CN107682308A - The electronic evidence preservation system for Channel Technology of being dived based on block chain - Google Patents

The electronic evidence preservation system for Channel Technology of being dived based on block chain Download PDF

Info

Publication number
CN107682308A
CN107682308A CN201710701265.8A CN201710701265A CN107682308A CN 107682308 A CN107682308 A CN 107682308A CN 201710701265 A CN201710701265 A CN 201710701265A CN 107682308 A CN107682308 A CN 107682308A
Authority
CN
China
Prior art keywords
evidence
audit
key
user
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710701265.8A
Other languages
Chinese (zh)
Other versions
CN107682308B (en
Inventor
伍前红
王明明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Innovation Research Institute of Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201710701265.8A priority Critical patent/CN107682308B/en
Publication of CN107682308A publication Critical patent/CN107682308A/en
Application granted granted Critical
Publication of CN107682308B publication Critical patent/CN107682308B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

The invention discloses a kind of electronic evidence based on the latent Channel Technology of block chain to preserve system, including:Client, for carrying out offline collection and processing, online management and evidence obtaining work to user's electronic evidence;Service end, generate the existence proof of evidence;According to trustship and recovery of the station address to evidence on chain;Audit end, for corresponding transaction to be audited and generated on block chain to evidence on chain, audit certification is constructed, to safeguard the integrality of auditing result, ageing and non-repudiation;The network terminal, for the state synchronized and Real-Time Forensics to user's evidence on chain.The system can excavate the cryptography foundation that latent channel preserves electronic evidence and its auditing result among the block catenary system of maturation, realize the safe handling to electronic evidence and hidden preservation, so as to improve the security of electronic evidence preservation and ageing, effective reduction preservation cost.

Description

The electronic evidence preservation system for Channel Technology of being dived based on block chain
Technical field
The present invention relates to telecom information technical field, the electronic evidence of more particularly to a kind of Channel Technology of being dived based on block chain Preservation system.
Background technology
With the development of information technology and the popularization of computer network, electronic evidence is as the activity of a large amount of e-commerces and net The spin-off of network communication activity, the evidence obtaining in copyright protection, business right-safeguarding, virtual assets, mobile office etc. and phase Close in division management and play more and more important role.Wherein, electronic evidence is mainly characterized by depending on digital media, and With the convenience that collection is rapid, transmission is convenient, memory space is small, can reappear repeatedly so that electronic evidence can be in future dimension Power and playing an important role in law-enforcing work, can use as evidence to prove relevant fact.
At present, most of electronic evidences preserve framework and are all based on third-party centralization cloud storage structure, except its institute The service experience problems such as the high cost brought, high right-safeguarding barrier, complex operation, poor expandability, electronic evidence have uniqueness again Fragility, show that it is easy to be tampered and replicated, gone wrong in abundant form conversion and failure so that electron number According to security it is poor.Once the memory node of third party center framework is invaded, it will causes information leakage, electronic evidence failure Or many serious the problem of such as be forged, and whether service provider credible, the mechanism of cooperation whether authority, its operation it is saturating Bright property, normalization and legitimacy, the security of electronic evidence will all be impacted, moreover, the processing of multiple third-party institutions Specification differs with the evidence obtaining interface good and the bad, and data not intercommunication and service it is incompatible, so as to establish at electronic evidence for judicial department Reason index zone carrys out negative effect.
In the related art, the block chain technology of decentralization and its application are good with its since the appearance of bit coin Information Security and the fashionable whole world of anonymity, and it coordinates common recognition mechanism to reach the application effect of " without trusting ", perfectly Solves the trust problem under many sensitive scenes.However, the cost that electronic data is preserved in correlation technique is high and ageing Difference, the use demand of most of user can not be met, had to be solved.
The content of the invention
It is contemplated that at least solves one of technical problem in correlation technique to a certain extent.
Therefore, it is an object of the invention to propose that a kind of electronic evidence based on the latent Channel Technology of block chain preserves system, The system can improve the security of electronic data preservation and ageing, effective reduction preservation cost.
To reach above-mentioned purpose, the embodiment of the present invention proposes a kind of electronic evidence guarantor for Channel Technology of being dived based on block chain Deposit system, including:Client, for carrying out offline collection and processing, online management and evidence obtaining work to user's electronic evidence; Service end, for the certification to user, encryption key distribution and the management of online electronic evidence, and according to service type, to user Evidence carries out latent channel coding and uploads to structure user's chain of evidence in block chain network, generates the existence proof of evidence;Root According to trustship and recovery of the station address to evidence on chain;Audit end, for being audited to evidence on chain and being given birth on block chain Into corresponding transaction, audit certification is constructed, to safeguard the integrality of auditing result, ageing and non-repudiation;And network Terminal, for the state synchronized and Real-Time Forensics to user's evidence on chain.
The electronic evidence preservation system of the Channel Technology of being dived based on block chain of the embodiment of the present invention, can be demonstrate,proved user's electronics Gather and handle offline according to carrying out, and according to service type, latent channel coding is carried out to user's evidence and uploads to block link network User's chain of evidence is built on network, generates the existence proof of evidence, and excavates latent channel among the block catenary system of maturation and protects The cryptography foundation of electronic evidence and its auditing result is deposited, the safe handling to electronic evidence and hidden preservation are realized, so as to carry The security and ageing, effective reduction preservation cost that high electronic data preserves.
In addition, the electronic evidence according to the above embodiment of the present invention based on the latent Channel Technology of block chain preserves system and may be used also With with following additional technical characteristic:
Further, in one embodiment of the invention, client be specifically used for obtain electronic evidence file or it is expected that The instrument of evidence of calculation is made a summary safely, wherein, if the electronic evidence file submitted is source file, electronic evidence file is carried out Safe summary processing, if electronic evidence includes multiple files, calculates multiple files by way of constructing Merkel tree Total summary, to protect the overall integrality of source file, finally give the safety summary H of source file1, and by the phase of electronic evidence Information is closed as a part for electronic evidence to participate in follow-up evidence obtaining and audit work, and all information are encoded and serialized For the file using evi as suffix, and the safety summary H of file is calculated2, and safety is made a summary H2With safety summary H1Series connection, Safety summary H series connection result is calculated by same safe digest algorithm3, as representing the final of electronic evidence integrality Summary, in case being uploaded in follow-up work on the block chain network of maturation.
Further, in one embodiment of the invention, service end is specifically used for carrying out authentication to user, its In, new user using the mailbox that possesses as ID, and sets user password K by submitting brief personal informationu, service end leads to The mode for crossing email authentication coordinates user to complete registration, and by cipher key derivative algorithm to user password KuCarry out plus salt is breathed out It is uncommon, according to different initial parameters, derive multiple key K with high intensity and randomnessx1, Kx2…Kxn, recognize as password The foundation of card, it is stored in service client database;Then generated in client with audit end as generation seed for user data The AES key of encryption, after user's successful registration, service end generates a pair of legal ripe block catenary system keys pair at random (Sku,Pku), by private key SkuPass through corresponding user's derivative key KxiAfter encryption in deposit service client database, public key PkuTurn It is changed to transaction address AddruAfter send to client, as station address, for aid in user supervise electronic evidence on convey feelings Condition and construction chain of evidence;Wherein, after by server side authentication, offline evidence management can be carried out by service end, added offline The electronic evidence added can be automatically imported in local evidence storehouse, and by the AES key encrypting storing of generation, to check that evidence is believed in detail Breath, recover evidence secondary file, delete also not on the local evidence that is transmitted through, add new offline evidence, and proof data is standby Part arrives high in the clouds.
Further, in one embodiment of the invention, may be selected to upload evidence to service end, selection needs what is uploaded Offline evidence, deposit the service type of card and card request is deposited in transmission, client is by the auxiliary information Info of the evidence after encryptionevi, clothes Service type information Infoserve, station address AddruAnd the final digest H of evidence3Sent by ssl protocol to service end, its In, for evidence service on chain, service end is according to user password KuUser's derivative key KxiDecryption is with obtaining corresponding user Location private key Sku, it is converted into the station address Addr sent behind normal address with clientuCompare, when this simultaneously, by service type Information Infoserve, station address AddruAnd the final digest H of evidence3It is encoded to the standard transaction script of block catenary system ScriptPbkey, and construct the contact between evidence transaction perpetuation of testimony summary, evidence and mark station address;For poly- Close evidence service, service end by preset time final digest H on evidence3Include into syndication summary set { HiIn, to Up to after timing node, service end produces the random vector H of same lengthrandAdd in set, and by building Merkel tree Mode calculates the root summary H entirely gatheredroot, and service end by the root entirely gathered make a summary HrootWrite the transaction of block chain In NullData channel scripts, addition input will completely polymerize with generating final complete transaction script after redeeming output Summary set { HiIt is sent to each client for participating in request.
Further, in one embodiment of the invention, the multiple evidence transaction of user's evidence chain link and audit transactions, Wherein, coordinate the modification of evidence operator, the contact between electronic evidence is represented in transverse direction, represented on longitudinal direction between electronic evidence Audit relationship, the unified micro block chain currency output using user oriented address is as identifying, by loose block chain currency Transaction is converted into user's evidence network, so that evidence on chain is managed and investigated.
Further, in one embodiment of the invention, service end merchandises the standard of generation script ScriptPbkey It is converted into and merchandises and broadcasted to block chain network, while the index TxHash of transaction is sent to corresponding client, with The transaction to broadcast carries out the confirmation monitoring of preset times afterwards, and the evidence that predetermined threshold value is more than or equal to for depth is merchandised, recognized Fixed its can not be distorted, and record transaction and enter block time T accordingly, and the timestamp as carried evidence is sent to client End, the existence proof of evidence is generated, and the state of evidence is uploaded according to the information real-time update of service end, and by merchandising Index TxHash generation towards third party's block chain query interface link, to be browsed at any time by accessing third party's block chain Device carries out the checking of real-time to all information.
Further, in one embodiment of the invention, audit end is specifically used for the public key being introduced into block chain network System, the method generation proved by constructing key generation transaction can represent the block chain key of audit end identity, then pass through area Block chain key is signed to auditing result file so that when user needs to audit to the legal effect of evidence on chain, By stable open channel to submission evidence audit request, and the evidence source file and secondary file audited are passed through into safety Channel is sent to audit end, to be verified according to information on chain to existence proof, if checking is errorless, to the auxiliary of evidence Information InfoeviDecoded, and the authenticity of evidence is audited according to the content of evidence.
Further, in one embodiment of the invention, generation audit key comprises the following steps:Randomly generate n New block chain currency key, and obtain root summary H according to n new block chain currency keysn_key, pass through authentication private key Sk_auditMake a summary H to rootn_keySignature, and summary H is calculated to signature result Sigsig;Generate and broadcast a new block chain goods Coin is merchandised, and H is included with onesigOp_Return output, after successfully being confirmed by block chain network, to service end send: The index TxHash, all new public key set { Pk for producing audit key of transaction1,Pk2…PknAnd its root summary Hn_key, construction Signature Sig;The summary H that service end is extracted according to the index TxHash of transactionsigIt is determined that signature Sig integrality, and verify label Name signature Sig is for root summary Hn_keyValidity;Merkel tree is reconstructed using root summary Hn_keyProve n block chain currency The integrality of key, with final certification newly it is caused n audit key legitimacy.
Further, in one embodiment of the invention, audit end is additionally operable to examine corresponding electronic evidence in generation Count destination file FileauditAfterwards, choose audit key to one of { Skx, PkxSigned for auditing result file, it will sign Name result is converted into Der coding forms Sigaudit, to construct the audit transactions towards block chain network, wherein, with a bag Containing auditing result signature SigauditOp_Return outputs, auditing result integrality, ageing and could not be safeguarded with generation The audit certification of recognizing property, and one flow to station address AddruxThe micro amount of money output, flowed to proof of identity and construct use Family chain of evidence, audit end money are broadcasted to block chain network and monitor transaction, and by the audit public key Pk of selectionx, audit knot The safety summary H of fruit fileauditTxHash is indexed with audit transactionsauditSend to service end, and complete auditing result is literary Part is sent to relative users.
Further, in one embodiment of the invention, user establishes the chain of evidence of oneself, to pass through client or net Network plug-in unit submits corresponding station address Addr to service endux, and corresponding block catenary system key is to (Sku,Pku) with extensive Multiple or trustship chain of evidence, service end is to (Sku,Pku) validity and key to station address AddruxUniformity examined Test, and to station address AddruxCorresponding transaction is tested according to the construction of evidence transaction, and the presence of synchronous corresponding evidence Property prove and evidence chain structure.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially and it is readily appreciated that, wherein:
Fig. 1 is that the structure that system is preserved according to the electronic evidence based on the latent Channel Technology of block chain of the embodiment of the present invention is shown It is intended to;
Fig. 2 is the knot that system is preserved according to the electronic evidence based on the latent Channel Technology of block chain of one embodiment of the invention Structure schematic diagram;
Fig. 3 is the structural representation according to the workflow of the client of one embodiment of the invention;
Fig. 4 is the structural representation according to the workflow of the service end of one embodiment of the invention;
Fig. 5 is the structural representation according to the cipher key derivative model of one embodiment of the invention;
Fig. 6 is the structural representation merchandised according to the evidence of the generation existence proof of one embodiment of the invention;
Fig. 7 is the structural representation according to the handling process of the polymerization upload request of one embodiment of the invention;
Fig. 8 is the structural representation according to the building method of the chain of evidence of one embodiment of the invention;
Fig. 9 is the structural representation according to the workflow at the audit end of one embodiment of the invention;
Figure 10 is the structural representation according to the audit transactions of the generation audit certification of one embodiment of the invention;
Figure 11 is the structural representation according to the internet of the integral frame structure of one embodiment of the invention.
Embodiment
Embodiments of the invention are described below in detail, the example of embodiment is shown in the drawings, wherein identical from beginning to end Or similar label represents same or similar element or the element with same or like function.Retouched below with reference to accompanying drawing The embodiment stated is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
The electronic evidence for the Channel Technology of being dived based on block chain for describing to propose according to embodiments of the present invention with reference to the accompanying drawings Preservation system.
Fig. 1 is that the electronic evidence based on the latent Channel Technology of block chain of the embodiment of the present invention preserves the structural representation of system Figure.
As shown in figure 1, the electronic evidence for the Channel Technology that should be dived based on block chain is preserved system 10 and included:Client 100, clothes Business end 200, audit end 300 and the network terminal 400.
Wherein, client 100 is used to carry out user's electronic evidence offline collection and processing, online management and evidence obtaining work Make.Service end 200 is used for certification, encryption key distribution and the management of online electronic evidence to user, and according to service type, it is right User's evidence carries out latent channel coding and uploads to structure user's chain of evidence in block chain network, generates the existence card of evidence It is bright;According to trustship and recovery of the station address to evidence on chain.Audit end 300 is used to audit to evidence on chain and in block Corresponding transaction is generated on chain, audit certification is constructed, to safeguard the integrality of auditing result, ageing and non-repudiation.Net Network terminal 400 is used for state synchronized and Real-Time Forensics to user's evidence on chain.The system 10 of the embodiment of the present invention can carry The security and ageing, effective reduction preservation cost that high electronic data preserves.
It is understood that the system 10 of the embodiment of the present invention among the block catenary system of maturation by excavating latent channel Preserve the cryptography foundation of electronic evidence and its auditing result, realize safe handling of the user for held electronic evidence with it is hidden Preserve, and give electronic evidence integrality, ageing and legal effect proof.System of the embodiment of the present invention 10 can provide Convenient and efficient, transparent disclosed evidence obtaining interface and audit interface, complete Real-Time Forensics and solve electronics with perfection while checking Trust problem in evidence preservation, and the design of service hierarchies is added, weigh the relation of system cost and efficiency, led to simultaneously The efficiency of management of the constitution optimization of evidence chain structure electronic evidence is crossed, so as to improve the expansibility of system and data interchange Property, and it is succinctly tight without losing, and the advantage of decentralization block chain network is sufficiently utilized, evading at traditional evidence While the privacy and trust problem that are related in reason, time and the resources costs of related work are greatly reduced, so as to improve The efficiency of security and access card during electronic evidence preservation.
Alternatively, as shown in Fig. 2 terminal device application that is to say that client 100 can be made up of four modules:Registration with Authentication module 101, offline evidence processing module 102, online evidence management module 103 and checking and evidence obtaining module 104.
Wherein, registration and authentication module 101 are responsible for the registration of user and certification and logged in and system peace during system initialization The generation of full key.Offline evidence processing module 102 is responsible for receiving the electronic evidence that user provides, and enters row information to electronic evidence Collection and summary processing, the latent channel coding of a part and the generation of evident information file.Online evidence management module 103 is negative Duty auxiliary user management submit electronic evidence, including but not limited to evidence additions and deletions, upload, synchronization, proof (existence, Audit) work such as acquisition, secondary file recovery, chain of evidence management.Checking is responsible for auxiliary user with evidence obtaining module 104 and passes through evidence Preservation and proof situation of the source file to evidence on chain are collected evidence and inquired about, and auditing result file is verified.
It should be noted that terminal device includes the office equipment such as PC, mobile phone, flat board, work station, terminal device Using the application specific software for referring to write as platform using corresponding office equipment, the application software be responsible for be as client 100 What client provided electronic evidence deposits card and management service, including the electronic evidence submitted to client carries out information gathering and offline Processing, auxiliary user's selection deposit card and service and carry out online evidence management and the evidence of upload, the proof of generation are taken Card and checking work.
Further, in one embodiment of the invention, client 100 is specifically used for obtaining electronic evidence file or pre- The instrument of evidence of calculating is made a summary safely, wherein, if the electronic evidence file submitted is source file, electronic evidence file is entered The safe summary processing of row, if electronic evidence includes multiple files, calculates multiple files by way of constructing Merkel tree Total summary, to protect the overall integrality of source file, finally give the safety summary H of source file1, and by electronic evidence Relevant information as a part for electronic evidence to participate in follow-up evidence obtaining and audit work, and by all information coding and sequence The file using evi as suffix is turned to, and the safety summary H of file is calculated2, and safety is made a summary H2With safety summary H1String Connection, safety summary H series connection result is calculated by same safe digest algorithm3, as representing electronic evidence integrality Final digest, in case being uploaded in follow-up work on the block chain network of maturation.
It is understood that as shown in figure 3, user needs to submit complete electronic evidence text by client 100 first Part or the instrument of evidence of precomputation are made a summary safely, if submit be electronic evidence file in itself, offline evidence processing module 102 Safe summary processing can be carried out to the source file, if electronic evidence includes multiple files, offline evidence processing module 102 can lead to Total summary that the mode for crossing construction Merkel tree calculates All Files finally gives source to protect the overall integrality of source file The safety summary H of file1.Safe digest algorithm among these, which refers to, meets national commercial cipher management office standard, and nothing is touched The Hash cryptographic algorithm of manufacture risk is hit, such as:SHA-2, SM3 etc..User needs to fill in submitted electronics card in client 100 According to relevant information, include but is not limited to:Evidence title, Evidence type, generation time, application method, evidence related personnel, carry Friendship person's information, extra explanation etc., this partial information will participate in follow-up evidence obtaining after submitting as a part for electronic evidence With audit work, user can selectively fill according to the desirability of information supplement, and all information finally filled in will It can encode and sequence is turned to the file that " .evi " is suffix, be available for user locally downloading.The offline meeting of evidence processing module 102 Calculate the safety summary H of this document2, and by the summary H of acquisition1Series connection, eventually through same safe digest algorithm to result of connecting Summary H is calculated3, so that as the final digest for representing electronic evidence integrality, in case being uploaded in follow-up work Among ripe block chain network.As the workflow of the offline e evidence processing module 102 of client 100, its is all Work is all carried out under local offline environment, has not only been ensured the integrality of electronic evidence but also has been maintained the personal secrets of user, mould The design of block considers the characteristics of electronic evidence itself, is easy to user to supplement electronic evidence important information, and as A part for electronic evidence, be advantageous to the realization of evidence legal effect.
It should be noted that service end 200 is used as service system, it is responsible for receiving the evidence service request of user and to act on behalf of its complete Interacted into block catenary system to complete the preservation of electronic evidence, while the flow for supervising audit end 300 audit transactions is correct Property and to user's sync key information, different from traditional service organization, the service end 200 in the system is not related to any sensitivity The processing of information, the authenticity of all service results can be verified by third-party block chain browser in real time, pole Degree alleviates the data safety pressure and trust pressure that traditional mechanism faces.As shown in Fig. 2 service end 200 can be by following six Individual module composition:Authentication module 201, latent channel coding module 202, transaction modules 203, network communication module 204, expense Count and collect module 205 and data memory module 206.
Wherein, authentication module 201 is responsible for coordinating the user's registration request of data server processing, point of user key The authentication work of hair and user and auditing bodies.Latent channel coding module 202 is responsible for according to service type to user's The information such as the evidence final digest that is included in evidence upload request, chain of evidence relation information, station address carry out latent channel coding, It is converted into the standard transaction script of specification.Transaction modules 203 are transformed by block chain wallet, by the transaction script comprising evident information Issued and monitored in the form of transaction and enter block message with synchronous relationship trading, be further converted to existence proof and audit Prove.Network communication module 204 is responsible for service end 200 and client 100 and the communication work at end 300 of auditing, including data Synchronous and request processing.Expense counts the expense being responsible for collecting module 205 required for statistics realizes user's request issue transaction Collected with and by client 100 to user.Data memory module 206 is deployed on data server, for preserving each mould Critical data needed for block work.
Further, in one embodiment of the invention, service end 200 is specifically used for carrying out authentication to user, Wherein, new user is by submitting brief personal information, using the mailbox that possesses as ID, and sets user password Ku, service end 200 coordinate user to complete registration by way of email authentication, and by cipher key derivative algorithm to user password KuAdded Salt Hash, according to different initial parameters, derive multiple key K with high intensity and randomnessx1, Kx2…Kxn, as mouth The foundation of certification is made, is stored in the database of service end 200;In client 100 with audit end 300 then as generation seed generation For the AES key of ciphering user data, after user's successful registration, service end 200 generates a pair of legal maturation zones at random Block catenary system key is to (Sku,Pku), by private key SkuPass through corresponding user's derivative key KxiService end 200 is stored in after encryption to count According in storehouse, public key PkuBe converted to transaction address AddruAfter send to client 100, as station address, for aiding in user to supervise Superintend and direct the upload situation and construction chain of evidence of electronic evidence.Wherein, after by the certification of service end 200, service end 200 can be passed through Offline evidence management is carried out, the electronic evidence added offline can be automatically imported in local evidence storehouse, and the AES key of generation is added Close preservation, to check evidence details, recover evidence secondary file, delete also not on the local evidence that is transmitted through, add new Offline evidence, and proof data backup to high in the clouds.
It is to be appreciated that as shown in figure 4, user is completed after offline e evidence is handled by client 100, it is necessary to logical Cross registration log-in module and carry out authentication to service end 200, new user is by submitting brief personal information, with the postal possessed Case is as ID, and the user password K for setting the numerals of 8-12 positions, symbol, letter to mixu, service end 200 inquire about mailbox after pass through The mode of mail checking coordinates user to complete registration.To ensure the security of system, evade what weak passwurd may be brought to system Security risk, user password is handled using the method shown in Fig. 5, first by the cipher key derivative algorithm of safety (such as Argon2, bcrypt, scrypt etc.) to user password KuCarry out adding salt Hash, according to different initial parameters, derive multiple Key K with high intensity and randomnessx1, Kx2…Kxn, the key is used as mouth in the authentication module 201 of service end 200 The foundation of certification is made, and is stored in the database of service end 200, and in client 100 with being used as generation seed in audit end 300 The AES key for ciphering user data is generated, so as to improve the security of whole system, reduces bypass attack and sudden and violent The threat to system that power cracks.After first time successful registration, the transaction modules 203 of service end 200 can generate user at random A pair of legal ripe block catenary system keys are to (Sku,Pku), by its private key SkuPass through corresponding user's derivative key KxiAdd After close in the deposit database of service end 200, public key PkuBe converted to transaction address AddruSend to the client 100 of user, make afterwards For station address, for aiding in user to supervise the upload situation and construction chain of evidence of electronic evidence.User logs in and passes through clothes It is engaged in after the certification of end 200, can be to carry out offline evidence management, Yong Huli by the online evidence management module 103 of client 100 Line addition electronic evidence can be automatically imported in the local evidence storehouse of user, related data can in it is above-mentioned caused by AES Key encrypting storing, user can select to check evidence details, recover evidence secondary file, delete also not on the sheet that is transmitted through Ground evidence, new offline evidence is added, can also select proof data backuping to high in the clouds.
Further, in one embodiment of the invention, it may be selected to upload evidence to service end 200, select to need The offline evidence that passes, deposit the service type of card and card request is deposited in transmission, client 100 is by the auxiliary information of the evidence after encryption Infoevi, service type information Infoserve, station address AddruAnd the final digest H of evidence3By ssl protocol send to Service end 200, wherein, for evidence service on chain, service end 200 is according to user password KuUser's derivative key KxiDecrypt To corresponding station address private key Sku, it is converted into the station address Addr sent behind normal address with client 100uCompare, when When identical, by service type information Infoserve, station address AddruAnd the final digest H of evidence3It is encoded to block linkwork The standard transaction script ScriptPbkey of system, and construct the contact between evidence transaction perpetuation of testimony summary, evidence and mark Station address;For polymerizeing evidence service, service end 200 by preset time final digest H on evidence3Include into polymerization Summary set { HiIn, after arrival time node, service end 200 produces the random vector H of same lengthrandAdd in set, And the root summary H entirely gathered is calculated by way of building Merkel treeroot, and the root that service end 200 will entirely be gathered Make a summary HrootWrite in the NullData channel scripts of block chain transaction, addition input generates final complete after being exported with redemption Merchandise script, and by complete syndication summary set { HiIt is sent to each client 100 for participating in request.
It is understood that user can select to upload evidence to service end 200, its detailed process is as follows:User selects The offline evidence uploaded is needed, the service type of card is deposited in selection, can be sent and be deposited card request, client 100 will be by after encryption Evidence auxiliary information Infoevi, service type information Infoserve, station address AddruAnd the final digest H of evidence3 Sent by ssl protocol to service end 200.Wherein, the service type for depositing card is divided into evidence service and polymerization evidence clothes on chain It is engaged in two major classes.If the service type of user's selection is evidence service on chain, service end 200 first can be according to password KuDerivative Key KxiDecryption obtains corresponding station address private key Sku, it is converted into the station address sent behind normal address with client 100 AddruCompare, by latent channel coding module 202 by Info if identicalserve、Addru、H3It is encoded to the mark of block catenary system Quasi- transaction script ScriptPbkey, by taking bit coin as an example, according to the finding of table 1, by cost, efficiency, security, thoroughly Bright property is many to be considered, the channel that framework final choice Op_Return output scripts are made a summary as perpetuation of testimony;LockTime Channel of (locking time) channel as coding evidence operator;EcPubkey (bit coin public key) channel is as mark user The channel of location.Wherein, evidence operator is to represent social property relation, Evidence type between the service type of evidence, evidence A set of coding so that framework can with the more complicated Evidence type of contained structure and expression evidence between contact, such as Version relationship, inheritance etc., so as to improve the ductility of framework.Ultimately constructed transaction form as shown in fig. 6, its In, first input and the output of transaction all come from the existing address of the wallet of service end 200, and incident take is handed over for providing With;The bit coin of the micro amount of money is output on station address by second output, construction and user's evidence for chain of evidence Management;3rd exports the final digest H for then saving evidence3, for generating the existence proof of evidence;If upload Fresh evidence is associated with existing chain of evidence, then the micro ratio of station address is output in the presence of second input reference evidence chain end Special coin output.Polymerization evidence service request for user, the handling process of service end 200 is as shown in fig. 7, the meeting of service end 200 By time block by certain time final digest H on evidence3Include into syndication summary set { HiIn, when reaching After intermediate node, service end 200 can produce the random vector H of same length firstrandAdd in set, then by building Merck The mode of your tree calculates the root summary H entirely gatheredroot, this integrality for maintaining and gathering all sub- evidences of making a summary, service end 200 latent channel coding module 202 can be by HrootWrite in the NullData channel scripts of block chain transaction, addition input is with redeeming Final complete transaction script will be generated by transaction modules 203 after feeding back out, and will complete { HiIt is sent to each participation The client 100 of request.The relation of system cost and efficiency is weighed compared to evidence service on chain, the service, has sacrificed one The evidence for entering block efficiency, collecting some users more of half-proof transaction, it is same by once merchandising by the way of evidence is polymerize When give multiple evidence existence prooves, in theory, as long as user be ready wait time enough, the cost of service can be by nothing Limit reduces.The evidence of this lightweight preserves service and brings more abundant user's selection and low cost, high clothes for system The advantage for handling capacity of being engaged in.
It should be noted that table 1 is to block chain network the most ripe now --- each latent channel of the latent channel of bit coin system Each latent characteristic of channel statistics of the statistics of characteristic and analysis, i.e. the bit coin of table 1 and analytical table.
Table 1
Latent channel name Channel capacity Whether disclose Key safety Transaction every time includes Estimated cost
Op_Return 80 It is Without influence 1 6020
EcPubkey 32 It is By force n 10190
EcPrikey 32 It is no It is weak n 4760
Tx Amount 3 It is Without influence n 47600
LockTime 3 It is Without influence 1
Further, in one embodiment of the invention, the multiple evidence transaction of user's evidence chain link and audit transactions, Wherein, coordinate the modification of evidence operator, the contact between electronic evidence is represented in transverse direction, represented on longitudinal direction between electronic evidence Audit relationship, the unified micro block chain currency output using user oriented address is as identifying, by loose block chain currency Transaction is converted into user's evidence network, so that evidence on chain is managed and investigated.
It is to be appreciated that construct chain of evidence form as shown in figure 8, wherein, coordinate the modification of evidence operator, in transverse direction The contact between electronic evidence is represented, the audit relationship between electronic evidence is represented on longitudinal direction, it is unified with user oriented address Loose block chain moneytary operations is converted into compact-sized user's evidence net by micro block chain currency output as mark Network, user and judicial department is facilitated to be managed and investigate evidence on chain;The evidence network of construction has good number simultaneously According to interconnectivity and stability, there may be multiple service ends 200 in different geographical while work, evidence on same all chains of user Importing only need to retrieve corresponding station address in block chain network, import convenient and asking in the absence of data compatibility Topic;Even if the worst situation such as collapse of presence service end 200, still effective and data recovery is very square for all proofs occurred Just, user does not have any loss.
Alternatively, in one embodiment of the invention, user establishes the chain of evidence of oneself, with by client 100 or Network plug-in submits corresponding station address Addr to service end 200ux, and corresponding block catenary system key is to (Sku, Pku) with recovery or trustship chain of evidence, service end 200 is to (Sku,Pku) validity and key to station address AddruxOne Cause property is tested, and to station address AddruxCorresponding transaction is tested according to the construction of evidence transaction, and synchronous corresponding The existence proof and evidence chain structure of evidence.
It is to be appreciated that user can establish the chain of evidence of oneself by block chain wallet, then by client 100 or Network plug-in submits corresponding station address Addr to service end 200ux, and corresponding block catenary system key is to (Sku, Pku) first can be to (Sk with recovery/trustship chain of evidence, service end 200u,Pku) validity and key to station address AddruxUniformity test, then by transaction modules 203 to block chain network station address AddruxCorresponding transaction The construction merchandised according to evidence is tested, and the existence proof and evidence chain structure of synchronous corresponding evidence, trustship/recovery Evidence evidence obtaining, audit, synchronous service can be equally obtained according to above step.
Further, in one embodiment of the invention, service end 200 merchandises the standard of generation script ScriptPbkey, which is converted into, to be merchandised and is broadcasted to block chain network, while the index TxHash of transaction is sent to corresponding Client 100, then to broadcast transaction carry out preset times confirmation monitor, be more than or equal to predetermined threshold value for depth Evidence transaction, assert that it can not be distorted, and record transaction accordingly enter block time T, the time as carried evidence Stamp is sent to client 100, generates the existence proof of evidence, and uploaded according to the information real-time update of service end 200 The state of evidence, and the index TxHash by merchandising generates the link towards third party's block chain query interface, to pass through at any time Access the checking that third party's block chain browser carries out real-time to all information.
Understanding can be seen, the standard transaction script of generation is converted into transaction and to area by the wallet module of service end 200 Block chain network is broadcasted, while the index TxHash of transaction is sent to corresponding client 100, and subsequent wallet module is to wide The confirmation that the transaction broadcast carries out preset times is monitored, such as carries out the monitoring of 3 confirmations, is more than or equal to default valve for depth The evidence transaction of value, such as evidence of the depth more than or equal to 3 are merchandised, and system assert that it can not be distorted, and records transaction Enter block time T accordingly, the timestamp as carried evidence sends the existence card for client 100, ultimately generating evidence It is bright.Online evidence management module 103 can upload the state of evidence according to the information real-time update of service end 200, and by merchandising TxHash generations are indexed towards the link of third party's block chain query interface, user can be at any time by accessing third party's block chain Browser carries out the checking of real-time to all information, and any chance done evil, the transparent peace of whole process is not present in service end 200 Entirely and without trusting.Wherein, if the wallet module of service end 200 detects that evidence transaction is handed over caused by signature script is tampered Ductile sex chromosome mosaicism, then it can be upgraded in time to client 100 and finally enter the index TxHash of block transactionnew, and transfer to monitor the friendship Easily, because the output script of transaction can not be tampered, so will not have influence for security in itself on service.Need what is illustrated It is that those skilled in the art can set according to actual conditions to preset times and pre-set threshold value, does not do herein specific Limit.
Alternatively, as shown in Fig. 2 audit end 300 can be made up of following five modules:Log-in module 301, audit key Management module 302, evidence obtaining module 303, Audit Module 304 and data memory module 305.
Wherein, log-in module 301 be responsible for auditing bodies establish with the communication of service end 200, completion log in work with it is initial Change the generation of safe key.Key management module 302 of auditing is responsible for the generation and management of audit signature key.Evidence obtaining module 303 It is responsible for that user's evidence on chain is collected evidence and verified.Audit Module 304 is transformed by block chain wallet, is responsible for according to evidence Auditing result cryptography processing and be published in the form of transaction on block chain, construct audit certification, and synchronous phase Close transaction enters block message.Data memory module 304 is deployed on the data server of auditing bodies, for preserving modules Critical data needed for work.
It is to be appreciated that user can be by collect evidence module 303 or the plug-in unit of the network terminal 400 for arbitrary electronics on chain Evidence is collected evidence, and concrete operations are as follows:User submits complete evidence source file and evidence by terminal or client 100 Secondary file, the system 10 of the embodiment of the present invention calculate the final digest H3 of evidence by way of and sent out by safe lane Deliver to service end 200, service end 200 retrieves the summary of evidence in database, and by the transaction index of corresponding evidence, it is credible when Between stamp, chain of evidence construction situation, evidence audit situation and the proof of acquirement return to user, equally, user can be by the Legal agency of the accuracy of these information of tripartite's block chain browser authentication with audit qualification is by end 300 of auditing on chain The electronic evidence for having obtained existence proof is audited, and specific workflow is as shown in figure 9, qualified judiciary leads to Cross and disclose the application that channel submits evidence on audit chain to service end 200, complete qualifications file, the base of mechanism need to be submitted This information, traditional PKI public keys P for authenticationk_auditAnd stable open contact channel (website, media), service The 200 pairs of information above in end are audited, audit its qualification and information above it is errorless after information above is disclosed, and assisted by SSL View establishes the safe lane of two-way authentication with corresponding audit end 300, and auditing bodies, need to be according to the password of agreement in each office By auditing, the certification of end 300 logs in.
Further, in one embodiment of the invention, audit end 300 is specifically used for the public affairs being introduced into block chain network Key system, the method generation proved by constructing key generation transaction can represent the block chain key of the audit identity of end 300, then lead to Cross block chain key to sign to auditing result file so that when user needs to audit to the legal effect of evidence on chain When, by stable open channel to submission evidence audit request, and the evidence source file and secondary file audited are passed through Safe lane is sent to audit end 300, to be verified according to information on chain to existence proof, if checking is errorless, is verified According to auxiliary information InfoeviDecoded, and the authenticity of evidence is audited according to the content of evidence.
Wherein, in one embodiment of the invention, generation audit key comprises the following steps:It is new to randomly generate n Block chain currency key, and obtain root summary H according to n new block chain currency keysn_key, pass through authentication private key Sk_auditMake a summary H to rootn_keySignature, and summary H is calculated to signature result Sigsig;Generate and broadcast a new block chain goods Coin is merchandised, and H is included with onesigOp_Return output, after successfully being confirmed by block chain network, sent out to service end 200 Send:The index TxHash, all new public key set { Pk for producing audit key of transaction1,Pk2…PknAnd its root summary Hn_key, The signature Sig of construction;The summary H that service end 200 is extracted according to the index TxHash of transactionsigIt is determined that signature Sig integrality, And verify signature signature Sig for root summary Hn_keyValidity;Merkel tree is reconstructed using root summary Hn_keyProve n area The integrality of block chain currency key, with final certification newly it is caused n audit key legitimacy.
It is to be appreciated that in view of need to prove the non-repudiation of auditing result on chain, so introducing block chain network In public key cryptosyst, generation can represent audit the identity of end 300 block chain key, then by these keys to auditing result text Part is signed, and the generating process for key of auditing is as follows:1. audit key management module 302 randomly generates n new block chains Currency key, and by the public key { Pk of this n key1,Pk2…PknTried to achieve by way of constructing Merkel tree and can represent key The root summary H of integralityn_key, auditing bodies passes through the authentication private key S in traditional PKIk_auditTo Hn_keySignature, using peace Full digest algorithm calculates summary H to signature result Sigsig.2. the audit wallet of end 300 generates and broadcasts a new block chain goods Coin is merchandised, and H is included with onesigOp_Return output, after the transaction is successfully confirmed by block chain network, audit end 300 send to service end 200:The index TxHash, all new public key set { Pk for producing audit key of the transaction1,Pk2… PknAnd its root summary Hn_key, the signature Sig of construction.3. service end 200 according to TxHash from this enter block merchandise in extract pluck Want HsigDetermine Sig integrality;Pass through Pk_auditChecking signature Sig is for Hn_keyValidity;Merkel tree is reconstructed to utilize Hn_keyProve the integrality of n block chain currency key.By said process final certification newly it is caused n audit key conjunction Method, it, which is signed, can represent the identity of auditing bodies.4. the data memory module 206 of service end 200 will merchandise and index TxHash, The new public key set { P for producing audit keyk1,Pk2…PknAnd signature Sig storages, and be supplied to and any receive the audit machine The user of structure service, the legitimacy of audit key can be independently differentiated according to the Transaction Information on block chain.
The system 10 of the embodiment of the present invention can be by way of constructing and proving by auditing bodies conventional public-key infrastructure In cipher key function be transplanted on the transaction key of block catenary system, assign the function of its authentication, for after for examine Meter destination file construction non-repudiation proves to establish basis.The system 10 of the embodiment of the present invention can avoid multiple audit machines Structure is caused to be based on block chain network public key using checking complexity and data interchange problem caused by signature system disunity The identity authorization system interface of system in itself is unified and rigorous, is easy to flexible allocation and the renewal of key, all proof procedures All disclosed in block chain moneytary operations network, facilitate user's individual authentication and masses to exercise supervision, there is well transparent Property and versatility.When user needs to audit to the legal effect of evidence on chain, need to by stable open channel to Evidence audit request is submitted by corresponding judicial department, and the evidence source file and secondary file audited are sent out by safe lane Audit end 300 is delivered to, auditing bodies is entered by the flow for module 303 of collecting evidence according to information on chain to the existence proof of the evidence Row checking, if checking is errorless, auditing bodies is then by Audit Module 304 to evidence auxiliary information InfoeviDecoded, and pressed The authenticity of evidence is audited according to the content of evidence.
Alternatively, in one embodiment of the invention, audit end 300 is additionally operable to examine corresponding electronic evidence in generation Count destination file FileauditAfterwards, choose audit key to one of { Skx, PkxSigned for auditing result file, it will sign As a result it is converted into Der coding forms Sigaudit, to construct the audit transactions towards block chain network, wherein, included with one Auditing result signature SigauditOp_Return outputs, auditing result integrality, ageing and undeniable is safeguarded with generation The audit certification of property, and one flow to station address AddruxThe micro amount of money output, with proof of identity flow direction and structuring user's Chain of evidence, the audit money of end 300 are broadcasted to block chain network and monitor transaction, and by the audit public key P of selectionkx, audit knot The safety summary H of fruit fileauditTxHash is indexed with audit transactionsauditSend to service end 200, and the knot that will completely audit Fruit file is sent to relative users.
It is understood that auditing result file File of the auditing bodies in generation to corresponding electronic evidenceauditAfterwards, pass through Audit Module 304 choose the audit key through generation to one of { Skx, PkxSigned for auditing result file, it will sign As a result it is converted into Der coding forms Sigaudit, wallet module according to Figure 10 structure construction towards block chain network audit hand over Easily, wherein including auditing result signature Sig with oneauditOp_Return output, for generate safeguard that auditing result is complete Property, ageing and non-repudiation audit certification, and one flow to station address AddruxThe micro amount of money output, use In proof of identity flow direction and structuring user's chain of evidence.The audit wallet module of end 300 is broadcasted to block chain network and monitors the transaction, And by the audit public key P of selectionkx, the safety summary H of auditing result fileaudit, audit transactions index TxHashauditHair Service end 200 is delivered to, complete auditing result file is sent to relative users.The transaction modules 203 of service end 200 are according to index TxHashauditCorresponding audit transactions are obtained from block chain network, and normalization, the validity of signature to its structure are carried out Detection, if detection passes through, corresponding user's chain of evidence is updated, evidence transaction is monitored, and pass through data memory module By Haudit, TxHashaudit, PkxStorage.User is when client 100 logs in synchronous evident information next time, it will more fresh evidence Audit information, including audit transactions index TxHashaudit, audit public key Pkx, audit transactions confirmation situation, machine of auditing The essential information of structure, audit key generation transaction index TxHashkey, and the public key set { P of agency audit keyk1, Pk2…Pkn, auditing bodies PKI public keys Pk_audit.User can be by client 100 to the key P that auditskxValidity carry out Checking, and according to audit transactions information on existing auditing result file and chain, verify auditing result integrality, it is ageing with Non-repudiation, so as to realize the audit certification to electronic evidence.
That is, the system 10 of the embodiment of the present invention generates audit certification, card to electronic evidence by block catenary system Understand electronic evidence legal effect, solve under traditional system, multiple auditing bodies data interchanges are poor, specification is chaotic, scarce Weary unified interface, the problems such as information is not transparent enough.The system 10 of the embodiment of the present invention have ease for use, security, the transparency with And the advantages of data interchange, in implementation process, service side, user, auditing bodies can mutually be supervised by block chain network Superintend and direct, so as to improve the security of electronic evidence preservation, while personal secrets can also be protected.Service end 200 is only used as supervising With the platform of information transmission, without contacting specific auditing result file and the instrument of evidence.The process improves auditing bodies Office efficiency, while reduce right-safeguarding cost of the user to electronic evidence, just, unified put down established for the audit of evidence Platform.
Alternatively, the network terminal 400 include computer, smart mobile phone, Intelligent flat etc. all can networked devices, the network terminal 400 plug-in units refer to the browser plug-in write based on particular browser, or special application program, and the network terminal 400 is inserted Part includes latent channel decoding module, and has packed the open query interface of block chain application, to realize the evidence obtaining of real-time online And checking work, user can obtain evidence by submitting corresponding complete electronic evidence source file and evidence secondary file Synchronous situation, existence proof, audit certification and chain of evidence construction situation, auditing result file can also be tested Card.
It should be noted that the system 10 of the embodiment of the present invention is a kind of low cost, the lightweight electronics card of high security According to the system of preservation, the system 10 of the embodiment of the present invention is participated in by client 100, service end 200,300 3 kinds of end of audit entity end, And Real-Time Forensics, checking and the polling routine of browser end are provided, by the interactive collaboration at three ends in existing ripe block Efficient electronic evidence protection and an audit platform comprehensively are built on chain network.The system 10 of the embodiment of the present invention is combined into The characteristics of ripe block chain network, and on the basis of existence proof scheme, fully consider the legal effect of electronic evidence, can test Card property, the trackability of auditing result, the transparency of operation, the key features such as anti-collision of system.Coordinate latent Channel Technology Use, greatly reduce system deposits card cost, and original chain transaction in block chain is converted into chain of evidence, compatible more multiple Miscellaneous evidence structure, the service ability of application is enriched, final design, which has gone out a set of low cost, high security, operation transparent, to be looked into Lightweight electronic evidence preserve framework.The system 10 of the embodiment of the present invention is brought more transparent credible, safe and efficient for user Electronic evidence management tool, while be advantageous to judicial department and establish more specifical electronic evidence processing standard, entangled in right-safeguarding Confusingly take place frequently, today that public credibility glides, the system 10 of the embodiment of the present invention has good prospect and social value.It is of the invention real The system 10 for applying example realizes the lightweight electronic evidence preservation framework that a kind of low cost, high security, operation transparent can be looked into, and utilizes The data storage environment of stable safety in ripe decentralization block chain application, the natural, timestamp mechanism that can not forge, side Just real-time query interface, build the preservation system of a set of hidden data, be online ecommerce, copyright protection, domain name supervising, Caused diversified forms electronic evidence gives the integrity protection and timeliness of real-time in many application scenarios such as network auction Property prove, maintain its proof, while the easy evidence obtaining of provider and checking interface, on the one hand facilitate user at any time for card According to being collected evidence and being investigated, on the other hand judicial department can be coordinated to be audited and verified for the authenticity of evidence, generated The cryptography evidence of relevant evidence auditing result is simultaneously preserved, so as to safely and efficiently solve the problems, such as the preservation of electronic evidence. System of the embodiment of the present invention 10 provides a high security, strong ease for use, low cost, high efficiency, respects the comprehensive of privacy of user System, it is intended that judicial department is also beneficial to while right-safeguarding threshold is reduced and establishes more specifical electronic evidence processing mark Standard, create more wide influence power and social value.
That is, the design of the embodiment of the present invention and the electronic evidence preservation for the Channel Technology of being dived based on block chain realized System 10, possesses more preferable security and the transparency, and user can be with to the complete of electronic evidence under conditions of without trust It is property, ageing, and the non-repudiation of its legal effect gives and proves, and proof procedure will not reveal the privacy of user, Centralization mechanism is avoided because the trust crisis that data corruption is brought with sensitive operation, also solves the incident of centralization memory node The safety issue under fire brought, simultaneity factor provide efficiently easily evidence obtaining and checking interface by block chain network, It is simple to operate, it is easily used, reduces the right-safeguarding threshold of user, is also beneficial to judicial department and establishes more specifical electronic evidence Processing standard.Compared to the existing existence proof service based on block chain, the characteristics of system is according to electronic evidence, there is provided More specific, tight, personalized service, the typing that aucillary document information is added in evidence process part facilitate user to electronics The specifying information of evidence is supplemented;Convenient, unified audit interface is developed, user is established and is tieed up by block chain Protect the legal effect of evidence;The design of addition service hierarchies, introducing polymerization evidence upload service, balance system cost and efficiency Relation, the flexibility of system is improved while the scope and bearing capacity that expand service;It is excellent by constructing evidence chain structure The efficiency of management of electronic evidence is changed, has allow the compatible more complicated proof results of system and various evidence relation, have Stronger expansibility, the positioning of station address make it that service invariant is reliable, are easy to the importing and recovery of evidence, even if clothes be present The extreme case of business node collapses, also it will not produce any harmful effect to obtaining security proving on evidence.
In one particular embodiment of the present invention, as shown in figure 11, the system 10 of the embodiment of the present invention can by Latent channel is constructed on the original data layer of ripe block chain network, audit transactions is produced and is merchandised with evidence, provided for electronic evidence Transparent reliable existence proof and audit certification, and transaction is linked to form a plurality of user with station address and evidence operator Chain of evidence.By different regions service end 200 with audit the jointly constructs of end 300 and safeguard user evidence prove data, without Trust and interface is unified efficient, user can seek the agency of evidence upload by client 100 to service end 200, can also The chain of evidence of oneself is constructed by block chain wallet and then transfers to the trustship of service end 200.
It is proposed according to embodiments of the present invention based on block chain dive Channel Technology electronic evidence preserve system, by Family electronic evidence carries out offline collection and processing, and according to service type, latent channel coding is carried out to user's evidence and is uploaded to User's chain of evidence is built in block chain network, generates the existence proof of evidence, and excavated among the block catenary system of maturation Latent channel preserves the cryptography foundation of electronic evidence and its auditing result, realizes the safe handling to electronic evidence and hidden guarantor Deposit, so as to improve the security of electronic data preservation and ageing, effective reduction preservation cost.
In the description of the invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " length ", " width ", " thickness ", " on ", " under ", "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom " " interior ", " outer ", " up time The orientation or position relationship of the instruction such as pin ", " counterclockwise ", " axial direction ", " radial direction ", " circumference " be based on orientation shown in the drawings or Position relationship, it is for only for ease of and describes the present invention and simplify description, rather than indicates or imply that signified device or element must There must be specific orientation, with specific azimuth configuration and operation, therefore be not considered as limiting the invention.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the invention, " multiple " are meant that at least two, such as two, three It is individual etc., unless otherwise specifically defined.
In the present invention, unless otherwise clearly defined and limited, term " installation ", " connected ", " connection ", " fixation " etc. Term should be interpreted broadly, for example, it may be fixedly connected or be detachably connected, or integrally;Can be that machinery connects Connect or electrically connect;Can be joined directly together, can also be indirectly connected by intermediary, can be in two elements The connection in portion or the interaction relationship of two elements, limited unless otherwise clear and definite.For one of ordinary skill in the art For, the concrete meaning of above-mentioned term in the present invention can be understood as the case may be.
In the present invention, unless otherwise clearly defined and limited, fisrt feature can be with "above" or "below" second feature It is that the first and second features directly contact, or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists Second feature " on ", " top " and " above " but fisrt feature are directly over second feature or oblique upper, or be merely representative of Fisrt feature level height is higher than second feature.Fisrt feature second feature " under ", " lower section " and " below " can be One feature is immediately below second feature or obliquely downward, or is merely representative of fisrt feature level height and is less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area Art personnel can be tied the different embodiments or example and the feature of different embodiments or example described in this specification Close and combine.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art within the scope of the invention can be to above-mentioned Embodiment is changed, changed, replacing and modification.

Claims (10)

  1. A kind of 1. electronic evidence preservation system for Channel Technology of being dived based on block chain, it is characterised in that including:
    Client, for carrying out offline collection and processing, online management and evidence obtaining work to user's electronic evidence;
    Service end is right for the certification to user, encryption key distribution and the management of online electronic evidence, and according to service type User's evidence carries out latent channel coding and uploads to structure user's chain of evidence in block chain network, generates the existence card of evidence It is bright;According to trustship and recovery of the station address to evidence on chain;
    Audit end, for corresponding transaction to be audited and generated on block chain to evidence on chain, construct the audit card of evidence It is bright, to safeguard the integrality of auditing result, ageing and non-repudiation;And
    The network terminal, for the state synchronized and Real-Time Forensics to user's evidence on chain.
  2. 2. the electronic evidence preservation system of Channel Technology according to claim 1 of being dived based on block chain, it is characterised in that client Made a summary safely specifically for the instrument of evidence for obtaining electronic evidence file or precomputation, wherein, if the electronic evidence text submitted Part is source file, then carries out safe summary processing to electronic evidence file, if electronic evidence includes multiple files, pass through structure The mode for making Merkel tree calculates total summary of multiple files, to protect the overall integrality of source file, finally gives source file Safety summary H1, and using the relevant information of electronic evidence as a part for electronic evidence with participate in follow-up evidence obtaining with examine Work is counted, and all information coding and sequence are turned into file using evi as suffix, and the safety summary of file is calculated H2, and safety is made a summary H2With safety summary H1Series connection, safety is calculated to series connection result by same safe digest algorithm and plucked Want H3, as the final digest for representing electronic evidence integrality, in case uploading to the block link network of maturation in follow-up work On network.
  3. 3. the electronic evidence preservation system of Channel Technology according to claim 1 of being dived based on block chain, it is characterised in that service end Specifically for carrying out authentication to user, wherein, new user by submitting brief personal information, using the mailbox that possesses as ID, and user password K is setu, service end coordinates user to complete registration by way of email authentication, and passes through cipher key derivative Algorithm is to user password KuCarry out plus salt Hash, according to different initial parameters, deriving multiple has high intensity and randomness Key Kx1, Kx2…Kxn, as the foundation of password authentication, it is stored in service client database;Then make in client and audit end The AES key for ciphering user data is generated for generation seed, after user's successful registration, service end generates a pairing at random The ripe block catenary system key of method is to (Sku,Pku), by private key SkuPass through corresponding user's derivative key KxiIt is stored in after encryption Service in client database, public key PkuBe converted to transaction address AddruAfter send to client, as station address, for aiding in User supervises the upload situation and construction chain of evidence of electronic evidence;
    Wherein, after by server side authentication, offline evidence management can be carried out by service end, the electronic evidence meeting added offline It is automatically imported in local evidence storehouse, and by the AES key encrypting storing of generation, to check evidence details, it is auxiliary recovers evidence Help file, delete also not on the local evidence that is transmitted through, add new offline evidence, and proof data backups to high in the clouds.
  4. 4. according to the electronic evidence preservation system of the Channel Technology of being dived based on block chain of claim 1 or 3, it is characterised in that its In, may be selected to upload evidence to service end, offline evidence that selection needs to upload, deposit the service type of card and transmission deposit card please Ask, client is by the auxiliary information Info of the evidence after encryptionevi, service type information Infoserve, station address AddruAnd The final digest H of evidence3Sent by ssl protocol to service end, wherein,
    For evidence service on chain, service end is according to user password KuUser's derivative key KxiDecryption is with obtaining corresponding user Location private key Sku, it is converted into the station address Addr sent behind normal address with clientuCompare, when identical, by service type Information Infoserve, station address AddruAnd the final digest H of evidence3It is encoded to the standard transaction script of block catenary system ScriptPbkey, and construct the contact between evidence transaction perpetuation of testimony summary, evidence and mark station address;
    For polymerizeing evidence service, service end by preset time final digest H on evidence3Include into syndication summary set {HiIn, after arrival time node, service end produces the random vector H of same lengthrandAdd in set, and pass through structure The mode of Merkel tree calculates the root summary H entirely gatheredroot, and service end by the root entirely gathered make a summary HrootWrite area In the NullData channel scripts of block chain transaction, final script of completely merchandising is generated after addition input and redemption output, and will Complete syndication summary set { HiIt is sent to each client for participating in request.
  5. 5. the electronic evidence preservation system of Channel Technology according to claim 4 of being dived based on block chain, it is characterised in that user certificate According to the transaction of chain link multiple evidences and audit transactions, wherein, coordinate the modification of evidence operator, represented in transverse direction electronic evidence it Between contact, the audit relationship between electronic evidence, the unified micro block chain currency with user oriented address are represented on longitudinal direction Output as mark, loose block chain moneytary operations is converted into user's evidence network, with evidence on chain is managed with Verification.
  6. 6. the electronic evidence preservation system of Channel Technology according to claim 4 of being dived based on block chain, it is characterised in that service end The standard of generation transaction script ScriptPbkey is converted into and merchandises and is broadcasted to block chain network, while by transaction Index TxHash is sent to corresponding client, and the then transaction to broadcast carries out the confirmation monitoring of preset times, for depth Evidence more than or equal to predetermined threshold value is merchandised, and assert that it can not be distorted, and is recorded transaction and entered block time T accordingly, is made By the timestamp of carrying evidence send to client, generate the existence proof of evidence, and real according to the information of service end Shi Gengxin uploads the state of evidence, and the index TxHash by merchandising generates the chain towards third party's block chain query interface Connect, so that by accessing third party's block chain browser all information are carried out with the checking of real-time at any time.
  7. 7. the electronic evidence preservation system of Channel Technology according to claim 4 of being dived based on block chain, it is characterised in that audit end Specifically for the public key cryptosyst being introduced into block chain network, the method generation proved by constructing key generation transaction can represent careful The block chain key of end identity is counted, then auditing result file is signed by block chain key so that when user's needs pair When the legal effect of evidence is audited on chain, by stable open channel to submission evidence audit request, and it will be audited Evidence source file and secondary file by safe lane send to audit end, with according to information on chain to existence proof carry out Checking, if checking is errorless, to the auxiliary information Info of evidenceeviDecoded, and according to evidence content to the true of evidence Property is audited.
  8. 8. the electronic evidence preservation system of Channel Technology according to claim 7 of being dived based on block chain, it is characterised in that generation is examined Meter key comprises the following steps:
    N new block chain currency keys are randomly generated, and root summary H is obtained according to n new block chain currency keysn_key, Pass through authentication private key Sk_auditMake a summary H to rootn_keySignature, and summary H is calculated to signature result Sigsig
    Generate and broadcast a new block chain moneytary operations, H is included with onesigOp_Return output, by block After chain network successfully confirms, sent to service end:The index TxHash of transaction, all new public key set for producing audit key {Pk1,Pk2…PknAnd its root summary Hn_key, the signature Sig of construction;
    The summary H that service end is extracted according to the index TxHash of transactionsigIt is determined that signature Sig integrality, and verify signature signature Sig is for root summary Hn_keyValidity;Merkel tree is reconstructed using root summary Hn_keyN block chain currency key of proof Integrality, with final certification newly it is caused n audit key legitimacy.
  9. 9. the electronic evidence preservation system of Channel Technology according to claim 1 of being dived based on block chain, it is characterised in that audit end It is additionally operable to the auditing result file File to corresponding electronic evidence in generationauditAfterwards, choose audit key to one of { Skx, Pkx} Signed for auditing result file, signature result is converted into Der coding forms Sigaudit, to construct towards block link network The audit transactions of network, wherein, include auditing result signature Sig with oneauditOp_Return output, with generation safeguard examine Result integrality, ageing and non-repudiation audit certification are counted, and one flows to station address AddruxMicro gold Volume is exported, and with proof of identity flow direction and structuring user's chain of evidence, audit end money is broadcasted to block chain network and monitors transaction, and will The audit public key Pk of selectionx, auditing result file safety summary HauditTxHash is indexed with audit transactionsauditSend extremely Service end, and complete auditing result file is sent to relative users.
  10. 10. the electronic evidence preservation system of Channel Technology according to claim 5 of being dived based on block chain, it is characterised in that user The chain of evidence of oneself is established, to submit corresponding station address Addr to service end by client or network plug-inux, Yi Jixiang The block catenary system key answered is to (Sku,Pku) with recovery or trustship chain of evidence, service end is to (Sku,Pku) validity and Key is to station address AddruxUniformity test, and to station address AddruxCorresponding transaction is merchandised according to evidence Construction test, and the existence proof and evidence chain structure of synchronous corresponding evidence.
CN201710701265.8A 2017-08-16 2017-08-16 Electronic evidence preservation system based on block chain latent channel technology Active CN107682308B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710701265.8A CN107682308B (en) 2017-08-16 2017-08-16 Electronic evidence preservation system based on block chain latent channel technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710701265.8A CN107682308B (en) 2017-08-16 2017-08-16 Electronic evidence preservation system based on block chain latent channel technology

Publications (2)

Publication Number Publication Date
CN107682308A true CN107682308A (en) 2018-02-09
CN107682308B CN107682308B (en) 2019-12-13

Family

ID=61134398

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710701265.8A Active CN107682308B (en) 2017-08-16 2017-08-16 Electronic evidence preservation system based on block chain latent channel technology

Country Status (1)

Country Link
CN (1) CN107682308B (en)

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108429759A (en) * 2018-03-28 2018-08-21 电子科技大学成都研究院 Decentralization stores safety implementation method
CN108650252A (en) * 2018-04-28 2018-10-12 分布共享(北京)信息技术有限公司 The data-sharing systems and method of a kind of safety, fair protection privacy
CN108647230A (en) * 2018-03-29 2018-10-12 深圳市网心科技有限公司 Distributed storage method, electronic device and storage medium
CN108712380A (en) * 2018-04-12 2018-10-26 三维通信股份有限公司 A kind of mixing identity identifying method based on strategy
CN108769031A (en) * 2018-05-31 2018-11-06 中化能源科技有限公司 The material object of edge calculations service based on block chain deposits card traceability system
CN108897760A (en) * 2018-05-22 2018-11-27 贵阳信息技术研究院(中科院软件所贵阳分部) Electronic evidence chain integrity verification method based on Merkel tree
CN109150550A (en) * 2018-10-31 2019-01-04 重庆爱思网安信息技术有限公司 A kind of electronic data dynamic hash chain common recognition storage system and method
CN109166040A (en) * 2018-08-23 2019-01-08 北京京东金融科技控股有限公司 Transaction auditing method, device, equipment and storage medium based on block chain
CN109165304A (en) * 2018-07-03 2019-01-08 泰链(厦门)科技有限公司 Building method, medium and the system of block chain
CN109246179A (en) * 2018-06-30 2019-01-18 华为技术有限公司 Safeguard method and apparatus, server and the computer readable storage medium of block chain
CN109376552A (en) * 2018-08-21 2019-02-22 阿里巴巴集团控股有限公司 A kind of evidence collection method and system for depositing card based on block chain
CN109462540A (en) * 2018-10-12 2019-03-12 彩讯科技股份有限公司 Mail deposits card methods, devices and systems
CN109547218A (en) * 2019-01-18 2019-03-29 北京工业大学 It is a kind of improve BIP agreement alliance's chain node code key distribution and standby system
CN109726997A (en) * 2019-01-09 2019-05-07 广州闪链区块链科技有限公司 A kind of gold register auditing method, device and storage medium based on block chain
CN110008728A (en) * 2019-04-11 2019-07-12 苏州超擎图形软件科技发展有限公司 Electronic evidence method for anti-counterfeit and device
CN110020844A (en) * 2019-04-17 2019-07-16 深圳市先河系统技术有限公司 Control method, system and the relevant device of decentralization storage
CN110032880A (en) * 2018-12-13 2019-07-19 阿里巴巴集团控股有限公司 Record screen evidence collecting method, system and electronic equipment based on block chain
CN110189122A (en) * 2019-04-30 2019-08-30 阿里巴巴集团控股有限公司 The method and device fixed time for the data anchor on block chain, electronic equipment
CN110276610A (en) * 2019-05-31 2019-09-24 阿里巴巴集团控股有限公司 The method and device of dynamic encryption is realized based on transaction offset
CN110309259A (en) * 2018-10-10 2019-10-08 腾讯科技(深圳)有限公司 Audit result data storage, querying method, audit item storage method and device
CN110324422A (en) * 2019-07-05 2019-10-11 北京大学 A kind of substantive approach and system of cloud application
CN110351297A (en) * 2019-07-23 2019-10-18 深圳前海微众银行股份有限公司 A kind of verification method and device applied to block chain
CN110532290A (en) * 2019-07-25 2019-12-03 深圳壹账通智能科技有限公司 Information Authentication device, method and storage medium based on block chain
CN110674521A (en) * 2019-09-27 2020-01-10 合肥工业大学 Privacy protection evidence management system and method
CN110738584A (en) * 2018-07-20 2020-01-31 樊华 intellectual property information management system and method
CN111144881A (en) * 2018-11-06 2020-05-12 国际商业机器公司 Selective access to asset transfer data
CN111368007A (en) * 2020-04-03 2020-07-03 南京审计大学 Environment audit access system based on block chain technology
CN111368080A (en) * 2020-02-29 2020-07-03 重庆百事得大牛机器人有限公司 Electronic evidence collecting and recording method for legal consultation robot
CN111460499A (en) * 2020-03-31 2020-07-28 中国电子科技集团公司第三十研究所 Merkletree-based block chain user attribute set verification method for protecting privacy
CN111711655A (en) * 2020-05-14 2020-09-25 特斯联科技集团有限公司 Block chain-based electronic data evidence storing method, system, storage medium and terminal
CN111738832A (en) * 2020-06-22 2020-10-02 中国银行股份有限公司 Block chain-based deposit certificate checking method, device, equipment and medium
CN111814141A (en) * 2020-09-15 2020-10-23 浙江数秦科技有限公司 Off-line process evidence obtaining and storing method based on block chain
CN111819817A (en) * 2018-03-08 2020-10-23 区块链控股有限公司 Method and system for block chain implementation for bilinear mapping accumulator-based authorization
CN113343256A (en) * 2021-06-04 2021-09-03 中荧科技股份有限公司 Electronic evidence obtaining and storing system based on block chain technology
WO2021196091A1 (en) * 2020-04-01 2021-10-07 南方科技大学 Method and system for proving existence of file, and server and storage medium
FR3112625A1 (en) * 2020-07-20 2022-01-21 Jiangsu Aowei Holdings Co., Ltd. Blockchain electronic contract management system
TWI764043B (en) * 2018-09-14 2022-05-11 宏達國際電子股份有限公司 Method of social key recovery and related device
CN114614981A (en) * 2022-02-21 2022-06-10 北京航空航天大学 Hidden information transmission method and device based on-chain negotiation
US20220327239A1 (en) * 2021-04-09 2022-10-13 VIQ Solutions Inc. Securing and managing offline digital evidence with a smart data lease system
CN115314352A (en) * 2022-07-27 2022-11-08 北京航空航天大学 Privacy-enhanced fair block chain leader election method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223374A (en) * 2011-06-22 2011-10-19 熊志海 Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
WO2014201059A1 (en) * 2013-06-10 2014-12-18 Certimix, Llc Secure storing and offline transfering of digitally transferable assets
CN105790954A (en) * 2016-03-02 2016-07-20 布比(北京)网络技术有限公司 Method and system for constructing electronic evidence
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106296359A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 Credible electric power networks transaction platform based on block chain technology
CN106485167A (en) * 2016-09-22 2017-03-08 中金云金融(北京)大数据科技股份有限公司 Credit record system and method based on block chain
CN106779385A (en) * 2016-12-07 2017-05-31 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223374A (en) * 2011-06-22 2011-10-19 熊志海 Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
WO2014201059A1 (en) * 2013-06-10 2014-12-18 Certimix, Llc Secure storing and offline transfering of digitally transferable assets
CN105790954A (en) * 2016-03-02 2016-07-20 布比(北京)网络技术有限公司 Method and system for constructing electronic evidence
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106296359A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 Credible electric power networks transaction platform based on block chain technology
CN106485167A (en) * 2016-09-22 2017-03-08 中金云金融(北京)大数据科技股份有限公司 Credit record system and method based on block chain
CN106779385A (en) * 2016-12-07 2017-05-31 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张仕斌等: "电子证据收集与还原系统的设计与实现", 《技术研究》 *
李兆森等: "基于区块链的电子数据存证应用研究", 《软件》 *

Cited By (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111819817A (en) * 2018-03-08 2020-10-23 区块链控股有限公司 Method and system for block chain implementation for bilinear mapping accumulator-based authorization
CN108429759B (en) * 2018-03-28 2020-06-30 电子科技大学成都研究院 Decentralized storage safety implementation method
CN108429759A (en) * 2018-03-28 2018-08-21 电子科技大学成都研究院 Decentralization stores safety implementation method
CN108647230A (en) * 2018-03-29 2018-10-12 深圳市网心科技有限公司 Distributed storage method, electronic device and storage medium
CN108647230B (en) * 2018-03-29 2021-10-08 深圳市网心科技有限公司 Distributed storage method, electronic device, and storage medium
CN108712380A (en) * 2018-04-12 2018-10-26 三维通信股份有限公司 A kind of mixing identity identifying method based on strategy
CN108650252A (en) * 2018-04-28 2018-10-12 分布共享(北京)信息技术有限公司 The data-sharing systems and method of a kind of safety, fair protection privacy
CN108650252B (en) * 2018-04-28 2020-09-29 分布共享(北京)信息技术有限公司 Data sharing system and method for protecting privacy safely and fairly
CN108897760A (en) * 2018-05-22 2018-11-27 贵阳信息技术研究院(中科院软件所贵阳分部) Electronic evidence chain integrity verification method based on Merkel tree
CN108769031A (en) * 2018-05-31 2018-11-06 中化能源科技有限公司 The material object of edge calculations service based on block chain deposits card traceability system
CN109246179A (en) * 2018-06-30 2019-01-18 华为技术有限公司 Safeguard method and apparatus, server and the computer readable storage medium of block chain
CN109165304A (en) * 2018-07-03 2019-01-08 泰链(厦门)科技有限公司 Building method, medium and the system of block chain
CN110738584A (en) * 2018-07-20 2020-01-31 樊华 intellectual property information management system and method
WO2020038095A1 (en) * 2018-08-21 2020-02-27 阿里巴巴集团控股有限公司 Evidence collection method and system based on blockchain evidence storage
CN109376552A (en) * 2018-08-21 2019-02-22 阿里巴巴集团控股有限公司 A kind of evidence collection method and system for depositing card based on block chain
EP3734489A4 (en) * 2018-08-21 2021-10-06 Advanced New Technologies Co., Ltd. Evidence collection method and system based on blockchain evidence storage
CN109166040A (en) * 2018-08-23 2019-01-08 北京京东金融科技控股有限公司 Transaction auditing method, device, equipment and storage medium based on block chain
TWI764043B (en) * 2018-09-14 2022-05-11 宏達國際電子股份有限公司 Method of social key recovery and related device
CN110309259A (en) * 2018-10-10 2019-10-08 腾讯科技(深圳)有限公司 Audit result data storage, querying method, audit item storage method and device
US11316669B2 (en) 2018-10-10 2022-04-26 Tencent Technology (Shenzhen) Company Limited Audit result data storage method and device, audit result data query method and device, and audit item storage method and device
CN110309259B (en) * 2018-10-10 2021-09-03 腾讯科技(深圳)有限公司 Audit result data storage and query methods, and audit item storage method and device
US11700113B2 (en) 2018-10-10 2023-07-11 Tencent Technology (Shenzhen) Company Limited Audit result data storage method and device, audit result data query method and device, and audit item storage method and device
CN109462540A (en) * 2018-10-12 2019-03-12 彩讯科技股份有限公司 Mail deposits card methods, devices and systems
CN109150550A (en) * 2018-10-31 2019-01-04 重庆爱思网安信息技术有限公司 A kind of electronic data dynamic hash chain common recognition storage system and method
CN111144881B (en) * 2018-11-06 2024-01-30 国际商业机器公司 Selective access to asset transfer data
CN111144881A (en) * 2018-11-06 2020-05-12 国际商业机器公司 Selective access to asset transfer data
CN110032880A (en) * 2018-12-13 2019-07-19 阿里巴巴集团控股有限公司 Record screen evidence collecting method, system and electronic equipment based on block chain
CN109726997A (en) * 2019-01-09 2019-05-07 广州闪链区块链科技有限公司 A kind of gold register auditing method, device and storage medium based on block chain
CN109547218A (en) * 2019-01-18 2019-03-29 北京工业大学 It is a kind of improve BIP agreement alliance's chain node code key distribution and standby system
CN109547218B (en) * 2019-01-18 2021-10-15 北京工业大学 Alliance link node key distribution and backup system for improving BIP (building information processing) protocol
CN110008728A (en) * 2019-04-11 2019-07-12 苏州超擎图形软件科技发展有限公司 Electronic evidence method for anti-counterfeit and device
CN110008728B (en) * 2019-04-11 2021-08-24 苏州超擎图形软件科技发展有限公司 Electronic evidence anti-counterfeiting method and device
CN110020844A (en) * 2019-04-17 2019-07-16 深圳市先河系统技术有限公司 Control method, system and the relevant device of decentralization storage
CN110189122A (en) * 2019-04-30 2019-08-30 阿里巴巴集团控股有限公司 The method and device fixed time for the data anchor on block chain, electronic equipment
CN110276610A (en) * 2019-05-31 2019-09-24 阿里巴巴集团控股有限公司 The method and device of dynamic encryption is realized based on transaction offset
CN110276610B (en) * 2019-05-31 2021-04-06 创新先进技术有限公司 Method and device for realizing dynamic encryption based on transaction offset
CN110324422A (en) * 2019-07-05 2019-10-11 北京大学 A kind of substantive approach and system of cloud application
CN110351297A (en) * 2019-07-23 2019-10-18 深圳前海微众银行股份有限公司 A kind of verification method and device applied to block chain
CN110351297B (en) * 2019-07-23 2022-04-01 深圳前海微众银行股份有限公司 Verification method and device applied to block chain
CN110532290A (en) * 2019-07-25 2019-12-03 深圳壹账通智能科技有限公司 Information Authentication device, method and storage medium based on block chain
CN110532290B (en) * 2019-07-25 2023-05-12 深圳壹账通智能科技有限公司 Information verification device, method and storage medium based on block chain
CN110674521A (en) * 2019-09-27 2020-01-10 合肥工业大学 Privacy protection evidence management system and method
CN111368080A (en) * 2020-02-29 2020-07-03 重庆百事得大牛机器人有限公司 Electronic evidence collecting and recording method for legal consultation robot
CN111460499A (en) * 2020-03-31 2020-07-28 中国电子科技集团公司第三十研究所 Merkletree-based block chain user attribute set verification method for protecting privacy
WO2021196091A1 (en) * 2020-04-01 2021-10-07 南方科技大学 Method and system for proving existence of file, and server and storage medium
CN111368007A (en) * 2020-04-03 2020-07-03 南京审计大学 Environment audit access system based on block chain technology
CN111711655A (en) * 2020-05-14 2020-09-25 特斯联科技集团有限公司 Block chain-based electronic data evidence storing method, system, storage medium and terminal
CN111738832A (en) * 2020-06-22 2020-10-02 中国银行股份有限公司 Block chain-based deposit certificate checking method, device, equipment and medium
NL2028778A (en) * 2020-07-20 2022-03-15 Jiangsu Aowei Holdings Co Ltd Blockchain electronic contract management system
FR3112625A1 (en) * 2020-07-20 2022-01-21 Jiangsu Aowei Holdings Co., Ltd. Blockchain electronic contract management system
CN111814141A (en) * 2020-09-15 2020-10-23 浙江数秦科技有限公司 Off-line process evidence obtaining and storing method based on block chain
US20220327239A1 (en) * 2021-04-09 2022-10-13 VIQ Solutions Inc. Securing and managing offline digital evidence with a smart data lease system
US11822701B2 (en) * 2021-04-09 2023-11-21 VIQ Solutions Inc. Securing and managing offline digital evidence with a smart data lease system
CN113343256A (en) * 2021-06-04 2021-09-03 中荧科技股份有限公司 Electronic evidence obtaining and storing system based on block chain technology
CN114614981A (en) * 2022-02-21 2022-06-10 北京航空航天大学 Hidden information transmission method and device based on-chain negotiation
CN114614981B (en) * 2022-02-21 2023-12-19 北京航空航天大学 Hidden information transmission method and device based on-chain negotiation
CN115314352A (en) * 2022-07-27 2022-11-08 北京航空航天大学 Privacy-enhanced fair block chain leader election method and device
CN115314352B (en) * 2022-07-27 2023-12-12 北京航空航天大学 Privacy-enhanced fair blockchain leader election method and device

Also Published As

Publication number Publication date
CN107682308B (en) 2019-12-13

Similar Documents

Publication Publication Date Title
CN107682308A (en) The electronic evidence preservation system for Channel Technology of being dived based on block chain
CN111259070B (en) Method and related device for storing and acquiring service data
Zhang et al. Research on a covert communication model realized by using smart contracts in blockchain environment
Zhu et al. Dynamic audit services for outsourced storages in clouds
CN111914027B (en) Block chain transaction keyword searchable encryption method and system
US20190036895A1 (en) Data distribution over nodal elements
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
CN108964905A (en) A kind of safe and efficient block chain implementation method
KR20180115768A (en) Encryption method and system for secure extraction of data from a block chain
CN107911216A (en) A kind of block chain transaction method for secret protection and system
CN107301521A (en) Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN107070938A (en) Data access control system based on block chain
CN106982203A (en) The ATM network system and its information processing method of robust based on block chain technology
CN113781073B (en) Subsidizing method capable of hiding real names based on matrix alliance chain
CN106650495A (en) File verification method and device
CN110289951A (en) A kind of shared content monitoring method based on Threshold key sharing and block chain
CN106487786A (en) A kind of cloud data integrity verification method based on biological characteristic and system
CN112801778A (en) Federated bad asset blockchain
CN104125230A (en) Short message authentication service system and authentication method
CN115270145A (en) User electricity stealing behavior detection method and system based on alliance chain and federal learning
CN112765565A (en) Copyright protection method and system based on block chain
CN108156139A (en) No certificate can verify that multiple key cryptogram search system and method
Gao et al. BFR-SE: a blockchain-based fair and reliable searchable encryption scheme for IoT with fine-grained access control in cloud environment
CN114254394A (en) Data sharing system and method based on alliance chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210830

Address after: 310053 No. 18, Chuanghui street, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: BUAA HANGZHOU INNOVATION INSTITUTE

Address before: 100191 No. 37, Haidian District, Beijing, Xueyuan Road

Patentee before: BEIHANG University

TR01 Transfer of patent right