CN107682308A - The electronic evidence preservation system for Channel Technology of being dived based on block chain - Google Patents
The electronic evidence preservation system for Channel Technology of being dived based on block chain Download PDFInfo
- Publication number
- CN107682308A CN107682308A CN201710701265.8A CN201710701265A CN107682308A CN 107682308 A CN107682308 A CN 107682308A CN 201710701265 A CN201710701265 A CN 201710701265A CN 107682308 A CN107682308 A CN 107682308A
- Authority
- CN
- China
- Prior art keywords
- evidence
- audit
- key
- user
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Abstract
The invention discloses a kind of electronic evidence based on the latent Channel Technology of block chain to preserve system, including:Client, for carrying out offline collection and processing, online management and evidence obtaining work to user's electronic evidence;Service end, generate the existence proof of evidence;According to trustship and recovery of the station address to evidence on chain;Audit end, for corresponding transaction to be audited and generated on block chain to evidence on chain, audit certification is constructed, to safeguard the integrality of auditing result, ageing and non-repudiation;The network terminal, for the state synchronized and Real-Time Forensics to user's evidence on chain.The system can excavate the cryptography foundation that latent channel preserves electronic evidence and its auditing result among the block catenary system of maturation, realize the safe handling to electronic evidence and hidden preservation, so as to improve the security of electronic evidence preservation and ageing, effective reduction preservation cost.
Description
Technical field
The present invention relates to telecom information technical field, the electronic evidence of more particularly to a kind of Channel Technology of being dived based on block chain
Preservation system.
Background technology
With the development of information technology and the popularization of computer network, electronic evidence is as the activity of a large amount of e-commerces and net
The spin-off of network communication activity, the evidence obtaining in copyright protection, business right-safeguarding, virtual assets, mobile office etc. and phase
Close in division management and play more and more important role.Wherein, electronic evidence is mainly characterized by depending on digital media, and
With the convenience that collection is rapid, transmission is convenient, memory space is small, can reappear repeatedly so that electronic evidence can be in future dimension
Power and playing an important role in law-enforcing work, can use as evidence to prove relevant fact.
At present, most of electronic evidences preserve framework and are all based on third-party centralization cloud storage structure, except its institute
The service experience problems such as the high cost brought, high right-safeguarding barrier, complex operation, poor expandability, electronic evidence have uniqueness again
Fragility, show that it is easy to be tampered and replicated, gone wrong in abundant form conversion and failure so that electron number
According to security it is poor.Once the memory node of third party center framework is invaded, it will causes information leakage, electronic evidence failure
Or many serious the problem of such as be forged, and whether service provider credible, the mechanism of cooperation whether authority, its operation it is saturating
Bright property, normalization and legitimacy, the security of electronic evidence will all be impacted, moreover, the processing of multiple third-party institutions
Specification differs with the evidence obtaining interface good and the bad, and data not intercommunication and service it is incompatible, so as to establish at electronic evidence for judicial department
Reason index zone carrys out negative effect.
In the related art, the block chain technology of decentralization and its application are good with its since the appearance of bit coin
Information Security and the fashionable whole world of anonymity, and it coordinates common recognition mechanism to reach the application effect of " without trusting ", perfectly
Solves the trust problem under many sensitive scenes.However, the cost that electronic data is preserved in correlation technique is high and ageing
Difference, the use demand of most of user can not be met, had to be solved.
The content of the invention
It is contemplated that at least solves one of technical problem in correlation technique to a certain extent.
Therefore, it is an object of the invention to propose that a kind of electronic evidence based on the latent Channel Technology of block chain preserves system,
The system can improve the security of electronic data preservation and ageing, effective reduction preservation cost.
To reach above-mentioned purpose, the embodiment of the present invention proposes a kind of electronic evidence guarantor for Channel Technology of being dived based on block chain
Deposit system, including:Client, for carrying out offline collection and processing, online management and evidence obtaining work to user's electronic evidence;
Service end, for the certification to user, encryption key distribution and the management of online electronic evidence, and according to service type, to user
Evidence carries out latent channel coding and uploads to structure user's chain of evidence in block chain network, generates the existence proof of evidence;Root
According to trustship and recovery of the station address to evidence on chain;Audit end, for being audited to evidence on chain and being given birth on block chain
Into corresponding transaction, audit certification is constructed, to safeguard the integrality of auditing result, ageing and non-repudiation;And network
Terminal, for the state synchronized and Real-Time Forensics to user's evidence on chain.
The electronic evidence preservation system of the Channel Technology of being dived based on block chain of the embodiment of the present invention, can be demonstrate,proved user's electronics
Gather and handle offline according to carrying out, and according to service type, latent channel coding is carried out to user's evidence and uploads to block link network
User's chain of evidence is built on network, generates the existence proof of evidence, and excavates latent channel among the block catenary system of maturation and protects
The cryptography foundation of electronic evidence and its auditing result is deposited, the safe handling to electronic evidence and hidden preservation are realized, so as to carry
The security and ageing, effective reduction preservation cost that high electronic data preserves.
In addition, the electronic evidence according to the above embodiment of the present invention based on the latent Channel Technology of block chain preserves system and may be used also
With with following additional technical characteristic:
Further, in one embodiment of the invention, client be specifically used for obtain electronic evidence file or it is expected that
The instrument of evidence of calculation is made a summary safely, wherein, if the electronic evidence file submitted is source file, electronic evidence file is carried out
Safe summary processing, if electronic evidence includes multiple files, calculates multiple files by way of constructing Merkel tree
Total summary, to protect the overall integrality of source file, finally give the safety summary H of source file1, and by the phase of electronic evidence
Information is closed as a part for electronic evidence to participate in follow-up evidence obtaining and audit work, and all information are encoded and serialized
For the file using evi as suffix, and the safety summary H of file is calculated2, and safety is made a summary H2With safety summary H1Series connection,
Safety summary H series connection result is calculated by same safe digest algorithm3, as representing the final of electronic evidence integrality
Summary, in case being uploaded in follow-up work on the block chain network of maturation.
Further, in one embodiment of the invention, service end is specifically used for carrying out authentication to user, its
In, new user using the mailbox that possesses as ID, and sets user password K by submitting brief personal informationu, service end leads to
The mode for crossing email authentication coordinates user to complete registration, and by cipher key derivative algorithm to user password KuCarry out plus salt is breathed out
It is uncommon, according to different initial parameters, derive multiple key K with high intensity and randomnessx1, Kx2…Kxn, recognize as password
The foundation of card, it is stored in service client database;Then generated in client with audit end as generation seed for user data
The AES key of encryption, after user's successful registration, service end generates a pair of legal ripe block catenary system keys pair at random
(Sku,Pku), by private key SkuPass through corresponding user's derivative key KxiAfter encryption in deposit service client database, public key PkuTurn
It is changed to transaction address AddruAfter send to client, as station address, for aid in user supervise electronic evidence on convey feelings
Condition and construction chain of evidence;Wherein, after by server side authentication, offline evidence management can be carried out by service end, added offline
The electronic evidence added can be automatically imported in local evidence storehouse, and by the AES key encrypting storing of generation, to check that evidence is believed in detail
Breath, recover evidence secondary file, delete also not on the local evidence that is transmitted through, add new offline evidence, and proof data is standby
Part arrives high in the clouds.
Further, in one embodiment of the invention, may be selected to upload evidence to service end, selection needs what is uploaded
Offline evidence, deposit the service type of card and card request is deposited in transmission, client is by the auxiliary information Info of the evidence after encryptionevi, clothes
Service type information Infoserve, station address AddruAnd the final digest H of evidence3Sent by ssl protocol to service end, its
In, for evidence service on chain, service end is according to user password KuUser's derivative key KxiDecryption is with obtaining corresponding user
Location private key Sku, it is converted into the station address Addr sent behind normal address with clientuCompare, when this simultaneously, by service type
Information Infoserve, station address AddruAnd the final digest H of evidence3It is encoded to the standard transaction script of block catenary system
ScriptPbkey, and construct the contact between evidence transaction perpetuation of testimony summary, evidence and mark station address;For poly-
Close evidence service, service end by preset time final digest H on evidence3Include into syndication summary set { HiIn, to
Up to after timing node, service end produces the random vector H of same lengthrandAdd in set, and by building Merkel tree
Mode calculates the root summary H entirely gatheredroot, and service end by the root entirely gathered make a summary HrootWrite the transaction of block chain
In NullData channel scripts, addition input will completely polymerize with generating final complete transaction script after redeeming output
Summary set { HiIt is sent to each client for participating in request.
Further, in one embodiment of the invention, the multiple evidence transaction of user's evidence chain link and audit transactions,
Wherein, coordinate the modification of evidence operator, the contact between electronic evidence is represented in transverse direction, represented on longitudinal direction between electronic evidence
Audit relationship, the unified micro block chain currency output using user oriented address is as identifying, by loose block chain currency
Transaction is converted into user's evidence network, so that evidence on chain is managed and investigated.
Further, in one embodiment of the invention, service end merchandises the standard of generation script ScriptPbkey
It is converted into and merchandises and broadcasted to block chain network, while the index TxHash of transaction is sent to corresponding client, with
The transaction to broadcast carries out the confirmation monitoring of preset times afterwards, and the evidence that predetermined threshold value is more than or equal to for depth is merchandised, recognized
Fixed its can not be distorted, and record transaction and enter block time T accordingly, and the timestamp as carried evidence is sent to client
End, the existence proof of evidence is generated, and the state of evidence is uploaded according to the information real-time update of service end, and by merchandising
Index TxHash generation towards third party's block chain query interface link, to be browsed at any time by accessing third party's block chain
Device carries out the checking of real-time to all information.
Further, in one embodiment of the invention, audit end is specifically used for the public key being introduced into block chain network
System, the method generation proved by constructing key generation transaction can represent the block chain key of audit end identity, then pass through area
Block chain key is signed to auditing result file so that when user needs to audit to the legal effect of evidence on chain,
By stable open channel to submission evidence audit request, and the evidence source file and secondary file audited are passed through into safety
Channel is sent to audit end, to be verified according to information on chain to existence proof, if checking is errorless, to the auxiliary of evidence
Information InfoeviDecoded, and the authenticity of evidence is audited according to the content of evidence.
Further, in one embodiment of the invention, generation audit key comprises the following steps:Randomly generate n
New block chain currency key, and obtain root summary H according to n new block chain currency keysn_key, pass through authentication private key
Sk_auditMake a summary H to rootn_keySignature, and summary H is calculated to signature result Sigsig;Generate and broadcast a new block chain goods
Coin is merchandised, and H is included with onesigOp_Return output, after successfully being confirmed by block chain network, to service end send:
The index TxHash, all new public key set { Pk for producing audit key of transaction1,Pk2…PknAnd its root summary Hn_key, construction
Signature Sig;The summary H that service end is extracted according to the index TxHash of transactionsigIt is determined that signature Sig integrality, and verify label
Name signature Sig is for root summary Hn_keyValidity;Merkel tree is reconstructed using root summary Hn_keyProve n block chain currency
The integrality of key, with final certification newly it is caused n audit key legitimacy.
Further, in one embodiment of the invention, audit end is additionally operable to examine corresponding electronic evidence in generation
Count destination file FileauditAfterwards, choose audit key to one of { Skx, PkxSigned for auditing result file, it will sign
Name result is converted into Der coding forms Sigaudit, to construct the audit transactions towards block chain network, wherein, with a bag
Containing auditing result signature SigauditOp_Return outputs, auditing result integrality, ageing and could not be safeguarded with generation
The audit certification of recognizing property, and one flow to station address AddruxThe micro amount of money output, flowed to proof of identity and construct use
Family chain of evidence, audit end money are broadcasted to block chain network and monitor transaction, and by the audit public key Pk of selectionx, audit knot
The safety summary H of fruit fileauditTxHash is indexed with audit transactionsauditSend to service end, and complete auditing result is literary
Part is sent to relative users.
Further, in one embodiment of the invention, user establishes the chain of evidence of oneself, to pass through client or net
Network plug-in unit submits corresponding station address Addr to service endux, and corresponding block catenary system key is to (Sku,Pku) with extensive
Multiple or trustship chain of evidence, service end is to (Sku,Pku) validity and key to station address AddruxUniformity examined
Test, and to station address AddruxCorresponding transaction is tested according to the construction of evidence transaction, and the presence of synchronous corresponding evidence
Property prove and evidence chain structure.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
Substantially and it is readily appreciated that, wherein:
Fig. 1 is that the structure that system is preserved according to the electronic evidence based on the latent Channel Technology of block chain of the embodiment of the present invention is shown
It is intended to;
Fig. 2 is the knot that system is preserved according to the electronic evidence based on the latent Channel Technology of block chain of one embodiment of the invention
Structure schematic diagram;
Fig. 3 is the structural representation according to the workflow of the client of one embodiment of the invention;
Fig. 4 is the structural representation according to the workflow of the service end of one embodiment of the invention;
Fig. 5 is the structural representation according to the cipher key derivative model of one embodiment of the invention;
Fig. 6 is the structural representation merchandised according to the evidence of the generation existence proof of one embodiment of the invention;
Fig. 7 is the structural representation according to the handling process of the polymerization upload request of one embodiment of the invention;
Fig. 8 is the structural representation according to the building method of the chain of evidence of one embodiment of the invention;
Fig. 9 is the structural representation according to the workflow at the audit end of one embodiment of the invention;
Figure 10 is the structural representation according to the audit transactions of the generation audit certification of one embodiment of the invention;
Figure 11 is the structural representation according to the internet of the integral frame structure of one embodiment of the invention.
Embodiment
Embodiments of the invention are described below in detail, the example of embodiment is shown in the drawings, wherein identical from beginning to end
Or similar label represents same or similar element or the element with same or like function.Retouched below with reference to accompanying drawing
The embodiment stated is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
The electronic evidence for the Channel Technology of being dived based on block chain for describing to propose according to embodiments of the present invention with reference to the accompanying drawings
Preservation system.
Fig. 1 is that the electronic evidence based on the latent Channel Technology of block chain of the embodiment of the present invention preserves the structural representation of system
Figure.
As shown in figure 1, the electronic evidence for the Channel Technology that should be dived based on block chain is preserved system 10 and included:Client 100, clothes
Business end 200, audit end 300 and the network terminal 400.
Wherein, client 100 is used to carry out user's electronic evidence offline collection and processing, online management and evidence obtaining work
Make.Service end 200 is used for certification, encryption key distribution and the management of online electronic evidence to user, and according to service type, it is right
User's evidence carries out latent channel coding and uploads to structure user's chain of evidence in block chain network, generates the existence card of evidence
It is bright;According to trustship and recovery of the station address to evidence on chain.Audit end 300 is used to audit to evidence on chain and in block
Corresponding transaction is generated on chain, audit certification is constructed, to safeguard the integrality of auditing result, ageing and non-repudiation.Net
Network terminal 400 is used for state synchronized and Real-Time Forensics to user's evidence on chain.The system 10 of the embodiment of the present invention can carry
The security and ageing, effective reduction preservation cost that high electronic data preserves.
It is understood that the system 10 of the embodiment of the present invention among the block catenary system of maturation by excavating latent channel
Preserve the cryptography foundation of electronic evidence and its auditing result, realize safe handling of the user for held electronic evidence with it is hidden
Preserve, and give electronic evidence integrality, ageing and legal effect proof.System of the embodiment of the present invention 10 can provide
Convenient and efficient, transparent disclosed evidence obtaining interface and audit interface, complete Real-Time Forensics and solve electronics with perfection while checking
Trust problem in evidence preservation, and the design of service hierarchies is added, weigh the relation of system cost and efficiency, led to simultaneously
The efficiency of management of the constitution optimization of evidence chain structure electronic evidence is crossed, so as to improve the expansibility of system and data interchange
Property, and it is succinctly tight without losing, and the advantage of decentralization block chain network is sufficiently utilized, evading at traditional evidence
While the privacy and trust problem that are related in reason, time and the resources costs of related work are greatly reduced, so as to improve
The efficiency of security and access card during electronic evidence preservation.
Alternatively, as shown in Fig. 2 terminal device application that is to say that client 100 can be made up of four modules:Registration with
Authentication module 101, offline evidence processing module 102, online evidence management module 103 and checking and evidence obtaining module 104.
Wherein, registration and authentication module 101 are responsible for the registration of user and certification and logged in and system peace during system initialization
The generation of full key.Offline evidence processing module 102 is responsible for receiving the electronic evidence that user provides, and enters row information to electronic evidence
Collection and summary processing, the latent channel coding of a part and the generation of evident information file.Online evidence management module 103 is negative
Duty auxiliary user management submit electronic evidence, including but not limited to evidence additions and deletions, upload, synchronization, proof (existence,
Audit) work such as acquisition, secondary file recovery, chain of evidence management.Checking is responsible for auxiliary user with evidence obtaining module 104 and passes through evidence
Preservation and proof situation of the source file to evidence on chain are collected evidence and inquired about, and auditing result file is verified.
It should be noted that terminal device includes the office equipment such as PC, mobile phone, flat board, work station, terminal device
Using the application specific software for referring to write as platform using corresponding office equipment, the application software be responsible for be as client 100
What client provided electronic evidence deposits card and management service, including the electronic evidence submitted to client carries out information gathering and offline
Processing, auxiliary user's selection deposit card and service and carry out online evidence management and the evidence of upload, the proof of generation are taken
Card and checking work.
Further, in one embodiment of the invention, client 100 is specifically used for obtaining electronic evidence file or pre-
The instrument of evidence of calculating is made a summary safely, wherein, if the electronic evidence file submitted is source file, electronic evidence file is entered
The safe summary processing of row, if electronic evidence includes multiple files, calculates multiple files by way of constructing Merkel tree
Total summary, to protect the overall integrality of source file, finally give the safety summary H of source file1, and by electronic evidence
Relevant information as a part for electronic evidence to participate in follow-up evidence obtaining and audit work, and by all information coding and sequence
The file using evi as suffix is turned to, and the safety summary H of file is calculated2, and safety is made a summary H2With safety summary H1String
Connection, safety summary H series connection result is calculated by same safe digest algorithm3, as representing electronic evidence integrality
Final digest, in case being uploaded in follow-up work on the block chain network of maturation.
It is understood that as shown in figure 3, user needs to submit complete electronic evidence text by client 100 first
Part or the instrument of evidence of precomputation are made a summary safely, if submit be electronic evidence file in itself, offline evidence processing module 102
Safe summary processing can be carried out to the source file, if electronic evidence includes multiple files, offline evidence processing module 102 can lead to
Total summary that the mode for crossing construction Merkel tree calculates All Files finally gives source to protect the overall integrality of source file
The safety summary H of file1.Safe digest algorithm among these, which refers to, meets national commercial cipher management office standard, and nothing is touched
The Hash cryptographic algorithm of manufacture risk is hit, such as:SHA-2, SM3 etc..User needs to fill in submitted electronics card in client 100
According to relevant information, include but is not limited to:Evidence title, Evidence type, generation time, application method, evidence related personnel, carry
Friendship person's information, extra explanation etc., this partial information will participate in follow-up evidence obtaining after submitting as a part for electronic evidence
With audit work, user can selectively fill according to the desirability of information supplement, and all information finally filled in will
It can encode and sequence is turned to the file that " .evi " is suffix, be available for user locally downloading.The offline meeting of evidence processing module 102
Calculate the safety summary H of this document2, and by the summary H of acquisition1Series connection, eventually through same safe digest algorithm to result of connecting
Summary H is calculated3, so that as the final digest for representing electronic evidence integrality, in case being uploaded in follow-up work
Among ripe block chain network.As the workflow of the offline e evidence processing module 102 of client 100, its is all
Work is all carried out under local offline environment, has not only been ensured the integrality of electronic evidence but also has been maintained the personal secrets of user, mould
The design of block considers the characteristics of electronic evidence itself, is easy to user to supplement electronic evidence important information, and as
A part for electronic evidence, be advantageous to the realization of evidence legal effect.
It should be noted that service end 200 is used as service system, it is responsible for receiving the evidence service request of user and to act on behalf of its complete
Interacted into block catenary system to complete the preservation of electronic evidence, while the flow for supervising audit end 300 audit transactions is correct
Property and to user's sync key information, different from traditional service organization, the service end 200 in the system is not related to any sensitivity
The processing of information, the authenticity of all service results can be verified by third-party block chain browser in real time, pole
Degree alleviates the data safety pressure and trust pressure that traditional mechanism faces.As shown in Fig. 2 service end 200 can be by following six
Individual module composition:Authentication module 201, latent channel coding module 202, transaction modules 203, network communication module 204, expense
Count and collect module 205 and data memory module 206.
Wherein, authentication module 201 is responsible for coordinating the user's registration request of data server processing, point of user key
The authentication work of hair and user and auditing bodies.Latent channel coding module 202 is responsible for according to service type to user's
The information such as the evidence final digest that is included in evidence upload request, chain of evidence relation information, station address carry out latent channel coding,
It is converted into the standard transaction script of specification.Transaction modules 203 are transformed by block chain wallet, by the transaction script comprising evident information
Issued and monitored in the form of transaction and enter block message with synchronous relationship trading, be further converted to existence proof and audit
Prove.Network communication module 204 is responsible for service end 200 and client 100 and the communication work at end 300 of auditing, including data
Synchronous and request processing.Expense counts the expense being responsible for collecting module 205 required for statistics realizes user's request issue transaction
Collected with and by client 100 to user.Data memory module 206 is deployed on data server, for preserving each mould
Critical data needed for block work.
Further, in one embodiment of the invention, service end 200 is specifically used for carrying out authentication to user,
Wherein, new user is by submitting brief personal information, using the mailbox that possesses as ID, and sets user password Ku, service end
200 coordinate user to complete registration by way of email authentication, and by cipher key derivative algorithm to user password KuAdded
Salt Hash, according to different initial parameters, derive multiple key K with high intensity and randomnessx1, Kx2…Kxn, as mouth
The foundation of certification is made, is stored in the database of service end 200;In client 100 with audit end 300 then as generation seed generation
For the AES key of ciphering user data, after user's successful registration, service end 200 generates a pair of legal maturation zones at random
Block catenary system key is to (Sku,Pku), by private key SkuPass through corresponding user's derivative key KxiService end 200 is stored in after encryption to count
According in storehouse, public key PkuBe converted to transaction address AddruAfter send to client 100, as station address, for aiding in user to supervise
Superintend and direct the upload situation and construction chain of evidence of electronic evidence.Wherein, after by the certification of service end 200, service end 200 can be passed through
Offline evidence management is carried out, the electronic evidence added offline can be automatically imported in local evidence storehouse, and the AES key of generation is added
Close preservation, to check evidence details, recover evidence secondary file, delete also not on the local evidence that is transmitted through, add new
Offline evidence, and proof data backup to high in the clouds.
It is to be appreciated that as shown in figure 4, user is completed after offline e evidence is handled by client 100, it is necessary to logical
Cross registration log-in module and carry out authentication to service end 200, new user is by submitting brief personal information, with the postal possessed
Case is as ID, and the user password K for setting the numerals of 8-12 positions, symbol, letter to mixu, service end 200 inquire about mailbox after pass through
The mode of mail checking coordinates user to complete registration.To ensure the security of system, evade what weak passwurd may be brought to system
Security risk, user password is handled using the method shown in Fig. 5, first by the cipher key derivative algorithm of safety (such as
Argon2, bcrypt, scrypt etc.) to user password KuCarry out adding salt Hash, according to different initial parameters, derive multiple
Key K with high intensity and randomnessx1, Kx2…Kxn, the key is used as mouth in the authentication module 201 of service end 200
The foundation of certification is made, and is stored in the database of service end 200, and in client 100 with being used as generation seed in audit end 300
The AES key for ciphering user data is generated, so as to improve the security of whole system, reduces bypass attack and sudden and violent
The threat to system that power cracks.After first time successful registration, the transaction modules 203 of service end 200 can generate user at random
A pair of legal ripe block catenary system keys are to (Sku,Pku), by its private key SkuPass through corresponding user's derivative key KxiAdd
After close in the deposit database of service end 200, public key PkuBe converted to transaction address AddruSend to the client 100 of user, make afterwards
For station address, for aiding in user to supervise the upload situation and construction chain of evidence of electronic evidence.User logs in and passes through clothes
It is engaged in after the certification of end 200, can be to carry out offline evidence management, Yong Huli by the online evidence management module 103 of client 100
Line addition electronic evidence can be automatically imported in the local evidence storehouse of user, related data can in it is above-mentioned caused by AES
Key encrypting storing, user can select to check evidence details, recover evidence secondary file, delete also not on the sheet that is transmitted through
Ground evidence, new offline evidence is added, can also select proof data backuping to high in the clouds.
Further, in one embodiment of the invention, it may be selected to upload evidence to service end 200, select to need
The offline evidence that passes, deposit the service type of card and card request is deposited in transmission, client 100 is by the auxiliary information of the evidence after encryption
Infoevi, service type information Infoserve, station address AddruAnd the final digest H of evidence3By ssl protocol send to
Service end 200, wherein, for evidence service on chain, service end 200 is according to user password KuUser's derivative key KxiDecrypt
To corresponding station address private key Sku, it is converted into the station address Addr sent behind normal address with client 100uCompare, when
When identical, by service type information Infoserve, station address AddruAnd the final digest H of evidence3It is encoded to block linkwork
The standard transaction script ScriptPbkey of system, and construct the contact between evidence transaction perpetuation of testimony summary, evidence and mark
Station address;For polymerizeing evidence service, service end 200 by preset time final digest H on evidence3Include into polymerization
Summary set { HiIn, after arrival time node, service end 200 produces the random vector H of same lengthrandAdd in set,
And the root summary H entirely gathered is calculated by way of building Merkel treeroot, and the root that service end 200 will entirely be gathered
Make a summary HrootWrite in the NullData channel scripts of block chain transaction, addition input generates final complete after being exported with redemption
Merchandise script, and by complete syndication summary set { HiIt is sent to each client 100 for participating in request.
It is understood that user can select to upload evidence to service end 200, its detailed process is as follows:User selects
The offline evidence uploaded is needed, the service type of card is deposited in selection, can be sent and be deposited card request, client 100 will be by after encryption
Evidence auxiliary information Infoevi, service type information Infoserve, station address AddruAnd the final digest H of evidence3
Sent by ssl protocol to service end 200.Wherein, the service type for depositing card is divided into evidence service and polymerization evidence clothes on chain
It is engaged in two major classes.If the service type of user's selection is evidence service on chain, service end 200 first can be according to password KuDerivative
Key KxiDecryption obtains corresponding station address private key Sku, it is converted into the station address sent behind normal address with client 100
AddruCompare, by latent channel coding module 202 by Info if identicalserve、Addru、H3It is encoded to the mark of block catenary system
Quasi- transaction script ScriptPbkey, by taking bit coin as an example, according to the finding of table 1, by cost, efficiency, security, thoroughly
Bright property is many to be considered, the channel that framework final choice Op_Return output scripts are made a summary as perpetuation of testimony;LockTime
Channel of (locking time) channel as coding evidence operator;EcPubkey (bit coin public key) channel is as mark user
The channel of location.Wherein, evidence operator is to represent social property relation, Evidence type between the service type of evidence, evidence
A set of coding so that framework can with the more complicated Evidence type of contained structure and expression evidence between contact, such as
Version relationship, inheritance etc., so as to improve the ductility of framework.Ultimately constructed transaction form as shown in fig. 6, its
In, first input and the output of transaction all come from the existing address of the wallet of service end 200, and incident take is handed over for providing
With;The bit coin of the micro amount of money is output on station address by second output, construction and user's evidence for chain of evidence
Management;3rd exports the final digest H for then saving evidence3, for generating the existence proof of evidence;If upload
Fresh evidence is associated with existing chain of evidence, then the micro ratio of station address is output in the presence of second input reference evidence chain end
Special coin output.Polymerization evidence service request for user, the handling process of service end 200 is as shown in fig. 7, the meeting of service end 200
By time block by certain time final digest H on evidence3Include into syndication summary set { HiIn, when reaching
After intermediate node, service end 200 can produce the random vector H of same length firstrandAdd in set, then by building Merck
The mode of your tree calculates the root summary H entirely gatheredroot, this integrality for maintaining and gathering all sub- evidences of making a summary, service end
200 latent channel coding module 202 can be by HrootWrite in the NullData channel scripts of block chain transaction, addition input is with redeeming
Final complete transaction script will be generated by transaction modules 203 after feeding back out, and will complete { HiIt is sent to each participation
The client 100 of request.The relation of system cost and efficiency is weighed compared to evidence service on chain, the service, has sacrificed one
The evidence for entering block efficiency, collecting some users more of half-proof transaction, it is same by once merchandising by the way of evidence is polymerize
When give multiple evidence existence prooves, in theory, as long as user be ready wait time enough, the cost of service can be by nothing
Limit reduces.The evidence of this lightweight preserves service and brings more abundant user's selection and low cost, high clothes for system
The advantage for handling capacity of being engaged in.
It should be noted that table 1 is to block chain network the most ripe now --- each latent channel of the latent channel of bit coin system
Each latent characteristic of channel statistics of the statistics of characteristic and analysis, i.e. the bit coin of table 1 and analytical table.
Table 1
Latent channel name | Channel capacity | Whether disclose | Key safety | Transaction every time includes | Estimated cost |
Op_Return | 80 | It is | Without influence | 1 | 6020 |
EcPubkey | 32 | It is | By force | n | 10190 |
EcPrikey | 32 | It is no | It is weak | n | 4760 |
Tx Amount | 3 | It is | Without influence | n | 47600 |
LockTime | 3 | It is | Without influence | 1 | — |
Further, in one embodiment of the invention, the multiple evidence transaction of user's evidence chain link and audit transactions,
Wherein, coordinate the modification of evidence operator, the contact between electronic evidence is represented in transverse direction, represented on longitudinal direction between electronic evidence
Audit relationship, the unified micro block chain currency output using user oriented address is as identifying, by loose block chain currency
Transaction is converted into user's evidence network, so that evidence on chain is managed and investigated.
It is to be appreciated that construct chain of evidence form as shown in figure 8, wherein, coordinate the modification of evidence operator, in transverse direction
The contact between electronic evidence is represented, the audit relationship between electronic evidence is represented on longitudinal direction, it is unified with user oriented address
Loose block chain moneytary operations is converted into compact-sized user's evidence net by micro block chain currency output as mark
Network, user and judicial department is facilitated to be managed and investigate evidence on chain;The evidence network of construction has good number simultaneously
According to interconnectivity and stability, there may be multiple service ends 200 in different geographical while work, evidence on same all chains of user
Importing only need to retrieve corresponding station address in block chain network, import convenient and asking in the absence of data compatibility
Topic;Even if the worst situation such as collapse of presence service end 200, still effective and data recovery is very square for all proofs occurred
Just, user does not have any loss.
Alternatively, in one embodiment of the invention, user establishes the chain of evidence of oneself, with by client 100 or
Network plug-in submits corresponding station address Addr to service end 200ux, and corresponding block catenary system key is to (Sku,
Pku) with recovery or trustship chain of evidence, service end 200 is to (Sku,Pku) validity and key to station address AddruxOne
Cause property is tested, and to station address AddruxCorresponding transaction is tested according to the construction of evidence transaction, and synchronous corresponding
The existence proof and evidence chain structure of evidence.
It is to be appreciated that user can establish the chain of evidence of oneself by block chain wallet, then by client 100 or
Network plug-in submits corresponding station address Addr to service end 200ux, and corresponding block catenary system key is to (Sku,
Pku) first can be to (Sk with recovery/trustship chain of evidence, service end 200u,Pku) validity and key to station address
AddruxUniformity test, then by transaction modules 203 to block chain network station address AddruxCorresponding transaction
The construction merchandised according to evidence is tested, and the existence proof and evidence chain structure of synchronous corresponding evidence, trustship/recovery
Evidence evidence obtaining, audit, synchronous service can be equally obtained according to above step.
Further, in one embodiment of the invention, service end 200 merchandises the standard of generation script
ScriptPbkey, which is converted into, to be merchandised and is broadcasted to block chain network, while the index TxHash of transaction is sent to corresponding
Client 100, then to broadcast transaction carry out preset times confirmation monitor, be more than or equal to predetermined threshold value for depth
Evidence transaction, assert that it can not be distorted, and record transaction accordingly enter block time T, the time as carried evidence
Stamp is sent to client 100, generates the existence proof of evidence, and uploaded according to the information real-time update of service end 200
The state of evidence, and the index TxHash by merchandising generates the link towards third party's block chain query interface, to pass through at any time
Access the checking that third party's block chain browser carries out real-time to all information.
Understanding can be seen, the standard transaction script of generation is converted into transaction and to area by the wallet module of service end 200
Block chain network is broadcasted, while the index TxHash of transaction is sent to corresponding client 100, and subsequent wallet module is to wide
The confirmation that the transaction broadcast carries out preset times is monitored, such as carries out the monitoring of 3 confirmations, is more than or equal to default valve for depth
The evidence transaction of value, such as evidence of the depth more than or equal to 3 are merchandised, and system assert that it can not be distorted, and records transaction
Enter block time T accordingly, the timestamp as carried evidence sends the existence card for client 100, ultimately generating evidence
It is bright.Online evidence management module 103 can upload the state of evidence according to the information real-time update of service end 200, and by merchandising
TxHash generations are indexed towards the link of third party's block chain query interface, user can be at any time by accessing third party's block chain
Browser carries out the checking of real-time to all information, and any chance done evil, the transparent peace of whole process is not present in service end 200
Entirely and without trusting.Wherein, if the wallet module of service end 200 detects that evidence transaction is handed over caused by signature script is tampered
Ductile sex chromosome mosaicism, then it can be upgraded in time to client 100 and finally enter the index TxHash of block transactionnew, and transfer to monitor the friendship
Easily, because the output script of transaction can not be tampered, so will not have influence for security in itself on service.Need what is illustrated
It is that those skilled in the art can set according to actual conditions to preset times and pre-set threshold value, does not do herein specific
Limit.
Alternatively, as shown in Fig. 2 audit end 300 can be made up of following five modules:Log-in module 301, audit key
Management module 302, evidence obtaining module 303, Audit Module 304 and data memory module 305.
Wherein, log-in module 301 be responsible for auditing bodies establish with the communication of service end 200, completion log in work with it is initial
Change the generation of safe key.Key management module 302 of auditing is responsible for the generation and management of audit signature key.Evidence obtaining module 303
It is responsible for that user's evidence on chain is collected evidence and verified.Audit Module 304 is transformed by block chain wallet, is responsible for according to evidence
Auditing result cryptography processing and be published in the form of transaction on block chain, construct audit certification, and synchronous phase
Close transaction enters block message.Data memory module 304 is deployed on the data server of auditing bodies, for preserving modules
Critical data needed for work.
It is to be appreciated that user can be by collect evidence module 303 or the plug-in unit of the network terminal 400 for arbitrary electronics on chain
Evidence is collected evidence, and concrete operations are as follows:User submits complete evidence source file and evidence by terminal or client 100
Secondary file, the system 10 of the embodiment of the present invention calculate the final digest H3 of evidence by way of and sent out by safe lane
Deliver to service end 200, service end 200 retrieves the summary of evidence in database, and by the transaction index of corresponding evidence, it is credible when
Between stamp, chain of evidence construction situation, evidence audit situation and the proof of acquirement return to user, equally, user can be by the
Legal agency of the accuracy of these information of tripartite's block chain browser authentication with audit qualification is by end 300 of auditing on chain
The electronic evidence for having obtained existence proof is audited, and specific workflow is as shown in figure 9, qualified judiciary leads to
Cross and disclose the application that channel submits evidence on audit chain to service end 200, complete qualifications file, the base of mechanism need to be submitted
This information, traditional PKI public keys P for authenticationk_auditAnd stable open contact channel (website, media), service
The 200 pairs of information above in end are audited, audit its qualification and information above it is errorless after information above is disclosed, and assisted by SSL
View establishes the safe lane of two-way authentication with corresponding audit end 300, and auditing bodies, need to be according to the password of agreement in each office
By auditing, the certification of end 300 logs in.
Further, in one embodiment of the invention, audit end 300 is specifically used for the public affairs being introduced into block chain network
Key system, the method generation proved by constructing key generation transaction can represent the block chain key of the audit identity of end 300, then lead to
Cross block chain key to sign to auditing result file so that when user needs to audit to the legal effect of evidence on chain
When, by stable open channel to submission evidence audit request, and the evidence source file and secondary file audited are passed through
Safe lane is sent to audit end 300, to be verified according to information on chain to existence proof, if checking is errorless, is verified
According to auxiliary information InfoeviDecoded, and the authenticity of evidence is audited according to the content of evidence.
Wherein, in one embodiment of the invention, generation audit key comprises the following steps:It is new to randomly generate n
Block chain currency key, and obtain root summary H according to n new block chain currency keysn_key, pass through authentication private key
Sk_auditMake a summary H to rootn_keySignature, and summary H is calculated to signature result Sigsig;Generate and broadcast a new block chain goods
Coin is merchandised, and H is included with onesigOp_Return output, after successfully being confirmed by block chain network, sent out to service end 200
Send:The index TxHash, all new public key set { Pk for producing audit key of transaction1,Pk2…PknAnd its root summary Hn_key,
The signature Sig of construction;The summary H that service end 200 is extracted according to the index TxHash of transactionsigIt is determined that signature Sig integrality,
And verify signature signature Sig for root summary Hn_keyValidity;Merkel tree is reconstructed using root summary Hn_keyProve n area
The integrality of block chain currency key, with final certification newly it is caused n audit key legitimacy.
It is to be appreciated that in view of need to prove the non-repudiation of auditing result on chain, so introducing block chain network
In public key cryptosyst, generation can represent audit the identity of end 300 block chain key, then by these keys to auditing result text
Part is signed, and the generating process for key of auditing is as follows:1. audit key management module 302 randomly generates n new block chains
Currency key, and by the public key { Pk of this n key1,Pk2…PknTried to achieve by way of constructing Merkel tree and can represent key
The root summary H of integralityn_key, auditing bodies passes through the authentication private key S in traditional PKIk_auditTo Hn_keySignature, using peace
Full digest algorithm calculates summary H to signature result Sigsig.2. the audit wallet of end 300 generates and broadcasts a new block chain goods
Coin is merchandised, and H is included with onesigOp_Return output, after the transaction is successfully confirmed by block chain network, audit end
300 send to service end 200:The index TxHash, all new public key set { Pk for producing audit key of the transaction1,Pk2…
PknAnd its root summary Hn_key, the signature Sig of construction.3. service end 200 according to TxHash from this enter block merchandise in extract pluck
Want HsigDetermine Sig integrality;Pass through Pk_auditChecking signature Sig is for Hn_keyValidity;Merkel tree is reconstructed to utilize
Hn_keyProve the integrality of n block chain currency key.By said process final certification newly it is caused n audit key conjunction
Method, it, which is signed, can represent the identity of auditing bodies.4. the data memory module 206 of service end 200 will merchandise and index TxHash,
The new public key set { P for producing audit keyk1,Pk2…PknAnd signature Sig storages, and be supplied to and any receive the audit machine
The user of structure service, the legitimacy of audit key can be independently differentiated according to the Transaction Information on block chain.
The system 10 of the embodiment of the present invention can be by way of constructing and proving by auditing bodies conventional public-key infrastructure
In cipher key function be transplanted on the transaction key of block catenary system, assign the function of its authentication, for after for examine
Meter destination file construction non-repudiation proves to establish basis.The system 10 of the embodiment of the present invention can avoid multiple audit machines
Structure is caused to be based on block chain network public key using checking complexity and data interchange problem caused by signature system disunity
The identity authorization system interface of system in itself is unified and rigorous, is easy to flexible allocation and the renewal of key, all proof procedures
All disclosed in block chain moneytary operations network, facilitate user's individual authentication and masses to exercise supervision, there is well transparent
Property and versatility.When user needs to audit to the legal effect of evidence on chain, need to by stable open channel to
Evidence audit request is submitted by corresponding judicial department, and the evidence source file and secondary file audited are sent out by safe lane
Audit end 300 is delivered to, auditing bodies is entered by the flow for module 303 of collecting evidence according to information on chain to the existence proof of the evidence
Row checking, if checking is errorless, auditing bodies is then by Audit Module 304 to evidence auxiliary information InfoeviDecoded, and pressed
The authenticity of evidence is audited according to the content of evidence.
Alternatively, in one embodiment of the invention, audit end 300 is additionally operable to examine corresponding electronic evidence in generation
Count destination file FileauditAfterwards, choose audit key to one of { Skx, PkxSigned for auditing result file, it will sign
As a result it is converted into Der coding forms Sigaudit, to construct the audit transactions towards block chain network, wherein, included with one
Auditing result signature SigauditOp_Return outputs, auditing result integrality, ageing and undeniable is safeguarded with generation
The audit certification of property, and one flow to station address AddruxThe micro amount of money output, with proof of identity flow direction and structuring user's
Chain of evidence, the audit money of end 300 are broadcasted to block chain network and monitor transaction, and by the audit public key P of selectionkx, audit knot
The safety summary H of fruit fileauditTxHash is indexed with audit transactionsauditSend to service end 200, and the knot that will completely audit
Fruit file is sent to relative users.
It is understood that auditing result file File of the auditing bodies in generation to corresponding electronic evidenceauditAfterwards, pass through
Audit Module 304 choose the audit key through generation to one of { Skx, PkxSigned for auditing result file, it will sign
As a result it is converted into Der coding forms Sigaudit, wallet module according to Figure 10 structure construction towards block chain network audit hand over
Easily, wherein including auditing result signature Sig with oneauditOp_Return output, for generate safeguard that auditing result is complete
Property, ageing and non-repudiation audit certification, and one flow to station address AddruxThe micro amount of money output, use
In proof of identity flow direction and structuring user's chain of evidence.The audit wallet module of end 300 is broadcasted to block chain network and monitors the transaction,
And by the audit public key P of selectionkx, the safety summary H of auditing result fileaudit, audit transactions index TxHashauditHair
Service end 200 is delivered to, complete auditing result file is sent to relative users.The transaction modules 203 of service end 200 are according to index
TxHashauditCorresponding audit transactions are obtained from block chain network, and normalization, the validity of signature to its structure are carried out
Detection, if detection passes through, corresponding user's chain of evidence is updated, evidence transaction is monitored, and pass through data memory module
By Haudit, TxHashaudit, PkxStorage.User is when client 100 logs in synchronous evident information next time, it will more fresh evidence
Audit information, including audit transactions index TxHashaudit, audit public key Pkx, audit transactions confirmation situation, machine of auditing
The essential information of structure, audit key generation transaction index TxHashkey, and the public key set { P of agency audit keyk1,
Pk2…Pkn, auditing bodies PKI public keys Pk_audit.User can be by client 100 to the key P that auditskxValidity carry out
Checking, and according to audit transactions information on existing auditing result file and chain, verify auditing result integrality, it is ageing with
Non-repudiation, so as to realize the audit certification to electronic evidence.
That is, the system 10 of the embodiment of the present invention generates audit certification, card to electronic evidence by block catenary system
Understand electronic evidence legal effect, solve under traditional system, multiple auditing bodies data interchanges are poor, specification is chaotic, scarce
Weary unified interface, the problems such as information is not transparent enough.The system 10 of the embodiment of the present invention have ease for use, security, the transparency with
And the advantages of data interchange, in implementation process, service side, user, auditing bodies can mutually be supervised by block chain network
Superintend and direct, so as to improve the security of electronic evidence preservation, while personal secrets can also be protected.Service end 200 is only used as supervising
With the platform of information transmission, without contacting specific auditing result file and the instrument of evidence.The process improves auditing bodies
Office efficiency, while reduce right-safeguarding cost of the user to electronic evidence, just, unified put down established for the audit of evidence
Platform.
Alternatively, the network terminal 400 include computer, smart mobile phone, Intelligent flat etc. all can networked devices, the network terminal
400 plug-in units refer to the browser plug-in write based on particular browser, or special application program, and the network terminal 400 is inserted
Part includes latent channel decoding module, and has packed the open query interface of block chain application, to realize the evidence obtaining of real-time online
And checking work, user can obtain evidence by submitting corresponding complete electronic evidence source file and evidence secondary file
Synchronous situation, existence proof, audit certification and chain of evidence construction situation, auditing result file can also be tested
Card.
It should be noted that the system 10 of the embodiment of the present invention is a kind of low cost, the lightweight electronics card of high security
According to the system of preservation, the system 10 of the embodiment of the present invention is participated in by client 100, service end 200,300 3 kinds of end of audit entity end,
And Real-Time Forensics, checking and the polling routine of browser end are provided, by the interactive collaboration at three ends in existing ripe block
Efficient electronic evidence protection and an audit platform comprehensively are built on chain network.The system 10 of the embodiment of the present invention is combined into
The characteristics of ripe block chain network, and on the basis of existence proof scheme, fully consider the legal effect of electronic evidence, can test
Card property, the trackability of auditing result, the transparency of operation, the key features such as anti-collision of system.Coordinate latent Channel Technology
Use, greatly reduce system deposits card cost, and original chain transaction in block chain is converted into chain of evidence, compatible more multiple
Miscellaneous evidence structure, the service ability of application is enriched, final design, which has gone out a set of low cost, high security, operation transparent, to be looked into
Lightweight electronic evidence preserve framework.The system 10 of the embodiment of the present invention is brought more transparent credible, safe and efficient for user
Electronic evidence management tool, while be advantageous to judicial department and establish more specifical electronic evidence processing standard, entangled in right-safeguarding
Confusingly take place frequently, today that public credibility glides, the system 10 of the embodiment of the present invention has good prospect and social value.It is of the invention real
The system 10 for applying example realizes the lightweight electronic evidence preservation framework that a kind of low cost, high security, operation transparent can be looked into, and utilizes
The data storage environment of stable safety in ripe decentralization block chain application, the natural, timestamp mechanism that can not forge, side
Just real-time query interface, build the preservation system of a set of hidden data, be online ecommerce, copyright protection, domain name supervising,
Caused diversified forms electronic evidence gives the integrity protection and timeliness of real-time in many application scenarios such as network auction
Property prove, maintain its proof, while the easy evidence obtaining of provider and checking interface, on the one hand facilitate user at any time for card
According to being collected evidence and being investigated, on the other hand judicial department can be coordinated to be audited and verified for the authenticity of evidence, generated
The cryptography evidence of relevant evidence auditing result is simultaneously preserved, so as to safely and efficiently solve the problems, such as the preservation of electronic evidence.
System of the embodiment of the present invention 10 provides a high security, strong ease for use, low cost, high efficiency, respects the comprehensive of privacy of user
System, it is intended that judicial department is also beneficial to while right-safeguarding threshold is reduced and establishes more specifical electronic evidence processing mark
Standard, create more wide influence power and social value.
That is, the design of the embodiment of the present invention and the electronic evidence preservation for the Channel Technology of being dived based on block chain realized
System 10, possesses more preferable security and the transparency, and user can be with to the complete of electronic evidence under conditions of without trust
It is property, ageing, and the non-repudiation of its legal effect gives and proves, and proof procedure will not reveal the privacy of user,
Centralization mechanism is avoided because the trust crisis that data corruption is brought with sensitive operation, also solves the incident of centralization memory node
The safety issue under fire brought, simultaneity factor provide efficiently easily evidence obtaining and checking interface by block chain network,
It is simple to operate, it is easily used, reduces the right-safeguarding threshold of user, is also beneficial to judicial department and establishes more specifical electronic evidence
Processing standard.Compared to the existing existence proof service based on block chain, the characteristics of system is according to electronic evidence, there is provided
More specific, tight, personalized service, the typing that aucillary document information is added in evidence process part facilitate user to electronics
The specifying information of evidence is supplemented;Convenient, unified audit interface is developed, user is established and is tieed up by block chain
Protect the legal effect of evidence;The design of addition service hierarchies, introducing polymerization evidence upload service, balance system cost and efficiency
Relation, the flexibility of system is improved while the scope and bearing capacity that expand service;It is excellent by constructing evidence chain structure
The efficiency of management of electronic evidence is changed, has allow the compatible more complicated proof results of system and various evidence relation, have
Stronger expansibility, the positioning of station address make it that service invariant is reliable, are easy to the importing and recovery of evidence, even if clothes be present
The extreme case of business node collapses, also it will not produce any harmful effect to obtaining security proving on evidence.
In one particular embodiment of the present invention, as shown in figure 11, the system 10 of the embodiment of the present invention can by
Latent channel is constructed on the original data layer of ripe block chain network, audit transactions is produced and is merchandised with evidence, provided for electronic evidence
Transparent reliable existence proof and audit certification, and transaction is linked to form a plurality of user with station address and evidence operator
Chain of evidence.By different regions service end 200 with audit the jointly constructs of end 300 and safeguard user evidence prove data, without
Trust and interface is unified efficient, user can seek the agency of evidence upload by client 100 to service end 200, can also
The chain of evidence of oneself is constructed by block chain wallet and then transfers to the trustship of service end 200.
It is proposed according to embodiments of the present invention based on block chain dive Channel Technology electronic evidence preserve system, by
Family electronic evidence carries out offline collection and processing, and according to service type, latent channel coding is carried out to user's evidence and is uploaded to
User's chain of evidence is built in block chain network, generates the existence proof of evidence, and excavated among the block catenary system of maturation
Latent channel preserves the cryptography foundation of electronic evidence and its auditing result, realizes the safe handling to electronic evidence and hidden guarantor
Deposit, so as to improve the security of electronic data preservation and ageing, effective reduction preservation cost.
In the description of the invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " length ", " width ",
" thickness ", " on ", " under ", "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom " " interior ", " outer ", " up time
The orientation or position relationship of the instruction such as pin ", " counterclockwise ", " axial direction ", " radial direction ", " circumference " be based on orientation shown in the drawings or
Position relationship, it is for only for ease of and describes the present invention and simplify description, rather than indicates or imply that signified device or element must
There must be specific orientation, with specific azimuth configuration and operation, therefore be not considered as limiting the invention.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance
Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the invention, " multiple " are meant that at least two, such as two, three
It is individual etc., unless otherwise specifically defined.
In the present invention, unless otherwise clearly defined and limited, term " installation ", " connected ", " connection ", " fixation " etc.
Term should be interpreted broadly, for example, it may be fixedly connected or be detachably connected, or integrally;Can be that machinery connects
Connect or electrically connect;Can be joined directly together, can also be indirectly connected by intermediary, can be in two elements
The connection in portion or the interaction relationship of two elements, limited unless otherwise clear and definite.For one of ordinary skill in the art
For, the concrete meaning of above-mentioned term in the present invention can be understood as the case may be.
In the present invention, unless otherwise clearly defined and limited, fisrt feature can be with "above" or "below" second feature
It is that the first and second features directly contact, or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists
Second feature " on ", " top " and " above " but fisrt feature are directly over second feature or oblique upper, or be merely representative of
Fisrt feature level height is higher than second feature.Fisrt feature second feature " under ", " lower section " and " below " can be
One feature is immediately below second feature or obliquely downward, or is merely representative of fisrt feature level height and is less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not
Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office
Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area
Art personnel can be tied the different embodiments or example and the feature of different embodiments or example described in this specification
Close and combine.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, changed, replacing and modification.
Claims (10)
- A kind of 1. electronic evidence preservation system for Channel Technology of being dived based on block chain, it is characterised in that including:Client, for carrying out offline collection and processing, online management and evidence obtaining work to user's electronic evidence;Service end is right for the certification to user, encryption key distribution and the management of online electronic evidence, and according to service type User's evidence carries out latent channel coding and uploads to structure user's chain of evidence in block chain network, generates the existence card of evidence It is bright;According to trustship and recovery of the station address to evidence on chain;Audit end, for corresponding transaction to be audited and generated on block chain to evidence on chain, construct the audit card of evidence It is bright, to safeguard the integrality of auditing result, ageing and non-repudiation;AndThe network terminal, for the state synchronized and Real-Time Forensics to user's evidence on chain.
- 2. the electronic evidence preservation system of Channel Technology according to claim 1 of being dived based on block chain, it is characterised in that client Made a summary safely specifically for the instrument of evidence for obtaining electronic evidence file or precomputation, wherein, if the electronic evidence text submitted Part is source file, then carries out safe summary processing to electronic evidence file, if electronic evidence includes multiple files, pass through structure The mode for making Merkel tree calculates total summary of multiple files, to protect the overall integrality of source file, finally gives source file Safety summary H1, and using the relevant information of electronic evidence as a part for electronic evidence with participate in follow-up evidence obtaining with examine Work is counted, and all information coding and sequence are turned into file using evi as suffix, and the safety summary of file is calculated H2, and safety is made a summary H2With safety summary H1Series connection, safety is calculated to series connection result by same safe digest algorithm and plucked Want H3, as the final digest for representing electronic evidence integrality, in case uploading to the block link network of maturation in follow-up work On network.
- 3. the electronic evidence preservation system of Channel Technology according to claim 1 of being dived based on block chain, it is characterised in that service end Specifically for carrying out authentication to user, wherein, new user by submitting brief personal information, using the mailbox that possesses as ID, and user password K is setu, service end coordinates user to complete registration by way of email authentication, and passes through cipher key derivative Algorithm is to user password KuCarry out plus salt Hash, according to different initial parameters, deriving multiple has high intensity and randomness Key Kx1, Kx2…Kxn, as the foundation of password authentication, it is stored in service client database;Then make in client and audit end The AES key for ciphering user data is generated for generation seed, after user's successful registration, service end generates a pairing at random The ripe block catenary system key of method is to (Sku,Pku), by private key SkuPass through corresponding user's derivative key KxiIt is stored in after encryption Service in client database, public key PkuBe converted to transaction address AddruAfter send to client, as station address, for aiding in User supervises the upload situation and construction chain of evidence of electronic evidence;Wherein, after by server side authentication, offline evidence management can be carried out by service end, the electronic evidence meeting added offline It is automatically imported in local evidence storehouse, and by the AES key encrypting storing of generation, to check evidence details, it is auxiliary recovers evidence Help file, delete also not on the local evidence that is transmitted through, add new offline evidence, and proof data backups to high in the clouds.
- 4. according to the electronic evidence preservation system of the Channel Technology of being dived based on block chain of claim 1 or 3, it is characterised in that its In, may be selected to upload evidence to service end, offline evidence that selection needs to upload, deposit the service type of card and transmission deposit card please Ask, client is by the auxiliary information Info of the evidence after encryptionevi, service type information Infoserve, station address AddruAnd The final digest H of evidence3Sent by ssl protocol to service end, wherein,For evidence service on chain, service end is according to user password KuUser's derivative key KxiDecryption is with obtaining corresponding user Location private key Sku, it is converted into the station address Addr sent behind normal address with clientuCompare, when identical, by service type Information Infoserve, station address AddruAnd the final digest H of evidence3It is encoded to the standard transaction script of block catenary system ScriptPbkey, and construct the contact between evidence transaction perpetuation of testimony summary, evidence and mark station address;For polymerizeing evidence service, service end by preset time final digest H on evidence3Include into syndication summary set {HiIn, after arrival time node, service end produces the random vector H of same lengthrandAdd in set, and pass through structure The mode of Merkel tree calculates the root summary H entirely gatheredroot, and service end by the root entirely gathered make a summary HrootWrite area In the NullData channel scripts of block chain transaction, final script of completely merchandising is generated after addition input and redemption output, and will Complete syndication summary set { HiIt is sent to each client for participating in request.
- 5. the electronic evidence preservation system of Channel Technology according to claim 4 of being dived based on block chain, it is characterised in that user certificate According to the transaction of chain link multiple evidences and audit transactions, wherein, coordinate the modification of evidence operator, represented in transverse direction electronic evidence it Between contact, the audit relationship between electronic evidence, the unified micro block chain currency with user oriented address are represented on longitudinal direction Output as mark, loose block chain moneytary operations is converted into user's evidence network, with evidence on chain is managed with Verification.
- 6. the electronic evidence preservation system of Channel Technology according to claim 4 of being dived based on block chain, it is characterised in that service end The standard of generation transaction script ScriptPbkey is converted into and merchandises and is broadcasted to block chain network, while by transaction Index TxHash is sent to corresponding client, and the then transaction to broadcast carries out the confirmation monitoring of preset times, for depth Evidence more than or equal to predetermined threshold value is merchandised, and assert that it can not be distorted, and is recorded transaction and entered block time T accordingly, is made By the timestamp of carrying evidence send to client, generate the existence proof of evidence, and real according to the information of service end Shi Gengxin uploads the state of evidence, and the index TxHash by merchandising generates the chain towards third party's block chain query interface Connect, so that by accessing third party's block chain browser all information are carried out with the checking of real-time at any time.
- 7. the electronic evidence preservation system of Channel Technology according to claim 4 of being dived based on block chain, it is characterised in that audit end Specifically for the public key cryptosyst being introduced into block chain network, the method generation proved by constructing key generation transaction can represent careful The block chain key of end identity is counted, then auditing result file is signed by block chain key so that when user's needs pair When the legal effect of evidence is audited on chain, by stable open channel to submission evidence audit request, and it will be audited Evidence source file and secondary file by safe lane send to audit end, with according to information on chain to existence proof carry out Checking, if checking is errorless, to the auxiliary information Info of evidenceeviDecoded, and according to evidence content to the true of evidence Property is audited.
- 8. the electronic evidence preservation system of Channel Technology according to claim 7 of being dived based on block chain, it is characterised in that generation is examined Meter key comprises the following steps:N new block chain currency keys are randomly generated, and root summary H is obtained according to n new block chain currency keysn_key, Pass through authentication private key Sk_auditMake a summary H to rootn_keySignature, and summary H is calculated to signature result Sigsig;Generate and broadcast a new block chain moneytary operations, H is included with onesigOp_Return output, by block After chain network successfully confirms, sent to service end:The index TxHash of transaction, all new public key set for producing audit key {Pk1,Pk2…PknAnd its root summary Hn_key, the signature Sig of construction;The summary H that service end is extracted according to the index TxHash of transactionsigIt is determined that signature Sig integrality, and verify signature signature Sig is for root summary Hn_keyValidity;Merkel tree is reconstructed using root summary Hn_keyN block chain currency key of proof Integrality, with final certification newly it is caused n audit key legitimacy.
- 9. the electronic evidence preservation system of Channel Technology according to claim 1 of being dived based on block chain, it is characterised in that audit end It is additionally operable to the auditing result file File to corresponding electronic evidence in generationauditAfterwards, choose audit key to one of { Skx, Pkx} Signed for auditing result file, signature result is converted into Der coding forms Sigaudit, to construct towards block link network The audit transactions of network, wherein, include auditing result signature Sig with oneauditOp_Return output, with generation safeguard examine Result integrality, ageing and non-repudiation audit certification are counted, and one flows to station address AddruxMicro gold Volume is exported, and with proof of identity flow direction and structuring user's chain of evidence, audit end money is broadcasted to block chain network and monitors transaction, and will The audit public key Pk of selectionx, auditing result file safety summary HauditTxHash is indexed with audit transactionsauditSend extremely Service end, and complete auditing result file is sent to relative users.
- 10. the electronic evidence preservation system of Channel Technology according to claim 5 of being dived based on block chain, it is characterised in that user The chain of evidence of oneself is established, to submit corresponding station address Addr to service end by client or network plug-inux, Yi Jixiang The block catenary system key answered is to (Sku,Pku) with recovery or trustship chain of evidence, service end is to (Sku,Pku) validity and Key is to station address AddruxUniformity test, and to station address AddruxCorresponding transaction is merchandised according to evidence Construction test, and the existence proof and evidence chain structure of synchronous corresponding evidence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710701265.8A CN107682308B (en) | 2017-08-16 | 2017-08-16 | Electronic evidence preservation system based on block chain latent channel technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710701265.8A CN107682308B (en) | 2017-08-16 | 2017-08-16 | Electronic evidence preservation system based on block chain latent channel technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107682308A true CN107682308A (en) | 2018-02-09 |
CN107682308B CN107682308B (en) | 2019-12-13 |
Family
ID=61134398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710701265.8A Active CN107682308B (en) | 2017-08-16 | 2017-08-16 | Electronic evidence preservation system based on block chain latent channel technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107682308B (en) |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108429759A (en) * | 2018-03-28 | 2018-08-21 | 电子科技大学成都研究院 | Decentralization stores safety implementation method |
CN108650252A (en) * | 2018-04-28 | 2018-10-12 | 分布共享(北京)信息技术有限公司 | The data-sharing systems and method of a kind of safety, fair protection privacy |
CN108647230A (en) * | 2018-03-29 | 2018-10-12 | 深圳市网心科技有限公司 | Distributed storage method, electronic device and storage medium |
CN108712380A (en) * | 2018-04-12 | 2018-10-26 | 三维通信股份有限公司 | A kind of mixing identity identifying method based on strategy |
CN108769031A (en) * | 2018-05-31 | 2018-11-06 | 中化能源科技有限公司 | The material object of edge calculations service based on block chain deposits card traceability system |
CN108897760A (en) * | 2018-05-22 | 2018-11-27 | 贵阳信息技术研究院(中科院软件所贵阳分部) | Electronic evidence chain integrity verification method based on Merkel tree |
CN109150550A (en) * | 2018-10-31 | 2019-01-04 | 重庆爱思网安信息技术有限公司 | A kind of electronic data dynamic hash chain common recognition storage system and method |
CN109166040A (en) * | 2018-08-23 | 2019-01-08 | 北京京东金融科技控股有限公司 | Transaction auditing method, device, equipment and storage medium based on block chain |
CN109165304A (en) * | 2018-07-03 | 2019-01-08 | 泰链(厦门)科技有限公司 | Building method, medium and the system of block chain |
CN109246179A (en) * | 2018-06-30 | 2019-01-18 | 华为技术有限公司 | Safeguard method and apparatus, server and the computer readable storage medium of block chain |
CN109376552A (en) * | 2018-08-21 | 2019-02-22 | 阿里巴巴集团控股有限公司 | A kind of evidence collection method and system for depositing card based on block chain |
CN109462540A (en) * | 2018-10-12 | 2019-03-12 | 彩讯科技股份有限公司 | Mail deposits card methods, devices and systems |
CN109547218A (en) * | 2019-01-18 | 2019-03-29 | 北京工业大学 | It is a kind of improve BIP agreement alliance's chain node code key distribution and standby system |
CN109726997A (en) * | 2019-01-09 | 2019-05-07 | 广州闪链区块链科技有限公司 | A kind of gold register auditing method, device and storage medium based on block chain |
CN110008728A (en) * | 2019-04-11 | 2019-07-12 | 苏州超擎图形软件科技发展有限公司 | Electronic evidence method for anti-counterfeit and device |
CN110020844A (en) * | 2019-04-17 | 2019-07-16 | 深圳市先河系统技术有限公司 | Control method, system and the relevant device of decentralization storage |
CN110032880A (en) * | 2018-12-13 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Record screen evidence collecting method, system and electronic equipment based on block chain |
CN110189122A (en) * | 2019-04-30 | 2019-08-30 | 阿里巴巴集团控股有限公司 | The method and device fixed time for the data anchor on block chain, electronic equipment |
CN110276610A (en) * | 2019-05-31 | 2019-09-24 | 阿里巴巴集团控股有限公司 | The method and device of dynamic encryption is realized based on transaction offset |
CN110309259A (en) * | 2018-10-10 | 2019-10-08 | 腾讯科技(深圳)有限公司 | Audit result data storage, querying method, audit item storage method and device |
CN110324422A (en) * | 2019-07-05 | 2019-10-11 | 北京大学 | A kind of substantive approach and system of cloud application |
CN110351297A (en) * | 2019-07-23 | 2019-10-18 | 深圳前海微众银行股份有限公司 | A kind of verification method and device applied to block chain |
CN110532290A (en) * | 2019-07-25 | 2019-12-03 | 深圳壹账通智能科技有限公司 | Information Authentication device, method and storage medium based on block chain |
CN110674521A (en) * | 2019-09-27 | 2020-01-10 | 合肥工业大学 | Privacy protection evidence management system and method |
CN110738584A (en) * | 2018-07-20 | 2020-01-31 | 樊华 | intellectual property information management system and method |
CN111144881A (en) * | 2018-11-06 | 2020-05-12 | 国际商业机器公司 | Selective access to asset transfer data |
CN111368007A (en) * | 2020-04-03 | 2020-07-03 | 南京审计大学 | Environment audit access system based on block chain technology |
CN111368080A (en) * | 2020-02-29 | 2020-07-03 | 重庆百事得大牛机器人有限公司 | Electronic evidence collecting and recording method for legal consultation robot |
CN111460499A (en) * | 2020-03-31 | 2020-07-28 | 中国电子科技集团公司第三十研究所 | Merkletree-based block chain user attribute set verification method for protecting privacy |
CN111711655A (en) * | 2020-05-14 | 2020-09-25 | 特斯联科技集团有限公司 | Block chain-based electronic data evidence storing method, system, storage medium and terminal |
CN111738832A (en) * | 2020-06-22 | 2020-10-02 | 中国银行股份有限公司 | Block chain-based deposit certificate checking method, device, equipment and medium |
CN111814141A (en) * | 2020-09-15 | 2020-10-23 | 浙江数秦科技有限公司 | Off-line process evidence obtaining and storing method based on block chain |
CN111819817A (en) * | 2018-03-08 | 2020-10-23 | 区块链控股有限公司 | Method and system for block chain implementation for bilinear mapping accumulator-based authorization |
CN113343256A (en) * | 2021-06-04 | 2021-09-03 | 中荧科技股份有限公司 | Electronic evidence obtaining and storing system based on block chain technology |
WO2021196091A1 (en) * | 2020-04-01 | 2021-10-07 | 南方科技大学 | Method and system for proving existence of file, and server and storage medium |
FR3112625A1 (en) * | 2020-07-20 | 2022-01-21 | Jiangsu Aowei Holdings Co., Ltd. | Blockchain electronic contract management system |
TWI764043B (en) * | 2018-09-14 | 2022-05-11 | 宏達國際電子股份有限公司 | Method of social key recovery and related device |
CN114614981A (en) * | 2022-02-21 | 2022-06-10 | 北京航空航天大学 | Hidden information transmission method and device based on-chain negotiation |
US20220327239A1 (en) * | 2021-04-09 | 2022-10-13 | VIQ Solutions Inc. | Securing and managing offline digital evidence with a smart data lease system |
CN115314352A (en) * | 2022-07-27 | 2022-11-08 | 北京航空航天大学 | Privacy-enhanced fair block chain leader election method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223374A (en) * | 2011-06-22 | 2011-10-19 | 熊志海 | Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence |
WO2014201059A1 (en) * | 2013-06-10 | 2014-12-18 | Certimix, Llc | Secure storing and offline transfering of digitally transferable assets |
CN105790954A (en) * | 2016-03-02 | 2016-07-20 | 布比(北京)网络技术有限公司 | Method and system for constructing electronic evidence |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106296359A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | Credible electric power networks transaction platform based on block chain technology |
CN106485167A (en) * | 2016-09-22 | 2017-03-08 | 中金云金融(北京)大数据科技股份有限公司 | Credit record system and method based on block chain |
CN106779385A (en) * | 2016-12-07 | 2017-05-31 | 北京信任度科技有限公司 | The method and system of electronic evidence and user identity are fixed using block chain |
-
2017
- 2017-08-16 CN CN201710701265.8A patent/CN107682308B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223374A (en) * | 2011-06-22 | 2011-10-19 | 熊志海 | Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence |
WO2014201059A1 (en) * | 2013-06-10 | 2014-12-18 | Certimix, Llc | Secure storing and offline transfering of digitally transferable assets |
CN105790954A (en) * | 2016-03-02 | 2016-07-20 | 布比(北京)网络技术有限公司 | Method and system for constructing electronic evidence |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106296359A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | Credible electric power networks transaction platform based on block chain technology |
CN106485167A (en) * | 2016-09-22 | 2017-03-08 | 中金云金融(北京)大数据科技股份有限公司 | Credit record system and method based on block chain |
CN106779385A (en) * | 2016-12-07 | 2017-05-31 | 北京信任度科技有限公司 | The method and system of electronic evidence and user identity are fixed using block chain |
Non-Patent Citations (2)
Title |
---|
张仕斌等: "电子证据收集与还原系统的设计与实现", 《技术研究》 * |
李兆森等: "基于区块链的电子数据存证应用研究", 《软件》 * |
Cited By (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111819817A (en) * | 2018-03-08 | 2020-10-23 | 区块链控股有限公司 | Method and system for block chain implementation for bilinear mapping accumulator-based authorization |
CN108429759B (en) * | 2018-03-28 | 2020-06-30 | 电子科技大学成都研究院 | Decentralized storage safety implementation method |
CN108429759A (en) * | 2018-03-28 | 2018-08-21 | 电子科技大学成都研究院 | Decentralization stores safety implementation method |
CN108647230A (en) * | 2018-03-29 | 2018-10-12 | 深圳市网心科技有限公司 | Distributed storage method, electronic device and storage medium |
CN108647230B (en) * | 2018-03-29 | 2021-10-08 | 深圳市网心科技有限公司 | Distributed storage method, electronic device, and storage medium |
CN108712380A (en) * | 2018-04-12 | 2018-10-26 | 三维通信股份有限公司 | A kind of mixing identity identifying method based on strategy |
CN108650252A (en) * | 2018-04-28 | 2018-10-12 | 分布共享(北京)信息技术有限公司 | The data-sharing systems and method of a kind of safety, fair protection privacy |
CN108650252B (en) * | 2018-04-28 | 2020-09-29 | 分布共享(北京)信息技术有限公司 | Data sharing system and method for protecting privacy safely and fairly |
CN108897760A (en) * | 2018-05-22 | 2018-11-27 | 贵阳信息技术研究院(中科院软件所贵阳分部) | Electronic evidence chain integrity verification method based on Merkel tree |
CN108769031A (en) * | 2018-05-31 | 2018-11-06 | 中化能源科技有限公司 | The material object of edge calculations service based on block chain deposits card traceability system |
CN109246179A (en) * | 2018-06-30 | 2019-01-18 | 华为技术有限公司 | Safeguard method and apparatus, server and the computer readable storage medium of block chain |
CN109165304A (en) * | 2018-07-03 | 2019-01-08 | 泰链(厦门)科技有限公司 | Building method, medium and the system of block chain |
CN110738584A (en) * | 2018-07-20 | 2020-01-31 | 樊华 | intellectual property information management system and method |
WO2020038095A1 (en) * | 2018-08-21 | 2020-02-27 | 阿里巴巴集团控股有限公司 | Evidence collection method and system based on blockchain evidence storage |
CN109376552A (en) * | 2018-08-21 | 2019-02-22 | 阿里巴巴集团控股有限公司 | A kind of evidence collection method and system for depositing card based on block chain |
EP3734489A4 (en) * | 2018-08-21 | 2021-10-06 | Advanced New Technologies Co., Ltd. | Evidence collection method and system based on blockchain evidence storage |
CN109166040A (en) * | 2018-08-23 | 2019-01-08 | 北京京东金融科技控股有限公司 | Transaction auditing method, device, equipment and storage medium based on block chain |
TWI764043B (en) * | 2018-09-14 | 2022-05-11 | 宏達國際電子股份有限公司 | Method of social key recovery and related device |
CN110309259A (en) * | 2018-10-10 | 2019-10-08 | 腾讯科技(深圳)有限公司 | Audit result data storage, querying method, audit item storage method and device |
US11316669B2 (en) | 2018-10-10 | 2022-04-26 | Tencent Technology (Shenzhen) Company Limited | Audit result data storage method and device, audit result data query method and device, and audit item storage method and device |
CN110309259B (en) * | 2018-10-10 | 2021-09-03 | 腾讯科技(深圳)有限公司 | Audit result data storage and query methods, and audit item storage method and device |
US11700113B2 (en) | 2018-10-10 | 2023-07-11 | Tencent Technology (Shenzhen) Company Limited | Audit result data storage method and device, audit result data query method and device, and audit item storage method and device |
CN109462540A (en) * | 2018-10-12 | 2019-03-12 | 彩讯科技股份有限公司 | Mail deposits card methods, devices and systems |
CN109150550A (en) * | 2018-10-31 | 2019-01-04 | 重庆爱思网安信息技术有限公司 | A kind of electronic data dynamic hash chain common recognition storage system and method |
CN111144881B (en) * | 2018-11-06 | 2024-01-30 | 国际商业机器公司 | Selective access to asset transfer data |
CN111144881A (en) * | 2018-11-06 | 2020-05-12 | 国际商业机器公司 | Selective access to asset transfer data |
CN110032880A (en) * | 2018-12-13 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Record screen evidence collecting method, system and electronic equipment based on block chain |
CN109726997A (en) * | 2019-01-09 | 2019-05-07 | 广州闪链区块链科技有限公司 | A kind of gold register auditing method, device and storage medium based on block chain |
CN109547218A (en) * | 2019-01-18 | 2019-03-29 | 北京工业大学 | It is a kind of improve BIP agreement alliance's chain node code key distribution and standby system |
CN109547218B (en) * | 2019-01-18 | 2021-10-15 | 北京工业大学 | Alliance link node key distribution and backup system for improving BIP (building information processing) protocol |
CN110008728A (en) * | 2019-04-11 | 2019-07-12 | 苏州超擎图形软件科技发展有限公司 | Electronic evidence method for anti-counterfeit and device |
CN110008728B (en) * | 2019-04-11 | 2021-08-24 | 苏州超擎图形软件科技发展有限公司 | Electronic evidence anti-counterfeiting method and device |
CN110020844A (en) * | 2019-04-17 | 2019-07-16 | 深圳市先河系统技术有限公司 | Control method, system and the relevant device of decentralization storage |
CN110189122A (en) * | 2019-04-30 | 2019-08-30 | 阿里巴巴集团控股有限公司 | The method and device fixed time for the data anchor on block chain, electronic equipment |
CN110276610A (en) * | 2019-05-31 | 2019-09-24 | 阿里巴巴集团控股有限公司 | The method and device of dynamic encryption is realized based on transaction offset |
CN110276610B (en) * | 2019-05-31 | 2021-04-06 | 创新先进技术有限公司 | Method and device for realizing dynamic encryption based on transaction offset |
CN110324422A (en) * | 2019-07-05 | 2019-10-11 | 北京大学 | A kind of substantive approach and system of cloud application |
CN110351297A (en) * | 2019-07-23 | 2019-10-18 | 深圳前海微众银行股份有限公司 | A kind of verification method and device applied to block chain |
CN110351297B (en) * | 2019-07-23 | 2022-04-01 | 深圳前海微众银行股份有限公司 | Verification method and device applied to block chain |
CN110532290A (en) * | 2019-07-25 | 2019-12-03 | 深圳壹账通智能科技有限公司 | Information Authentication device, method and storage medium based on block chain |
CN110532290B (en) * | 2019-07-25 | 2023-05-12 | 深圳壹账通智能科技有限公司 | Information verification device, method and storage medium based on block chain |
CN110674521A (en) * | 2019-09-27 | 2020-01-10 | 合肥工业大学 | Privacy protection evidence management system and method |
CN111368080A (en) * | 2020-02-29 | 2020-07-03 | 重庆百事得大牛机器人有限公司 | Electronic evidence collecting and recording method for legal consultation robot |
CN111460499A (en) * | 2020-03-31 | 2020-07-28 | 中国电子科技集团公司第三十研究所 | Merkletree-based block chain user attribute set verification method for protecting privacy |
WO2021196091A1 (en) * | 2020-04-01 | 2021-10-07 | 南方科技大学 | Method and system for proving existence of file, and server and storage medium |
CN111368007A (en) * | 2020-04-03 | 2020-07-03 | 南京审计大学 | Environment audit access system based on block chain technology |
CN111711655A (en) * | 2020-05-14 | 2020-09-25 | 特斯联科技集团有限公司 | Block chain-based electronic data evidence storing method, system, storage medium and terminal |
CN111738832A (en) * | 2020-06-22 | 2020-10-02 | 中国银行股份有限公司 | Block chain-based deposit certificate checking method, device, equipment and medium |
NL2028778A (en) * | 2020-07-20 | 2022-03-15 | Jiangsu Aowei Holdings Co Ltd | Blockchain electronic contract management system |
FR3112625A1 (en) * | 2020-07-20 | 2022-01-21 | Jiangsu Aowei Holdings Co., Ltd. | Blockchain electronic contract management system |
CN111814141A (en) * | 2020-09-15 | 2020-10-23 | 浙江数秦科技有限公司 | Off-line process evidence obtaining and storing method based on block chain |
US20220327239A1 (en) * | 2021-04-09 | 2022-10-13 | VIQ Solutions Inc. | Securing and managing offline digital evidence with a smart data lease system |
US11822701B2 (en) * | 2021-04-09 | 2023-11-21 | VIQ Solutions Inc. | Securing and managing offline digital evidence with a smart data lease system |
CN113343256A (en) * | 2021-06-04 | 2021-09-03 | 中荧科技股份有限公司 | Electronic evidence obtaining and storing system based on block chain technology |
CN114614981A (en) * | 2022-02-21 | 2022-06-10 | 北京航空航天大学 | Hidden information transmission method and device based on-chain negotiation |
CN114614981B (en) * | 2022-02-21 | 2023-12-19 | 北京航空航天大学 | Hidden information transmission method and device based on-chain negotiation |
CN115314352A (en) * | 2022-07-27 | 2022-11-08 | 北京航空航天大学 | Privacy-enhanced fair block chain leader election method and device |
CN115314352B (en) * | 2022-07-27 | 2023-12-12 | 北京航空航天大学 | Privacy-enhanced fair blockchain leader election method and device |
Also Published As
Publication number | Publication date |
---|---|
CN107682308B (en) | 2019-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107682308A (en) | The electronic evidence preservation system for Channel Technology of being dived based on block chain | |
CN111259070B (en) | Method and related device for storing and acquiring service data | |
Zhang et al. | Research on a covert communication model realized by using smart contracts in blockchain environment | |
Zhu et al. | Dynamic audit services for outsourced storages in clouds | |
CN111914027B (en) | Block chain transaction keyword searchable encryption method and system | |
US20190036895A1 (en) | Data distribution over nodal elements | |
CN109409122A (en) | File memory method and its electronic equipment, storage medium | |
CN109472164A (en) | The verification method and its network and electronic equipment of contract dataset | |
CN108964905A (en) | A kind of safe and efficient block chain implementation method | |
KR20180115768A (en) | Encryption method and system for secure extraction of data from a block chain | |
CN107911216A (en) | A kind of block chain transaction method for secret protection and system | |
CN107301521A (en) | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain | |
CN107070938A (en) | Data access control system based on block chain | |
CN106982203A (en) | The ATM network system and its information processing method of robust based on block chain technology | |
CN113781073B (en) | Subsidizing method capable of hiding real names based on matrix alliance chain | |
CN106650495A (en) | File verification method and device | |
CN110289951A (en) | A kind of shared content monitoring method based on Threshold key sharing and block chain | |
CN106487786A (en) | A kind of cloud data integrity verification method based on biological characteristic and system | |
CN112801778A (en) | Federated bad asset blockchain | |
CN104125230A (en) | Short message authentication service system and authentication method | |
CN115270145A (en) | User electricity stealing behavior detection method and system based on alliance chain and federal learning | |
CN112765565A (en) | Copyright protection method and system based on block chain | |
CN108156139A (en) | No certificate can verify that multiple key cryptogram search system and method | |
Gao et al. | BFR-SE: a blockchain-based fair and reliable searchable encryption scheme for IoT with fine-grained access control in cloud environment | |
CN114254394A (en) | Data sharing system and method based on alliance chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210830 Address after: 310053 No. 18, Chuanghui street, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: BUAA HANGZHOU INNOVATION INSTITUTE Address before: 100191 No. 37, Haidian District, Beijing, Xueyuan Road Patentee before: BEIHANG University |
|
TR01 | Transfer of patent right |