CN116881533B - Digital file management method and system based on blockchain - Google Patents

Digital file management method and system based on blockchain Download PDF

Info

Publication number
CN116881533B
CN116881533B CN202311139135.1A CN202311139135A CN116881533B CN 116881533 B CN116881533 B CN 116881533B CN 202311139135 A CN202311139135 A CN 202311139135A CN 116881533 B CN116881533 B CN 116881533B
Authority
CN
China
Prior art keywords
node
transaction
nodes
archive
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311139135.1A
Other languages
Chinese (zh)
Other versions
CN116881533A (en
Inventor
江伟超
梁丽宁
伍伟珍
云光中
冯德明
梁文佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tongluo Technology Co ltd
Zhaoqing Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Tongluo Technology Co ltd
Zhaoqing Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongluo Technology Co ltd, Zhaoqing Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Tongluo Technology Co ltd
Priority to CN202311139135.1A priority Critical patent/CN116881533B/en
Publication of CN116881533A publication Critical patent/CN116881533A/en
Application granted granted Critical
Publication of CN116881533B publication Critical patent/CN116881533B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to the technical field of data processing, in particular to a digitalized file management method and system based on a blockchain, which realize file information blockchain storage by digitizing the existing file management, realize authority management and operation backtracking of file management personnel, thereby overcoming the complexity of file information management flow, reducing the consumption of manpower and material resources for repeated file storage, effectively preventing file data from being tampered by storing and managing the digitalized file through the blockchain, preventing the phenomenon of losing the file data in the transmission process, and ensuring the storage of the digitalized file to be safer by judging whether the trade in the blockchain achieves consensus and whether the trade is in safety.

Description

Digital file management method and system based on blockchain
Technical Field
The invention relates to the technical field of data processing, in particular to a digital archive management method and system based on a blockchain.
Background
The file informatization and digitalization processes develop rapidly, the traditional paper file is converted into the digital file which is more convenient to store, and the digital file has flexibility compared with the traditional paper file, so that the modification and replacement in the file can be kept and archived, and the rigor and the authenticity of the file are ensured. In actual work, the semi-automatic processing of each flow of file digitization is basically realized based on the support of various business software, but the digitization splitting link is still in the original state of manual identification processing, and particularly under the conditions of large digitization quantity and large number of pieces, copying, pasting, checking and checking are needed to be repeated manually, so that a great deal of manpower and time are required to be consumed, and errors are extremely easy to occur. In the prior art, there is a high risk at the operation end during modification and operation of a file manager, and due to the traceable property of the digital file after modification, data redundancy is caused, and there is a great inconvenience in checking or retrieving the file, in the chinese patent application No. 2022115016280 (a digital file management system), it is proposed to classify the digital file by using high-dimensional semantic features, and intelligent and accurate file archiving processing can be performed based on text semantic understanding of the electronic scanned document, so as to implement digital file management, but there is a need for a digital file management method and system based on a block chain to solve the above-mentioned problems.
Disclosure of Invention
In view of the limitations of the prior art, the present invention is directed to an integrated sewage treatment method and system based on dynamic monitoring, so as to solve one or more technical problems in the prior art, and at least provide a beneficial choice or creation condition.
A blockchain-based digitized archive management method, the method comprising the steps of:
s100: digitizing the file and storing the file in a memory;
s200: storing the digitized file in a distributed manner through a block chain;
s300: defining each time of modifying the digital file in the node as a blockchain transaction, and determining that the transaction is valid;
s400: and judging the storage of the digitized file and the security of the transaction, and adding encryption information at the node position.
Further, in step S100, the data in the archive is digitized by electronic archive scanning, and stored according to the archive as a whole, the creation time, the modification time, and the digitizing time in the archive are recorded by semantic recognition, the recorded time is defined as a time stamp of the storing time, and the time stamp is bound to the digitized archive and stored in the memory.
Further, in step S200, the digitized archive is stored in a planned manner according to the blockchain, the digitized archive is stored in a node of the blockchain, the node is divided into a main node and a sub-node, the initial version of the digitized archive is stored according to the order of the creation time of the archive, the stored initial version of the digitized archive is stored in the main node, the main node is provided with a main node number according to the stored digitized archive ID, the node number and the digitized archive ID are bound, the digitized archive confirmed after modification of the archive in the main node is stored in the sub-node, and the sub-node number is set according to the main node number and the modification time, and each node is connected with each other and communicates through any one of a wired network and a wireless network.
Further, in step S300, the digital archive numbers stored in the digital archive in the main node are extracted, the digital archive is constructed into a sequence arch according to the number sequence, the number sequence of the corresponding sub-node is constructed into a sequence arch, the node where the blockchain transaction occurs is defined with a signal track, the signal track is added into the node corresponding to the number in the sequence, the time when the signal track exists is recorded, the recording time is t, the time when the signal track exists during the modification in the main node where the corresponding modification end exists and the recording format of the modified digital archive are (archei, ti), the archei is the modified digital archive stored in the sub-node, ti is the time when the signal track exists in the digital archive archei, and the digital archive archei is calculated and recorded as the transaction in the blockchain;
judging whether the modified transaction is effective or not after the transaction is achieved, wherein the judging method comprises the following steps: and acquiring code editing times and code editing time length of a developer in each node according to the workload proof data, recording the node where the transaction occurs as a node Q, recording the code editing times of the node Q as a TQ, taking the node with the code editing times greater than or equal to TQ as an effective voting node, setting the node with the code editing time length less than or equal to TK as a locking state, setting the node with the code editing time length greater than or equal to TK as an unlocking state, counting the number of the effective voting nodes in all the unlocking states, and when the number of the effective voting nodes in all the unlocking states is greater than half of the total number of the effective voting nodes, modifying the transaction to achieve consensus, and confirming that the modified transaction is effective.
Further, each node in the blockchain network performs security judgment on the modified nodes in the digitized file through calculation, and the method comprises the following steps:
s301, each node acquires code editing times and code editing time length of a developer in each node according to workload proving data, wherein the code editing times are defined as transaction times, and the code editing times are defined as transaction time length at all times;
s302, calculating average transaction duration of all nodes in the blockchain as mean (ti), initializing integer variables k1=1, k1 epsilon [1, L1], traversing source code files corresponding to the occurrence of transactions in the nodes from k1=1, acquiring total data access amount of the nodes when the transactions are performed by traversing the source code files, calculating standard transaction duration TRDU (total data access) by L1 as the total number of all nodes,
where mean () is a function of obtaining an average number, max () is a function of obtaining a maximum value, min is a function of obtaining a minimum value,for the data access coefficients ln () is a logarithmic function, ++>Total data access for the ith node,/-bit>The transaction number of the ith node is C, which is the node transaction number;
the method has the beneficial effects of calculating the standard transaction duration TRDU: the method has the advantages that when the transaction occurs in the blockchain, whether the time length corresponding to the modified code quantity is reasonable or not can be judged more accurately by calculating the standard transaction time length, the average value is taken through a plurality of data, the obtained standard time length is more accurate, and the subsequent judgment is more accurate.
S303, constructing a set W, W= (C, ti) by using the transaction times and the transaction time length in the nodes where transaction trade occurs, wherein C is the node transaction times, ti is the transaction time length when the ith transaction is performed, the transaction times of the node D is DK, the node D is the node with the transaction times being closest to the average transaction times in the blockchain, the node with the transaction times greater than or equal to DK is defined as an active node, the step S304 is skipped, the node with the transaction times less than DK is defined as an inactive node, and the step S306 is skipped;
s304, initializing integer variables k2=1 and k2 epsilon [1, L2] in any active node, traversing source code files corresponding to transaction occurrence in the node from k2=1, acquiring data access amount accessl when single transaction is performed by traversing the source code files, wherein L2 is the number of active nodes, comparing transaction duration in the traversed nodes with transaction duration of node D according to the transaction duration of the traversed nodes, jumping to S305 when the node transaction duration is longer than the standard duration TRDU, and jumping to S306 when the node transaction duration is smaller than or equal to the standard duration TRDU;
s305: the method for judging whether the transaction time is longer than the standard time TRDU is in the secure network comprises the following steps: the method comprises the steps of taking a set formed by encryption vectors obtained by all nodes with transaction time length longer than standard time length TRDU through encryption modules as an encryption vector set, marking the encryption vector of any node (archei, ti) as Vec (i), marking the sequence number of the dimension in Vec (i) as archei consistent with the sequence number of the node, marking the sequence number as Vec (i, archei), calculating the arithmetic average of the values of the dimensions in Vec (i) as a screening value, marking the screening value as eta (i), comparing the value of the dimension of each sequence number in Vec (i) with the screening value eta (i), screening the sequence number of the dimension with the value smaller than the screening value eta (i) in Vec (i) as a screening sequence number set, calculating the screening proportion value as S (i) according to Vec (i), wherein the calculation formula of S (i) is as follows:
wherein exp () is an exponential function based on a natural number e, and whether the node meets a constraint condition is judged by combining a screening proportion S (i) with a data access amount accessl in the node, a node transaction number C and a transaction duration ti, wherein the constraint condition is as follows:
F((archei,ti))=
wherein in the formulaFor node->Is a single data access amount of +.>For node->The maximum value of the data access amount in the memory,for node->The minimum data access amount in the node C (archei, ti)Is>For node->Is used to determine the average transaction duration of (a),for node->Ti is the duration of a single transaction, and when the constraint condition is satisfied, the node is +.>Outputting and storing the data in the step S306, and jumping the node data to the step S when the constraint condition is not met;
s306: and when the investigation data find the loopholes, backing up the data, and carrying out investigation and repair on the loopholes, and then encrypting the stored data.
Further, in S400, the method for transporting the digitized file by node and adding the encrypted information at the node position includes:
marking nodes of which the transaction is not checked and the loopholes are not checked as safe nodes, defining the nodes of which the loopholes are checked in the transaction as secondary nodes, marking the risk level of the current blockchain storage data as high when the number of the safe nodes is less than or equal to three times of the number of the secondary nodes, marking the risk level of the current blockchain storage data as low when the number of the safe nodes is greater than three times of the number of the secondary nodes, and performing secondary encryption on the digitized archive data in the nodes when the current risk level of the nodes is high.
A blockchain-based digitized archive management system, the system comprising: the system comprises a processor and a memory, wherein the processor and the memory in the system can run a computer program in the processor, and the processor can realize the steps in the block chain-based digital archive management method when executing the computer program.
The processor executes the computer program to run in the units of the following system:
a workload certification generation unit for generating workload certification in the form of hash value in real time by the nodes when each node of the blockchain network generates an operation of editing the local code;
a modification transaction broadcasting unit, configured to take each modification of the local code by a node as a modification transaction of a blockchain network, and when there is a node where the modification transaction occurs, broadcast the modification transaction in the entire blockchain network by the node;
the modified transaction validity judging unit is used for confirming whether the modified transaction is valid or not after each node in the blockchain network agrees with the modified transaction through an consensus algorithm;
and the local code file synchronization unit is used for synchronizing the file of the modified local code in the nodes of the effective modification transaction to each node.
The beneficial effects of the invention are as follows: the method has the advantages that the existing file management is digitalized, file information blockchain storage is realized, authority management and operation backtracking of file management staff are realized, so that the problem that the file information management flow is complex, the consumption of manpower and material resources for file repeated storage is reduced, the digitalized file is stored and managed through the blockchain, the phenomenon that file data are tampered is effectively prevented, the phenomenon that the file data are lost in the transmission process can be prevented, and the storage of the digitalized file is safer by judging whether the trade in the blockchain achieves consensus and whether the trade is in safety or not.
Drawings
The above and other features of the present invention will become more apparent from the detailed description of the embodiments thereof given in conjunction with the accompanying drawings, in which like reference characters designate like or similar elements, and it is apparent that the drawings in the following description are merely some examples of the present invention, and other drawings may be obtained from these drawings without inventive effort to those of ordinary skill in the art, in which:
FIG. 1 is a flow chart of a method for managing digitized files based on blockchain;
FIG. 2 is a block chain based digitized archive management system.
Detailed Description
The conception, specific structure, and technical effects produced by the present invention will be clearly and completely described below with reference to the embodiments and the drawings to fully understand the objects, aspects, and effects of the present invention. It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other.
As shown in fig. 1, a method for managing digitized archives based on blockchain includes the following steps:
s100: digitizing the file and storing the file in a memory;
s200: storing the digitized file in a distributed manner through a block chain;
s300: defining each time of modifying the digital file in the node as a blockchain transaction, and determining that the transaction is valid;
s400: and judging the storage of the digitized file and the security of the transaction, and adding encryption information at the node position.
Further, in step S100, the data in the archive is digitized by electronic archive scanning, and stored according to the archive as a whole, the creation time, the modification time, and the digitizing time in the archive are recorded by semantic recognition, the recorded time is defined as a time stamp of the storing time, and the time stamp is bound to the digitized archive and stored in the memory.
Further, in step S200, the digitized archive is stored in a planned manner according to the blockchain, the digitized archive is stored in a node of the blockchain, the node is divided into a main node and a sub-node, the initial version of the digitized archive is stored according to the order of the creation time of the archive, the stored initial version of the digitized archive is stored in the main node, the main node is provided with a main node number according to the stored digitized archive ID, the node number and the digitized archive ID are bound, the digitized archive confirmed after modification of the archive in the main node is stored in the sub-node, and the sub-node number is set according to the main node number and the modification time, and each node is connected with each other and communicates through any one of a wired network and a wireless network.
Further, in step S300, the digital archive numbers stored in the digital archive in the main node are extracted, the digital archive is constructed into a sequence arch according to the number sequence, the number sequence of the corresponding sub-node is constructed into a sequence arch, the node where the blockchain transaction occurs is defined with a signal track, the signal track is added into the node corresponding to the number in the sequence, the time when the signal track exists is recorded, the recording time is t, the time when the signal track exists during the modification in the main node where the corresponding modification end exists and the recording format of the modified digital archive are (archei, ti), the archei is the modified digital archive stored in the sub-node, ti is the time when the signal track exists in the digital archive archei, and the digital archive archei is calculated and recorded as the transaction in the blockchain;
judging whether the modified transaction is effective or not after the transaction is achieved, wherein the judging method comprises the following steps: and acquiring code editing times and code editing time length of a developer in each node according to the workload proof data, recording the node where the transaction occurs as a node Q, recording the code editing times of the node Q as a TQ, taking the node with the code editing times greater than or equal to TQ as an effective voting node, setting the node with the code editing time length less than or equal to TK as a locking state, setting the node with the code editing time length greater than or equal to TK as an unlocking state, counting the number of the effective voting nodes in all the unlocking states, and when the number of the effective voting nodes in all the unlocking states is greater than half of the total number of the effective voting nodes, modifying the transaction to achieve consensus, and confirming that the modified transaction is effective.
Further, each node in the blockchain network performs security judgment on the modified nodes in the digitized file through calculation, and the method comprises the following steps:
s301, each node acquires code editing times and code editing time length of a developer in each node according to workload proving data, wherein the code editing times are defined as transaction times, and the code editing times are defined as transaction time length at all times;
s302, calculating average transaction duration of all nodes in the blockchain as mean (ti), initializing integer variables k1=1, k1 epsilon [1, L1], traversing source code files corresponding to the occurrence of transactions in the nodes from k1=1, acquiring total data access amount of the nodes when the transactions are performed by traversing the source code files, calculating standard transaction duration TRDU (total data access) by L1 as the total number of all nodes,
where mean () is a function of obtaining an average number, max () is a function of obtaining a maximum value, min is a function of obtaining a minimum value,for the data access coefficients ln () is a logarithmic function, ++>Total data access for the ith node,/-bit>The transaction number of the ith node is C, which is the node transaction number;
the method has the beneficial effects of calculating the standard transaction duration TRDU: the method has the advantages that when the transaction occurs in the blockchain, whether the time length corresponding to the modified code quantity is reasonable or not can be judged more accurately by calculating the standard transaction time length, the average value is taken through a plurality of data, the obtained standard time length is more accurate, and the subsequent judgment is more accurate.
S303, constructing a set W, W= (C, ti) by using the transaction times and the transaction time length in the nodes where transaction trade occurs, wherein C is the node transaction times, ti is the transaction time length when the ith transaction is performed, the transaction times of the node D is DK, the node D is the node with the transaction times being closest to the average transaction times in the blockchain, the node with the transaction times greater than or equal to DK is defined as an active node, the step S304 is skipped, the node with the transaction times less than DK is defined as an inactive node, and the step S306 is skipped;
s304, initializing integer variables k2=1 and k2 epsilon [1, L2] in any active node, traversing source code files corresponding to transaction occurrence in the node from k2=1, acquiring data access amount accessl when single transaction is performed by traversing the source code files, wherein L2 is the number of active nodes, comparing transaction duration in the traversed nodes with transaction duration of node D according to the transaction duration of the traversed nodes, jumping to S305 when the node transaction duration is longer than the standard duration TRDU, and jumping to S306 when the node transaction duration is smaller than or equal to the standard duration TRDU;
s305: the method for judging whether the transaction time is longer than the standard time TRDU is in the secure network comprises the following steps: the method comprises the steps of taking a set formed by encryption vectors obtained by all nodes with transaction time length longer than standard time length TRDU through encryption modules as an encryption vector set, marking the encryption vector of any node (archei, ti) as Vec (i), marking the sequence number of the dimension in Vec (i) as archei consistent with the sequence number of the node, marking the sequence number as Vec (i, archei), calculating the arithmetic average of the values of the dimensions in Vec (i) as a screening value, marking the screening value as eta (i), comparing the value of the dimension of each sequence number in Vec (i) with the screening value eta (i), screening the sequence number of the dimension with the value smaller than the screening value eta (i) in Vec (i) as a screening sequence number set, calculating the screening proportion value as S (i) according to Vec (i), wherein the calculation formula of S (i) is as follows:
wherein exp () is an exponential function based on a natural number e, and whether the node meets a constraint condition is judged by combining a screening proportion S (i) with a data access amount accessl in the node, a node transaction number C and a transaction duration ti, wherein the constraint condition is as follows:
F((archei,ti))=
wherein in the formulaFor node->Is a single data access amount of +.>For node->The maximum value of the data access amount in the memory,for node->The minimum data access amount in the node C (archei, ti)Is>For node->Is used to determine the average transaction duration of (a),for node->Ti is the duration of a single transaction, and when the constraint condition is satisfied, the node is +.>Outputting and storing the data in the step S306, and jumping the node data to the step S when the constraint condition is not met;
s306: and when the investigation data find the loopholes, backing up the data, and carrying out investigation and repair on the loopholes, and then encrypting the stored data.
Further, in S400, the method for transporting the digitized file by node and adding the encrypted information at the node position includes:
marking nodes of which the transaction is not checked and the loopholes are not checked as safe nodes, defining the nodes of which the loopholes are checked in the transaction as secondary nodes, marking the risk level of the current blockchain storage data as high when the number of the safe nodes is less than or equal to three times of the number of the secondary nodes, marking the risk level of the current blockchain storage data as low when the number of the safe nodes is greater than three times of the number of the secondary nodes, and performing secondary encryption on the digitized archive data in the nodes when the current risk level of the nodes is high.
As shown in fig. 2, a digital archive management system based on a blockchain includes: the system comprises a processor and a memory, wherein the processor and the memory in the system can run a computer program in the processor, and the processor can realize the steps in the block chain-based digital archive management method when executing the computer program.
The processor executes the computer program to run in the units of the following system:
a workload certification generation unit for generating workload certification in the form of hash value in real time by the nodes when each node of the blockchain network generates an operation of editing the local code;
a modification transaction broadcasting unit, configured to take each modification of the local code by a node as a modification transaction of a blockchain network, and when there is a node where the modification transaction occurs, broadcast the modification transaction in the entire blockchain network by the node;
the modified transaction validity judging unit is used for confirming whether the modified transaction is valid or not after each node in the blockchain network agrees with the modified transaction through an consensus algorithm;
and the local code file synchronization unit is used for synchronizing the file of the modified local code in the nodes of the effective modification transaction to each node.
The processor may be a central processing unit (Central Processing Unit, CPU), other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete component gate or transistor logic devices, discrete hardware components, or the like. The general processor can be a microprocessor or any conventional processor, and the processor is a control center of the integrated sewage treatment system based on dynamic monitoring, and various interfaces and lines are utilized to connect various subareas of the whole integrated sewage treatment system based on dynamic monitoring.
The memory may be used to store the computer program and/or module, and the processor may implement various functions of the integrated wastewater treatment system based on dynamic monitoring by running or executing the computer program and/or module stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash Card (Flash Card), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
Although the present invention has been described in considerable detail and with particularity with respect to several described embodiments, it is not intended to be limited to any such detail or embodiment or any particular embodiment so as to effectively cover the intended scope of the invention. Furthermore, the foregoing description of the invention has been presented in its embodiments contemplated by the inventors for the purpose of providing a useful description, and for the purposes of providing a non-essential modification of the invention that may not be presently contemplated, may represent an equivalent modification of the invention.

Claims (5)

1. A method for managing digitized archives based on a blockchain, the method comprising the steps of:
s100: digitizing the file and storing the file in a memory;
s200: storing the digitized file in a distributed manner through a block chain;
s300: defining each time of modifying the digital file in the node as a blockchain transaction, and determining that the transaction is valid;
s400: judging the storage of the digitized file and the safety of the transaction, and adding encryption information at the node position;
in step S300, the digital archive numbers stored in the digital archive in the master node are extracted, the digital archive is constructed into a sequence arch according to the number sequence, the number sequence of the corresponding child node is constructed into a sequence arch, the node where the blockchain transaction occurs is defined with a signal track, the signal track is added into the node corresponding to the number in the sequence, the time when the signal track exists is recorded, the recording time is t, the time when the signal track exists when the corresponding modification end exists in the master node and the recording format of the modified digital archive are (archei, ti), the archei is the modified digital archive stored in the child node, ti is the time when the signal track exists in the digital archive archei, and the digital archive archei is calculated and recorded for the transaction in the blockchain;
judging whether the modified transaction is effective or not after the transaction is achieved, wherein the judging method comprises the following steps: acquiring code editing times and code editing time length of a developer in each node according to workload proof data, recording the node where transaction occurs as a node Q, the code editing times of the node Q as a TQ, setting the node with the code editing times being greater than or equal to TQ as an effective voting node, setting the node with the code editing time length being less than or equal to TK as a locking state, setting the node with the code editing time length being greater than or equal to TK as an unlocking state, counting the number of the effective voting nodes in all the unlocking states, and when the number of the effective voting nodes in all the unlocking states is greater than half of the total number of the effective voting nodes, modifying the transaction to achieve consensus, and confirming that the modified transaction is effective;
each node in the blockchain network performs security judgment on the modified nodes in the digitized file through calculation, and the method comprises the following steps:
s301, each node acquires code editing times and code editing time length of a developer in each node according to workload proving data, wherein the code editing times are defined as transaction times, and the code editing times are defined as transaction time length at all times;
s302, calculating average transaction duration of all nodes in the blockchain as mean (ti), initializing integer variables k1=1, k1 epsilon [1, L1], traversing source code files corresponding to the occurrence of transactions in the nodes from k1=1, acquiring total data access amount of the nodes when the transactions are performed by traversing the source code files, calculating standard transaction duration TRDU (total data access) by L1 as the total number of all nodes,
where mean () is a function of obtaining an average number, max () is a function of obtaining a maximum value, min is a function of obtaining a minimum value,for the data access coefficients ln () is a logarithmic function, ++>Total data access for the ith node,/-bit>The transaction number of the ith node is C, which is the node transaction number;
s303, constructing a set W, W= (C, ti) by using the transaction times and the transaction time length in the nodes where transaction trade occurs, wherein C is the node transaction times, ti is the transaction time length when the ith transaction is performed, the transaction times of the node D is DK, the node D is the node with the transaction times being closest to the average transaction times in the blockchain, the node with the transaction times greater than or equal to DK is defined as an active node, the step S304 is skipped, the node with the transaction times less than DK is defined as an inactive node, and the step S306 is skipped;
s304, initializing integer variables k2=1 and k2 epsilon [1, L2] in any active node, traversing source code files corresponding to transaction occurrence in the node from k2=1, acquiring data access amount accessl when single transaction is performed by traversing the source code files, wherein L2 is the number of active nodes, comparing transaction duration in the traversed nodes with transaction duration of node D according to the transaction duration of the traversed nodes, jumping to S305 when the node transaction duration is longer than the standard duration TRDU, and jumping to S306 when the node transaction duration is smaller than or equal to the standard duration TRDU;
s305: the method for judging whether the transaction time is longer than the standard time TRDU is in the secure network comprises the following steps: the method comprises the steps of taking a set formed by encryption vectors obtained by all nodes with transaction time length longer than standard time length TRDU through encryption modules as an encryption vector set, marking the encryption vector of any node (archei, ti) as Vec (i), marking the sequence number of the dimension in Vec (i) as archei consistent with the sequence number of the node, marking the sequence number as Vec (i, archei), calculating the arithmetic average of the values of the dimensions in Vec (i) as a screening value, marking the screening value as eta (i), comparing the value of the dimension of each sequence number in Vec (i) with the screening value eta (i), screening the sequence number of the dimension with the value smaller than the screening value eta (i) in Vec (i) as a screening sequence number set, calculating the screening proportion value as S (i) according to Vec (i), wherein the calculation formula of S (i) is as follows:
wherein exp () is an exponential function based on a natural number e, and whether the node meets a constraint condition is judged by combining a screening proportion S (i) with a data access amount accessl in the node, a node transaction number C and a transaction duration ti, wherein the constraint condition is as follows:
F((archei,ti))=
wherein in the formulaFor node->Is a single data access amount of +.>For node->The maximum value of the data access amount in the memory,for node->The minimum data access amount in the node C (archei, ti)Is>For node->Is used to determine the average transaction duration of (a),for node->Ti is the duration of a single transaction, and when the constraint condition is satisfied, the node is +.>Outputting and storing the data in the step S306, and jumping the node data to the step S when the constraint condition is not met;
s306: and when the investigation data find the loopholes, backing up the data, and carrying out investigation and repair on the loopholes, and then encrypting the stored data.
2. A blockchain-based digitized archive management method according to claim 1, wherein in step S100, the archive is digitized by electronic archive scanning and the data in the archive is stored according to the archive as a whole, the creation time, modification time, and the digitized time in the archive are recorded by semantic recognition, the recorded time is defined as a time stamp of the storage time, and the time stamp is bound to the digitized archive and stored in the memory.
3. A blockchain-based digitized archive management method as in claim 1, wherein in step S200, the digitized archive is programmatically stored according to a blockchain, the digitized archive is stored in nodes of the blockchain, the nodes are divided into a main node and a sub-node, an initial version of the digitized archive is stored according to the order of creation time of the archive, the stored initial version of the digitized archive is stored in the main node, the main node is set with a main node number according to the stored digitized archive ID, the node number is bound with the digitized archive ID, the digitally-confirmed digitized archive of the archive in the main node is stored in the sub-node, and the sub-node numbers are set according to the main node number and the modification time, and each node is connected to each other and communicates through any one of a wired network and a wireless network.
4. A blockchain-based digitized archive management method as in claim 1, wherein in S400, the method of transporting the digitized archive by node and adding encrypted information at the node location is:
marking nodes of which the transaction is not checked and the loopholes are not checked as safe nodes, defining the nodes of which the loopholes are checked in the transaction as secondary nodes, marking the risk level of the current blockchain storage data as high when the number of the safe nodes is less than or equal to three times of the number of the secondary nodes, marking the risk level of the current blockchain storage data as low when the number of the safe nodes is greater than three times of the number of the secondary nodes, and performing secondary encryption on the digitized archive data in the nodes when the current risk level of the nodes is high.
5. A blockchain-based digitized archive management system, the system comprising: a processor and a memory, both in the system being capable of running a computer program in the processor, the processor implementing the steps in a blockchain-based digitized archive management method of any of claims 1-4 when the computer program is executed.
CN202311139135.1A 2023-09-06 2023-09-06 Digital file management method and system based on blockchain Active CN116881533B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311139135.1A CN116881533B (en) 2023-09-06 2023-09-06 Digital file management method and system based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311139135.1A CN116881533B (en) 2023-09-06 2023-09-06 Digital file management method and system based on blockchain

Publications (2)

Publication Number Publication Date
CN116881533A CN116881533A (en) 2023-10-13
CN116881533B true CN116881533B (en) 2024-01-16

Family

ID=88271835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311139135.1A Active CN116881533B (en) 2023-09-06 2023-09-06 Digital file management method and system based on blockchain

Country Status (1)

Country Link
CN (1) CN116881533B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114610777A (en) * 2022-03-06 2022-06-10 浙江数秦科技有限公司 Intelligent management system for civil archives based on block chain
CN116257892A (en) * 2023-05-09 2023-06-13 广东电网有限责任公司佛山供电局 Data privacy security verification method for digital archives

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10255108B2 (en) * 2016-01-26 2019-04-09 International Business Machines Corporation Parallel execution of blockchain transactions
US11544708B2 (en) * 2017-12-29 2023-01-03 Ebay Inc. User controlled storage and sharing of personal user information on a blockchain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114610777A (en) * 2022-03-06 2022-06-10 浙江数秦科技有限公司 Intelligent management system for civil archives based on block chain
CN116257892A (en) * 2023-05-09 2023-06-13 广东电网有限责任公司佛山供电局 Data privacy security verification method for digital archives

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链技术在电子档案管理中的应用分析;余子丹;范智新;;兰台世界(第04期);第79-82页 *

Also Published As

Publication number Publication date
CN116881533A (en) 2023-10-13

Similar Documents

Publication Publication Date Title
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN112134883B (en) Method, device and related product for carrying out rapid authentication on trust relationship between nodes based on trusted computing
CN110826091B (en) File signature method and device, electronic equipment and readable storage medium
US20200226267A1 (en) Distributed ledger-based digital content tracing
CN112163412A (en) Data verification method and device, electronic equipment and storage medium
WO2023051308A1 (en) Data verification method and apparatus, device and storage medium
US8131761B2 (en) File management system and apparatus, and computer readable recording medium storing program
US20100223469A1 (en) Method, System and Computer Program Product for Certifying Software Origination
CN111324517B (en) Application service supervision method, supervision server and storage medium
CN114781007A (en) Tree-based document batch signature and signature verification method and system
Martínez et al. Robust hashing for models
CN116881533B (en) Digital file management method and system based on blockchain
Martínez et al. On watermarking for collaborative model-driven engineering
CN112685795A (en) Digital deposit certificate creating method, digital deposit certificate verifying method and digital deposit certificate system
US11469901B2 (en) Data structures
CN116010360A (en) Similarity-based electric power text data storage method and device
CN111539028B (en) File storage method and device, storage medium and electronic equipment
CN111191271B (en) Computer-implemented method, system and storage medium
CN109509095B (en) Video active identification method combined with block chain
JP5511270B2 (en) Information processing apparatus and information processing method
CN114756837B (en) Block chain-based digital content tracing method and system
CN115439118B (en) Digital certificate storage management method based on blockchain
US20240056465A1 (en) System and method of managing and auditing training data based on distributed ledger technology
CN114880320B (en) Method for generating block state certification
CN112667659B (en) Feature processing method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant