Archive management system based on block chain
A file management system and block chain technology, applied in the field of file management system based on block chain, can solve the problems of high cost of file management, inconvenient sharing, etc., to reduce the cost of file management, improve security, and facilitate storage and reference Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] A blockchain-based file management system, please refer to the appendix figure 1 , including the receiving module 10, the certificate storage module 20, the storage module 30 and the time-limited sharing module 40, the receiving module 10 receives the scanned file 11 and the description information 12 of the file, the description information 12 includes the file type and the query key value, and the certificate storage module 20 extracts The hash value of the scanned part 11, upload the hash value to the blockchain 50 for storage, obtain the corresponding block height, the storage module 30 stores the scanned part 11, the storage module 30 establishes the index of the scanned part 11, and the index records the file storage address, File type, query key value, hash value and height of storage certificate block, the time-limited sharing module 40 receives read requests from other departments, and the read request includes department information, retrieval key value, type a...
Embodiment 2
[0035] A blockchain-based file management system, this embodiment specifically improves the smart contract used for time-limited encryption. As shown in Table 4, the encrypted column of the smart contract in this embodiment also includes a second clock and a prompt column.
[0036] Table 4 Smart Contracts
[0037] Encryption column 1 {column ID 1, clock 1, second clock 1, prompt column 1, bulletin column 1} Encryption column 2 {Column ID 2, Clock 2, Second Clock 2, Prompt Column 2, Public Column 2} Encryption column 3 {Column ID 3, Clock 3, Second Clock 3, Prompt Column 3, Public Column 3} … … Encryption column 60 {column logo 60, clock 60, second clock 60, prompt column 60, bulletin column 60}
[0038] The prompt bar is initially hidden. When the second clock counts down to 0, the prompt bar is displayed and the clock is started. When the clock counts down to 0, the clock and the second clock are reset.
[0039] Please see attached ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


