CN113610526A - Data trust method and device, electronic equipment and storage medium - Google Patents

Data trust method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113610526A
CN113610526A CN202110974484.XA CN202110974484A CN113610526A CN 113610526 A CN113610526 A CN 113610526A CN 202110974484 A CN202110974484 A CN 202110974484A CN 113610526 A CN113610526 A CN 113610526A
Authority
CN
China
Prior art keywords
hash value
current transaction
current
data
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110974484.XA
Other languages
Chinese (zh)
Inventor
史锋锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Dianrong Information Technology Co ltd
Original Assignee
Shanghai Dianrong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Dianrong Information Technology Co ltd filed Critical Shanghai Dianrong Information Technology Co ltd
Priority to CN202110974484.XA priority Critical patent/CN113610526A/en
Publication of CN113610526A publication Critical patent/CN113610526A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The invention discloses a data trust method, a data trust device, electronic equipment and a storage medium. The method comprises the following steps: obtaining the hash value of the current block, and calculating the hash value of the current transaction according to the hash value of the current block and the current transaction data; calculating signature information of the hash value of the current transaction; and submitting the hash value of the current transaction, the identity identification information of the user side and the signature information to the block link points, so that the block link points verify the signature information based on the hash value and the identity identification information of the current block to obtain current transaction data and store the current transaction data. According to the embodiment of the invention, the problem of weak tamper resistance of the block chain of the centralized data storage is solved, and the hash value of the current block is contained in the current transaction hash value through hash operation, so that the tamper resistance of the current transaction data is ensured through the hash value of the current block, and the tamper resistance of the block chain of the centralized data storage is improved.

Description

Data trust method and device, electronic equipment and storage medium
Technical Field
The embodiment of the invention relates to information technology, in particular to a data trust method, a data trust device, electronic equipment and a storage medium.
Background
The application mode of the block chain as a computer technology has a plurality of characteristics of distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. Each block chain network comprises a plurality of distributed block chain link points, and the nodes complete block generation and transaction packaging through a consensus algorithm. How many participants on the blockchain affect the tamper resistance of the blockchain to some extent, such as: the public link has a plurality of participants, the data is most resistant to tampering, the larger the number of the participants in the alliance link is, the stronger the data is resistant to tampering, and the weakest the data in the private link is resistant to tampering. In a centralized system, data is stored in a centralized database, since the block data in all the blockchain nodes are stored in a centralized manner, transaction data in the blocks can be modified, and it is fully feasible to recalculate all the block hash values after the modified blocks, so that the blockchain is difficult to exert the capability of preventing tampering.
Disclosure of Invention
The invention provides a data trust method, a data trust device, electronic equipment and a storage medium, solves the problem that the tamper resistance of a data storage centralized block chain in a centralized system is weak, and enhances the tamper resistance of the data storage centralized block chain in the centralized system.
In a first aspect, an embodiment of the present invention provides a data trust method, where the method includes:
obtaining a hash value of a current block, and calculating a current transaction hash value according to the hash value of the current block and current transaction data;
calculating signature information of the current transaction hash value;
and submitting the current transaction hash value, the identity identification information of the user side and the signature information to the block chain node, so that the block chain node verifies the signature information based on the current transaction hash value and the identity identification information to obtain the current transaction data and stores the current transaction data.
Further, the calculating the current transaction hash value according to the hash value of the current chunk and the current transaction data includes:
and carrying out hash operation on the hash value of the current block and the current transaction data by using a hash function to obtain the current transaction hash value.
Further, the calculating signature information of the current transaction hash value includes:
and encrypting the current transaction hash value according to a private key corresponding to the user side to obtain signature information of the current transaction hash value.
Further, after submitting the current transaction hash value, the identity information of the user side, and the signature information to the block node, the method further includes:
and receiving a submission failure message sent by the block connection node.
In a second aspect, an embodiment of the present invention further provides a data trust apparatus, where the apparatus includes:
the data acquisition module is used for acquiring the hash value of the current block and calculating the hash value of the current transaction according to the hash value of the current block and the current transaction data;
the signature calculation module is used for calculating signature information of the current transaction hash value;
and the transaction submitting module is used for submitting the current transaction hash value, the identity information of the user side and the signature information to the block chain node, so that the block chain node verifies the signature information based on the hash value of the current block and the identity information to obtain the current transaction data and stores the latest uplink block.
In a third aspect, an embodiment of the present invention further provides a data trust method, where the method includes:
receiving a current transaction hash value, identity identification information and signature information of a user side, and determining a public key corresponding to the user side according to the identity identification information of the user side;
decrypting the signature information according to the public key to obtain a current transaction hash value to be verified;
and verifying the current transaction hash value to be verified according to the current transaction hash value, if the current transaction hash value passes the verification, determining current transaction data according to the current transaction hash value, and storing the current transaction data in a latest uplink block.
Further, the verifying the current transaction hash value to be verified according to the current transaction hash value includes:
determining whether the current transaction hash value is consistent with the current transaction hash value to be verified;
and when the current transaction hash value is consistent with the current transaction hash value to be verified, the current transaction hash value to be verified passes verification.
Further, after determining whether the current transaction hash value is consistent with the current transaction hash value to be verified, the method further includes:
when the current transaction hash value is inconsistent with the current transaction hash value to be verified, the current transaction hash value to be verified is not verified, and a submission failure message is sent to the user side
Further, determining the public key corresponding to the user side according to the identity information of the user side includes:
and matching the public key corresponding to the user side in a key pool corresponding to the block link point according to the received identity information of the user side.
In a fourth aspect, an embodiment of the present invention further provides a data trust apparatus, where the apparatus includes:
the data receiving module is used for receiving the hash value of the current block, the identity identification information and the signature information of the user side and determining a public key corresponding to the user side according to the identity identification information of the user side;
the public key decryption module is used for decrypting the signature information according to the public key to obtain a current transaction hash value to be verified;
and the data storage module is used for verifying the current transaction hash value to be verified according to the current transaction hash value, determining current transaction data according to the current transaction hash value if the current transaction hash value passes the verification, and storing the current transaction data in the latest uplink block.
In a fifth aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement a data trust method as described.
In a sixth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the data trust method.
According to the embodiment of the invention, the hash value of the current block is obtained, and the hash value of the current transaction is calculated according to the hash value of the current block and the current transaction data; calculating signature information of the hash value of the current transaction; and submitting the current transaction hash value, the identity identification information of the user side and the signature information to the block link points, so that the block link points verify the signature information based on the current transaction hash value and the identity identification information to obtain current transaction data and store the current transaction data. According to the embodiment of the invention, the problem of weak tamper resistance of the block chain of the centralized data storage is solved, and the hash value of the current block is contained in the current transaction hash value through hash operation, so that the tamper resistance of the current transaction data is ensured through the hash value of the current block, and the tamper resistance of the block chain of the centralized data storage is improved.
Drawings
FIG. 1 is a flow chart diagram of a data trust method provided by an embodiment of the present invention;
FIG. 2 is another flow chart of a data trust method provided by an embodiment of the present invention;
FIG. 2A is a schematic diagram of a data trust method provided by an embodiment of the present invention;
FIG. 2B is a schematic diagram illustrating another principle of the data trust method according to the embodiment of the present invention
FIG. 3 is another flow chart of a data trust method provided by an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a data trust apparatus provided in an embodiment of the present invention;
fig. 5 is another schematic structural diagram of a data trust apparatus provided in an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Fig. 1 is a schematic flowchart of a data trust method according to an embodiment of the present invention, which may be executed by a data trust apparatus according to an embodiment of the present invention, where the apparatus may be implemented in software and/or hardware. In a particular embodiment, the apparatus may be integrated in an electronic device, which may be, for example, a server. The following embodiments will be described by taking as an example that the apparatus is integrated in an electronic device, and referring to fig. 1, the method may specifically include the following steps:
step 110, obtaining a hash value of a current block, and calculating a current transaction hash value according to the hash value of the current block and current transaction data;
for example, the hash value of a block may be understood as a hash value obtained by hashing information of a block in a block chain, a block position in the block chain may be uniquely and explicitly identified, and any block chain node may obtain the block hash value by hashing a block header. The hash value of the current block may be understood as a hash value corresponding to a block on a block chain selected according to a preset rule, where the hash value of the current block may be a block previous to the last uplink block or any block previous to the last uplink block, and is used to form the current transaction hash value with the current transaction data. The preset rule can be understood as a random function set according to requirements and experimental data. The current transaction data may be understood as data corresponding to data stored in the blockchain after the user submits the transaction. The current transaction hash value may be understood as a hash value used for generating signature information capable of verifying a change of current transaction data, and is not a hash value of the current transaction data, nor a current transaction hash value, but only a hash value of a current block and a hash value of the current transaction data calculated by a hash function.
In the specific implementation, before the user side submits the transaction data to the block link point, the hash value of the current block selected according to the preset rule is obtained, and the corresponding current transaction hash value is calculated according to the hash value of the current block and the current transaction data through the hash function. Before the hash value of the current block and the current transaction data are subjected to the hash function, the hash value of the current block and the current transaction data can be operated to obtain the current block, the hash value and the mapping data of the current transaction hash value corresponding to the current transaction data. The hash value of the current block and the current transaction data obtain mapping data of the current transaction hash value, and the mapping data of the current transaction hash value can be understood as data input into a hash function.
Step 120, calculating signature information of the current transaction hash value;
for example, the signature information of the current transaction hash value may be understood as that the current transaction hash value is encrypted by the identity information of the user side to obtain signature information corresponding to the identity information of the user side, which is used to prove the authenticity of the data source and verify the identity of the data, and the current transaction hash value is obtained by decrypting the current transaction hash value according to a decryption method corresponding to the identity information of the user side, so as to avoid falsification and data authentication in the transmission process. The signature information for calculating the hash value of the current transaction can use different calculation methods according to the calculation speed, the encryption intensity and the signature length, such as: hash algorithm, elliptic curve digital signature algorithm, serial number verification algorithm, public key and private key and other encryption methods.
In the specific implementation, the hash value of the current block selected according to the preset rule is obtained, and the corresponding current transaction hash value is calculated through a hash function according to the hash value of the current block and the current transaction data. The current transaction hash value is encrypted according to the identity information of the user side to obtain signature information of the current transaction hash value, the signature information is used for proving the authenticity of a data source and verifying data, the current transaction hash value can be obtained by decrypting the current transaction hash value according to a decryption method corresponding to the identity information of the user side, and forgery and data authentication in a transmission process are avoided. Wherein, by, the integrity of the data is guaranteed. The signature is generated by calculating the hash value (current transaction hash value) of the information and encrypting the hash value through the identity identification information of the user side, so that the source and the integrity of the data are ensured.
Step 130, submitting the current transaction hash value, the identity information of the user side and the signature information to the blockchain node, so that the blockchain node verifies the signature information based on the current transaction hash value and the identity information to obtain the current transaction data and stores the current transaction data.
By way of example, a block link point may be understood as a server having the functions of sending, receiving and verifying the consistency of data for analyzing data information of received transactions and storing the data information of transactions in a particular block. The client side can be understood as a program for providing local service for the client, and the program is generally installed on the client machine and operated with the server side in a matching way. The identity information of the user side can be understood as information for uniquely identifying the identity of the user side, and is used for distinguishing different user sides in the network, and can be an international mobile subscriber identity, an IP address of the user side in the network, and a permanent device identifier in a specific system.
In the specific implementation, the user side submits the current hash value, the identification information of the user side and the signature information to the block link points, the block link points can determine the source of the transaction data according to the identification information of the user side, and then the public key corresponding to the identification information of the user side is obtained according to the broadcast message received by the identification information of the user side on the block link nodes. And decrypting the signature information according to the public key to obtain a current transaction hash value to be verified, verifying whether the current transaction hash value to be verified is tampered according to the current transaction hash value, and if the current transaction hash value to be verified passes the verification. Performing inverse calculation according to a calculation method of mapping data of the current transaction hash value to obtain the hash value of the current block and the current transaction data; the current transaction data can be obtained according to the hash value of the current block corresponding to the transaction and the mapping data of the hash value of the current transaction, and the current transaction data is stored in the latest uplink block.
According to the embodiment of the invention, the hash value of the current block is obtained, and the hash value of the current transaction is calculated according to the hash value of the current block and the current transaction data; calculating signature information of the hash value of the current transaction; and submitting the current transaction hash value, the identity identification information of the user side and the signature information to the block link points, so that the block link points verify the signature information based on the current transaction hash value and the identity identification information to obtain current transaction data and store the current transaction data. According to the embodiment of the invention, the problem of weak tamper resistance of the block chain of the centralized data storage is solved, and the hash value of the current block is contained in the current transaction hash value through hash operation, so that the tamper resistance of the current transaction data is ensured through the hash value of the current block, and the tamper resistance of the block chain of the centralized data storage is improved.
The data trust method provided by the embodiment of the present invention is further described below, and as shown in fig. 2, the method may specifically include the following steps:
step 210, obtaining a hash value of a current block, and performing hash operation on the hash value of the current block and the current transaction data by using a hash function to obtain the current transaction hash value;
for example, a current block corresponding to the current transaction data is selected from a block chain according to a preset rule, and a hash value of the current block is obtained, where the current block may be a block previous to a last uplink block on the block chain, or may be any block that matches a stored transaction data characteristic according to an occupied memory size of the current transaction data or a characteristic of the current transaction data. The hash function can be understood as a mapping relation which reformulates the original data, is used for determining elements in the hash table, can perform mapping according to the hash table, reformulates the original data, breaks the original relation between the elements in the current transaction data, and enables the data in the current transaction data to be arranged according to the hash corresponding to the hash function.
Fig. 2A is a schematic diagram illustrating a principle of the data trust method according to an embodiment of the present invention, as shown in fig. 2A, the block link point includes three blocks with block numbers 10, 11, and 12, and the block link point and the user end can perform information transmission. The current block is the previous block 11 of the last uplink block 12 on the blockchain, and the hash value of the previous block 11 and the current transaction data are used to obtain the current transaction hash value through a hash function. In the specific implementation, a current block corresponding to current transaction data is selected from a block chain according to a preset rule, the current block is a block before a last uplink block on the block chain, and an acquisition block chain node acquires a hash value corresponding to the block before the last uplink block as a hash value of the current block. And calculating according to the hash value of the current block and the current transaction data to obtain mapping data of the current transaction hash value, and performing hash operation by using the mapping data of the hash function corresponding to the current transaction hash value to obtain the signature information of the current transaction hash value used for obtaining the current transaction hash value.
Fig. 2B is another schematic diagram of a data trust method according to an embodiment of the present invention, and as shown in fig. 2B, a chunk header in a current chunk points to a previous chunk through a hash value of the previous chunk, where the chunk header includes the hash value of the previous chunk and the hash value of the current chunk. And each transaction stored in the block stores the hash value of the previous block, the current transaction hash value and the transaction data.
Step 220, encrypting the current transaction hash value according to a private key corresponding to the user side to obtain signature information of the current transaction hash value;
by way of example, the private key may be understood as a key private to the undisclosed user side, used for adding a secret to transaction data to generate signature information, and also used for decrypting data encrypted by the public key. The public key and the private key are both keys known to the user or keys established by the user. Encryption can be understood as using a hash function to generate a hash value from the original data, and then using a private key to encrypt the hash value to obtain a corresponding data signature. The digital signature can be understood as a section of digital string which can not be forged and can be generated only by the user end, and is used for effectively verifying the authenticity of the transaction data transmitted by the user end for transmitting the transaction data. The signature information of the current transaction hash value comprises a transaction signature and the current transaction hash value.
In the specific implementation, a current block corresponding to the current transaction data is selected from a block chain according to a preset rule, and a hash value of the current block is obtained. And carrying out hash operation on the hash value of the current block and the current transaction data by using a hash function to obtain the current transaction hash value. And encrypting the current transaction hash value according to a private key corresponding to the user side to obtain a transaction signature, and packaging the transaction signature and the current transaction hash value to obtain signature information corresponding to the current transaction hash value.
Step 230, submitting the current transaction hash value, the identity information of the user side and the signature information to the blockchain node, so that the blockchain node verifies the signature information based on the current transaction hash value and the identity information to obtain the current transaction data and stores the current transaction data.
In the specific implementation, when verifying whether the data is tampered, the user side obtains the target transaction data and the hash value of the current block corresponding to the target transaction data, and performs hash operation on the target transaction data and the hash value of the current block corresponding to the target transaction data by using a hash function to obtain the target transaction hash value. Encrypting the target transaction hash value according to a private key corresponding to the user side to obtain signature information of the target transaction hash value, comparing the signature information with a signature information list, and determining whether the signature information of the target transaction hash value exists in the signature information list or not; and when the signature information of the target transaction hash value does not exist in the signature information list, the target transaction hash value is tampered, and the target transaction data is determined to be tampered. The current transaction hash value is obtained by carrying out hash change on the non-tamper-proof property of the information encrypted by the private key and the hash value of the current block corresponding to the added target transaction data, so that a tamperer cannot tamper the target transaction data randomly on the premise of not obtaining the private key of a user side.
Further, after submitting the current transaction hash value, the identity information of the user side, and the signature information to the block node, the method further includes:
and receiving a submission failure message sent by the block connection node.
For example, the transaction failure message may be understood as a message notifying the user terminal or the server that the transaction was failed to be submitted, and includes information about the transaction submitted to the blockchain node by the user terminal and a failure reason corresponding to the transaction submitted.
In the specific implementation, the user side submits the current hash value, the identification information of the user side and the signature information to the block link points, the block link points can determine the source of the transaction data according to the identification information of the user side, and then the public key corresponding to the identification information of the user side is obtained according to the broadcast message received by the identification information of the user side on the block link nodes. And decrypting the signature information according to the public key to obtain a current transaction hash value to be verified, verifying whether the current transaction hash value to be verified is tampered according to the current transaction hash value, and if the current transaction hash value to be verified is not verified, judging whether the current transaction hash value to be verified is not tampered. The block connection point sends a transaction failure message to the user side, and the user clicks the transaction failure message through the user side to finish the transaction submitting process.
According to the embodiment of the invention, the hash value of the current block is obtained, and the hash value of the current transaction is calculated according to the hash value of the current block and the current transaction data; calculating signature information of the hash value of the current transaction; and submitting the current transaction hash value, the identity identification information of the user side and the signature information to the block link points, so that the block link points verify the signature information based on the current transaction hash value and the identity identification information to obtain current transaction data and store the current transaction data. According to the embodiment of the invention, the problem of weak tamper resistance of the block chain of the centralized data storage is solved, and the hash value of the current block is contained in the current transaction hash value through hash operation, so that the tamper resistance of the current transaction data is ensured through the hash value of the current block, and the tamper resistance of the block chain of the centralized data storage is improved.
Fig. 3 is another schematic flow chart of the data trust method according to the embodiment of the present invention. The method can be executed by the data trust device provided by the embodiment of the invention, and the device can be realized in a software and/or hardware mode and can be generally integrated into a server. As shown in fig. 1, the method of this embodiment specifically includes:
step 310, receiving a current transaction hash value, identity information and signature information of a user side, and determining a public key corresponding to the user side according to the identity information of the user side;
in the specific implementation, when the block link node receives the current transaction hash value, the identity identification information and the signature information of the user side, the identity identification information of the user side is used for distinguishing different user sides in the network, and after a private key and a public key are created at the user side, the public key with the identity identification information of the user side can be broadcasted through a broadcast message, so that a server and other equipment which can transmit the broadcast message with the user side can obtain the public key with the identity identification information of the user side, and the public key with the identity identification information of the user side is stored in a secret key pool according to the received public key; the public key with the identity information of the user side can also be sent to the block chain node in a mode of carrying the public key in the signature information; the public key with the identification information of the user side can be acquired in a certificate acquisition mode, wherein the certificate acquisition mode can be acquired from an external system or a file system.
Step 320, decrypting the signature information according to the public key to obtain a current transaction hash value to be verified;
in the specific implementation, when the block link node receives the current transaction hash value, the identity identification information and the signature information of the user side, and determines the public key corresponding to the user side according to the identity identification information of the user side; and decrypting the transaction signature in the signature information according to the public key corresponding to the user side to obtain a current transaction hash value to be verified, comparing the current transaction hash value to be verified obtained by decryption with the received current transaction hash value, and if the current transaction hash value to be verified obtained by decryption is consistent with the received current transaction hash value, indicating that the transaction data is not tampered and the transaction signature is effective.
And 330, verifying the current transaction hash value to be verified according to the current transaction hash value, if the current transaction hash value passes the verification, determining current transaction data according to the current transaction hash value, and storing the current transaction data in the latest uplink block.
In the specific implementation, the signature information is decrypted according to the secret key to obtain a current transaction hash value to be verified, and mapping data of the current transaction hash value is obtained according to a reverse hash function. Performing inverse calculation according to a calculation method of mapping data of the current transaction hash value to obtain the hash value of the current block and the current transaction data; the current transaction data can be obtained according to the hash value of the current transaction block and the mapping data of the hash value of the current transaction, and the current transaction data is stored in the latest uplink block.
Further, the verifying the current transaction hash value to be verified according to the current transaction hash value includes:
determining whether the current transaction hash value is consistent with the current transaction hash value to be verified;
and when the current transaction hash value is consistent with the current transaction hash value to be verified, the current transaction hash value to be verified passes verification.
In the specific implementation, a public key corresponding to a user side is determined according to identity information of the user side; and decrypting the transaction signature in the signature information according to the public key corresponding to the user side to obtain a current transaction hash value to be verified, comparing the current transaction hash value to be verified obtained by decryption with the received current transaction hash value, and if the current transaction hash value to be verified obtained by decryption is consistent with the received current transaction hash value, indicating that the transaction data is not tampered and the transaction signature is effective. After the current transaction hash value to be verified is verified, the data stored in the current block can be verified according to the fact that the current transaction hash value comprises the hash value of the current block.
Further, after determining whether the current transaction hash value is consistent with the current transaction hash value to be verified, the method further includes:
and when the current transaction hash value is inconsistent with the current transaction hash value to be verified, the current transaction hash value to be verified is not verified, and a submission failure message is sent to the user side.
In a specific implementation, the block link node may determine the source of the transaction data according to the id information of the user side, and then obtain the public key corresponding to the id information of the user side according to the broadcast message received by the id information of the user side on the block link node. And decrypting the signature information according to the public key to obtain a current transaction hash value to be verified, verifying whether the current transaction hash value to be verified is tampered according to the current transaction hash value, and if the current transaction hash value to be verified is not verified, judging whether the current transaction hash value to be verified is not tampered. The block connection point sends a transaction failure message to the user side, and the user clicks the transaction failure message through the user side to finish the transaction submitting process.
Further, determining the public key corresponding to the user side according to the identity information of the user side includes:
and matching the public key corresponding to the user side in a key pool corresponding to the block link point according to the received identity information of the user side.
In the specific implementation, the public key with the identification information of the user side is broadcasted through the broadcast message, so that a server and other equipment which can transmit the broadcast message with the user side can obtain the public key with the identification information of the user side, and the public key with the identification information of the user side, which is received by the block link point, is stored in a secret key pool; and when the identity identification information of the user side sent by the user side is received, matching the public key corresponding to the user side in the public key pool corresponding to the block link point according to the identity identification information of the user side.
The method comprises the steps of obtaining a hash value of a current block, and calculating a current transaction hash value according to the hash value of the current block and current transaction data; calculating signature information of the hash value of the current transaction; and submitting the hash value of the current block, the identity identification information of the user side and the signature information to the block link point, so that the block link point decrypts the signature information based on the hash value and the identity identification information of the current block to obtain current transaction data and stores the current transaction data. According to the embodiment of the invention, the problem of weak tamper resistance of the block chain of the centralized data storage is solved, and the hash value of the current block is contained in the current transaction hash value through hash operation, so that the tamper resistance of the current transaction data is ensured through the hash value of the current block, and the tamper resistance of the block chain of the centralized data storage is improved.
Fig. 4 is a schematic structural diagram of a data trust apparatus according to an embodiment of the present invention, and as shown in fig. 4, the data trust apparatus includes:
a data obtaining module 410, configured to obtain a hash value of a current block, and calculate a current transaction hash value according to the hash value of the current block and current transaction data;
a signature calculation module 420, configured to calculate signature information of the current transaction hash value;
the transaction submission module 430 is configured to,
and submitting the current transaction hash value, the identity identification information of the user side and the signature information to the block chain node, so that the block chain node verifies the signature information based on the current transaction hash value and the identity identification information to obtain the current transaction data and stores the current transaction data.
In an embodiment, the calculating, by the data obtaining module 410, the current transaction hash value according to the hash value of the current chunk and the current transaction data includes:
and carrying out hash operation on the hash value of the current block and the current transaction data by using a hash function to obtain the current transaction hash value.
In one embodiment, the signature calculating module 420 calculates the signature information of the current transaction hash value, including:
and encrypting the current transaction hash value according to a private key corresponding to the user side to obtain signature information of the current transaction hash value.
In one embodiment, the transaction submission module 430
After submitting the current transaction hash value, the identity information of the user side and the signature information to the block link node, the method further comprises the following steps:
and receiving a submission failure message sent by the block connection node.
The device of the embodiment of the invention calculates the hash value of the current transaction according to the hash value of the current block and the current transaction data by acquiring the hash value of the current block; calculating signature information of the hash value of the current transaction; and submitting the current transaction hash value, the identity identification information of the user side and the signature information to the block link points, so that the block link points verify the signature information based on the current transaction hash value and the identity identification information to obtain current transaction data and store the current transaction data. According to the embodiment of the invention, the problem of weak tamper resistance of the block chain of the centralized data storage is solved, and the hash value of the current block is contained in the current transaction hash value through hash operation, so that the tamper resistance of the current transaction data is ensured through the hash value of the current block, and the tamper resistance of the block chain of the centralized data storage is improved.
Fig. 5 is another schematic structural diagram of a data trust apparatus according to an embodiment of the present invention, and as shown in fig. 5, the data trust apparatus includes:
the data receiving module 510 receives the current transaction hash value, the identity information of the user side and the signature information, and determines a public key corresponding to the user side according to the identity information of the user side;
a public key decryption module 520, configured to decrypt the signature information according to the public key to obtain a current transaction hash value to be verified;
a data storage module 530, configured to verify the current transaction hash value to be verified according to the current transaction hash value, determine current transaction data according to the current transaction hash value if the current transaction hash value passes the verification, and store the current transaction data in the latest uplink block.
In one embodiment, the verifying the current transaction hash value to be verified by the data storage module 530 according to the current transaction hash value includes:
determining whether the current transaction hash value is consistent with the current transaction hash value to be verified;
and when the current transaction hash value is consistent with the current transaction hash value to be verified, the current transaction hash value to be verified passes verification.
In an embodiment, after the data storage module 530 determines whether the current transaction hash value is consistent with the current transaction hash value to be verified, the method further includes:
when the current transaction hash value is inconsistent with the current transaction hash value to be verified, the current transaction hash value to be verified is not verified, and a submission failure message is sent to the user side
In an embodiment, the determining, by the data receiving module 510, the public key corresponding to the user side according to the identity information of the user side includes:
and matching the public key corresponding to the user side in a key pool corresponding to the block link point according to the received identity information of the user side.
The device of the embodiment of the invention receives the current transaction hash value, the identity identification information and the signature information of the user side, and determines the public key corresponding to the user side according to the identity identification information of the user side; decrypting the signature information according to the public key to obtain a current transaction hash value to be verified; and verifying the current transaction hash value to be verified according to the current transaction hash value, if the current transaction hash value passes the verification, determining current transaction data according to the current transaction hash value, and storing the current transaction data in the latest uplink block. According to the embodiment of the invention, the problem of weak tamper resistance of the block chain of the centralized data storage is solved, and the hash value of the current block is contained in the current transaction hash value through hash operation, so that the tamper resistance of the current transaction data is ensured through the hash value of the current block, and the tamper resistance of the block chain of the centralized data storage is improved.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. FIG. 6 illustrates a block diagram of an exemplary electronic device 12 suitable for use in implementing embodiments of the present invention. The electronic device 12 shown in fig. 6 is only an example and should not bring any limitation to the function and the scope of use of the embodiment of the present invention.
As shown in FIG. 6, electronic device 12 is embodied in the form of a general purpose computing device. The components of electronic device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by electronic device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. The electronic device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 6, and commonly referred to as a "hard drive"). Although not shown in FIG. 6, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Electronic device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with electronic device 12, and/or with any devices (e.g., network card, modem, etc.) that enable electronic device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the electronic device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with other modules of the electronic device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with electronic device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, to implement a data trust method provided by an embodiment of the present invention, the method including:
obtaining a hash value of a current block, and calculating a current transaction hash value according to the hash value of the current block and current transaction data;
calculating signature information of the current transaction hash value;
submitting the current transaction hash value, identity identification information of a user side and the signature information to a block chain node, so that the block chain node verifies the signature information based on the current transaction hash value and the identity identification information to obtain current transaction data and stores the current transaction data;
or receiving the current transaction hash value, the identity identification information and the signature information of the user side, and determining the public key corresponding to the user side according to the identity identification information of the user side;
decrypting the signature information according to the public key to obtain a current transaction hash value to be verified;
and verifying the current transaction hash value to be verified according to the current transaction hash value, if the current transaction hash value passes the verification, determining current transaction data according to the current transaction hash value, and storing the current transaction data in a latest uplink block.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the data trust method, and the method includes:
obtaining a hash value of a current block, and calculating a current transaction hash value according to the hash value of the current block and current transaction data;
calculating signature information of the current transaction hash value;
submitting the current transaction hash value, identity identification information of a user side and the signature information to a block chain node, so that the block chain node verifies the signature information based on the current transaction hash value and the identity identification information to obtain current transaction data and stores the current transaction data;
or receiving the current transaction hash value, the identity identification information and the signature information of the user side, and determining the public key corresponding to the user side according to the identity identification information of the user side;
decrypting the signature information according to the public key to obtain a current transaction hash value to be verified;
and verifying the current transaction hash value to be verified according to the current transaction hash value, if the current transaction hash value passes the verification, determining current transaction data according to the current transaction hash value, and storing the current transaction data in a latest uplink block.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, or the like, as well as conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A data trust method, comprising:
obtaining a hash value of a current block, and calculating a current transaction hash value according to the hash value of the current block and current transaction data;
calculating signature information of the current transaction hash value;
and submitting the current transaction hash value, the identity identification information of the user side and the signature information to the block chain node, so that the block chain node verifies the signature information based on the current transaction hash value and the identity identification information to obtain the current transaction data and stores the current transaction data.
2. The method of claim 1, wherein said calculating the current transaction hash value based on the hash value of the current chunk and current transaction data comprises:
and carrying out hash operation on the hash value of the current block and the current transaction data by using a hash function to obtain the current transaction hash value.
3. The method of claim 1, wherein said calculating signature information for the current transaction hash value comprises:
and encrypting the current transaction hash value according to a private key corresponding to the user side to obtain signature information of the current transaction hash value.
4. The method of claim 1, wherein after the submitting the current transaction hash value, the identity information of the user end, and the signature information to the chunk node, further comprising:
and receiving a submission failure message sent by the block connection node.
5. A data trust apparatus, comprising:
the data acquisition module is used for acquiring the hash value of the current block and calculating the hash value of the current transaction according to the hash value of the current block and the current transaction data;
the signature calculation module is used for calculating signature information of the current transaction hash value;
and the transaction submitting module is used for submitting the current transaction hash value, the identity information of the user side and the signature information to the block chain node, so that the block chain node verifies the signature information based on the current transaction hash value and the identity information to obtain the current transaction data and stores the latest uplink block.
6. A data trust method, comprising:
receiving a current transaction hash value, identity identification information and signature information of a user side, and determining a public key corresponding to the user side according to the identity identification information of the user side;
decrypting the signature information according to the public key to obtain a current transaction hash value to be verified;
and verifying the current transaction hash value to be verified according to the current transaction hash value, if the current transaction hash value passes the verification, determining current transaction data according to the current transaction hash value, and storing the current transaction data in a latest uplink block.
7. The method of claim 6, wherein verifying the current transaction hash value to be verified based on the current transaction hash value comprises:
determining whether the current transaction hash value is consistent with the current transaction hash value to be verified;
and when the current transaction hash value is consistent with the current transaction hash value to be verified, the current transaction hash value to be verified passes verification.
8. The method of claim 7, wherein after determining whether the current transaction hash value is consistent with the current transaction hash value to be verified, further comprising:
and when the current transaction hash value is inconsistent with the current transaction hash value to be verified, the current transaction hash value to be verified is not verified, and a submission failure message is sent to the user side.
9. The method of claim 7, wherein determining the public key corresponding to the user terminal according to the identification information of the user terminal comprises:
and matching the public key corresponding to the user side in a key pool corresponding to the block link point according to the received identity information of the user side.
10. A data trust apparatus, comprising:
the data receiving module is used for receiving the hash value of the current block, the identity identification information and the signature information of the user side and determining a public key corresponding to the user side according to the identity identification information of the user side;
the public key decryption module is used for decrypting the signature information according to the public key to obtain a current transaction hash value to be verified;
and the data storage module is used for verifying the current transaction hash value to be verified according to the current transaction hash value, determining current transaction data according to the current transaction hash value if the current transaction hash value passes the verification, and storing the current transaction data in the latest uplink block.
CN202110974484.XA 2021-08-24 2021-08-24 Data trust method and device, electronic equipment and storage medium Pending CN113610526A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110974484.XA CN113610526A (en) 2021-08-24 2021-08-24 Data trust method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110974484.XA CN113610526A (en) 2021-08-24 2021-08-24 Data trust method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113610526A true CN113610526A (en) 2021-11-05

Family

ID=78309216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110974484.XA Pending CN113610526A (en) 2021-08-24 2021-08-24 Data trust method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113610526A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113781048A (en) * 2021-11-15 2021-12-10 环球数科集团有限公司 Transaction information verification and settlement method based on block chain
CN117254975A (en) * 2023-11-14 2023-12-19 深圳市嘉合劲威电子科技有限公司 Block chain-based data anti-counterfeiting method and system
CN117499159A (en) * 2023-12-27 2024-02-02 杭州字节方舟科技有限公司 Block chain-based data transaction method and device and electronic equipment
CN117592990B (en) * 2024-01-04 2024-04-26 恒生电子股份有限公司 Block chain transaction authentication method and device, computing equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN109639714A (en) * 2019-01-02 2019-04-16 浙江师范大学 A kind of Internet of Things identity registration and verification method based on block chain
CN109767220A (en) * 2019-01-15 2019-05-17 中国联合网络通信集团有限公司 Method of commerce based on block chain and the transaction system based on block chain
CN111062716A (en) * 2019-11-29 2020-04-24 支付宝(杭州)信息技术有限公司 Method and device for generating block chain signature data and block chain transaction initiating system
CN112070501A (en) * 2020-11-10 2020-12-11 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN109639714A (en) * 2019-01-02 2019-04-16 浙江师范大学 A kind of Internet of Things identity registration and verification method based on block chain
CN109767220A (en) * 2019-01-15 2019-05-17 中国联合网络通信集团有限公司 Method of commerce based on block chain and the transaction system based on block chain
CN111062716A (en) * 2019-11-29 2020-04-24 支付宝(杭州)信息技术有限公司 Method and device for generating block chain signature data and block chain transaction initiating system
CN112070501A (en) * 2020-11-10 2020-12-11 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system
CN112884477A (en) * 2020-11-10 2021-06-01 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113781048A (en) * 2021-11-15 2021-12-10 环球数科集团有限公司 Transaction information verification and settlement method based on block chain
CN117254975A (en) * 2023-11-14 2023-12-19 深圳市嘉合劲威电子科技有限公司 Block chain-based data anti-counterfeiting method and system
CN117499159A (en) * 2023-12-27 2024-02-02 杭州字节方舟科技有限公司 Block chain-based data transaction method and device and electronic equipment
CN117499159B (en) * 2023-12-27 2024-03-26 杭州字节方舟科技有限公司 Block chain-based data transaction method and device and electronic equipment
CN117592990B (en) * 2024-01-04 2024-04-26 恒生电子股份有限公司 Block chain transaction authentication method and device, computing equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111628868B (en) Digital signature generation method and device, computer equipment and storage medium
US11811912B1 (en) Cryptographic algorithm status transition
WO2021012552A1 (en) Login processing method and related device
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
US20180365448A1 (en) Method and server for providing notary service for file and verifying file recorded by notary service
JP2020517200A (en) Block chain-based document management method using UTXO-based protocol and document management server using this method
US20050228999A1 (en) Audit records for digitally signed documents
CN109344631B (en) Data modification and block verification method, device, equipment and medium for block chain
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
US20080083039A1 (en) Method for integrity attestation of a computing platform hiding its configuration information
CN112182609A (en) Block chain-based data uplink storage method and tracing method, device and equipment
WO2022179115A1 (en) User authentication method and apparatus, server and storage medium
CN111639325B (en) Merchant authentication method, device, equipment and storage medium based on open platform
CN112435026B (en) Method and device for protecting file transaction information by using zero-knowledge proof and electronic equipment
CN111931158A (en) Bidirectional authentication method, terminal and server
CN111835774A (en) Data processing method, device, equipment and storage medium
CN113872770A (en) Security verification method, system, electronic device and storage medium
CN114785524B (en) Electronic seal generation method, device, equipment and medium
CN115203749A (en) Data transaction method and system based on block chain
CN116383867A (en) Data query method, device, electronic equipment and computer readable medium
CN113688399A (en) Firmware digital signature protection method and device, computer equipment and storage medium
CN111415155A (en) Encryption method, device, equipment and storage medium for chain-dropping transaction data
CN115550060A (en) Block chain based trusted certificate verification method, apparatus, device and medium
CN115549984A (en) Cross-chain transaction method, device, equipment and storage medium
CN110781511A (en) Transaction information storage method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination