CN115439118A - Digital certificate storage management method based on block chain - Google Patents

Digital certificate storage management method based on block chain Download PDF

Info

Publication number
CN115439118A
CN115439118A CN202210924508.5A CN202210924508A CN115439118A CN 115439118 A CN115439118 A CN 115439118A CN 202210924508 A CN202210924508 A CN 202210924508A CN 115439118 A CN115439118 A CN 115439118A
Authority
CN
China
Prior art keywords
information
hash
automobile
user characteristic
hash tree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210924508.5A
Other languages
Chinese (zh)
Other versions
CN115439118B (en
Inventor
皋勋
韩骅
许多
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wangshang E Commerce Co ltd
Original Assignee
Shanghai Wangshang E Commerce Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wangshang E Commerce Co ltd filed Critical Shanghai Wangshang E Commerce Co ltd
Priority to CN202210924508.5A priority Critical patent/CN115439118B/en
Publication of CN115439118A publication Critical patent/CN115439118A/en
Application granted granted Critical
Publication of CN115439118B publication Critical patent/CN115439118B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a block chain-based digital certificate storage management method which comprises the steps of constructing a first hash tree and a second hash tree, verifying user characteristic information according to the first hash tree, encrypting automobile certificate storage information by using an encryption key when the user characteristic information is effective, storing the automobile certificate storage information in a database, and finally verifying the validity of the stored automobile certificate storage information by using the second hash tree. The method and the device can be used for improving the efficiency of digital certificate storage management and improving the safety.

Description

Digital certificate storage management method based on block chain
Technical Field
The application relates to the technical field of computers, in particular to a digital certificate storage management method based on a block chain.
Background
The block chain technology, also called as distributed account book technology, is an emerging technology that a plurality of computing devices jointly participate in accounting and jointly maintain a complete distributed database, and is widely applied to the field of automobile supply chains due to the characteristics of decentralization, transparency and trust. The identity of each automobile can be established by using a block chain technology, the evidence storage information of part sources (manufacturers and batches), production assembly processes, sales channels, maintenance records and the like of each automobile is completely recorded and stored, the safety and the integrity of the evidence storage information of the automobile supply chain are guaranteed, the authentification of the user nodes of the distributed network is guaranteed, the reliability and certain fault tolerance of the distributed network are guaranteed, the anti-counterfeiting traceability of the supply chain is realized, and the trust problem of the whole value chain of the automobile is solved.
However, in the existing digital certificate storage management based on the block chain, various information is directly stored by directly using the block chain, and the problems of low efficiency and poor safety exist. Therefore, how to effectively improve the efficiency of digital certificate storage and improve the security becomes a technical problem to be solved at present.
Disclosure of Invention
In view of the above problems, the present application is proposed to provide a block chain-based digital certificate management method for improving efficiency and security of digital certificate management.
The application provides a block chain-based digital certificate storage management method, which comprises the following steps:
s101, constructing a first hash tree and a second hash tree, wherein the first hash tree is used for representing user characteristic information, and the second hash tree is used for representing automobile certificate storage information;
s102, receiving a digital certificate storing request, extracting the digital certificate storing information, and dividing the digital certificate storing information into user characteristic information and automobile certificate storing information;
s103, verifying the user characteristic information according to the first hash tree;
s104, when the user characteristic information is valid, returning an encryption key and an access token of the digital certificate information;
s105, encrypting the automobile license information by using the encryption key, and requesting a database to store the automobile license information by using the access token;
s106, when the access token is valid, the automobile license storage information is stored in the database, and the database returns a storage number;
and S107, according to the storage number, carrying out validity verification on the stored automobile license storage information by using a second hash tree.
Step S103 further includes:
and S1031, after the user characteristic information is obtained, carrying out hash operation on the user characteristic information, and calculating to obtain a first real-time hash root value.
S1032, comparing the first real-time hash root value with the hash root value in the first hash tree, and verifying whether the user characteristic information is valid.
Step S1032 further specifically includes:
if the first real-time hash root value is equal to the hash root value in the first hash tree, the user characteristic information is valid; otherwise, the user characteristic information is invalid.
Step S105 further specifically includes:
and segmenting the automobile certificate storage information, respectively utilizing the encryption key and the characteristic signature information to encrypt and calculate each segment of the automobile certificate storage information, and finally combining each segment of the encrypted automobile certificate storage information to form complete encrypted automobile certificate storage information.
The step S107 further specifically includes:
s1071, inquiring the stored automobile certificate storage information according to the storage number, carrying out hash operation, and calculating to obtain a second real-time hash root value.
S1072, comparing the second real-time hash root value with the hash root value in the second hash tree, and verifying whether the stored automobile evidence storage information is effective or not.
Step S1072 further specifically includes:
if the second real-time hash root value is equal to the hash root value stored in the second hash tree, the stored automobile certificate information is valid; otherwise, the stored automobile certificate storing information is invalid.
Further, the user characteristic information includes a user digital signature.
Further, the automobile certificate information comprises a part source, a production assembly process, a sales channel and a maintenance record.
The application also provides an automobile supply chain management method, which comprises the block chain-based digital certificate storage management method.
The beneficial effect of this application is:
(1) This application sets up first hash tree and second hash tree respectively, only adopts first hash tree to verify user characteristic information to need not deposit the card information to verify to all users, only adopts the second hash tree to describe the car of block chain and deposits the card information, and need not contain all figures and deposit the card information, has alleviateed block chain operation and pressure of preserving, has improved the management efficiency that the figure deposited the card.
(2) The first Hash tree and the second Hash tree are utilized to verify the validity of the user characteristic information and the validity of the automobile certificate information respectively, and the safety performance of digital certificate information management is also improved.
(3) This application has improved the treatment effeciency that the card information was deposited to the car through depositing the card information with the car segmentation and encrypting, still utilizes user characteristic information to deposit the card information to the car simultaneously and encrypts, has also further improved the security performance.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a block chain-based digital certificate management method provided in the present application;
fig. 2 is a schematic diagram of a first hash tree provided herein;
fig. 3 is a schematic diagram of a second hash tree provided in the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, and "a" and "an" typically include at least two, but do not exclude the presence of at least one.
The method and the device are respectively provided with the first hash tree and the second hash tree, only the first hash tree is adopted to describe the user characteristic information, all certificate storage information of the user is not required to be verified, only the second hash tree is adopted to describe the automobile certificate storage information of the block chain, and all certificate storage information of the user is not required to be contained, so that the operation and storage pressure of the block chain are reduced, and the management efficiency of digital certificate storage is improved; meanwhile, the validity of the user characteristic information and the validity of the automobile certificate information are verified respectively by utilizing the first hash tree and the second hash tree, and the safety performance of digital certificate information management is also improved.
In addition, in the encryption processing, the automobile certificate storing information is encrypted in sections, so that the processing efficiency of the automobile certificate storing information is improved, and meanwhile, the safety performance is further improved by encrypting the automobile certificate storing information by utilizing the user characteristic information.
The present application is further described with reference to the following figures and specific examples.
As shown in fig. 1, in one embodiment, a block chain based digital certificate management method is provided. The digital certificate storage management method specifically comprises the following steps of S101 to S106.
S101, a first hash tree and a second hash tree are constructed, wherein the first hash tree is used for representing user characteristic information, and the second hash tree is used for representing automobile evidence storage information.
In an automobile supply chain, the expression forms of automobile certificate storage information are different, and the embodiment of the application is not particularly limited to the expression forms of the automobile certificate storage information. For example, it may be in the form of a file, such as a word file, or an excel file, or a pdf document; also for example, it may be in the form of multimedia, such as pictures, audio, video, etc.
In the embodiment of the present application, the Hash tree is a tree structure formed by taking Hash (Hash) values as nodes. The hash tree can be a binary tree or a multi-branch tree, and has all the characteristics of a tree structure no matter a few-branch tree. Specifically, the hash tree is composed of a leaf node hash value (value), a non-leaf node hash value, and a root hash value. The leaf node hash value can be obtained from the initial data, the hash value of the non-leaf node is obtained from all the leaf node values below the leaf node hash value, and then the hash value of the root node is obtained from the non-leaf node hash value.
Referring to fig. 2, the first hash tree processes the initial user signature information into 8 pieces of feature information, and the pieces of feature information may be numbered for easy distinction, for example, the pieces of feature information are numbered as feature information 1 to feature information 8 in fig. 2. And then, respectively calculating the corresponding hash value of each signature information fragment to obtain hash values HashA 1-HashA 8, and taking the hash values HashA 1-HashA 8 as leaf nodes of the first hash tree. Then, performing hash processing on the leaf nodes according to a certain sequence, performing pairwise hash processing on adjacent leaf nodes as shown in fig. 2, and continuously processing until a hash value is finally obtained to serve as a root node HashD1 of the first hash tree, wherein the hash values obtained through pairwise hash processing serve as non-leaf nodes as hashbs 1 to HashB3 and hashcs 1 and hashcs 2 shown in fig. 2. Finally, the first hash tree shown in fig. 2 is obtained.
With reference to fig. 3, the second hash tree processes the initial digital evidence storage information into 8 evidence storage information fragments, which can be numbered for the convenience of distinguishing, for example, in fig. 3, the evidence storage information fragments are numbered as evidence storage information 1 to evidence storage information 8. And then, respectively calculating the corresponding hash value of each evidence storing information fragment to obtain hash values Hasha 1-Hasha 8, and taking the hash values Hasha 1-Hasha 8 as leaf nodes of the second Hash tree. Then, performing hash processing on the leaf nodes according to a certain sequence, performing pairwise hash processing on adjacent leaf nodes as shown in fig. 3, and continuously processing until a hash value is finally obtained to serve as a root node Hashd1 of the second hash tree, wherein the hash values obtained through pairwise hash processing serve as non-leaf nodes as Hashb 1-Hashb 3 and Hashc1 and Hashc2 shown in fig. 3. Finally, a second hash tree as shown in fig. 3 is obtained.
It should be noted that, in this embodiment, the number of leaf nodes of the first hash tree and the second hash tree is set to 8, but other numbers of leaf nodes, such as 4, may be selected.
S102, receiving the digital certificate storage request, extracting the digital certificate storage information, and dividing the digital certificate storage information into user characteristic information and automobile certificate storage information.
Specifically, the user characteristic information may include user digital signature information and the like, and the vehicle license information may include information of a part source, a production assembly process, a sales channel, a maintenance record and the like.
S103, verifying the user characteristic information according to the first hash tree.
And S104, when the user characteristic information is valid, returning the encryption key and the access token of the automobile license information.
And S105, encrypting the automobile license information by using the encryption key, and requesting the database to store the automobile license information by using the access token.
Specifically, the automobile certificate information is segmented, each segment of automobile certificate information is encrypted and calculated by using an encryption key and user characteristic information, and finally, each segment of encrypted 3 automobile certificate information is combined to form complete encrypted automobile certificate information.
In the application, the automobile certificate storing information is encrypted in a segmented mode, the processing efficiency of the automobile certificate storing information is improved, meanwhile, the automobile certificate storing information is encrypted by utilizing the user characteristic information, and the safety performance is further improved.
And S106, storing the automobile license storage information in the database, and returning the storage number to the database.
And S107, verifying the validity of the stored automobile certificate information by using a second hash tree according to the storage number.
In this application, set up first hash tree and second hash tree respectively, only adopt first hash tree to verify user characteristic information to need not deposit the card information to all figures and verify, only adopt the second hash tree to describe the car of block chain and deposit the card information, and need not contain all figures and deposit the card information, alleviateed block chain operation and pressure of preserving, improved the operation and the managerial efficiency that the digit deposited the card.
In another embodiment of the present application, step S103 further specifically includes:
and S1031, after the user characteristic information is obtained, carrying out Hash operation on the user characteristic information, and calculating to obtain a first real-time Hash root value.
S1032, comparing the first real-time hash root value with the hash root value in the first hash tree, and verifying whether the user characteristic information is valid.
Specifically, if the first real-time hash root value is equal to the hash root value in the first hash tree, the user feature information is valid; otherwise, the user characteristic information is invalid.
In another embodiment of the present application, step S107 further specifically includes:
s1071, inquiring the stored automobile certificate storage information according to the storage number, carrying out Hash operation, and calculating to obtain a second real-time Hash root value.
S1072, comparing the second real-time hash root value with the hash root value in the second hash tree, and verifying whether the stored automobile evidence storage information is effective.
Specifically, if the second real-time hash root value is equal to the hash root value in the second hash tree, the stored automobile certificate storage information is valid; otherwise, the stored automobile evidence storing information is invalid.
In the application, the first hash tree and the second hash tree are simultaneously utilized to verify the validity of the user characteristic information and the validity of the automobile certificate storing information respectively, so that the safety performance of digital certificate storing information management is improved.
In another embodiment of the present application, the present application further provides an automobile supply chain management method, including a block chain-based digital certificate storage management method.
The foregoing description shows and describes several preferred embodiments of the present application, but as aforementioned, it is to be understood that the application is not limited to the forms disclosed herein, but is not to be construed as excluding other embodiments and is capable of use in various other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the application, which is to be protected by the claims appended hereto.

Claims (9)

1. A block chain-based digital certificate storage management method is characterized by comprising the following steps:
s101, constructing a first hash tree and a second hash tree, wherein the first hash tree is used for representing user characteristic information, and the second hash tree is used for representing automobile certificate storage information;
s102, receiving a digital certificate storing request, extracting the digital certificate storing information, and dividing the digital certificate storing information into the user characteristic information and the automobile certificate storing information;
s103, verifying the user characteristic information according to the first hash tree;
s104, when the user characteristic information is valid, returning an encryption key and an access token of the automobile license information;
s105, encrypting the automobile license information by using the encryption key, and requesting a database to store the automobile license information by using the access token;
s106, when the access token is valid, the automobile license storage information is stored in the database, and the database returns a storage number;
and S107, according to the storage number, carrying out validity verification on the stored automobile license storage information by using the second hash tree.
2. The method for block chain-based digital certificate management according to claim 1, wherein the step S103 further includes:
and S1031, after the user characteristic information is obtained, carrying out hash operation on the user characteristic information, and calculating to obtain a first real-time hash root value.
S1032, comparing the first real-time hash root value with the hash root value in the first hash tree, and verifying whether the user characteristic information is valid.
3. The method according to claim 2, wherein the step S1032 further includes:
if the first real-time hash root value is equal to the hash root value in the first hash tree, the user characteristic information is valid; otherwise, the user characteristic information is invalid.
4. The method according to claim 1, wherein the step S105 further includes:
and segmenting the automobile certificate storage information, respectively utilizing the encryption key and the characteristic signature information to encrypt and calculate each segment of the automobile certificate storage information, and finally combining each segment of the encrypted automobile certificate storage information to form complete encrypted automobile certificate storage information.
5. The method for block chain-based digital certificate management according to claim 1, wherein the step S107 further includes:
s1071, inquiring the stored automobile certificate storage information according to the storage number, carrying out hash operation, and calculating to obtain a second real-time hash root value.
S1072, comparing the second real-time hash root value with the hash root value in the second hash tree, and verifying whether the stored automobile evidence storage information is effective or not.
6. The method according to claim 5, wherein the step S1072 further includes:
if the second real-time hash root value is equal to the hash root value stored in the second hash tree, the stored automobile certificate information is valid; otherwise, the stored automobile certificate storing information is invalid.
7. The blockchain-based digital certificate management method according to claim 1, wherein the user characteristic information includes a user digital signature.
8. The method according to claim 1, wherein the vehicle license information comprises a component source, a production and assembly process, a sales channel and a maintenance record.
9. A method for managing a supply chain of a vehicle, wherein the method for managing the supply chain of the vehicle comprises a block chain-based digital certificate management method according to any one of claims 1 to 8.
CN202210924508.5A 2022-08-02 2022-08-02 Digital certificate storage management method based on blockchain Active CN115439118B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210924508.5A CN115439118B (en) 2022-08-02 2022-08-02 Digital certificate storage management method based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210924508.5A CN115439118B (en) 2022-08-02 2022-08-02 Digital certificate storage management method based on blockchain

Publications (2)

Publication Number Publication Date
CN115439118A true CN115439118A (en) 2022-12-06
CN115439118B CN115439118B (en) 2023-11-21

Family

ID=84243126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210924508.5A Active CN115439118B (en) 2022-08-02 2022-08-02 Digital certificate storage management method based on blockchain

Country Status (1)

Country Link
CN (1) CN115439118B (en)

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN107705208A (en) * 2017-10-12 2018-02-16 南京网数信息科技有限公司 A kind of digital asset processing method and system based on Hash tree
US20180227131A1 (en) * 2017-02-06 2018-08-09 ShoCard, Inc. Electronic identification verification methods and systems with storage of certification records to a side chain
CN109639632A (en) * 2018-11-02 2019-04-16 远光软件股份有限公司 User information management method, electronic equipment and storage medium based on block chain
CN109840769A (en) * 2019-01-21 2019-06-04 中国联合网络通信集团有限公司 Card method and device, system and storage medium are deposited based on block chain
CN109889479A (en) * 2018-12-21 2019-06-14 中链科技有限公司 User identity based on block chain deposits card, verification method and device and verification system
CN110071808A (en) * 2019-04-09 2019-07-30 郭浩 A kind of the secure digital identity verification method and device of block chain user
CN110245511A (en) * 2019-06-24 2019-09-17 浪潮卓数大数据产业发展有限公司 A kind of file encryption storage method based on block chain
CN110969207A (en) * 2019-11-29 2020-04-07 腾讯科技(深圳)有限公司 Electronic evidence processing method, device, equipment and storage medium
CN111130751A (en) * 2019-11-04 2020-05-08 杭州云萃流图网络科技有限公司 Appointment information processing method, device and system based on block chain and electronic equipment
CN111130770A (en) * 2019-12-18 2020-05-08 杭州云萃流图网络科技有限公司 Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium
CN111444257A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Block chain-based electronic evidence storage method and system
CN111475845A (en) * 2020-04-13 2020-07-31 中国工商银行股份有限公司 Unstructured data identity authorization access system and method
CN111552676A (en) * 2020-04-26 2020-08-18 北京众享比特科技有限公司 Block chain based evidence storing method, device, equipment and medium
CN112069550A (en) * 2020-07-20 2020-12-11 江苏傲为控股有限公司 Electronic contract deposit certificate system based on intelligent contract mode
CN112383611A (en) * 2020-11-11 2021-02-19 上海保险交易所股份有限公司 File evidence storing method, system and server based on block chain
CN112580073A (en) * 2020-12-17 2021-03-30 昆明理工大学 Evidence storing method and system based on block chain and IPFS
CN112711637A (en) * 2020-12-31 2021-04-27 航天信息股份有限公司 Block chain-based electronic data notarization method and device
CN113055431A (en) * 2021-01-13 2021-06-29 湖南天河国云科技有限公司 Block chain-based industrial big data file efficient chaining method and device
CN113326317A (en) * 2021-05-24 2021-08-31 中国科学院计算技术研究所 Block chain evidence storing method and system based on isomorphic multi-chain architecture
CN114691669A (en) * 2020-12-30 2022-07-01 航天信息股份有限公司 Electronic certificate storage method and device, electronic equipment and storage medium

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
US20180227131A1 (en) * 2017-02-06 2018-08-09 ShoCard, Inc. Electronic identification verification methods and systems with storage of certification records to a side chain
CN107705208A (en) * 2017-10-12 2018-02-16 南京网数信息科技有限公司 A kind of digital asset processing method and system based on Hash tree
CN109639632A (en) * 2018-11-02 2019-04-16 远光软件股份有限公司 User information management method, electronic equipment and storage medium based on block chain
CN109889479A (en) * 2018-12-21 2019-06-14 中链科技有限公司 User identity based on block chain deposits card, verification method and device and verification system
CN109840769A (en) * 2019-01-21 2019-06-04 中国联合网络通信集团有限公司 Card method and device, system and storage medium are deposited based on block chain
CN110071808A (en) * 2019-04-09 2019-07-30 郭浩 A kind of the secure digital identity verification method and device of block chain user
CN110245511A (en) * 2019-06-24 2019-09-17 浪潮卓数大数据产业发展有限公司 A kind of file encryption storage method based on block chain
CN111130751A (en) * 2019-11-04 2020-05-08 杭州云萃流图网络科技有限公司 Appointment information processing method, device and system based on block chain and electronic equipment
CN110969207A (en) * 2019-11-29 2020-04-07 腾讯科技(深圳)有限公司 Electronic evidence processing method, device, equipment and storage medium
CN111130770A (en) * 2019-12-18 2020-05-08 杭州云萃流图网络科技有限公司 Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium
CN111444257A (en) * 2020-02-11 2020-07-24 江苏荣泽信息科技股份有限公司 Block chain-based electronic evidence storage method and system
CN111475845A (en) * 2020-04-13 2020-07-31 中国工商银行股份有限公司 Unstructured data identity authorization access system and method
CN111552676A (en) * 2020-04-26 2020-08-18 北京众享比特科技有限公司 Block chain based evidence storing method, device, equipment and medium
CN112069550A (en) * 2020-07-20 2020-12-11 江苏傲为控股有限公司 Electronic contract deposit certificate system based on intelligent contract mode
CN112383611A (en) * 2020-11-11 2021-02-19 上海保险交易所股份有限公司 File evidence storing method, system and server based on block chain
CN112580073A (en) * 2020-12-17 2021-03-30 昆明理工大学 Evidence storing method and system based on block chain and IPFS
CN114691669A (en) * 2020-12-30 2022-07-01 航天信息股份有限公司 Electronic certificate storage method and device, electronic equipment and storage medium
CN112711637A (en) * 2020-12-31 2021-04-27 航天信息股份有限公司 Block chain-based electronic data notarization method and device
CN113055431A (en) * 2021-01-13 2021-06-29 湖南天河国云科技有限公司 Block chain-based industrial big data file efficient chaining method and device
CN113326317A (en) * 2021-05-24 2021-08-31 中国科学院计算技术研究所 Block chain evidence storing method and system based on isomorphic multi-chain architecture

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周正南: "区块链技术在图片存证中的应用", vol. 52, no. 11, pages 2785 - 2790 *

Also Published As

Publication number Publication date
CN115439118B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
US10296248B2 (en) Turn-control rewritable blockchain
US10623387B2 (en) Distributed key secret for rewritable blockchain
EP3693886B1 (en) Optimizations for verification of interactions system and method
CN107220559B (en) Encryption storage method for non-tamperable file
CN109428892B (en) Multi-stage rewritable block chain
CN115659417A (en) Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment
CN113570465B (en) Block chain signature processing method based on POS (Point of sale) consensus mechanism
CN115659378A (en) Case record information evidence storing method and related equipment
CN115439118B (en) Digital certificate storage management method based on blockchain
CN113468549A (en) Retrieval method and system for encrypted information evidence based on block chain and electronic equipment
CN117033382A (en) Block chain digital evidence-storing method and system
Gao et al. Similarity-based Secure Deduplication for IIoT Cloud Management System
CN112929173A (en) Digital certificate authentication method based on signature recognition
CN117768092A (en) Paging-oriented blockchain authentication method and system
CN114095518A (en) Scientific and technological data authority confirming and tracking protection method based on multistage committee consensus
CN116015609A (en) Business record storage method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant