a second keyword phrase of the second volume content;
and the information matching module 14 is configured to generate a second folder block according to the folder information if the first key phrase is matched with the second key phrase, and add the second folder block to the folder block chain.
Wherein, the apparatus 900 further comprises:
the collection obtaining module 15 is configured to invoke a first intelligent contract to obtain a file authority block from a file block chain, and obtain, based on the first intelligent contract, a recording mechanism identifier collection associated with a recording authority from the file authority block;
and the authority determining module 16 is configured to obtain a mechanism identifier of the first mechanism node, and if the mechanism identifier belongs to the set of recording mechanism identifiers, determine that the first mechanism node has a recording authority for the volume corresponding to the volume identifier.
Wherein, the apparatus 900 further comprises:
the flow acquiring module 17 is configured to acquire a file recording flow corresponding to the file identifier; the file recording process comprises at least two mechanisms and the execution sequence of each mechanism;
the authority generation module 18 is used for determining the authority of each mechanism according to the execution sequence of each mechanism and generating a file authority block according to the authority of each mechanism;
the block adding module 19 is configured to add the file permission block to the file block chain if the consensus on the file permission block passes;
and the contract generating module 20 is configured to determine a block call interface according to the file authority block, determine an authority logic function of each mechanism according to the authority of each mechanism, and generate a first intelligent contract according to the block call interface and the authority logic function.
Wherein, the apparatus 900 further comprises:
the process obtaining module 17 is further configured to obtain a file type corresponding to the file identifier, and obtain a file recording process corresponding to the file type;
the location comparing module 21 is configured to obtain a second mechanism node associated with the first volume block, and if a processing location of the second mechanism node in the volume recording flow is located before a processing location of the first mechanism node in the volume recording flow, execute a process of obtaining the content of the second volume from the first volume block.
Wherein, the first volume block comprises a first volume signature;
in terms of acquiring the content of the second volume from the first volume block, the phrase acquiring module 13 includes:
the signature verification unit 131 is configured to obtain a first volume signature from the first volume block, obtain a second mechanism node associated with the first volume block, and verify the signature of the first volume signature by using a public key of the second mechanism node;
the content obtaining unit 132 is configured to obtain the content of the second volume from the block of the first volume if the signature of the first volume is verified.
The information obtaining module 11 includes:
the interface generating unit 111 is configured to obtain, by a first mechanism node, a first volume processing template sent by a core node, and generate an information obtaining interface based on the first volume processing template;
an information obtaining unit 112, configured to obtain, in response to an input submission operation for an information obtaining interface, the file information submitted by the information obtaining interface; the first volume processing template is a volume processing template of the first mechanism node, the volume processing template is determined by the core node according to service types respectively managed by at least two mechanism nodes in the block chain network, and the block chain network is a network where the volume block chain is located.
The file processing template provided by the core node further comprises a second file processing template corresponding to the second mechanism node; the first volume processing template comprises a first key phrase position of a first mechanism node; the second file processing template comprises a second key phrase position of a second mechanism node;
in terms of obtaining a first keyword group of the first volume content and a second keyword group of the second volume content, the phrase obtaining module 13 includes:
a first position determining unit 133, configured to obtain a first keyword group position corresponding to the first mechanism node based on the first volume processing template;
a second position obtaining unit 134, configured to obtain a second mechanism node associated with the first volume block, and obtain a second keyword group position corresponding to the second mechanism node based on a second volume processing template corresponding to the second mechanism node;
the keyword group obtaining unit 135 is configured to obtain a first keyword group from a first keyword group position in the first volume content, and obtain a second keyword group from a second keyword group position in the second volume content.
In obtaining a first keyword group of the first volume content and a second keyword group of the second volume content, the phrase obtaining module 13 includes:
the first name searching unit 136 is configured to obtain a key information name, search the key information name from the first volume content, and determine, as a first key phrase of the first volume content, content corresponding to the key information name in the first volume content;
the second name searching unit 137 is configured to search the key information name from the second volume content, and determine a content corresponding to the key information name in the second volume content as a second key phrase of the second volume content.
In generating a second volume block according to the volume information, and adding the second volume block to the volume block chain, the information matching module 14 includes:
the ciphertext generating unit 141 is configured to obtain a public key of the first mechanism node, encrypt the volume information by using the public key of the first mechanism node, and generate a first volume ciphertext;
the signature generating unit 142 is configured to obtain a private key of the first mechanism node, and generate a second volume signature of the first volume ciphertext by using the private key of the first mechanism node;
the block generating unit 143 is configured to generate a second volume block according to the first volume ciphertext and the second volume signature, and add the second volume block to the volume block chain if the second volume block is identified and passed.
Wherein, the apparatus 900 further comprises:
a request obtaining module 22, configured to obtain a data access request sent by a third mechanism node; the data access request comprises a file identification;
the information encryption module 23 is configured to obtain the file information based on the file identifier, encrypt the file information by using a public key of a third organization node, and generate a second file ciphertext;
the signature generation module 24 is configured to generate a third volume signature of the second volume ciphertext by using the private key of the first mechanism node, and send access data to the third mechanism node; the access data includes a second volume ciphertext and a third volume signature.
Wherein, the apparatus 900 further comprises:
a modification obtaining module 25, configured to obtain modification information by the first mechanism node; the modification information comprises data before updating, data after updating and block height;
the permission obtaining module 26 is configured to obtain a third volume block corresponding to the block height from the volume block chain, and obtain a modification permission set corresponding to the third volume block;
an update block generation module 27, configured to generate a signature of the modification information by using a private key of the first mechanism node if the mechanism identifier of the first mechanism node belongs to the modification permission set, and generate a file update block according to the signature of the modification information, the pre-update data, the post-update data, and the block height;
the update block chaining module 28 is configured to add the file update block to the file block chain if the consensus on the file update block passes.
The embodiment of the application describes a block chain-based file management device, which acquires file information; the file information comprises a file identifier and first file content; if the first organization node has the recording authority of the volume corresponding to the volume identification, searching a first volume block associated with the volume identification from a volume block chain, wherein the first volume block is provided by a second organization node, and the first organization node and the second organization node belong to a block chain network where the volume block chain is located; acquiring second volume content from the first volume block, and acquiring a first key phrase of the first volume content and a second key phrase of the second volume content; and if the first key phrase is matched with the second key phrase, generating a second file block according to the file information, and adding the second file block into the file block chain. The volume is managed through the block chain, and the block chain has the properties of decentralization, incapability of being tampered and the like, so that the storage safety of the volume is improved; the mechanism nodes can generate corresponding blocks when storing, accessing or modifying the related data of the file, and the blocks are added into the file block chain, so that the file can be traced from generation to modification to access, the file is managed through the file block chain, the efficiency of circulation of the file among all the mechanism nodes is improved, the processing efficiency of cases is improved, meanwhile, the safety of file management is improved, when problems occur in the circulation process of the file, responsibility tracing can be found from the file block chain, and the safety of file management is further improved. By comparing the respective key phrases of the second volume content and the first volume content in the first volume block, the standards between the first volume content and the second volume content are unified, such as consistent names and specifications, and the like, so that the volume circulation management efficiency and the cooperativity between mechanisms are improved.
Referring to fig. 10, fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present application. As shown in fig. 10, the computer device 1000 in the embodiment of the present application may include: one or more processors 1001, memory 1002, and input-output interface 1003. The processor 1001, the memory 1002, and the input/output interface 1003 are connected by a bus 1004. The memory 1002 is configured to store a computer program, where the computer program includes program instructions, and the input/output interface 1003 is used for performing data interaction between each mechanism node, between each core node, and between a core node and a mechanism node in a block chain network; the processor 1001 is configured to execute program instructions stored in the memory 1002 to perform the following operations:
a first mechanism node acquires file information; the file information comprises a file identifier and first file content;
if the first mechanism node has the recording authority of the file corresponding to the file identifier, searching a first file block associated with the file identifier from a file block chain; the first volume block is provided by a second mechanism node, and the first mechanism node and the second mechanism node belong to a block chain network where a volume block chain is located;
acquiring second volume content from the first volume block, and acquiring a first key phrase of the first volume content and a second key phrase of the second volume content;
and if the first key phrase is matched with the second key phrase, generating a second file block according to file information, and adding the second file block into the file block chain.
In some possible embodiments, the processor 1001 may be a Central Processing Unit (CPU), and the processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), field-programmable gate arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 1002 may include both read-only memory and random-access memory, and provides instructions and data to the processor 1001 and the input/output interface 1003. A portion of the memory 1002 may also include non-volatile random access memory. For example, the memory 1002 may also store device type information.
In a specific implementation, the computer may execute the implementation manners provided in the steps in fig. 3 through the built-in functional modules, which may specifically refer to the implementation manners provided in the steps in fig. 3, and details are not described herein again.
The embodiment of the present application provides a computer device, including: the system comprises a processor, an input/output interface and a memory, wherein the processor acquires computer instructions in the memory, executes each step of the method shown in the figure 3 and performs block chain-based volume management operation. With computer instructions in the memory, the processor performs the steps of: acquiring file information; the file information comprises a file identifier and first file content; if the first organization node has the recording authority of the volume corresponding to the volume identification, searching a first volume block associated with the volume identification from a volume block chain, wherein the first volume block is provided by a second organization node, and the first organization node and the second organization node belong to a block chain network where the volume block chain is located; acquiring second volume content from the first volume block, and acquiring a first key phrase of the first volume content and a second key phrase of the second volume content; and if the first key phrase is matched with the second key phrase, generating a second file block according to the file information, and adding the second file block into the file block chain. The volume is managed through the block chain, and the block chain has the properties of decentralization, incapability of being tampered and the like, so that the storage safety of the volume is improved; the mechanism nodes can generate corresponding blocks when storing, accessing or modifying the related data of the file, and the blocks are added into the file block chain, so that the file can be traced from generation to modification to access, the file is managed through the file block chain, the efficiency of circulation of the file among all the mechanism nodes is improved, the processing efficiency of cases is improved, meanwhile, the safety of file management is improved, when problems occur in the circulation process of the file, responsibility tracing can be found from the file block chain, and the safety of file management is further improved. By comparing the respective key phrases of the second volume content and the first volume content in the first volume block, the standards between the first volume content and the second volume content are unified, such as consistent names and specifications, and the like, so that the volume circulation management efficiency and the cooperativity between mechanisms are improved.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by the processor, the block chain-based volume management method provided in each step in fig. 3 may be implemented, which may specifically refer to the implementation manner provided in each step in fig. 3, and is not described herein again. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in embodiments of the computer-readable storage medium referred to in the present application, reference is made to the description of embodiments of the method of the present application. By way of example, program instructions may be deployed to be executed on one computer device or on multiple computer devices at one site or distributed across multiple sites and interconnected by a communication network, which may comprise a blockchain network.
The computer-readable storage medium may be the block chain-based volume management apparatus provided in any of the foregoing embodiments or an internal storage unit of the computer, such as a hard disk or a memory of the computer. The computer readable storage medium may also be an external storage device of the computer, such as a plug-in hard disk, a Smart Memory Card (SMC), a Secure Digital (SD) card, a flash memory card (flash card), and the like, provided on the computer. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the computer. The computer-readable storage medium is used for storing the computer program and other programs and data required by the computer. The computer readable storage medium may also be used to temporarily store data that has been output or is to be output.
The term "comprises" and any variations thereof in the description and claims of the embodiments of the present application and in the drawings is intended to cover non-exclusive inclusions. For example, a process, method, apparatus, product, or apparatus that comprises a list of steps or elements is not limited to the listed steps or modules, but may alternatively include other steps or modules not listed or inherent to such process, method, apparatus, product, or apparatus.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The method and the related apparatus provided by the embodiments of the present application are described with reference to the flowchart and/or the structural diagram of the method provided by the embodiments of the present application, and each flow and/or block of the flowchart and/or the structural diagram of the method, and the combination of the flow and/or block in the flowchart and/or the block diagram can be specifically implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block or blocks of the block diagram. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block or blocks of the block diagram. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block or blocks.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (14)

1. A block chain-based volume management method, the method comprising:
a first mechanism node acquires file information; the file information comprises a file identifier and first file content;
if the first mechanism node has the recording authority of the volume corresponding to the volume identification, searching a first volume block associated with the volume identification from a volume block chain; the first volume block is provided by a second mechanism node, and the first mechanism node and the second mechanism node belong to a block chain network where the volume block chain is located;
acquiring a file type corresponding to the file identification, and acquiring a file recording process corresponding to the file type;
acquiring the second mechanism node associated with the first volume block, and if the processing position of the second mechanism node in the volume recording process is located before the processing position of the first mechanism node in the volume recording process, acquiring second volume content from the first volume block, and acquiring a first key phrase of the first volume content and a second key phrase of the second volume content;
if the first key phrase is matched with the second key phrase, a second file block is generated according to the file information, and the second file block is added to the file block chain.
2. The method of claim 1, wherein the method further comprises:
calling a first intelligent contract to acquire a file authority block from the file block chain, and acquiring a recording mechanism identification set associated with the recording authority from the file authority block based on the first intelligent contract;
and acquiring a mechanism identifier of the first mechanism node, and if the mechanism identifier belongs to the recording mechanism identifier set, determining that the first mechanism node has the recording authority of the file corresponding to the file identifier.
3. The method of claim 2, wherein the method further comprises:
acquiring a file recording process corresponding to the file identification; the file recording process comprises at least two mechanisms and execution sequences of the mechanisms;
determining the authority of each mechanism according to the execution sequence of each mechanism, and generating the file authority block according to the authority of each mechanism;
if the common identification of the file permission blocks passes, adding the file permission blocks to the file block chain;
determining a block calling interface according to the file permission block, determining a permission logic function of each mechanism according to the permission of each mechanism, and generating the first intelligent contract according to the block calling interface and the permission logic function.
4. The method of claim 1, wherein the first volume block includes a first volume signature therein;
the obtaining of the content of the second volume from the block of the first volume includes:
acquiring the first volume signature from the first volume block, acquiring the second organization node associated with the first volume block, and verifying and signing the first volume signature by adopting a public key of the second organization node;
and if the signature of the first volume is verified, acquiring the content of a second volume from the block of the first volume.
5. The method of claim 1, wherein the first organization node obtains volume information comprising:
the first mechanism node acquires a first volume processing template sent by a core node, and generates an information acquisition interface based on the first volume processing template;
responding to input submission operation aiming at the information acquisition interface, and acquiring the file information submitted by the information acquisition interface; the first volume processing template is a volume processing template of the first mechanism node, the volume processing template is determined by the core node according to service types respectively managed by at least two mechanism nodes in the block chain network, and the block chain network is a network where the volume block chain is located.
6. The method of claim 5, wherein the volume processing template provided by the core node further comprises a second volume processing template corresponding to the second organization node; the first volume processing template comprises a first keyword group position of the first mechanism node; the second portfolio processing template comprises a second keyword group position of the second organization node;
the obtaining a first key phrase of the first volume content and a second key phrase of the second volume content includes:
acquiring a first keyword group position corresponding to the first mechanism node based on the first volume processing template;
acquiring the second mechanism node associated with the first mechanism block, and acquiring a second keyword group position corresponding to the second mechanism node based on the second mechanism processing template corresponding to the second mechanism node;
and acquiring a first keyword group from the position of the first keyword group in the first volume content, and acquiring a second keyword group from the position of the second keyword group in the second volume content.
7. The method of claim 1, wherein the obtaining a first keyword set of the first volume of content and a second keyword set of the second volume of content comprises:
acquiring a key information name, searching the key information name from the first volume content, and determining the content corresponding to the key information name in the first volume content as a first key phrase of the first volume content;
and searching the key information name from the second file content, and determining the content corresponding to the key information name in the second file content as a second key phrase of the second file content.
8. The method of claim 1, wherein the generating a second volume block according to the volume information, adding the second volume block to the chain of volume blocks, comprises:
acquiring a public key of the first mechanism node, and encrypting the file information by adopting the public key of the first mechanism node to generate a first file ciphertext;
obtaining a private key of the first mechanism node, and generating a second volume signature of the first volume ciphertext by adopting the private key of the first mechanism node;
and generating a second volume block according to the first volume ciphertext and the second volume signature, and if the second volume block is identified and passed, adding the second volume block to the volume block chain.
9. The method of claim 1, wherein the method further comprises:
acquiring a data access request sent by a third mechanism node; the data access request comprises the file identification;
acquiring the file information based on the file identification, and encrypting the file information by adopting a public key of the third organization node to generate a second file ciphertext;
generating a third volume signature of the second volume ciphertext by using a private key of the first mechanism node, and sending access data to the third mechanism node; the access data includes the second volume ciphertext and the third volume signature.
10. The method of claim 1, wherein the method further comprises:
the first mechanism node acquires modification information; the modification information comprises data before updating, data after updating and block height;
acquiring a third file block corresponding to the block height from the file block chain, and acquiring a modification permission set corresponding to the third file block;
if the organization identifier of the first organization node belongs to the modification permission set, generating a signature of the modification information by using a private key of the first organization node, and generating a file update block according to the signature of the modification information, the data before update, the data after update and the block height;
and if the consensus on the file updating block passes, adding the file updating block to the file block chain.
11. A block chain-based portfolio management apparatus, the apparatus comprising:
the information acquisition module is used for acquiring the file information by the first mechanism node; the file information comprises a file identifier and first file content;
the block searching module is used for searching a first volume block associated with the volume identification from a volume block chain if the first mechanism node has the recording authority of the volume corresponding to the volume identification; the first volume block is provided by a second mechanism node, and the first mechanism node and the second mechanism node belong to a block chain network where the volume block chain is located;
the flow acquisition module is used for acquiring the file type corresponding to the file identification and acquiring the file recording flow corresponding to the file type;
a phrase obtaining module, configured to obtain the second mechanism node associated with the first volume block, and if a processing position of the second mechanism node in the volume recording process is located before a processing position of the first mechanism node in the volume recording process, obtain second volume content from the first volume block, and obtain a first keyword phrase of the first volume content and a second keyword phrase of the second volume content;
and the information matching module is used for generating a second file block according to the file information and adding the second file block to the file block chain if the first key phrase is matched with the second key phrase.
12. The apparatus of claim 11, wherein the apparatus further comprises:
the collection acquisition module is used for calling a first intelligent contract to acquire a file authority block from the file block chain and acquiring a recording mechanism identification collection associated with the recording authority from the file authority block based on the first intelligent contract;
and the authority determining module is used for acquiring the mechanism identifier of the first mechanism node, and if the mechanism identifier belongs to the recording mechanism identifier set, determining that the first mechanism node has the recording authority of the file corresponding to the file identifier.
13. A computer device comprising a processor, a memory, an input output interface;
the processor is connected to the memory and the input/output interface respectively, wherein the input/output interface is used for data interaction between nodes in a block chain, the memory is used for storing program codes, and the processor is used for calling the program codes to execute the method of any one of claims 1 to 10.
14. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the method of any of claims 1-10.
CN202011250726.2A 2020-11-11 2020-11-11 Block chain-based volume management method and device, computer and storage medium Active CN112069529B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011250726.2A CN112069529B (en) 2020-11-11 2020-11-11 Block chain-based volume management method and device, computer and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011250726.2A CN112069529B (en) 2020-11-11 2020-11-11 Block chain-based volume management method and device, computer and storage medium

Publications (2)

Publication Number Publication Date
CN112069529A CN112069529A (en) 2020-12-11
CN112069529B true CN112069529B (en) 2021-02-19

Family

ID=73655366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011250726.2A Active CN112069529B (en) 2020-11-11 2020-11-11 Block chain-based volume management method and device, computer and storage medium

Country Status (1)

Country Link
CN (1) CN112069529B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651871A (en) * 2020-12-17 2021-04-13 北京无线电计量测试研究所 City management law enforcement system and method based on augmented reality technology
CN112287403B (en) * 2020-12-25 2021-03-19 腾讯科技(深圳)有限公司 Block chain-based electronic volume management method and device, electronic equipment and medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110362799B (en) * 2019-06-17 2024-02-06 平安科技(深圳)有限公司 On-line arbitration-based method and device for generating and processing resolution book and computer equipment
CN110597818B (en) * 2019-09-19 2023-11-14 腾讯科技(深圳)有限公司 File inquiry method, device, equipment and storage medium based on block chain
CN110727679A (en) * 2019-09-25 2020-01-24 支付宝(杭州)信息技术有限公司 Cooperative tracking method, system, device and equipment for court case
CN110995673B (en) * 2019-11-20 2022-05-31 腾讯科技(深圳)有限公司 Case evidence management method and device based on block chain, terminal and storage medium
CN111008403A (en) * 2019-11-26 2020-04-14 山东爱城市网信息技术有限公司 Criminal case evidence management method, equipment and medium based on block chain
CN111639914A (en) * 2020-05-29 2020-09-08 航天科工智慧产业发展有限公司 Block chain case information management method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112069529A (en) 2020-12-11

Similar Documents

Publication Publication Date Title
US20230370283A1 (en) Securing blockchain transaction based on undetermined data
US11360963B2 (en) Tracking and verification of physical assets
AU2020414467B2 (en) Partially-ordered blockchain
US20210091960A1 (en) Tracking and verification of physical assets
CN112104665B (en) Block chain-based identity authentication method and device, computer and storage medium
CN107004080A (en) Environment sensing security token
AU2021210206B2 (en) Index structure for blockchain ledger
CN112241919A (en) Multi-domain blockchain network with data flow control
US10956204B1 (en) Free-riding node identification for blockchain
US11379472B2 (en) Schema-based pruning of blockchain data
US11194770B2 (en) Database mergeable ledgers
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
US11343313B1 (en) Fault tolerant periodic leader rotation for blockchain
CN111709860A (en) Homote advice processing method, device, equipment and storage medium
CN114826736A (en) Information sharing method, device, equipment and storage medium
CN112200680B (en) Block link point management method, device, computer and readable storage medium
CN116583833A (en) Self-auditing blockchain
CN113011960A (en) Block chain-based data access method, device, medium and electronic equipment
US11658824B2 (en) Plagiarism detection from encrypted documents
CN112163917A (en) Bill processing method, device, medium and electronic equipment based on block chain
CN111769956A (en) Service processing method, device, equipment and medium
US11321298B1 (en) Automated merge of DLT networks
CN116032494B (en) Data interaction method, blockchain predictor, device and medium
US20230208648A1 (en) Htlc with proof of elapsed time
CN117792616A (en) Key management method, device, equipment, medium and program based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant