CN109033875A - Publication executes authentication method offline in a kind of block chain - Google Patents

Publication executes authentication method offline in a kind of block chain Download PDF

Info

Publication number
CN109033875A
CN109033875A CN201810861565.7A CN201810861565A CN109033875A CN 109033875 A CN109033875 A CN 109033875A CN 201810861565 A CN201810861565 A CN 201810861565A CN 109033875 A CN109033875 A CN 109033875A
Authority
CN
China
Prior art keywords
value
hash
document
hashed value
hashed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810861565.7A
Other languages
Chinese (zh)
Inventor
刘慧�
段安婧
刘祎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Longsheng Kps New Mstar Technology Ltd
Original Assignee
Changsha Longsheng Kps New Mstar Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Longsheng Kps New Mstar Technology Ltd filed Critical Changsha Longsheng Kps New Mstar Technology Ltd
Priority to CN201810861565.7A priority Critical patent/CN109033875A/en
Publication of CN109033875A publication Critical patent/CN109033875A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses issuing to execute authentication method offline in a kind of block chain, include the following steps: (a) existing document management server, to obtain the given issue object document request for the result from user terminal issued offline;(b) document management server, which is obtained, is applied to by by hash function about the id information of offline document and from the second particular Hash value generated and comparing value that document data obtains, first representative that the value obtained by the cryptographic Hash of hashed value or processing from common block chain database is generated by using this method and the ID of transmission addition is indicated by using the second particular Hash value for representing hashed value or the second acquisition, it carries out the first representativeness and executes processing, for obtaining the cryptographic Hash obtained by processing.

Description

Publication executes authentication method offline in a kind of block chain
Technical field
The present invention relates to block chain technical fields, in particular to publication executes authenticating party offline in a kind of block chain Method.
Background technique
Existing block chain data press the block chain data of Node distribution, each node storage full dose or part.When block chain In when having multiple nodes, each node saves a independent data, and data are stored on the physical hard disk of this node, this Storage organization can not simply provide across a network access;Each module close-coupled in existing block chain software simultaneously, is all deployed in It on same node, when run-time error occurs, can not be monitored for wherein single module, and can not be wrong for there is operation Module accidentally carries out corresponding processing, difficult so as to cause the O&M of block chain.When for there is no network, how block chain is carried out The certification of data is the technical problem for needing urgently to solve.
Summary of the invention
The invention proposes issuing to execute authentication method offline in a kind of block chain, include the following steps:
(a) existing document management server is used for what acquisition was issued offline from the given of the result of user terminal The request of issue object document;(i) make a reservation for the id information of distribution destination and registration, (II) reference paper is obtained from data Value, and (iii) reference documents data include corresponding to the scheduled file for issuing destination document to dedicated block chain number According to the character data of the content in library, then a specific cryptographic Hash, generates in the first particular Hash value;
(b) document management server obtains by being applied to hash function about the id information of offline document and from comparing Value that document data obtains and the second particular Hash value for generating, by using represent hashed value or second obtain it is second specific Hashed value indicates to add the hashed value or processing generated by from common block chain database by using this method and the ID of transmission First representative of cryptographic Hash and the value that obtains, carry out first it is representative executes processing, for obtaining the Kazakhstan obtained by processing Uncommon value;Also, the described first hashed value indicated or the first value of hashed value or second expression of second expression, processing Described first represents the hash of hashed value and using treated value generation document authentication end value.
The method, middle first particular Hash value that generates of the step (a) specifically include: (i) ID is described for issuing The file destination of predetermined information, and (ii), by using hash function from1The value obtained in reference paper data generates Hash-and by calculate at least one matched adjacent hashes value of the first particular Hash value or by processing first represent dissipate Value that train value obtains and first representing hashed value and be registered in Rake block chain database for generating, it is by corresponding to this to TxID Addition management, document management server, for the certification request information issued offline, id information and the comparison for off-line files Document data-compare document wherein, document management server includes: the image data that (i) extracts offline document, and passes through word It accords with identification technology (OCR) and extracts character data;(ii) character data extracted from the image data of offline document is received, to obtain The character data of document data must be compared.
The method, step (b), the representative hashed value of the second of generation or the second representative hashed value will be with the first generation Table hashed value or the first representative hashed value and the value obtained is compared.
The method, by calculating, matched at least one is adjacent with the second particular Hash value and the second particular Hash value Hashed value generates second generation table hashed value.
The method, the method for second particular Hash value and the hashed value for calculating or calculating, is assigned to brother Node and the node of the second particular Hash value are assigned to support, and calculate for second particular Hash value and by hashed value Calculated value out is assigned to the hashed value of the brother of node, which is assigned to the father node of the node, If father node is the root node for merging tree, the hashed value for distributing to father node is used as from public using the information of transmission The second of block chain database represents hashed value, if father node is not the root node for merging tree, distributes to the hash of father node Value is arranged to the second particular Hash value and repeats.
Detailed description of the invention
From following description with reference to the accompanying drawings it will be further appreciated that the present invention.Component in figure is not drawn necessarily to scale, But it focuses on and shows in the principle of embodiment.In the figure in different views, identical appended drawing reference is specified to be corresponded to Part.
Fig. 1 is that publication executes authentication method schematic diagram offline in block chain of the invention.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to this Invention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have to It is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodiment System, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included in It in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail below The other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
The invention proposes issuing to execute authentication method offline in a kind of block chain, include the following steps:
(a) existing document management server is used for what acquisition was issued offline from the given of the result of user terminal The request of issue object document;(i) make a reservation for the id information of distribution destination and registration, (II) reference paper is obtained from data Value, and (iii) reference documents data include corresponding to the scheduled file for issuing destination document to dedicated block chain number According to the character data of the content in library, then a specific cryptographic Hash, generates in the first particular Hash value;
(b) document management server obtains by being applied to hash function about the id information of offline document and from comparing Value that document data obtains and the second particular Hash value for generating, by using represent hashed value or second obtain it is second specific Hashed value indicates to add the hashed value or processing generated by from common block chain database by using this method and the ID of transmission First representative of cryptographic Hash and the value that obtains, carry out first it is representative executes processing, for obtaining the Kazakhstan obtained by processing Uncommon value;Also, the described first hashed value indicated or the first value of hashed value or second expression of second expression, processing Described first represents the hash of hashed value and using treated value generation document authentication end value.
The method, middle first particular Hash value that generates of the step (a) specifically include: (i) ID is described for issuing The file destination of predetermined information, and (ii), by using hash function from1The value obtained in reference paper data generates Hash-and by calculate at least one matched adjacent hashes value of the first particular Hash value or by processing first represent dissipate Value that train value obtains and first representing hashed value and be registered in Rake block chain database for generating, it is by corresponding to this to TxID Addition management, document management server, for the certification request information issued offline, id information and the comparison for off-line files Document data-compare document wherein, document management server includes: the image data that (i) extracts offline document, and passes through word It accords with identification technology (OCR) and extracts character data;(ii) character data extracted from the image data of offline document is received, to obtain The character data of document data must be compared.
The method, step (b), the representative hashed value of the second of generation or the second representative hashed value will be with the first generation Table hashed value or the first representative hashed value and the value obtained is compared.
The method, by calculating, matched at least one is adjacent with the second particular Hash value and the second particular Hash value Hashed value generates second generation table hashed value.
The method, the method for second particular Hash value and the hashed value for calculating or calculating, is assigned to brother Node and the node of the second particular Hash value are assigned to support, and calculate for second particular Hash value and by hashed value Calculated value out is assigned to the hashed value of the brother of node, which is assigned to the father node of the node, If father node is the root node for merging tree, the hashed value for distributing to father node is used as from public using the information of transmission The second of block chain database represents hashed value, if father node is not the root node for merging tree, distributes to the hash of father node Value is arranged to the second particular Hash value and repeats.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and Modification equally falls into the scope of the claims in the present invention.

Claims (5)

1. publication executes authentication method offline in a kind of block chain, which comprises the steps of:
(a) existing document management server, to obtain the given publication for the result from user terminal issued offline Object documents request;(i) id information of predetermined distribution destination and registration, the value that (II) reference paper is obtained from data, with And (iii) reference documents data include the file corresponding to the scheduled distribution destination document into dedicated block chain database Content character data, then a specific cryptographic Hash generates in the first particular Hash value;
(b) document management server obtains by being applied to hash function about the id information of offline document and from comparing document Value that data obtain and the second particular Hash value for generating, by using representing hashed value or second the second specific hash for obtaining Value indicates to generate the Hash by hashed value or processing from common block chain database by using this method and the ID of transmission addition First representative of value and the value of acquisition carries out the first representativeness and executes processing, for obtaining the cryptographic Hash obtained by processing; Also, the described first hashed value indicated or the described second hashed value for indicating described second indicate the first value, described in processing First represents the hash of hashed value and using treated value generation document authentication end value.
2. the method as described in claim 1, which is characterized in that generate the first particular Hash value in the step (a) and specifically wrap Include: (i) ID is used to issue the file destination of the predetermined information, and (ii), by using hash function from1With reference to text The Hash-and pass through calculating and at least one matched adjacent hashes value of the first particular Hash value that the value that number of packages obtains in generates Or first generated by handling the value that first represents hashed value acquisition represents hashed value and is registered in Rake block chain database, It is to add management, document management server, for the certification request information issued offline, id information to TxID by corresponding to this Compare document wherein with the document data-of the comparison for off-line files, document management server includes: that (i) extracts offline text The image data of shelves, and character data is extracted by character recognition technologies (OCR);(ii) image data from offline document is received The character data of middle extraction, to obtain the character data for comparing document data.
3. the method as described in claim 1, which is characterized in that step (b), the representative hashed value of the second of generation or the second generation Table hashed value by with the first representative hashed value or the first representative hashed value and the value that obtains is compared.
4. according to the method described in claim 2, it is characterized in that, specific scattered with the second particular Hash value and second by calculating At least one adjacent hashes values of hash value matches generates second generation table hashed value.
5. according to the method described in claim 3, it is characterized in that, second particular Hash value and the hash for calculating or calculating The method of value, the node for being assigned to the brotgher of node and the second particular Hash value are assigned to support, and special for described second Determine hashed value and be assigned to the hashed value of the brother of node by the calculated calculated value of hashed value, which is divided The father node of node described in dispensing will distribute to father using the information of transmission and save if father node is the root node for merging tree The hashed value of point represents hashed value as second from common block chain database, if father node is not the root section for merging tree Point, the then hashed value for distributing to father node are arranged to the second particular Hash value and repeat.
CN201810861565.7A 2018-08-01 2018-08-01 Publication executes authentication method offline in a kind of block chain Withdrawn CN109033875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810861565.7A CN109033875A (en) 2018-08-01 2018-08-01 Publication executes authentication method offline in a kind of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810861565.7A CN109033875A (en) 2018-08-01 2018-08-01 Publication executes authentication method offline in a kind of block chain

Publications (1)

Publication Number Publication Date
CN109033875A true CN109033875A (en) 2018-12-18

Family

ID=64647237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810861565.7A Withdrawn CN109033875A (en) 2018-08-01 2018-08-01 Publication executes authentication method offline in a kind of block chain

Country Status (1)

Country Link
CN (1) CN109033875A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101542468A (en) * 2006-11-28 2009-09-23 密刻爱你有限公司 System and method for verificating electric document and system for providing electric document service
WO2017135670A1 (en) * 2016-02-02 2017-08-10 주식회사 코인플러그 Method and server for providing notary service for file and verifying file recorded by notary service
KR101841929B1 (en) * 2016-11-02 2018-03-27 주식회사 코인플러그 Method for issuing document offline and method for validating issued offline document on the basis of merkle tree structure, and server using the same

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101542468A (en) * 2006-11-28 2009-09-23 密刻爱你有限公司 System and method for verificating electric document and system for providing electric document service
WO2017135670A1 (en) * 2016-02-02 2017-08-10 주식회사 코인플러그 Method and server for providing notary service for file and verifying file recorded by notary service
KR101841929B1 (en) * 2016-11-02 2018-03-27 주식회사 코인플러그 Method for issuing document offline and method for validating issued offline document on the basis of merkle tree structure, and server using the same

Similar Documents

Publication Publication Date Title
US20200374126A1 (en) Method for storing an object on a plurality of storage nodes
CN111782923A (en) Data query method and device, electronic equipment and storage medium
US8955143B1 (en) Use of decoy data in a data store
CN105447046A (en) Distributed system data consistency processing method, device and system
US11323245B2 (en) Method for linking block-chain using hyper-chain, and apparatus therefor
CN111563753A (en) Query method and device for product tracing information, server and storage medium
CN114218318B (en) Data processing system and method for electric power big data
CN112667592A (en) Data storage method and device, computer equipment and storage medium
CN109474691A (en) A kind of method and device of internet of things equipment identification
CN113901078A (en) Business order association query method, device, equipment and storage medium
CN103440302B (en) The method and system of Real Data Exchangs
CN109005167B (en) Authentication data processing method and device, server and storage medium
CN109033875A (en) Publication executes authentication method offline in a kind of block chain
US20230009460A1 (en) Trail recording system and data verification method
CN109960459A (en) A kind of data-storage system
EP3174263A1 (en) Apparatus and method for verifying detection rule
CN114721582A (en) Information sharing method and device and related equipment
CN115439118B (en) Digital certificate storage management method based on blockchain
CN116028444B (en) File fingerprint generation method, device and system, electronic equipment and storage medium
CN103092940A (en) File structure, digital signature method and digital signature validation method with verifiable reconfiguration
CN109344308A (en) A kind of personnel file management method and system
CN111339566B (en) Block summarization method, device, computer equipment and storage medium
KR101320833B1 (en) Method and evaluation server for evaluating performance of feature-based filtering
CN107194613B (en) Digital asset coding method
CN112101926B (en) Intelligent payment method and system for patent annual fee

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181218