Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Document manipulation method, device and computer storage medium

A technology of file operation and operation method, which is applied in computer security devices, computing, file systems, etc., can solve problems such as system paralysis, fatal blows, and hacker attacks on servers, so as to avoid random tampering and ensure security and fairness Effect

Active Publication Date: 2021-03-02
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the widely used file management method is the server-side plus client-side method. All files, status information, and permission information are stored on the server side. Once the file management system of the server is maliciously tampered with or the server is attacked by hackers or viruses, the entire system will face paralysis and a fatal blow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document manipulation method, device and computer storage medium
  • Document manipulation method, device and computer storage medium
  • Document manipulation method, device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] figure 1 A schematic flow chart of the operation method of the file provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method includes the following steps:

[0060] S101. Broadcast a file operation instruction to each second network node, where the file operation instruction includes: a file identifier, a first network node identifier, and an operation identifier, so that each second network node judges according to the file identifier, the first network node identifier, and the operation identifier Whether the first network node has the authority to operate the file corresponding to the file identifier.

[0061] Specifically, the blockchain network of this embodiment includes at least two network nodes, and each network node corresponds to a unique identifier. The network node that broadcasts file operation instructions is called the first network node, and the network node in the blockchain network is called The network nodes other tha...

Embodiment 2

[0070] figure 2 A schematic flow chart of the operation method of the file provided in Embodiment 2 of the present invention, such as figure 2 As shown, the method may include the following steps:

[0071] S201. Obtain operation authority information and file status information of the file identified by the file by the first network node.

[0072] S202. If it is determined according to the operation authority information that the first network node has the operation authority to the file and the file state information is operable, broadcast the file operation instruction to each second network node.

[0073] S203. Receive a file operation request response sent by each second network node, where the file operation request response includes a result of whether the file operation is approved.

[0074] Specifically, all network nodes in the blockchain network pre-store the file identifiers of all files, the corresponding file status information and the operation authority info...

Embodiment 3

[0085] image 3 A schematic flow chart of the operation method of the file provided in Embodiment 3 of the present invention, such as image 3 As shown, the method includes:

[0086] S301. Receive a file operation instruction sent by a first network node, where the file operation instruction includes: a file identifier, a first network node identifier, and an operation identifier.

[0087] S302. Determine whether the first network node has permission to operate the file corresponding to the file identifier according to the file identifier, the first network node identifier, and the operation identifier.

[0088] S303. Generate a result of agreeing to the file operation and a result of not agreeing to the file operation according to whether the first network node has the authority to operate the file corresponding to the file identifier.

[0089] S304. Send a file operation request response to the first network node, where the file operation request response includes a result...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file operation method, equipment and computer storage medium. By broadcasting file operation instructions to each second network node, the file operation request response sent by each second network node is received, and the file operation request response includes whether to agree or not. As a result of the file operation, if the file operation request response of each second network node agrees with the result of the file operation, the file will be operated to prevent the file from being tampered with at will, and the file is stored on the blockchain of any network node . This solution manages files based on the blockchain network. The entire file management process does not depend on the server. The operation of each network node on the file is realized by sending a request to other network nodes and obtaining the joint signature of other nodes. Manage system security and fairness.

Description

technical field [0001] The invention relates to the field of file management, in particular to a file operation method, device and computer storage medium. Background technique [0002] Due to the continuous development of the Internet, people need to store and manage big data to ensure the normal operation of the Internet. [0003] At present, the widely used file management method is the server-side plus client-side method. All files, status information, and permission information are stored on the server side. Once the server's file management system is maliciously tampered with or the server is attacked by hackers or viruses, the entire system will face paralysis and a fatal blow. [0004] Therefore, how to ensure the security of the file management system has become an urgent technical problem in this field. Contents of the invention [0005] In view of this, the present application provides a file operation method, device and computer storage medium to overcome the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/18G06F16/11G06F21/62H04L29/08
CPCG06F21/6218H04L67/1097
Inventor 黄珂邴建杜杏兰
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products