CN107506661A - A kind of method of the generation house historical record based on block chain - Google Patents

A kind of method of the generation house historical record based on block chain Download PDF

Info

Publication number
CN107506661A
CN107506661A CN201710696827.4A CN201710696827A CN107506661A CN 107506661 A CN107506661 A CN 107506661A CN 201710696827 A CN201710696827 A CN 201710696827A CN 107506661 A CN107506661 A CN 107506661A
Authority
CN
China
Prior art keywords
block
information
hash
data
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710696827.4A
Other languages
Chinese (zh)
Other versions
CN107506661B (en
Inventor
李征
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhen Er Internet Henan Science And Technology Ltd
Original Assignee
Zhen Er Internet Henan Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhen Er Internet Henan Science And Technology Ltd filed Critical Zhen Er Internet Henan Science And Technology Ltd
Priority to CN201710696827.4A priority Critical patent/CN107506661B/en
Publication of CN107506661A publication Critical patent/CN107506661A/en
Application granted granted Critical
Publication of CN107506661B publication Critical patent/CN107506661B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to real estate domain, discloses a kind of method of the generation house historical record based on block chain, specifically inserts information first, block chain is operated, the first block number evidence in house is regenerated, verifies the legitimacy of the first block number evidence, then the first block number evidence is stored in whole block chain;When in house, state changes, such as carry out data renewal or carry out the change of owner, the data of lastblock are first obtained from whole block chain, perhaps changed content is further filled with modification, block chain is operated, current block data are generated, verify the perhaps integrality of changed content, then by current block data storage in whole block chain in the validity and modification of current block data signature.The present invention forms unified house historical record, and it is open after information can not distort, it is ensured that the accuracy of houseclearing and can not tamper.

Description

A kind of method of the generation house historical record based on block chain
Technical field
This programme is related to real estate domain, and in particular to a kind of method of the generation house historical record based on block chain.
Background technology
Block chain is substantially the distributed data base of a decentralization, and it is acted on behalf of without centralization, realizes one kind Point-to-point direct interaction so that high efficiency, extensive, non-stop layerization agency information interaction approach become reality.Simultaneously Block chain ensures that data with existing can not possibly be tampered using the method for cryptography, each block number evidence recorded on block chain, All keep true and reliable while open and clear, (but dealer is personal or mechanism can be anonymous) can be checked by other people, So being formed one kind to strange counterparty's understanding and trust, need not need to only see the letter of counterparty on block chain Breath, assets etc. are believable in itself, it is possible to are relievedly merchandised.Here any trust intermediary is not needed.
Because block chain have can extend on a large scale, data are open and clear and because each client data it is consistent, i.e., Part client is ruined the technical characterstics such as the reliability that nor affects on data safety, particularly can effectively solve the strange human world Trust problem, thus this technology extend to it is all can be with digitized field, for example digital cash, pay clearance, numeral Bill, rights and interests prove, reference, government affairs service, medical records etc..
In existing house transaction system, the construction in ununified record house, history is overhauled, hires out and buys and sells, House Property is not apparent, thus occurs that the room two of owner one is sold or leased and has damaged house so that house buyer or rent Borrower has dust thrown into the eyes.
The content of the invention
It is an object of the invention to:Unified house historical record is formed, and the information after disclosure can not distort, it is ensured that A kind of accuracy of houseclearing and can not tamper, there is provided method of the generation house historical record based on block chain.
The technical solution adopted by the present invention is as follows:
A kind of method of the generation house historical record based on block chain, including following steps:
Step 1:The information in house is inserted, block chain is handled information, regenerates the first block number evidence in house, checking The legitimacy of first block number evidence, then the first block number evidence is stored in whole block chain;
Step 2:If house state changes, the concrete condition of state change is judged, if house carries out owner's change, Then enter step 4;Otherwise step 3 is entered;
Step 3:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are verified according to lastblock is referred to The data crossed;Modification information is further filled with, block chain is handled modification information, generates mth block data, verifies mth block data The validity of signature and the integrality of modification content, then by mth block data storage in whole block chain;
Step 4:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are verified according to lastblock is referred to The data crossed, owner B information is further filled with, block chain is handled owner B information, owner A changes For owner B, nth block data are obtained, nth block data are verified, again by nth block data storage in whole block after being verified In chain.
Specifically, the step 1 specifically includes following steps:
Step 1.1:Insert the information in house, including house initial information, mechanism A public keys and owner's A public keys;
Wherein, house initial information includes house data, house unique identifier, house are located, building structure and house Purposes;Mechanism A public keys are externally announced and can verify that;
Step 1.2:Information is calculated to generation cryptographic Hash, i.e. HASH [1] jointly, then HASH [1] carried out with mechanism A private keys Signature, mechanism A signature SIGNATURE [1] are obtained, information, HASH [1] and mechanism A signature SIGNATURE [1] are formed into house The first block number evidence, then by the first block number according to being stored in whole block chain;
Step 1.3:Then to first block number in house according to verifying, first block number in house is verified according to whether effective, If effectively, the first block number evidence in house has complete validity and legitimacy;
Specifically, the step 3 specifically includes following steps:
Step 3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are tested according to lastblock is referred to The data demonstrate,proved;Modification information is inserted, modification information is calculated into generation SUB_HASH [m], then with mechanism A private keys to SUB_HASH [m] is signed, and obtains mechanism A signature SUB_SIGNATURE [m], modification information, SUB_HASH [m] and mechanism A signatures SUB_ SIGNATURE [m] collectively constitutes modification content;
Step 3.2:Change content, owner's public key and M-1 block numbers and generate HASH [m] according to common calculate, then use institute People A private keys of having the right are signed to HASH [m], obtain owner A signature SIGNATURE [m], modification content, owner Public key, M-1 block numbers evidence, HASH [m] and owner A signature SIGNATURE [m] collectively constitute mth block data;
Step 3.3:Mth block data are verified, are stored at after being verified in whole block chain;
Specifically, the step 4 specifically includes following steps:
Step 4.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are tested according to lastblock is referred to The data demonstrate,proved;The legitimacy of N-1 block number evidences is verified, confirms N-1 block numbers according to legal;
Step 4.2:Modification information is inserted, modification information and owner A private keys are calculated into generation HASH [n] jointly, then HASH [n] is signed with owner's private key, obtains owner A signature SIGNATURE [n], by modification information, HASH [n] and owner A signature SIGNATURE [n] form nth block data;
Wherein, modification information includes change details and owner's B public keys;
Step 4.3:Nth block data are verified, are stored at after being verified in whole block chain.
Further, the verification process of step 1 includes following steps:
Step 1.3.1:To first block number in house according to starting to verify, the information inserted first is verified;
Step 1.3.2:With mechanism A public key decryptions mechanism A signature SIGNATURE [1] of first block number in, obtain in plain text Plaintext [1], then verify whether HASHs [1] of the plaintext plaintext [1] with the first block number in be consistent, if unanimously, Signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, and flow stops;
Step 1.3.3:The cryptographic Hash of information in calculation procedure 1, obtain HASH [1];Verify in HASH [1] and data Whether HASH [1] is consistent, if unanimously, the information inserted is not tampered with, into next step, otherwise information has been tampered, mark Information is fly-by-night, and flow stops;
Step 1.3.4:Body release A public key, the machine claimed in certifying organization A public key and information are obtained from trusted sources Whether structure A public key is consistent, if unanimously, it is mechanism A issues to represent information, into next step;Otherwise represent that information is usurped Change, label information is fly-by-night, and flow stops;
Step 1.3.5:First block number is according to complete effective, verification process completion.
Further, the verification process of step 3 includes following steps:
Step 3.3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are tested according to lastblock is referred to The data demonstrate,proved, whether checking M-1 block numbers evidence is complete effectively, if effectively, into next step, mth block number is represented if invalid According to also certain invalid, flow stopping;
Step 3.3.2:Owner A public key of the M-1 block numbers in is obtained, with owner's A public key decryptions ownership A People signature SIGNATUR [m], obtain plaintext plaintext [m], checking plaintext [m] and the HASH [m] in mth block data It is whether consistent, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, flow Stop;
Step 3.3.3:The complete content of M-1 block number evidences is calculated into cryptographic Hash together with the information of mth block data, obtained To info_hash [m], whether checking info_hash [m] and the HASH [m] in mth block data is consistent, if unanimously, information is not It is tampered, the signature of mth block data is effective, into next step;Otherwise information has been tampered, label information to be fly-by-night, Flow stops;
Step 3.3.4:Modification information, including mechanism A public keys and modification content are inserted, it is public with the mechanism A in mth block data Key decryption mechanism A signature SUB_SIGNATURE [m], obtain plaintext sub_plaintext [m], checking sub_plaintext [m] It is whether consistent with the SUB_HASH [n] in mth block data, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, Label information is fly-by-night, and flow stops;
Step 3.3.5:The cryptographic Hash of modification information is calculated, obtains sub_info_hash [m], verifies sub_info_hash Whether [m] be consistent with the SUB_HASH [n] in mth block data, if unanimously, then it represents that information is not tampered with, into next step;It is no Then information has been tampered, and label information is fly-by-night, and flow stops;
Step 3.3.6:Body release A public key, the machine claimed in certifying organization A public key and information are obtained from trusted sources Whether structure A public key is consistent, if unanimously, then it represents that information is mechanism A modifications, into next step;Otherwise representing information is not Mechanism A modifications, it has been tampered, label information is fly-by-night, and flow stops;
Step 3.3.7:Mth block data content has integrality.
Further, the verification process of the step 4 includes following steps:
Step 4.3.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are tested according to lastblock is referred to The data demonstrate,proved, whether checking N-1 block numbers evidence is complete effectively, if effectively, entering in next step;Otherwise nth block data are illustrated Also certain invalid, label information is fly-by-night, and flow stops;
Step 4.3.2:Nth block data are verified, owner A public key of the N-1 block numbers in is obtained first, uses Owner's A public key decryptions owner signs, and whether unanimously to obtain plaintext S [t], checking S [t] and the HASH [n] in data, If consistent, signature is effective, and into next step, it is invalid otherwise to sign, and label information is fly-by-night, and flow stops;
Step 4.3.3:The complete content of lastblock data is calculated into cryptographic Hash together with the information of current block data, obtained To HASH [t], whether checking HASH [t] and the HASH [n] in data is consistent, if unanimously, showing that information is not tampered with, entering Enter in next step, otherwise information is also tampered, and label information is fly-by-night, and flow stops;
Step 4.3.4:Owner's B public keys in current block data marked new owner B, owner's change Complete, by nth block data storage in whole block chain.
Specifically, the operation workflow of block chain includes following steps:
Step I:When once new modification produces, other nodes that can first be broadcast in block chain network;
Step II:The cryptographic Hash of not verified modification can be collected into block by each node, and each block may include 1 Secondary or multiple modification;
Step III:Each node all carries out verifying the legitimacy of modification, and knot is issued by the node for being initially completed checking Fruit;
Step IV:The block of oneself is broadcast to other all sections by the node that the node being initially completed obtains checking power Point;
Step V:Each node verification simultaneously links new block, and whether the modification included in other node verification blocks has Effect, after confirming the validity, is just put into block chain by this block;
Step VI:All nodes once receive new block, and the block do not verified also currently is just to be invalid, modification checking Complete, each node creates the checking calculating that a new block waits for next time.
Further, the step 1-3 points of processes and verification process for generation data block, the verification process and generation number Carried out jointly according to the process of block or verification process is individually carried out.
In summary, by adopting the above-described technical solution, the beneficial effects of the invention are as follows:
1. the present invention, because there is verification process, in the data in using block chain, the data being verified all are credible Appoint, in transmitting procedure have can not tamper, will not because of error of transmission or malice forge and carry out mistake on this basis Flow by mistake;
2. the present invention uses block chain, user can inquire about disclosed house historical information at any time, more convenient, also will not The personal information of housing ownership people is revealed, also with confidentiality while with publicity, mass data can be stored, without It is error-prone;
3. the verification process of the present invention can prevent mistake in time or the flow forged is carried out, can avoid because of transmitting procedure Error in data caused by error or artificial forgery, without because the data transfer of mistake causes whole database all mistakes;
4. the present invention can specify the owner in house, the behavior that owner is swindled can be effectively prevented, prevents from using Have dust thrown into the eyes at family;
5. the present invention forms the unified record of building management, can immediate inquiring house state, discern whether to hand over Easily.
Brief description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is first block number in house according to product process figure;
Fig. 2 is first piece of data verification flow chart in house;
Fig. 3 is the flow chart of third-party institution's modification record;
Fig. 4 is the flow chart for changing the legitimacy that data are verified in recording process;
Fig. 5 is the flow chart for changing the integrality of checking modification content in recording process;
Fig. 6 is the flow chart of owner's change;
Fig. 7 is the checking flow chart during change.
Embodiment
All features disclosed in this specification, or disclosed all methods or during the step of, except mutually exclusive Feature and/or step beyond, can combine in any way.
The present invention is elaborated below in conjunction with the accompanying drawings.
A kind of method of the generation house historical record based on block chain, including following steps:
Step 1:The information in house is inserted, block chain is handled information, regenerates the first block number evidence in house, checking The legitimacy of first block number evidence, then the first block number evidence is stored in whole block chain;
Step 2:If house state changes, the concrete condition of state change is judged, if house carries out owner's change, Then enter step 4;Otherwise step 3 is entered;
Step 3:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are verified according to lastblock is referred to The data crossed;Modification information is further filled with, block chain is handled modification information, generates mth block data, verifies mth block data The validity of signature and the integrality of modification content, then by mth block data storage in whole block chain;
Step 4:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are verified according to lastblock is referred to The data crossed, owner B information is further filled with, block chain is handled owner B information, owner A changes For owner B, nth block data are obtained, nth block data are verified, again by nth block data storage in whole block after being verified In chain.
Specifically, as shown in figure 1, the step 1 specifically includes following steps:
Step 1.1:Insert the information in house, including house initial information, mechanism A public keys and owner's A public keys;
Wherein, house initial information includes house data, house unique identifier, house are located, building structure and house Purposes;Mechanism A public keys are externally announced and can verify that;
Step 1.2:Information is calculated to generation cryptographic Hash, i.e. HASH [1] jointly, then HASH [1] carried out with mechanism A private keys Signature, mechanism A signature SIGNATURE [1] are obtained, information, HASH [1] and mechanism A signature SIGNATURE [1] are formed into house The first block number evidence, then by the first block number according to being stored in whole block chain;
Step 1.3:Then to first block number in house according to verifying, first block number in house is verified according to whether effective, If effectively, the first block number evidence in house has complete validity and legitimacy;
Specifically, as shown in figure 3, the step 3 specifically includes following steps:
Step 3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are tested according to lastblock is referred to The data demonstrate,proved;Modification information is inserted, modification information is calculated into generation SUB_HASH [m], then with mechanism A private keys to SUB_HASH [m] is signed, and obtains mechanism A signature SUB_SIGNATURE [m], modification information, SUB_HASH [m] and mechanism A signatures SUB_ SIGNATURE [m] collectively constitutes modification content;
Step 3.2:Change content, owner's public key and M-1 block numbers and generate HASH [m] according to common calculate, then use institute People A private keys of having the right are signed to HASH [m], obtain owner A signature SIGNATURE [m], modification content, owner Public key, M-1 block numbers evidence, HASH [m] and owner A signature SIGNATURE [m] collectively constitute mth block data;
Step 3.3:Mth block data are verified, are stored at after being verified in whole block chain;
Specifically, as shown in fig. 6, the step 4 specifically includes following steps:
Step 4.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are tested according to lastblock is referred to The data demonstrate,proved;The legitimacy of N-1 block number evidences is verified, confirms N-1 block numbers according to legal;
Step 4.2:Modification information is inserted, modification information and owner A private keys are calculated into generation HASH [n] jointly, then HASH [n] is signed with owner's private key, obtains owner A signature SIGNATURE [n], by modification information, HASH [n] and owner A signature SIGNATURE [n] form nth block data;
Wherein, modification information includes change details and owner's B public keys;
Step 4.3:Nth block data are verified, are stored at after being verified in whole block chain.
Further, as shown in Fig. 2 the verification process of step 1 includes following steps:
Step 1.3.1:To first block number in house according to starting to verify, the information inserted first is verified;
Step 1.3.2:With mechanism A public key decryptions mechanism A signature SIGNATURE [1] of first block number in, obtain in plain text Plaintext [1], then verify whether HASHs [1] of the plaintext plaintext [1] with the first block number in be consistent, if unanimously, Signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, and flow stops;
Step 1.3.3:The cryptographic Hash of information in calculation procedure 1, obtain HASH [1];Verify in HASH [1] and data Whether HASH [1] is consistent, if unanimously, the information inserted is not tampered with, into next step, otherwise information has been tampered, mark Information is fly-by-night, and flow stops;
Step 1.3.4:Body release A public key, the machine claimed in certifying organization A public key and information are obtained from trusted sources Whether structure A public key is consistent, if unanimously, it is mechanism A issues to represent information, into next step;Otherwise represent that information is usurped Change, label information is fly-by-night, and flow stops;
Step 1.3.5:First block number is according to complete effective, verification process completion.
Further, as shown in Figure 4, Figure 5, the verification process of step 3 includes following steps:
Step 3.3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are tested according to lastblock is referred to The data demonstrate,proved, whether checking M-1 block numbers evidence is complete effectively, if effectively, into next step, mth block number is represented if invalid According to also certain invalid, flow stopping;
Step 3.3.2:Owner A public key of the M-1 block numbers in is obtained, with owner's A public key decryptions ownership A People signature SIGNATUR [m], obtain plaintext plaintext [m], checking plaintext [m] and the HASH [m] in mth block data It is whether consistent, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, flow Stop;
Step 3.3.3:The complete content of M-1 block number evidences is calculated into cryptographic Hash together with the information of mth block data, obtained To info_hash [m], whether checking info_hash [m] and the HASH [m] in mth block data is consistent, if unanimously, information is not It is tampered, the signature of mth block data is effective, into next step;Otherwise information has been tampered, label information to be fly-by-night, Flow stops;
Step 3.3.4:Modification information, including mechanism A public keys and modification content are inserted, it is public with the mechanism A in mth block data Key decryption mechanism A signature SUB_SIGNATURE [m], obtain plaintext sub_plaintext [m], checking sub_plaintext [m] It is whether consistent with the SUB_HASH [n] in mth block data, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, Label information is fly-by-night, and flow stops;
Step 3.3.5:The cryptographic Hash of modification information is calculated, obtains sub_info_hash [m], verifies sub_info_hash Whether [m] be consistent with the SUB_HASH [n] in mth block data, if unanimously, then it represents that information is not tampered with, into next step;It is no Then information has been tampered, and label information is fly-by-night, and flow stops;
Step 3.3.6:Body release A public key, the machine claimed in certifying organization A public key and information are obtained from trusted sources Whether structure A public key is consistent, if unanimously, then it represents that information is mechanism A modifications, into next step;Otherwise representing information is not Mechanism A modifications, it has been tampered, label information is fly-by-night, and flow stops;
Step 3.3.7:Mth block data content has integrality.
Further, as shown in fig. 7, the verification process of the step 4 includes following steps:
Step 4.3.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are tested according to lastblock is referred to The data demonstrate,proved, whether checking N-1 block numbers evidence is complete effectively, if effectively, entering in next step;Otherwise nth block data are illustrated Also certain invalid, label information is fly-by-night, and flow stops;
Step 4.3.2:Nth block data are verified, owner A public key of the N-1 block numbers in is obtained first, uses Owner's A public key decryptions owner signs, and whether unanimously to obtain plaintext S [t], checking S [t] and the HASH [n] in data, If consistent, signature is effective, and into next step, it is invalid otherwise to sign, and label information is fly-by-night, and flow stops;
Step 4.3.3:The complete content of lastblock data is calculated into cryptographic Hash together with the information of current block data, obtained To HASH [t], whether checking HASH [t] and the HASH [n] in data is consistent, if unanimously, showing that information is not tampered with, entering Enter in next step, otherwise information is also tampered, and label information is fly-by-night, and flow stops;
Step 4.3.4:Owner's B public keys in current block data marked new owner B, owner's change Complete, by nth block data storage in whole block chain.
Specifically, the operation workflow of block chain includes following steps:
Step I:When once new modification produces, other nodes that can first be broadcast in block chain network;
Step II:The cryptographic Hash of not verified modification can be collected into block by each node, and each block may include 1 Secondary or multiple modification;
Step III:Each node all carries out verifying the legitimacy of modification, and knot is issued by the node for being initially completed checking Fruit;
Step IV:The block of oneself is broadcast to other all sections by the node that the node being initially completed obtains checking power Point;
Step V:Each node verification simultaneously links new block, and whether the modification included in other node verification blocks has Effect, after confirming the validity, is just put into block chain by this block;
Step VI:All nodes once receive new block, and the block do not verified also currently is just to be invalid, modification checking Complete, each node creates the checking calculating that a new block waits for next time.
Further, step 1, step 3 and the step 4 are divided into the process and verification process of generation data block, described to test The progress common with the process for generating data block of card process or verification process are individually carried out.

Claims (5)

  1. A kind of 1. method of the generation house historical record based on block chain, it is characterised in that including following steps:
    Step 1:The information in house is inserted, block chain is handled information, regenerates the first block number evidence in house, checking first The legitimacy of block number evidence, then the first block number evidence is stored in whole block chain;
    Step 2:If house state changes, the concrete condition of state change is judged, if house carries out owner's change, enter Enter step 4;Otherwise step 3 is entered;
    Step 3:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are authenticated according to lastblock progress is referred to Data;Modification information is further filled with, block chain is handled modification information, generates mth block data, verifies mth block data signature Validity and modification content integrality, then by mth block data storage in whole block chain;
    Step 4:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are authenticated according to lastblock progress is referred to Data, owner B information is further filled with, block chain is handled owner B information, and owner A is changed to institute Have the right people B, obtains nth block data, nth block data is verified, again by nth block data storage in whole block chain after being verified In.
  2. It is 2. according to claim 1, it is characterised in that the step 1 specifically includes following steps:
    Step 1.1:Insert the information in house, including house initial information, mechanism A public keys and owner's A public keys;
    Wherein, house initial information includes house data, house unique identifier, house are located, building structure and dwelling use; Mechanism A public keys are externally announced and can verify that;
    Step 1.2:Information is calculated to generation cryptographic Hash, i.e. HASH [1] jointly, then HASH [1] signed with mechanism A private keys Name, mechanism A signature SIGNATURE [1] are obtained, information, HASH [1] and mechanism A signature SIGNATURE [1] are formed into house First block number evidence, then the first block number evidence is stored in whole block chain;
    Step 1.3:Then to first block number in house according to verifying, first block number in house is verified according to whether effective, if having Imitate, then the first block number evidence in house has complete validity and legitimacy;
    The step 3 specifically includes following steps:
    Step 3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are authenticated according to lastblock progress is referred to Data;Modification information is inserted, modification information is calculated into generation SUB_HASH [m], then with mechanism A private keys to SUB_HASH [m] Signed, obtain mechanism A signature SUB_SIGNATURE [m], modification information, SUB_HASH [m] and mechanism A signatures SUB_ SIGNATURE [m] collectively constitutes modification content;
    Step 3.2:Change content, owner's public key and M-1 block numbers and generate HASH [m] according to common calculate, then use ownership People A private keys are signed to HASH [m], obtain owner A signature SIGNATURE [m], modification content, owner's public key, M-1 block numbers evidence, HASH [m] and owner A signature SIGNATURE [m] collectively constitute mth block data;
    Step 3.3:Mth block data are verified, are stored at after being verified in whole block chain;
    The step 4 specifically includes following steps:
    Step 4.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are authenticated according to lastblock progress is referred to Data;The legitimacy of N-1 block number evidences is verified, confirms N-1 block numbers according to legal;
    Step 4.2:Modification information is inserted, modification information and owner A private keys are calculated into generation HASH [n] jointly, then use institute People's private key of having the right is signed to HASH [n], owner A signature SIGNATURE [n] is obtained, by modification information, HASH [n] and owner A signature SIGNATURE [n] form nth block data;
    Wherein, modification information includes change details and owner's B public keys;
    Step 4.3:Nth block data are verified, are stored at after being verified in whole block chain.
  3. 3. according to claim 1 or 2, there is verification step step 1,3 and 4, it is characterised in that
    The verification process of step 1 includes following steps:
    Step 1.3.1:To first block number in house according to starting to verify, the information inserted first is verified;
    Step 1.3.2:With mechanism A public key decryptions mechanism A signature SIGNATURE [1] of first block number in, obtain in plain text Plaintext [1], then verify whether HASHs [1] of the plaintext plaintext [1] with the first block number in be consistent, if unanimously, Signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, and flow stops;
    Step 1.3.3:The cryptographic Hash of information in calculation procedure 1, obtain HASH [1];Verify HASH [1] and the HASH in data Whether [1] consistent, if unanimously, the information inserted is not tampered with, into next step, otherwise information has been tampered, label information To be fly-by-night, flow stops;
    Step 1.3.4:Body release A public key, the mechanism A claimed in certifying organization A public key and information are obtained from trusted sources Public key it is whether consistent, if unanimously, represent information be mechanism A issue, into next step;Otherwise represent that information has been tampered, Label information is fly-by-night, and flow stops;
    Step 1.3.5:First block number is according to complete effective, verification process completion.
    The verification process of step 3 includes following steps:
    Step 3.3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are authenticated according to lastblock progress is referred to Data, checking M-1 block numbers according to whether it is complete effectively, if effectively, into next step, mth block data are represented if invalid Certain invalid, flow stops;
    Step 3.3.2:Owner A public key of the M-1 block numbers in is obtained, is signed with owner's A public key decryptions ownership A people Name SIGNATUR [m], whether obtain plaintext plaintext [m], checking plaintext [m] and the HASH [m] in mth block data Unanimously, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, and flow stops;
    Step 3.3.3:The complete content of M-1 block number evidences is calculated into cryptographic Hash together with the information of mth block data, obtained Info_hash [m], whether checking info_hash [m] consistent with the HASH [m] in mth block data, if unanimously, information not by Distort, the signature of mth block data is effective, into next step;Otherwise information has been tampered, and label information is fly-by-night, stream Journey stops;
    Step 3.3.4:Modification information, including mechanism A public keys and modification content are inserted, with the mechanism A public key solutions in mth block data Close mechanism A signature SUB_SIGNATURE [m], obtains plaintext sub_plaintext [m], checking sub_plaintext [m] and the Whether SUB_HASH [n] of the M block numbers in be consistent, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, mark Information is fly-by-night, and flow stops;
    Step 3.3.5:The cryptographic Hash of modification information is calculated, obtains sub_info_hash [m], checking sub_info_hash [m] It is whether consistent with the SUB_HASH [n] in mth block data, if unanimously, then it represents that information is not tampered with, into next step;Otherwise Information has been tampered, and label information is fly-by-night, and flow stops;
    Step 3.3.6:Body release A public key, the mechanism A claimed in certifying organization A public key and information are obtained from trusted sources Public key it is whether consistent, if unanimously, then it represents that information be mechanism A modification, into next step;Otherwise represent that information is not mechanism A modifications, it has been tampered, label information is fly-by-night, and flow stops;
    Step 3.3.7:Mth block data content has integrality.
    The verification process of the step 4 includes following steps:
    Step 4.3.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are authenticated according to lastblock progress is referred to Data, checking N-1 block numbers according to whether it is complete effectively, if effectively, entering in next step;Otherwise nth block data also one are illustrated Fixed invalid, label information is fly-by-night, and flow stops;
    Step 4.3.2:Nth block data are verified, obtain owner A public key of the N-1 block numbers in first, with all People's A public key decryptions owner signature is weighed, whether unanimously to obtain plaintext S [t], checking S [t] and the HASH [n] in data, if one Cause, then signature is effective, and into next step, it is invalid otherwise to sign, and label information is fly-by-night, and flow stops;
    Step 4.3.3:The complete content of lastblock data is calculated into cryptographic Hash together with the information of current block data, obtained Whether HASH [t], checking HASH [t] and the HASH [n] in data are consistent, if unanimously, showing that information is not tampered with, enter In next step, otherwise information is also tampered, and label information is fly-by-night, and flow stops;
    Step 4.3.4:Owner's B public keys in current block data marked new owner B, and owner has changed Into by nth block data storage in whole block chain.
  4. 4. the operation workflow of block chain according to claim 1, it is characterised in that including following steps:
    Step I:When once new modification produces, other nodes that can first be broadcast in block chain network;
    Step II:The cryptographic Hash of not verified modification can be collected into block by each node, each block may include 1 time or Repeatedly modification;
    Step III:Each node all carries out verifying the legitimacy of modification, and result is issued by the node for being initially completed checking;
    Step IV:The block of oneself is broadcast to other all nodes by the node that the node being initially completed obtains checking power;
    Step V:Each node verification simultaneously links new block, and whether the modification included in other node verification blocks is effective, really After recognizing effectively, this block is just put into block chain;
    Step VI:All nodes once receive new block, and the block do not verified also currently just to be invalid, verified by modification Into each node creates the checking calculating that a new block waits for next time.
  5. It is 5. according to claim 1 or claim 2, it is characterised in that the step 1,3 and 4 be divided into generation data block process and Verification process, verification process progress common with the process for generating data block or verification process are individually carried out.
CN201710696827.4A 2017-08-15 2017-08-15 Method for generating house historical record based on block chain Active CN107506661B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710696827.4A CN107506661B (en) 2017-08-15 2017-08-15 Method for generating house historical record based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710696827.4A CN107506661B (en) 2017-08-15 2017-08-15 Method for generating house historical record based on block chain

Publications (2)

Publication Number Publication Date
CN107506661A true CN107506661A (en) 2017-12-22
CN107506661B CN107506661B (en) 2020-04-24

Family

ID=60691736

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710696827.4A Active CN107506661B (en) 2017-08-15 2017-08-15 Method for generating house historical record based on block chain

Country Status (1)

Country Link
CN (1) CN107506661B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108320160A (en) * 2018-02-02 2018-07-24 张超 Block catenary system, block common recognition method and apparatus
CN108428168A (en) * 2018-03-21 2018-08-21 王国良 A kind of house lease method and system based on block chain technology
CN108764901A (en) * 2018-05-16 2018-11-06 深圳市咕噜科技有限公司 Leasing method, system, equipment and storage medium based on block chain technology
CN108898289A (en) * 2018-06-13 2018-11-27 鹰投(上海)海洋科技发展有限公司 Project completion management system and its implementation based on block chain
CN108985908A (en) * 2018-09-10 2018-12-11 湖南智慧政务区块链科技有限公司 Real estate information sharing method, device, computer readable storage medium
CN109164780A (en) * 2018-11-22 2019-01-08 北京八分量信息科技有限公司 A kind of industrial field device control method based on edge calculations, apparatus and system
CN109408521A (en) * 2018-09-28 2019-03-01 上海擎沣投资控股有限公司 A kind of method and device thereof for more new block chain global data state
CN109493196A (en) * 2018-12-29 2019-03-19 杭州趣链科技有限公司 A kind of real estate based on block chain deposits card and method of commerce
CN109639625A (en) * 2018-10-17 2019-04-16 深圳市圆世科技有限责任公司 A kind of trusted content distributing network method based on block chain
CN109918874A (en) * 2019-03-14 2019-06-21 上海优扬新媒信息技术有限公司 A kind of material object information storage means and device, information searching method in kind and device
CN110311885A (en) * 2018-03-27 2019-10-08 美商远景科技有限公司 To online device and method with high safety
CN110659967A (en) * 2019-09-26 2020-01-07 腾讯科技(深圳)有限公司 House management method and device based on block chain
CN110826107A (en) * 2018-08-14 2020-02-21 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110896659A (en) * 2018-08-02 2020-03-20 刘卓 Data processing method, node, block chain network and virtual data carrier
CN111784339A (en) * 2020-05-19 2020-10-16 杭州亿房达科技有限公司 Commodity room project license file anti-counterfeiting and storage method based on block chain
CN112491551A (en) * 2018-06-29 2021-03-12 创新先进技术有限公司 Data verification method and device based on block chain and electronic equipment
WO2022267185A1 (en) * 2021-06-24 2022-12-29 安徽安时科技发展有限公司 Blockchain network-based secure and efficient item transaction method and system, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106485167A (en) * 2016-09-22 2017-03-08 中金云金融(北京)大数据科技股份有限公司 Credit record system and method based on block chain
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106485167A (en) * 2016-09-22 2017-03-08 中金云金融(北京)大数据科技股份有限公司 Credit record system and method based on block chain
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108320160A (en) * 2018-02-02 2018-07-24 张超 Block catenary system, block common recognition method and apparatus
CN108428168A (en) * 2018-03-21 2018-08-21 王国良 A kind of house lease method and system based on block chain technology
CN108428168B (en) * 2018-03-21 2021-03-02 王国良 House renting method and system based on block chain technology
CN110311885A (en) * 2018-03-27 2019-10-08 美商远景科技有限公司 To online device and method with high safety
CN110311885B (en) * 2018-03-27 2021-10-01 美商远景科技有限公司 Device and method for implementing safety connection
CN108764901A (en) * 2018-05-16 2018-11-06 深圳市咕噜科技有限公司 Leasing method, system, equipment and storage medium based on block chain technology
CN108898289A (en) * 2018-06-13 2018-11-27 鹰投(上海)海洋科技发展有限公司 Project completion management system and its implementation based on block chain
CN112491551B (en) * 2018-06-29 2023-01-20 创新先进技术有限公司 Data verification method and device based on block chain and electronic equipment
CN112491551A (en) * 2018-06-29 2021-03-12 创新先进技术有限公司 Data verification method and device based on block chain and electronic equipment
CN110896659A (en) * 2018-08-02 2020-03-20 刘卓 Data processing method, node, block chain network and virtual data carrier
CN110896659B (en) * 2018-08-02 2024-02-09 刘卓 Data processing method, node, blockchain network and virtual data carrier
CN110826107A (en) * 2018-08-14 2020-02-21 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110826107B (en) * 2018-08-14 2021-11-19 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN108985908A (en) * 2018-09-10 2018-12-11 湖南智慧政务区块链科技有限公司 Real estate information sharing method, device, computer readable storage medium
CN109408521A (en) * 2018-09-28 2019-03-01 上海擎沣投资控股有限公司 A kind of method and device thereof for more new block chain global data state
CN109639625A (en) * 2018-10-17 2019-04-16 深圳市圆世科技有限责任公司 A kind of trusted content distributing network method based on block chain
CN109164780A (en) * 2018-11-22 2019-01-08 北京八分量信息科技有限公司 A kind of industrial field device control method based on edge calculations, apparatus and system
CN109493196A (en) * 2018-12-29 2019-03-19 杭州趣链科技有限公司 A kind of real estate based on block chain deposits card and method of commerce
CN109918874A (en) * 2019-03-14 2019-06-21 上海优扬新媒信息技术有限公司 A kind of material object information storage means and device, information searching method in kind and device
CN110659967A (en) * 2019-09-26 2020-01-07 腾讯科技(深圳)有限公司 House management method and device based on block chain
CN110659967B (en) * 2019-09-26 2023-06-23 腾讯科技(深圳)有限公司 House management method and device based on block chain
CN111784339A (en) * 2020-05-19 2020-10-16 杭州亿房达科技有限公司 Commodity room project license file anti-counterfeiting and storage method based on block chain
WO2022267185A1 (en) * 2021-06-24 2022-12-29 安徽安时科技发展有限公司 Blockchain network-based secure and efficient item transaction method and system, and storage medium

Also Published As

Publication number Publication date
CN107506661B (en) 2020-04-24

Similar Documents

Publication Publication Date Title
CN107506661A (en) A kind of method of the generation house historical record based on block chain
CN109657450B (en) Method, device, medium, and electronic device for evaluation based on block chain
CN102484638B (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
CN106031086B (en) Method and system for generating device certificate and the validity for examining device certificate
AU755577B2 (en) Method for securing safety of electronic information
JP4061270B2 (en) Secure method and system for determining pricing and ensuring privacy
CN109118223A (en) For managing the method, apparatus and medium of electronic data in block chain
US6622247B1 (en) Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority
CN110400410A (en) A kind of electronic voting system
WO2002069557A1 (en) Information processing apparatus and method, and storage medium
JP4818664B2 (en) Device information transmission method, device information transmission device, device information transmission program
CN108197891A (en) A kind of electronic signature device and method based on block chain
JPH09507729A (en) Cryptographic system and method with key escrow function
CN104537293A (en) Authentication device and system
JP2012114907A (en) Method for generating barcode symbols for printing on passport, method for verifying authenticity and data integrity of passport, computer system for generating barcode symbols for printing on passport, and computer program for verifying authenticity and data integrity of passport
CN110113334B (en) Contract processing method and device based on block chain and storage medium
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
CN110493268A (en) A kind of data processing method and device based on block chain network
CN112035896B (en) Electronic contract evidence-storing system based on transaction mode
NL1032340C2 (en) System and method for digitally signing data files.
CN111612457A (en) Electronic voting method, device and storage medium based on block chain
CN103281180B (en) User is protected to access the bill generation method of privacy in a kind of network service
CN110502931A (en) A kind of internet arbitration and method for secret protection based on block chain
CN112583826A (en) Remote measurement method, monitoring method, device and system based on block chain
US10341314B2 (en) Method of security and verifiability of an electronic vote

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant