CN111611460A - File management method based on block chain - Google Patents
File management method based on block chain Download PDFInfo
- Publication number
- CN111611460A CN111611460A CN202010484950.1A CN202010484950A CN111611460A CN 111611460 A CN111611460 A CN 111611460A CN 202010484950 A CN202010484950 A CN 202010484950A CN 111611460 A CN111611460 A CN 111611460A
- Authority
- CN
- China
- Prior art keywords
- information
- target
- archive
- file
- check code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/93—Document management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/906—Clustering; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- General Business, Economics & Management (AREA)
- Business, Economics & Management (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention relates to a block chain-based archive management method, which comprises the steps of obtaining at least two archive information, classifying the archive information and establishing a query index, storing the classified archive information and a generated corresponding first check code into a block chain network, obtaining authentication information of an extractor when the archive information is extracted, obtaining an archive extraction instruction and a second check code after the authentication is passed, extracting a related target archive information set and a target first check code from the block chain network according to the archive extraction instruction, comparing whether the second check code and the target first check code accord with a preset relation, and obtaining and outputting the target archive information if the second check code and the target first check code accord with the preset relation. The block chain-based file management method can effectively reduce the possibility that file information is illegally stolen, tampered and damaged, and effectively improves the security of file management.
Description
Technical Field
The invention relates to a file management method based on a block chain.
Background
The block chain technology is a novel application technology set of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. At present, the application of the blockchain technology is receiving more and more attention.
The traditional file management method is a paper file management mode and has the defects of low searching speed and complex management flow, and the digital file management method can solve the defects of the paper file management mode. However, the implementation process of the current digital archive management method is simple, the required archive information can be directly obtained according to the archive extraction instruction, the security problem of the electronic archive file cannot be effectively solved, and the situations that the archive is illegally obtained, tampered and damaged and the like may exist.
Disclosure of Invention
The invention aims to provide a block chain-based file management method, which is used for solving the problem of poor safety of the existing digital file management method.
In order to solve the problems, the invention adopts the following technical scheme:
a block chain-based archive management method comprises the following steps:
acquiring at least two file information;
classifying the at least two file information according to a preset classification mechanism to obtain file information sets of at least two different file categories, wherein each file information set comprises at least one file information;
establishing a query index according to each file information set and the corresponding file type, wherein the query index comprises the corresponding relation between the file information set name of each file information set and the corresponding file type and the file information name of each file information in each file information set;
generating first check codes with the same number as the file information sets according to the file information sets, wherein the file information sets correspond to the first check codes one by one and are associated with the file information sets and the corresponding first check codes;
storing each file information set and the corresponding first check code into a block chain network;
acquiring the identity verification information of the person to be extracted;
inputting the identity authentication information into a preset identity information database, and judging whether the identity authentication information is certain identity information in the identity information database;
if the identity verification information is certain identity information in the identity information database, acquiring a file extraction instruction and a second check code, wherein the file extraction instruction comprises a target file information name to be extracted;
acquiring a target archive type corresponding to the target archive information name and a target archive information set name corresponding to the target archive type according to the target archive information name and the query index;
extracting a target archive information set and a target first check code corresponding to the target archive information set name from the block chain network according to the target archive information set name;
comparing whether the second check code and the target first check code accord with a preset relation or not;
if the second check code and the target first check code are in accordance with a preset relationship, extracting target archive information corresponding to the target archive information name from the target archive information set according to the target archive information name;
and outputting the target file information.
Further, the storing each archive information set and the corresponding first check code into the block chain network includes:
storing each file information set and the corresponding first check code into a storage node in a block chain network according to the time sequence, and adding a corresponding timestamp to each file information set and the corresponding first check code;
constructing a corresponding relation between each file information set name and a corresponding timestamp;
correspondingly, the extracting a target archive information set and a target first check code corresponding to the target archive information set name from the block chain network according to the target archive information set name includes:
determining a target time stamp corresponding to the target archive information set name according to the corresponding relation between the archive information set names and the corresponding time stamps and the target archive information set name;
and extracting a target archive information set and a target first check code corresponding to the target archive information set name from the block chain network according to the target timestamp.
Further, the comparing whether the second check code and the target first check code conform to a preset relationship includes:
and comparing whether the second check code and the target first check code are the same check code information.
Further, the acquiring the identity verification information of the extracted person comprises:
acquiring actual fingerprint information of an extracted person;
correspondingly, inputting the identity authentication information into a preset identity information database, and judging whether the identity authentication information is certain identity information in the identity information database, including:
inputting the actual fingerprint information into a preset fingerprint information database, and judging whether the actual fingerprint information is a certain fingerprint information in the fingerprint information database.
Further, the associating each archive information set with the corresponding first check code includes:
performing data compression on each file information set and the corresponding first check code to obtain a data compression packet corresponding to each file information set;
correspondingly, the storage of each archive information set and the corresponding first check code in the block chain network:
and storing the data compression packet corresponding to each file information set into the block chain network.
The invention has the following beneficial effects: classifying at least two acquired file information to obtain at least two file information sets, establishing a query index according to each file information set and a corresponding file category to facilitate data search in subsequent file information extraction, generating first check codes with the same number as the file information sets according to each file information set, wherein each file information set corresponds to each first check code one by one, associating each file information set with the corresponding first check code, storing each file information set and the corresponding first check code into a block chain network, comparing the second check code input in the extraction with the first check code obtained in the extraction in the subsequent file information extraction, and only when the second check code and the corresponding first check code accord with a preset relationship, extracting the related file information, thereby improving the safety of file management, the possibility that the file information is illegally stolen is greatly reduced, and the possibility that the file data is tampered and damaged is further reduced; the block chain can realize the functions of data falsification and falsification in a cryptographic mode, so that the archive data can be stored in the block chain network to avoid falsification and falsification of the archive data in the storage process, and the safety of archive management is improved; when the archives are extracted, the identity authentication information of an extraction person needs to be acquired at first, and only after the identity authentication is passed, the subsequent extraction process can be carried out, so that illegal persons can be prevented from acquiring the archives information, the archives information is prevented from being illegally stolen, and the safety of archive management is improved. Therefore, the block chain-based file management method provided by the invention can effectively reduce the possibility that file information is illegally stolen, tampered and damaged, and effectively improves the security of file management.
Drawings
FIG. 1 is a flow chart of a block chain-based archive management method.
Detailed Description
The embodiment provides a block chain-based file management method, and an execution subject of the file management method can be a computer device or a server device. The application scenarios of the archive management method are not unique, such as: the file management method can be applied to schools and is used for managing student files, and then the corresponding execution main body of the file management method is server equipment or computer equipment in a school archive room; the method can also be applied to a government department for managing the file of the employee in a certain region (such as a prefecture or county) for managing the file of all the employees in the region, and then the corresponding execution subject of the file management method is the server device or the computer device in the government department for managing the file of the employee.
As shown in fig. 1, the file management method includes:
step S101: acquiring at least two file information:
the number of the acquired file information and the specific content of the file information are determined by the actual application scenarios, such as: if the file management method is applied to a school, the acquired file information is the student file information of each grade; if the file management method is applied to a government department for managing the file of the employees in a certain area, the acquired file information is the file information of each employee in the area. It should be understood that the profile information is electronic profile information.
Step S102: classifying the at least two file information according to a preset classification mechanism to obtain file information sets of at least two different file categories, wherein each file information set comprises at least one file information:
after acquiring a plurality of archive information, classifying the archive information according to a preset classification mechanism, wherein the classification mechanism is determined by specific application scenarios, such as: if the archive management method is applied to schools, the archive information can be classified by a classification mechanism according to the difference of grades or the difference of classes, and the archive information of students in the same grade or the same class is classified into one class; if the file management method is applied to a government department for managing the file of the employees in a certain region, the classification mechanism can classify the file information according to different regions divided in the region, and classify the file information of the employees in the same region into one class.
After classification, at least two archive information sets of different archive categories are obtained, each archive information set comprises at least one archive information, and the archive information in each archive information set is the same type of archive information. Such as: if the archive management method is applied to universities, the archive information is divided into four different archive categories according to different grades, wherein the four different archive categories are as follows: the system comprises a first-grade student archive information set, a second-grade student archive information set, a third-grade student archive information set and a fourth-grade student archive information set, wherein each archive information set comprises at least one archive information. If the file management method is applied to a government department for managing the files of employees in a certain area, file information is divided into three different file categories according to the difference of areas, wherein the three different file categories are respectively as follows: the system comprises a first region employee file information set, a second region employee file information set and a third region employee file information set, wherein each file information set comprises at least one file information.
Step S103: establishing a query index according to each archive information set and the corresponding archive category, wherein the query index comprises the corresponding relation between the archive information set name of each archive information set and the corresponding archive category, and the archive information name of each archive information in each archive information set:
and establishing a query index according to each file information set and the corresponding file type, wherein the query index comprises the corresponding relation between the file information set name of each file information set and the corresponding file type and the file information name of each file information in each file information set. The name of the archive information set is the name of the corresponding archive information set, and the specific name is determined by the actual application scenario, for example: the name of the archive information set of the senior second class students is "archive information set of senior second class students". The archive category is determined by the actual application scenario, such as: archives of senior second-class students, archives of senior third-class students, and the like. The specific name of the archive information name of each archive information in each archive information set is determined by the actual application scenario, for example: each archive information name in the archive information set of the students in the second generation is archive information of each student name, that is, the archive information name contains the student name, specifically: the individual archive information names in the archive information sets of the senior students are "archive information of zhang san", "archive information of lie san", and so on.
The query index may be an index table including the corresponding relationship between the file information set name of each file information set and the corresponding file type, and the file information names in each file information set, and table 1 shows a specific embodiment. Where M and N represent the archive category, A is the archive information set name corresponding to archive category M, B is the archive information set name corresponding to archive category N, A1, A2, A3, and A4 are the archive information names of the individual archive information in archive information set name A, and B1, B2, B3, and B4 are the archive information names of the individual archive information in archive information set name B.
TABLE 1
As a specific application scenario, in table 1, M is "archive of senior two-grade students", N is "archive of senior three-grade students", a is "archive information set of senior two-grade students", B is "archive information set of senior three-grade students", a1 is "archive information of zhang san", a2 is "archive information of lie four", A3 is "archive information of wang wu", a4 is "archive information of zhang qiang", B1 is "archive information of zhang wei", B2 is "archive information of wang, B3 is" archive information of liu ", and B4 is" archive information of zhang qiang ".
Step S104: generating first check codes with the same number as the archive information sets according to the archive information sets, wherein the archive information sets correspond to the first check codes one by one, and associating the archive information sets with the corresponding first check codes:
and generating first check codes with the same number as the number of the file information sets according to the file information sets, wherein the file information sets correspond to the first check codes one by one, namely each file information set corresponds to one first check code. The specific implementation manner of the first check code is not limited, and the first check code may be composed of numbers and/or letters, the specific number of bits is set according to actual needs, and the first check code is used for comparison and check with the subsequent second check code. It should be understood that each archive information set corresponds to a first check code, and the first check codes corresponding to the archive information sets are independent from each other, so that the first check codes may be the same check code or different check codes.
And associating each file information set with the corresponding first check code, namely establishing a corresponding relationship between each file information set and the corresponding first check code, so that when a certain file information set is stored and extracted subsequently, the file information set and the corresponding first check code are stored together, or when the file information set is extracted, the corresponding first check code is also extracted. In this embodiment, an association method is given: and performing data compression on each file information set and the corresponding first check code to obtain a data compression packet corresponding to each file information set, wherein the data compression packet comprises the file information sets and the corresponding first check codes.
Step S105: storing each archive information set and the corresponding first check code into a block chain network:
in general, a blockchain network includes a plurality of storage nodes, and the specific number is set according to actual needs. And storing each file information set and the corresponding first check code into each storage node in the block chain network according to the time sequence, and adding a corresponding timestamp to each file information set and the corresponding first check code, wherein the timestamp is the storage time. And correspondingly, storing each data compression packet into each storage node in the block chain network according to the time sequence, and adding a corresponding time stamp to each data compression packet.
Because each file information set is stored in the block chain network in sequence according to the time sequence, each file information set has a corresponding storage time, namely a time stamp, and the time stamps corresponding to different file information sets are different. Then, a corresponding relationship between each archive information set name and the corresponding timestamp is constructed, and the timestamp of each archive information set name can be obtained according to the corresponding relationship.
Step S106: acquiring the identity verification information of the extracted person:
when the abstractor needs to extract the file, the identity authentication needs to be carried out firstly, and then the identity authentication information of the abstractor is obtained. In this embodiment, the acquired authentication information of the extracted person is actual fingerprint information of the extracted person. Accordingly, the executing main body needs to be in communication connection with the fingerprint collector, and fingerprint information of a person is collected and extracted through the fingerprint collector and output to the executing main body.
Step S107: inputting the identity verification information into a preset identity information database, and judging whether the identity verification information is certain identity information in the identity information database:
an identity information database is preset in the execution main body, the identity information database comprises at least one identity information, and the identity information in the identity information database is the identity information of related personnel capable of extracting files. Then, the acquired authentication information of the abstractor is input into a preset identity information database, and whether the authentication information of the abstractor is certain identity information in the identity information database is judged. Because the identity authentication information is actual fingerprint information, the identity information database is a fingerprint information database, and the fingerprint information in the fingerprint information database is the fingerprint information of the personnel with the archive extraction authority. Then, inputting the actual fingerprint information into the fingerprint information database, and determining whether the actual fingerprint information is a certain fingerprint information in the fingerprint information database, specifically: comparing the actual fingerprint information with each fingerprint information in the fingerprint information database to obtain each fingerprint similarity, then comparing each fingerprint similarity with a preset similarity threshold, and if the fingerprint similarity is larger than or equal to the preset similarity threshold, judging that the actual fingerprint information is a certain fingerprint information in the fingerprint information database; and if all the fingerprint similarities are smaller than the preset similarity threshold, judging that the actual fingerprint information is not the certain fingerprint information in the fingerprint information database. It should be understood that the identity information database, i.e. the fingerprint information database, is previously entered into the executing entity.
Step S108: if the identity verification information is certain identity information in the identity information database, acquiring a file extraction instruction and a second check code, wherein the file extraction instruction comprises a target file information name to be extracted:
if the identity verification information is certain identity information in the identity information database, that is, the actual fingerprint information is certain fingerprint information in the fingerprint information database, the identity verification is passed, a file extraction instruction and a second check code are obtained, the file extraction instruction and the second check code are both input to the execution main body by an extractor, and the file extraction instruction and the second check code can be specifically input through related input equipment, for example, the file extraction instruction and the second check code are input to the execution main body through a keyboard. The archive extraction instruction comprises a target archive information name to be extracted, namely, an archive information name to be extracted. The second check code is used for comparing with the first check code, the specific implementation mode of the second check code is not limited and can be composed of numbers and/or letters, and the specific number of digits is set according to actual needs.
Step S109: according to the target archive information name and the query index, acquiring a target archive type corresponding to the target archive information name and a target archive information set name corresponding to the target archive type:
and acquiring a target file type corresponding to the target file information name and a target file information set name corresponding to the target file type according to the acquired target file information name. In this embodiment, the obtained target archive information name is input into the query index, so as to obtain a target archive type corresponding to the target archive information name and a target archive information set name corresponding to the target archive type. Such as: if the target profile information name is A3, it is entered into the above query index (i.e., Table 1) to obtain the target profile type M corresponding to the target profile information name A3 and the target profile information set name A corresponding to the target profile type M.
Step S110: extracting a target archive information set and a target first check code corresponding to the target archive information set name from the block chain network according to the target archive information set name:
after the target file information set name is obtained, extracting a file information set and a first check code corresponding to the target file information set name from the block chain network according to the target file information set name, wherein the extracted file information set is the target file information set, and the extracted first check code is the target first check code. One specific embodiment is given below: because different file information set names have specific timestamps, the timestamp corresponding to the target file information set name is determined according to the corresponding relation between each file information set name and the corresponding timestamp and the target file information set name, and is the target timestamp; and then, extracting a target archive information set and a target first check code corresponding to the target archive information set name from the block chain network according to the obtained target timestamp. Therefore, since different sets of profile information have specific storage times, the target set of profile information and the target first check code corresponding to the target set of profile information name can be extracted from the blockchain network according to the target timestamp.
It should be understood that the related data information extraction from the blockchain network belongs to the conventional technical means, and therefore, as other embodiments, other technical means for extracting the related data information from the blockchain network, which are disclosed in the prior art, can also be adopted.
Step S111: comparing whether the second check code and the target first check code accord with a preset relation:
after the second check code and the first target check code are obtained, whether the second check code and the first target check code conform to a preset relationship is compared, and the preset relationship is set according to actual conditions, such as: the two pieces of check code information are identical check code information, or partial data in the two pieces of check code information are identical, or the two pieces of check code information conform to the negation principle, that is, the two pieces of check code information are completely opposite data information. In this embodiment, comparing whether the second check code and the target first check code conform to the preset relationship specifically means: and comparing whether the second check code and the target first check code are the same check code information.
Step S112: if the second check code and the target first check code are in accordance with a preset relationship, extracting target archive information corresponding to the target archive information name from the target archive information set according to the target archive information name:
if the second check code and the target first check code conform to a preset relationship, that is, the second check code and the target first check code are the same check code information and indicate that the check is passed, extracting target archive information corresponding to the target archive information name from the acquired target archive information set according to the target archive information name, for example: as shown in table 1, if the target profile information name is A3, the target profile information corresponding to the target profile information name A3 is extracted from the acquired target profile information set.
Step S113: outputting the target file information:
after the target profile information is obtained, the target profile information is output to a relevant device, for example, to a relevant display screen, or to an external device, so that the retriever can perform subsequent processing.
The above-mentioned embodiments are merely illustrative of the technical solutions of the present invention in a specific embodiment, and any equivalent substitutions and modifications or partial substitutions of the present invention without departing from the spirit and scope of the present invention should be covered by the claims of the present invention.
Claims (5)
1. A block chain-based archive management method is characterized by comprising the following steps:
acquiring at least two file information;
classifying the at least two file information according to a preset classification mechanism to obtain file information sets of at least two different file categories, wherein each file information set comprises at least one file information;
establishing a query index according to each file information set and the corresponding file type, wherein the query index comprises the corresponding relation between the file information set name of each file information set and the corresponding file type and the file information name of each file information in each file information set;
generating first check codes with the same number as the file information sets according to the file information sets, wherein the file information sets correspond to the first check codes one by one and are associated with the file information sets and the corresponding first check codes;
storing each file information set and the corresponding first check code into a block chain network;
acquiring the identity verification information of the person to be extracted;
inputting the identity authentication information into a preset identity information database, and judging whether the identity authentication information is certain identity information in the identity information database;
if the identity verification information is certain identity information in the identity information database, acquiring a file extraction instruction and a second check code, wherein the file extraction instruction comprises a target file information name to be extracted;
acquiring a target archive type corresponding to the target archive information name and a target archive information set name corresponding to the target archive type according to the target archive information name and the query index;
extracting a target archive information set and a target first check code corresponding to the target archive information set name from the block chain network according to the target archive information set name;
comparing whether the second check code and the target first check code accord with a preset relation or not;
if the second check code and the target first check code are in accordance with a preset relationship, extracting target archive information corresponding to the target archive information name from the target archive information set according to the target archive information name;
and outputting the target file information.
2. The blockchain-based archive management method according to claim 1,
the storing each archive information set and the corresponding first check code into the block chain network includes:
storing each file information set and the corresponding first check code into a storage node in a block chain network according to the time sequence, and adding a corresponding timestamp to each file information set and the corresponding first check code;
constructing a corresponding relation between each file information set name and a corresponding timestamp;
correspondingly, the extracting a target archive information set and a target first check code corresponding to the target archive information set name from the block chain network according to the target archive information set name includes:
determining a target time stamp corresponding to the target archive information set name according to the corresponding relation between the archive information set names and the corresponding time stamps and the target archive information set name;
and extracting a target archive information set and a target first check code corresponding to the target archive information set name from the block chain network according to the target timestamp.
3. The blockchain-based archive management method according to claim 1,
the comparing whether the second check code and the target first check code conform to a preset relationship includes:
and comparing whether the second check code and the target first check code are the same check code information.
4. The blockchain-based archive management method according to claim 1,
the acquiring of the identity verification information of the abstractor comprises the following steps:
acquiring actual fingerprint information of an extracted person;
correspondingly, inputting the identity authentication information into a preset identity information database, and judging whether the identity authentication information is certain identity information in the identity information database, including:
inputting the actual fingerprint information into a preset fingerprint information database, and judging whether the actual fingerprint information is a certain fingerprint information in the fingerprint information database.
5. The blockchain-based archive management method according to claim 1,
the associating each archive information set with the corresponding first check code includes:
performing data compression on each file information set and the corresponding first check code to obtain a data compression packet corresponding to each file information set;
correspondingly, the storage of each archive information set and the corresponding first check code in the block chain network:
and storing the data compression packet corresponding to each file information set into the block chain network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010484950.1A CN111611460A (en) | 2020-06-01 | 2020-06-01 | File management method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010484950.1A CN111611460A (en) | 2020-06-01 | 2020-06-01 | File management method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111611460A true CN111611460A (en) | 2020-09-01 |
Family
ID=72204998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010484950.1A Pending CN111611460A (en) | 2020-06-01 | 2020-06-01 | File management method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111611460A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112084474A (en) * | 2020-09-03 | 2020-12-15 | 上海容基工程项目管理有限公司 | Enterprise archive management method, system, storage medium and electronic equipment |
CN112309525A (en) * | 2020-11-09 | 2021-02-02 | 南通市第一人民医院 | Refractive development file management method and device |
CN113486144A (en) * | 2021-05-28 | 2021-10-08 | 南方电网数字电网研究院有限公司 | Digital archive recording method, system, device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150180865A1 (en) * | 2012-08-13 | 2015-06-25 | Wwtt Technology China | Device and method for identity authentication |
CN109167784A (en) * | 2018-08-31 | 2019-01-08 | 篱笆墙网络科技有限公司 | Data processing method and system on block chain |
CN109710823A (en) * | 2018-11-02 | 2019-05-03 | 远光软件股份有限公司 | Archive management method, file administration network and electronic equipment based on block chain |
CN110362533A (en) * | 2019-07-19 | 2019-10-22 | 华中师范大学 | A kind of archives storage and shared system based on alliance's chain |
CN110543545A (en) * | 2019-09-05 | 2019-12-06 | 腾讯科技(深圳)有限公司 | file management method and device based on block chain and storage medium |
-
2020
- 2020-06-01 CN CN202010484950.1A patent/CN111611460A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150180865A1 (en) * | 2012-08-13 | 2015-06-25 | Wwtt Technology China | Device and method for identity authentication |
CN109167784A (en) * | 2018-08-31 | 2019-01-08 | 篱笆墙网络科技有限公司 | Data processing method and system on block chain |
CN109710823A (en) * | 2018-11-02 | 2019-05-03 | 远光软件股份有限公司 | Archive management method, file administration network and electronic equipment based on block chain |
CN110362533A (en) * | 2019-07-19 | 2019-10-22 | 华中师范大学 | A kind of archives storage and shared system based on alliance's chain |
CN110543545A (en) * | 2019-09-05 | 2019-12-06 | 腾讯科技(深圳)有限公司 | file management method and device based on block chain and storage medium |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112084474A (en) * | 2020-09-03 | 2020-12-15 | 上海容基工程项目管理有限公司 | Enterprise archive management method, system, storage medium and electronic equipment |
CN112309525A (en) * | 2020-11-09 | 2021-02-02 | 南通市第一人民医院 | Refractive development file management method and device |
CN112309525B (en) * | 2020-11-09 | 2022-01-25 | 南通市第一人民医院 | Refractive development file management method and device |
CN113486144A (en) * | 2021-05-28 | 2021-10-08 | 南方电网数字电网研究院有限公司 | Digital archive recording method, system, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110929125B (en) | Search recall method, device, equipment and storage medium thereof | |
CN111611460A (en) | File management method based on block chain | |
CN112069543B (en) | Archive intelligent analysis management system based on big data | |
Jamal et al. | Blockchain-based identity verification system | |
CN112084474A (en) | Enterprise archive management method, system, storage medium and electronic equipment | |
CN111597418B (en) | Big data-based archive data storage system | |
CN111639355B (en) | Data security management method and system | |
Li et al. | The influence of Close Non‐Match fingerprints similar in delta regions of whorls on fingerprint identification | |
CN116611092A (en) | Multi-factor-based data desensitization method and device, and tracing method and device | |
Hasta et al. | Fingerprint based secured voting | |
CN111460139B (en) | Intelligent management based engineering supervision knowledge service system and method | |
CN111611459B (en) | File data protection method based on block chain | |
CN118013569A (en) | Dynamic data desensitization method and system based on operation and maintenance audit | |
CN116055067A (en) | Weak password detection method, device, electronic equipment and medium | |
Schnell | Privacy Preserving Record Linkage in the Context of a National Statistical Institute | |
Gladkikh et al. | Development of biometric systems for passenger identification based on noise-resistant coding means | |
CN114819733A (en) | Government affair service online information sharing platform | |
CN115115351A (en) | Method and system for auditing environmental damage identification evaluation report | |
CN118152816B (en) | Evidence collection analysis method and system based on intelligent terminal | |
Anjana et al. | Secured Natural Language Processing for Conversion of Unstructured Text Into Structured Intelligence | |
CN116011025B (en) | Digital identity authentication method and system based on block chain | |
CN117951174B (en) | Data classification and classification method, device, equipment and medium based on data set | |
US12079699B1 (en) | Verifying the provenance of a machine learning system | |
CN113709092B (en) | Data detection method, device, computer equipment and storage medium | |
CN114925352B (en) | Account registration risk detection method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |