CN114329620A - Method and device for acquiring electronic credential by third party based on block chain - Google Patents

Method and device for acquiring electronic credential by third party based on block chain Download PDF

Info

Publication number
CN114329620A
CN114329620A CN202111505970.3A CN202111505970A CN114329620A CN 114329620 A CN114329620 A CN 114329620A CN 202111505970 A CN202111505970 A CN 202111505970A CN 114329620 A CN114329620 A CN 114329620A
Authority
CN
China
Prior art keywords
party
certificate
block chain
hash value
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111505970.3A
Other languages
Chinese (zh)
Inventor
王皓月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing One Identity Express Information Technology Co ltd
Original Assignee
Suzhou Yizhengtong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Yizhengtong Information Technology Co ltd filed Critical Suzhou Yizhengtong Information Technology Co ltd
Priority to CN202111505970.3A priority Critical patent/CN114329620A/en
Publication of CN114329620A publication Critical patent/CN114329620A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for acquiring electronic certificates by a third party based on a block chain, wherein the method comprises the following steps: the certificate storage service party stores the electronic certificate to be stored and the corresponding unique identification code; the certificate storage service side converts the electronic certificate into a first hash value and uploads a record data block comprising the first hash value and the unique identification code to a block chain; a third party uploads an acquisition request comprising third party identity information and unique identification code information to a block chain; after the third-party identity information in the block chain verification acquisition request passes, the unique identification code information is sent to a card storage service party; the certificate storage service party acquires the corresponding electronic certificate, acquires a second hash value corresponding to the electronic certificate and feeds the second hash value back to the block chain; and the block chain compares the second hash value with the first hash value corresponding to the unique identification code information, the block chain feeds back the comparison result to the certificate storage service side, and the certificate storage service side feeds back the electronic certificate to a third party according to the comparison result.

Description

Method and device for acquiring electronic credential by third party based on block chain
Technical Field
The invention belongs to the technical field of electronic data acquisition, and particularly relates to a method and a device for acquiring an electronic certificate by a third party based on a block chain.
Background
The existing storage platforms (including cloud storage and the like) provide services such as evidence storage, security, witness and the like of electronic files by using credit or authority of the existing storage platforms. There is a possibility that the centrally stored electronic data may be modified due to various factors. Thus, there is a potential for errors in centrally stored electronic data for public services.
Disclosure of Invention
In view of the above technical problems, the present invention provides a method for a third party to obtain an electronic credential based on a blockchain.
In order to achieve the purpose, the invention adopts the technical scheme that: in a first aspect, the present invention provides a method for acquiring an electronic credential by a third party based on a blockchain, including the following steps:
the certificate storage service party stores the electronic certificate to be stored and the unique identification code corresponding to the electronic certificate;
the certificate storage service side converts the electronic certificate into a first hash value and uploads a record data block comprising the first hash value and the unique identification code to a block chain;
the third party uploads an acquisition request to the block chain; the acquisition request comprises third party identity information and unique identification code information and is used for a third party to acquire the electronic certificate;
verifying and acquiring third party identity information in the request by the block chain; after the verification is passed, the unique identification code information in the acquisition request is sent to a certificate storage service side;
the certificate storing service party acquires the corresponding electronic certificate based on the unique identification code information, acquires a second hash value corresponding to the electronic certificate according to the same way when the electronic certificate is stored, and feeds the second hash value back to the block chain;
the block chain compares the second hash value with the first hash value corresponding to the unique identification code information, and stores the comparison result into the block chain;
and the block chain feeds the comparison result back to the certificate storing service party, and the certificate storing service party feeds the electronic certificate back to the third party according to the comparison result.
Optionally, the obtaining third party identity information in the request for blockchain verification further includes:
the blockchain confirms whether the identity information of the third party is in a third party set stored in the blockchain, and the third party in the third party set can obtain the electronic credential of the evidence storing service party.
Optionally, a private key of a third party is used for digitally signing the unique identification code information in the acquisition request;
and the block chain verifies the acquisition request by using a public key corresponding to the third-party identity information, acquires the unique identification code information when the public key passes verification, and sends the unique identification code information to the certificate storage service party.
Optionally, when the certificate storing service side receives the electronic certificate to be stored, the time information is obtained in real time, and the running information is generated according to the time information;
the unique identification code information includes time information and running information.
Optionally, after receiving the electronic credential fed back by the credential storage service party, the third party obtains a third hash value corresponding to the electronic credential in the same manner as when the credential storage service party stores the electronic credential, and uploads a comparison request including the unique identifier information and the third hash value to the block chain;
and the block chain determines the recorded data block of the block chain according to the unique identification code information in the comparison request, compares the first hash value of the recorded data block with the third hash value in the comparison request, and feeds back the comparison result to a third party.
Optionally, the block chain feeds back the comparison result to the certificate storing service side, and the certificate storing service side transmits the electronic certificate to the third party according to the comparison result, further comprising: and when the comparison result is consistent, the certificate storing service party transfers the electronic certificate to a third party.
Optionally, the certificate storing service party digitally signs the electronic certificate transmitted to the third party by using a private key.
In a second aspect, the present invention further provides a device for acquiring an electronic credential by a third party based on a blockchain, including an electronic credential storage module: the certificate storing service party stores the electronic certificate to be stored and the unique identification code corresponding to the electronic certificate into a certificate storing database;
a first hash value calculation module: the certificate storage service side converts the electronic certificate into a first hash value and uploads a record data block comprising the first hash value and the unique identification code to a block chain;
an acquisition request uploading module: the third party uploads an acquisition request to the block chain; the acquisition request comprises third party identity information and unique identification code information and is used for a third party to acquire the electronic certificate;
a third party identity verification module: verifying and acquiring third party identity information in the request by the block chain; after the verification is passed, the unique identification code information in the acquisition request is sent to a certificate storage service side;
the second hash value calculation module: the certificate storing service party acquires the corresponding electronic certificate based on the unique identification code information, acquires a second hash value corresponding to the electronic certificate according to the same way when the electronic certificate is stored, and feeds the second hash value back to the block chain;
a hash value comparison module: the block chain compares the second hash value with a first hash value corresponding to the unique identification code information contained in the acquisition request, and stores a comparison result into the block chain;
a feedback module: and the block chain feeds the comparison result back to the certificate storing service party, and the certificate storing service party feeds the electronic certificate back to the third party according to the comparison result.
In a third aspect, the present invention provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein: the processor, when executing the computer program, implements any of the above-described methods for obtaining an electronic credential by a third party based on a blockchain.
In a fourth aspect, the present invention provides a computer readable storage medium having stored thereon computer instructions which, when executed, perform the steps of any of the above-mentioned methods for block chain-based third party acquisition of electronic credentials.
The invention has the following beneficial effects: based on the block chain, the authenticity of the stored electronic certificate and the controllability of the data query range can be ensured. Based on the hash value, it can be ensured that the e-credential is not modified, even if it occurs, and is known in time. Based on the digital signature, the security of the electronic certificate and the controllability of the behavior of the credentialing service party can be ensured.
Drawings
Fig. 1 is a flowchart of a method for a third party to obtain an e-credential based on a blockchain according to an embodiment of the present invention.
Fig. 2 is a block diagram of an apparatus for third party obtaining an electronic credential based on a blockchain according to an embodiment of the present invention.
Fig. 3 is a block diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The principles and spirit of the present invention will be described with reference to a number of exemplary embodiments. It is understood that these embodiments are given solely for the purpose of enabling those skilled in the art to better understand and to practice the invention, and are not intended to limit the scope of the invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
The block chain has the characteristics of being not falsifiable and ensuring the data traceability. We can store key information of electronic credentials based on the blockchain. Meanwhile, the content of the certificate (including text, video, audio, pictures and the like, which require large storage space) can be converted into an n (such as 256) -bit character string, the character string is stored in the block chain, and the character string is verified to verify the authenticity of the electronic certificate when requested.
And when the third party applies for the electronic certificate, verifying the identity of the third party. Meanwhile, the authenticity and the secrecy of the information are ensured by using the asymmetric key.
The method for obtaining the electronic credential by the third party based on the blockchain in this embodiment includes four entities, an individual or a company (a depositor) having a need to deposit the electronic credential, a depositor server providing a depositor service, and a blockchain for verifying whether the electronic credential is valid, where the third party (such as a court) needs to obtain the electronic credential. When the third party obtains the electronic certificate, the identity of the third party is verified, and meanwhile, the authenticity and the confidentiality of information are guaranteed through the asymmetric key. The principles and spirit of the present invention are explained in detail below with reference to several representative embodiments of the invention.
Fig. 1 is a flowchart illustrating a method for obtaining an e-credential by a third party based on a blockchain according to an embodiment of the present invention. As shown in fig. 1, the method includes:
s101, storing the electronic certificate needing to be stored and the unique identification code corresponding to the electronic certificate by a certificate storage service party;
s102, the certificate storage service side converts the electronic certificate into a first hash value and uploads a record data block comprising the first hash value and the unique identification code to a block chain;
s103, uploading an acquisition request to a block chain by a third party; the acquisition request comprises third party identity information and unique identification code information and is used for a third party to acquire the electronic certificate;
s104, verifying and acquiring third-party identity information in the request by the block chain; after the verification is passed, the unique identification code information in the acquisition request is sent to a certificate storage service side;
s105, the certificate storage service party acquires the corresponding electronic certificate based on the unique identification code information, acquires a second hash value corresponding to the electronic certificate according to the same mode when the electronic certificate is stored, and feeds the second hash value back to the block chain;
s106, the block chain compares the second hash value with the first hash value corresponding to the unique identification code information, and stores the comparison result into the block chain;
and S107, the block chain feeds the comparison result back to the certificate storing service party, and when the comparison result is consistent, the certificate storing service party transmits the electronic certificate to a third party.
The evidence storing service party converts the electronic certificate into a first hash value, and the method can be based on a hash function. The evidence storing service party selects a proper hash function with collision resistance according to the electronic evidence, and converts the electronic evidence into a hash value (such as an n-bit string). The specific process of selecting a suitable hash function with collision resistance may be: the evidence storing service party determines the digit n of the first hash value according to the number of the electronic certificates, so that the first hash value can represent all the electronic certificates; and the evidence storage service side selects a hash function with collision resistance to calculate the first hash value, and the output digit of the hash function is more than or equal to n.
And verifying and acquiring the third party identity information in the request by the blockchain. Specifically, the blockchain determines whether the third party identity information is in a third party set stored in the blockchain, and a third party in the third party set can obtain the electronic credential of the evidence deposit service party. If the verification is in the third party set stored in the blockchain, the verification is passed, otherwise, the verification is not passed.
When the third party identity information is determined not to be in the third party set stored in the blockchain, whether the third party identity information is in the trusted party set can be determined, the trusted party set is contained in the storage party digital signature information in the extraction request, wherein the storage party digital signature information is obtained after the storage party encrypts the trusted party set information (containing the identity information of each trusted party, such as user id, public key and the like) by using a private key of the storage party. Therefore, the blockchain confirms whether the third party uploading the acquisition request is in the trusting party set of the digital signature information, if the third party uploading the acquisition request is confirmed to be in the trusting party set, the verification is passed, and if the third party uploading the acquisition request is not in the trusting party set, the verification is not passed.
And the block chain verifies the acquisition request by using a public key corresponding to the third-party identity information, acquires the unique identification code information when the public key passes verification, and sends the unique identification code information to the certificate storage service party.
And when the certificate storage service party receives the electronic certificate needing to be stored, the time information is acquired in real time, the running information is generated according to the time information, and the unique identification code information is generated by the time information and the running information.
And after receiving the electronic certificate fed back by the certificate storage service party, the third party obtains a third hash value corresponding to the electronic certificate according to the same way when the certificate storage service party stores the electronic certificate, and uploads a comparison request comprising the unique identification code information and the third hash value to the block chain. And the block chain determines the recorded data block of the block chain according to the unique identification code information in the comparison request, compares the first hash value of the recorded data block with the third hash value in the comparison request, and feeds back the comparison result to a third party.
The intelligent contract of the block chain can adjust the weight of the evidence storage service party corresponding to the unique identification code information in the block chain in the consensus algorithm of the block chain based on the comparison result of two hash values of the same unique identification code information. Specifically, when the first hash value and the third hash value are not consistent (the inconsistency between the two hash values indicates that the certificate server corresponding to the unique identifier information has a problem, may be a problem in the system of the certificate server objectively, or may be that the certificate server intentionally provides an erroneous electronic file), the weight of the certificate server in the block chain consensus algorithm should be reduced.
The electronic certificate transmitted to the third party by the certificate storing service party needs to be digitally signed by the certificate storing service party by using a corresponding private key.
In order to avoid the change or the tampering of the certified electronic certificate, the certified service party can adopt the following method to backup the electronic certificate: the credentialing service backs up the specified file when the storage time of the e-credential exceeds a specified threshold, wherein the specified threshold may be determined based on historical storage data of the e-credential. The historical stored data of the electronic document comprises historical electronic documents and the time (the distance from the starting time for storing the historical electronic document) of each historical electronic document, and then the functional relation between the time and the accumulated number of the electronic document changes is obtained based on a function fitting mode, namely the independent variable of the function is the time, and the dependent variable is the total number of the electronic document changes by the time point. After the fitted function is obtained, the time point at which the derivative of the function is maximum is found, and the time point is taken as the specified threshold.
Based on the same inventive concept, an embodiment of the present application further provides a device for a third party to obtain an electronic credential based on a block chain, as in the following embodiments. Because the principle of the device for obtaining the electronic credential by the third party based on the blockchain is similar to the method for obtaining the electronic credential by the third party based on the blockchain, the implementation of the device for obtaining the electronic credential by the third party based on the blockchain can be referred to the implementation of the method for obtaining the electronic credential by the third party based on the blockchain, and repeated details are not repeated. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated. Fig. 2 is a block diagram of an apparatus for acquiring an electronic credential by a third party based on a blockchain according to an embodiment of the present application, as shown in fig. 2, including: the electronic credential storage module 201, the first hash value calculation module 202, the acquisition request upload module 203, the third party authentication module 204, the second hash value calculation module 205, the hash value comparison module 206, and the feedback module 207, which are described below.
Electronic credential storage module 201: the certificate storing service party stores the electronic certificate to be stored and the unique identification code corresponding to the electronic certificate into a certificate storing database;
the first hash value calculation module 202: the certificate storage service side converts the electronic certificate into a first hash value and uploads a record data block comprising the first hash value and the unique identification code to a block chain;
the get request upload module 203: the third party uploads an acquisition request to the block chain; the acquisition request comprises third party identity information and unique identification code information and is used for a third party to acquire the electronic certificate;
the third-party authentication module 204: verifying and acquiring third party identity information in the request by the block chain; after the verification is passed, the unique identification code information in the acquisition request is sent to a certificate storage service side;
the second hash value calculation module 205: the certificate storing service party acquires the corresponding electronic certificate based on the unique identification code information, acquires a second hash value corresponding to the electronic certificate according to the same way when the electronic certificate is stored, and feeds the second hash value back to the block chain;
hash value comparison module 206: the block chain compares the second hash value with a first hash value corresponding to the unique identification code information contained in the acquisition request, and stores a comparison result into the block chain;
the feedback module 207: and the block chain feeds the comparison result back to the certificate storing service party, and the certificate storing service party feeds the electronic certificate back to the third party according to the comparison result.
Based on the aforementioned inventive concept, an embodiment of a computer apparatus 300 as shown in fig. 3 comprises a memory 310, a processor 320 and a computer program 330 stored in the memory 310 and executable on the processor 320, wherein the processor 320 executes the computer program 330 to implement the aforementioned method for acquiring an electronic credential by a third party based on a block chain.
An embodiment based on the foregoing inventive concept discloses a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the method for acquiring an electronic credential by a third party based on a block chain is implemented.
In this embodiment, the storage medium includes, but is not limited to, a Random Access Memory (RAM), a Read-Only Memory (ROM), a Cache (Cache), a Hard Disk Drive (HDD), or a Memory Card (Memory Card). The memory may be used to store computer program instructions. The network communication unit may be an interface for performing network connection communication, which is set in accordance with a standard prescribed by a communication protocol.
In this embodiment, the functions and effects specifically realized by the program instructions stored in the computer storage medium can be explained by comparing with other embodiments, and are not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the embodiments of the present application described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different from that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
It is to be understood that the above description is intended to be illustrative, and not restrictive. Many embodiments and many applications other than the examples provided will be apparent to those of skill in the art upon reading the above description. The scope of the application should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with the full scope of equivalents to which such claims are entitled.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and it will be apparent to those skilled in the art that various modifications and variations can be made in the embodiment of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A method for obtaining an electronic certificate by a third party based on a block chain is characterized by comprising the following steps:
the certificate storage service party stores the electronic certificate to be stored and the unique identification code corresponding to the electronic certificate;
the certificate storage service side converts the electronic certificate into a first hash value and uploads a record data block comprising the first hash value and the unique identification code to a block chain;
the third party uploads an acquisition request to the block chain; the acquisition request comprises third party identity information and unique identification code information and is used for a third party to acquire the electronic certificate;
the block chain verifies the third party identity information in the acquisition request; after the verification is passed, the unique identification code information in the acquisition request is sent to a certificate storage service side;
the certificate storing service party acquires a corresponding electronic certificate based on the unique identification code information, acquires a second hash value corresponding to the electronic certificate according to the same way when the electronic certificate is stored, and feeds the second hash value back to the block chain;
the block chain compares the second hash value with the first hash value corresponding to the unique identification code information, and stores the comparison result into the block chain;
and the block chain feeds the comparison result back to the certificate storing service party, and the certificate storing service party feeds the electronic certificate back to the third party according to the comparison result.
2. The method for obtaining electronic credentials by a third party based on blockchain according to claim 1, wherein blockchain verifies the identity information of the third party in the obtaining request, further comprising:
the blockchain confirms whether the identity information of the third party is in a third party set stored in the blockchain, and the third party in the third party set can obtain the electronic credential of the evidence storing service party.
3. The method for acquiring electronic credentials by a third party based on a blockchain according to claim 1, wherein:
digitally signing the unique identification code information in the acquisition request by using a private key of a third party;
and the block chain verifies the acquisition request by using a public key corresponding to the third-party identity information, acquires the unique identification code information when the public key passes verification, and sends the unique identification code information to a certificate storage service party.
4. The method for block chain based third party obtaining electronic credentials of any of claims 1-3, wherein:
when the certificate storage service party receives the electronic certificate needing to be stored, time information is obtained in real time, and running information is generated according to the time information;
the unique identification code information includes the time information and the running water information.
5. The method for acquiring electronic credentials by a third party based on a blockchain according to claim 1, wherein:
after receiving the electronic certificate fed back by the certificate storage service party, the third party obtains a third hash value corresponding to the electronic certificate according to the same way when the certificate storage service party stores the electronic certificate, and uploads a comparison request comprising the unique identification code information and the third hash value to a block chain;
and the block chain determines a recording data block of the block chain according to the unique identification code information in the comparison request, compares the first hash value of the recording data block with the third hash value in the comparison request, and feeds back a comparison result to the third party.
6. The method of claim 1, wherein the blockchain feeds back the comparison result to a credentialing service, and the credentialing service transmits the electronic credential to the third party according to the comparison result, further comprising:
and when the comparison result is consistent, the evidence storing service party transmits the electronic certificate to a third party.
7. The method for acquiring electronic credentials by a third party based on a blockchain according to claim 1, wherein:
the certificate storing service party digitally signs the electronic certificate transferred to the third party by using the private key.
8. An apparatus for obtaining an electronic credential by a third party based on a blockchain, comprising:
the electronic credential storage module: the certificate storing service party stores the electronic certificate to be stored and the unique identification code corresponding to the electronic certificate into a certificate storing database;
a first hash value calculation module: the certificate storage service side converts the electronic certificate into a first hash value and uploads a record data block comprising the first hash value and the unique identification code to a block chain;
an acquisition request uploading module: the third party uploads an acquisition request to the block chain; the acquisition request comprises third party identity information and unique identification code information and is used for a third party to acquire the electronic certificate;
a third party identity verification module: the block chain verifies the third party identity information in the acquisition request; after the verification is passed, the unique identification code information in the acquisition request is sent to a certificate storage service side;
the second hash value calculation module: the certificate storing service party acquires a corresponding electronic certificate based on the unique identification code information, acquires a second hash value corresponding to the electronic certificate according to the same way when the electronic certificate is stored, and feeds the second hash value back to the block chain;
a hash value comparison module: the block chain compares the second hash value with a first hash value corresponding to the unique identification code information contained in the acquisition request, and stores a comparison result into the block chain;
a feedback module: and the block chain feeds the comparison result back to a certificate storing service party, and the certificate storing service party feeds the electronic certificate back to a third party according to the comparison result.
9. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein: the processor, when executing the computer program, implements the method of any of claims 1 to 7.
10. A computer-readable storage medium characterized by: the storage medium having stored thereon computer instructions which, when executed, implement the steps of the method of any one of claims 1 to 7.
CN202111505970.3A 2021-12-10 2021-12-10 Method and device for acquiring electronic credential by third party based on block chain Pending CN114329620A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111505970.3A CN114329620A (en) 2021-12-10 2021-12-10 Method and device for acquiring electronic credential by third party based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111505970.3A CN114329620A (en) 2021-12-10 2021-12-10 Method and device for acquiring electronic credential by third party based on block chain

Publications (1)

Publication Number Publication Date
CN114329620A true CN114329620A (en) 2022-04-12

Family

ID=81051219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111505970.3A Pending CN114329620A (en) 2021-12-10 2021-12-10 Method and device for acquiring electronic credential by third party based on block chain

Country Status (1)

Country Link
CN (1) CN114329620A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114781004A (en) * 2022-06-15 2022-07-22 恒生电子股份有限公司 Block chain-based data evidence storage method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114781004A (en) * 2022-06-15 2022-07-22 恒生电子股份有限公司 Block chain-based data evidence storage method and device, electronic equipment and storage medium
CN114781004B (en) * 2022-06-15 2022-09-30 恒生电子股份有限公司 Block chain-based data evidence storage method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US11496310B2 (en) Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
CN110300112B (en) Block chain key hierarchical management method
US11057187B2 (en) Blockchain-assisted hash-based data signature system and method
Jin et al. Dynamic and public auditing with fair arbitration for cloud data
CN108881253B (en) Block chain real name participation method and system
EP3031169B1 (en) Document verification with id augmentation
CN109194466A (en) A kind of cloud data integrity detection method and system based on block chain
US20100005318A1 (en) Process for securing data in a storage unit
EP2595340A2 (en) Cryptographic document processing in a network
US10511447B1 (en) System and method for generating one-time data signatures
ES2893822T3 (en) A computer-implemented method and system for life cycle tracking of certified documents and computer programs thereof
CN109861829B (en) Cloud data justice auditing system supporting dynamic updating and auditing method thereof
US20210021432A1 (en) Secure device on-boarding, ownership transfer, proof-of-ownership, and mutual authentication system
CN108924107A (en) A kind of block chain tele-medicine data call can verify that method
JP5958703B2 (en) Data certification system and data certification server
CN108876375B (en) Block chain real name participation method and system
CN110457928B (en) Hospital-enterprise cooperation internet hospital data security guarantee method based on block chain
CN115065679A (en) Block chain based electronic health profile sharing model, method, system, and medium
CN114329620A (en) Method and device for acquiring electronic credential by third party based on block chain
JP2012175554A (en) Long-term-signature terminal, long-term-signature server, long-term-signature terminal program, and long-term-signature server program
US11184176B2 (en) System and method for generating data signatures over non-continuously bidirectional communication channels
EP4014428A1 (en) System and method for electronic signature creation and management for long-term archived documents
KR101593675B1 (en) User data integrity verification method and apparatus
CN113139209B (en) Verification credential realization method and system based on atomic signature
CN116830181A (en) Service providing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20221008

Address after: 210000 floor 6, building 2, No. 170-1, software Avenue, Yuhuatai District, Nanjing, Jiangsu Province

Applicant after: NANJING ONE IDENTITY EXPRESS INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 215100 room 2601, building 1, No. 68, nantiancheng Road, high speed railway new town, Xiangcheng District, Suzhou City, Jiangsu Province

Applicant before: Suzhou yizhengtong Information Technology Co.,Ltd.

TA01 Transfer of patent application right