CN116561816A - Trusted evidence-storing method and device based on Lejia diagram contracts - Google Patents

Trusted evidence-storing method and device based on Lejia diagram contracts Download PDF

Info

Publication number
CN116561816A
CN116561816A CN202310826290.4A CN202310826290A CN116561816A CN 116561816 A CN116561816 A CN 116561816A CN 202310826290 A CN202310826290 A CN 202310826290A CN 116561816 A CN116561816 A CN 116561816A
Authority
CN
China
Prior art keywords
certification
node
certificate
contract
original data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310826290.4A
Other languages
Chinese (zh)
Other versions
CN116561816B (en
Inventor
王涛
罗铮
邓昕
郑宇�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beikexinlian Wuhan Digital Technology Co ltd
Original Assignee
Beikexinlian Wuhan Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beikexinlian Wuhan Digital Technology Co ltd filed Critical Beikexinlian Wuhan Digital Technology Co ltd
Priority to CN202310826290.4A priority Critical patent/CN116561816B/en
Publication of CN116561816A publication Critical patent/CN116561816A/en
Application granted granted Critical
Publication of CN116561816B publication Critical patent/CN116561816B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention provides a trusted certificate storing method and device based on a Lijia diagram contract, comprising the following steps: acquiring original data and a certificate storage requirement uploaded by a user node; preprocessing the original data uploaded by the user node to obtain a certification-preserving electronic certificate corresponding to the user node; the method comprises the steps that a certification-storing electronic certificate is simultaneously sent to nodes of a plurality of third-party platforms, the certification-storing electronic certificate is used for triggering the nodes of each third-party platform to conduct certification-storing feedback, and the certification-storing feedback is used for triggering a user node and the nodes of each third-party platform to correspondingly generate different certification-storing contracts through preset Lejia contracts; establishing a certificate deposit bill target model according to different certificate deposit contracts and the certificate deposit demands uploaded by the user nodes; and solving the evidence-storing single-target model by adopting a mathematical programming method to obtain the credible evidence-storing label. The method clearly and stably stores the electronic data, and balances the storage relationship between the storage requirement and the original data.

Description

Trusted evidence-storing method and device based on Lejia diagram contracts
Technical Field
The invention relates to the field of big data processing, in particular to a trusted memory certificate method and device based on a Lenijia map contract.
Background
Along with popularization of the Internet plus mode, various evidences exist in the form of electronic data, the electronic data has higher safety than traditional paper data, and when the electronic data needs to be stored, the prior art only sends an electronic seal and a digital certificate to a third party platform for storing, so that the data is poor in evidence storage. In the prior art, the ligan contract is a contract description way with intermediacy for converting a real contract into a code, which is essentially a clearly defined, non-tamperable readable text, mainly used as an intention of both parties clearly in a transaction. The prior art lacks a trusted evidence storage method based on the Lejia diagram contract, on one hand, the electronic data needs to be clearly and stably stored, and on the other hand, the evidence storage relation between the evidence storage requirement and the original data needs to be balanced so as to improve the evidence storage efficiency.
Disclosure of Invention
The invention aims to provide a trusted certificate-preserving method and device based on a Lijia diagram contract so as to solve the problems. In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
in a first aspect, the present application provides a trusted forensic method based on a liga contract, the method comprising:
acquiring original data and a certificate storage requirement uploaded by a user node;
preprocessing the original data uploaded by the user node to obtain a certification-preserving electronic certificate corresponding to the user node;
the certification-preserving electronic certificates are simultaneously sent to nodes of a plurality of third-party platforms, the certification-preserving electronic certificates are used for triggering the nodes of each third-party platform to conduct certification-preserving feedback, and the certification-preserving feedback is used for triggering the user nodes and the nodes of each third-party platform to correspondingly generate different certification-preserving contracts through preset Lijia contracts;
establishing a certification document target model according to the different certification contracts and the certification requirements uploaded by the user node;
and solving the document storage target model by adopting a mathematical programming method to obtain a trusted document storage label, wherein the trusted document storage label is used for document storage matching of user nodes.
In a second aspect, the present application further provides a trusted forensic device based on a liga contract, the device comprising:
the acquisition module is used for acquiring the original data and the certificate storage requirement uploaded by the user node;
the certificate generation module is used for preprocessing the original data uploaded by the user node to obtain a certification-storing electronic certificate corresponding to the user node;
the first processing module is used for simultaneously sending the certification-preserving electronic certificates to the nodes of a plurality of third-party platforms, the certification-preserving electronic certificates are used for triggering the nodes of each third-party platform to conduct certification-preserving feedback, and the certification-preserving feedback is used for triggering the user nodes and the nodes of each third-party platform to correspondingly generate different certification-preserving contracts through preset plum-Jia graph contracts;
the second processing module is used for establishing a certification document target model according to the different certification contracts and the certification requirements uploaded by the user node;
and the third processing module is used for solving the document storage target model by adopting a mathematical programming method to obtain a trusted document storage label, and the trusted document storage label is used for document storage matching of the user node.
The beneficial effects of the invention are as follows:
on one hand, the verification method introduces the Lijia diagram contract to ensure that the verification content is clearly expressed in the generation process of the verification contract, so that the data circulation between the user node and the node of the corresponding third party platform is clear, and the stability of the verification data is ensured; on the other hand, the evidence storage method introduces a single-target model and a mathematical programming method, balances the evidence storage relation between the evidence storage requirement and the original data, and improves the evidence storage efficiency.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the embodiments of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a trusted memory certificate method based on a ligan contract according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a trusted memory card device based on a ligan contract according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a first processing module according to an embodiment of the present invention;
fig. 4 is a schematic diagram of trusted memory card device structure based on a ligan contract according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance.
Example 1:
the embodiment provides a trusted memory certificate method based on a Lejia diagram contract.
Referring to fig. 1, the method is shown to include steps S1 to S5, specifically:
s1, acquiring original data and a certificate storage requirement uploaded by a user node;
in step S1, the raw data uploaded by the user node includes: when the original data is electronic contract data, terms of the contract, a transaction template of the contract, legal terms related to the contract and the like can be obtained from the original data.
The evidence storage requirement comprises the total evidence storage of the original data and the partial evidence storage of the original data, wherein the partial evidence storage of the original data comprises different classifications of keyword evidence storage, key data packet evidence storage, key applicable scene evidence storage and the like.
S2, preprocessing the original data uploaded by the user node to obtain a certification-preserving electronic certificate corresponding to the user node;
step S2 includes steps S21 to S25, specifically:
s21, carrying out hash calculation on the original data uploaded by the user node to obtain abstract information of the original data;
in step S21, hash calculation is performed on the original data uploaded by the user node, where the hash calculation specifically uses a hash function, and if the original data uploaded by the user node is n, the summary information of the original data at this time is:
(1)
in the above-mentioned method, the step of,representing the originalSummary information of data,/>Representing a hash function +_>Representing the raw data uploaded by the user node.
Wherein, the liquid crystal display device comprises a liquid crystal display device,the function is a one-way cipher system, when the input data n with arbitrary length passes throughAfter the function transformation, the output with fixed length can be generated, and the method uses the output with fixed length as the abstract information of the original data so as to record the later time stamp. Since the summary information is a compressed mapping of all bits in the input data, changing any bit or bits in the data will change the summary information, therefore +.>The function may also verify the integrity of the original data uploaded by the user node.
S22, performing timestamp recording on the summary information of the original data to obtain a first recording timestamp corresponding to the summary information;
in step S22, the formula of the first recording time stamp is:
(2)
in the above-mentioned method, the step of,representing a first recording time stamp,/>Summary information representing the original data, < > and->Summary information generation time representing the original data.
In step S22, the first record timestamp is a string of characters for describing the time of generating the summary information of the original data, and the step combines the summary information with the time source, so as to ensure the time accuracy of the summary information. When the first recorded time stamp application is carried out, the application can be uploaded to a third-party public time stamp service organization, and the third-party public time stamp service organization performs issuing according to a legal time source so as to ensure that the later-stage evidence storage data has legal effect in a time sense.
S23, carrying out digital signature on the abstract information of the original data to obtain electronic signature information of the original data;
in step S23, the electronic signature information formula of the original data is:
(3)
in the above-mentioned method, the step of,electronic signature information representing the original data, +.>Key information corresponding to the original data, +.>Summary information representing the original data.
S24, performing timestamp recording on the electronic signature information of the original data to obtain a second record timestamp corresponding to the electronic signature information;
(4)
in the above-mentioned method, the step of,representing a second recording time stamp,/for>Electronic signature information representing the original data, +.>Electronic signature information generation time representing the original data.
In step S24, the second record timestamp is a string of characters for describing the time of generating the electronic signature information, and when the second record timestamp is applied, the application can be uploaded to a third party public timestamp service, and the third party public timestamp service issues according to the legal time source.
S25, generating a certification electronic certificate according to the summary information of the original data, the signature information of the original data, the first recording time stamp and the second recording time stamp.
In step S25, the formula of the certification electronic certificate is:
(5)
in the above-mentioned method, the step of,representing a certification electronic certificate->Summary information representing the original data, < > and->Electronic signature information representing the original data, +.>Representing a first recording time stamp,/>Representing a second recording timestamp.
In the method, the step S2 can ensure that the certification-holding electronic certificate respectively records and stores two times, namely a first record time stamp corresponding to the abstract information and a second record time stamp corresponding to the electronic signature information, and the credibility and the specificity of the certification-holding electronic certificate are ensured.
In step S2, when a certification-preserving electronic certificate is generated according to the summary information of the original data, the signature information of the original data, the first recording time stamp and the second recording time stamp, the certification-preserving electronic certificate is subjected to time stamp recording, and a third recording time stamp is obtained. From the time sequence, the first recording time stamp, the second recording time stamp and the third recording time stamp are sequentially increased, and the three time stamps are mutually verified, so that the credibility of the credible evidence storage data and the time specificity of the evidence storage flow are further ensured.
S3, simultaneously sending the certification-preserving electronic certificates to nodes of a plurality of third-party platforms, wherein the certification-preserving electronic certificates are used for triggering the nodes of each third-party platform to conduct certification-preserving feedback, and the certification-preserving feedback is used for triggering the user nodes and the nodes of each third-party platform to generate different certification-preserving contracts through corresponding preset Lijia contracts;
because the primary public key technology in the blockchain can reveal the true physical address of the user, the privacy protection capability of the certification system is reduced, based on the fact that the certification method provides that the signature is divided into a plurality of periods, the public key is fixed, the private key is continuously updated by a one-way function along with the change of each period, and the method guarantees the non-counterfeitability and confidentiality requirements of the certification data. Step S3 includes step S31, and step S31 includes steps S311 to S316, specifically:
s311, obtaining public parameters required by the node authentication of each third party platform;
s312, generating a public key and a private key corresponding to each node of the third party platform according to the public parameters;
in step S312, the node of each third party platform may use an existing asymmetric encryption algorithm to generate a respective public and private key.
S313, combining the public key generated by the node of any one third party platform with the private keys generated by the nodes of other third party platforms to obtain ring signature information;
in step S313, the calculation formula of the ring signature information is:
(6)
in the above-mentioned method, the step of,representing ring signature information->Public key information representing nodes of any one third party platform, < >>、…、/>All represent nodes of the rest of the third party platforms, +.>、…、/>And each node represents private key information corresponding to each node of the rest of third-party platforms.
S314, carrying out secret segmentation on the ring signature information, and broadcasting segmented secret shares on nodes of each third party platform in a network;
in step S314, if the set of n ring members isAnd finally the set of signers of the actual signature +.>For the collection->Middle Member->Using a thresholdThe signature share algorithm segments and broadcasts the segmented secret shares on the nodes of each of the third party platforms in the network.
S315, solving the divided secret shares by the nodes of each third party platform to obtain partial signatures;
in step S315, the set of truly signed signersThe solving formula is as follows:
(7)
in the above-mentioned description of the invention,signer set representing real signature +.>Corresponding partial signature,/->Signer set representing real signature +.>Member number of->Representing a message to be signed,/->Representing ring signature information->Representing the right of use corresponding to the private key of the partial signature,/-for the private key of the partial signature>A random number representing a blockchain.
S316, the nodes of each third party platform carry out corresponding certificate signing on the certificate-preserving electronic certificates obtained through sending according to the partial signatures.
In step S316, the formula of the certificate-preserving signature is:
(8)
in the above-mentioned method, the step of,representing a certificate signature->Summary information representing the original data, < > and->Electronic signature information representing the original data, +.>Representing a first recording time stamp,/>Representing a second recording time stamp,/for>Signer set representing real signature +.>The corresponding partial signature.
In step S31, the finally generated forensic signature is included in the corresponding forensic electronic certificate, so as to ensure the accuracy and safety of triggering the forensic feedback.
In step S3, the certification feedback is configured to trigger the user node and each node of the third party platform to generate different certification contracts through corresponding preset lyjia graph contracts, where the different certification contracts include a primary certification contract and a secondary certification contract, specifically, the obtaining of the primary certification contract and the secondary certification contract includes step S32, and step S32 includes steps S321 to S321, specifically including:
s321, acquiring node addresses of a plurality of third-party platforms;
s322, grading the node addresses of a plurality of third-party platforms to obtain a first-level evidence storage node and a second-level evidence storage node;
s323, generating a primary evidence-storing contract according to the primary evidence-storing node and a preset Lijia diagram contract, wherein the primary evidence-storing contract comprises a first hash value and primary contract information;
in step S323, the preset lyjia graph contract specifies the certification content corresponding to the primary certification node, for example: setting the data version number, the data creator, the data creation time and the applicable scene of the data as the certification content on the primary certification node, and making contracts on the certification content; and then generating a primary certificate-storing contract through an intelligent contract algorithm, obtaining a first hash value in the primary certificate-storing contract through hash calculation of the certificate-storing content, and generating primary contract information for the certificate-storing content, wherein the primary contract information is human-readable information and program-readable information.
S324, generating a secondary evidence storage contract according to the secondary evidence storage node and a preset Lijia diagram contract, wherein the secondary evidence storage contract comprises a second hash value and secondary contract information.
In step S324, the preset lyjia map contract corresponds to the second-level evidence-storing node to define evidence-storing contents, and in this section, the evidence-storing contents are terms of the contract and a transaction template of the contract, and contract making is performed on the evidence-storing contents; and then generating a secondary certificate storing contract through an intelligent contract algorithm, obtaining a second hash value in the secondary certificate storing contract through hash calculation of the certificate storing content, and generating secondary contract information for the certificate storing content, wherein the secondary contract information is human-readable information and program-readable information.
After the user node and the node of each third party platform generate different certificate-storing contracts through the preset lyjia graph contracts, step S3 includes step S33, step S33 includes steps S331 to S334, specifically includes:
s331, establishing a judgment matrix through a preset influence factor;
in step S331, a judgment matrix is obtained by comparing importance of one factor with that of another factorWherein->,/>+/>=1,/>=1,2…,n;/>=1,2…,n;/>And->The influence factors of different rows and columns are respectively.
S332, converting the judgment matrix into a consistency judgment matrix through a preset conversion formula;
in step S332, the line sum is first calculatedThe preset conversion formula is as follows:
(9)
in the above-mentioned method, the step of,representing an intermediate matrix>Representing a row sum->Representing column sum->Representing the set total number of rows, and 0.5 represents a preset correction factor.
When the intermediate matrix is obtained, the consistency judgment matrix is
S333, vector calculation is carried out on the consistency judgment matrix to obtain a weight vector;
in step S333, the consistency determination matrix isWeight vector +.>
S334, determining a credibility evaluation index according to the weight vector, wherein the credibility evaluation index is used for evaluating the first evidence-storing contract and the second evidence-storing contract respectively.
In step S334, the calculation formula of the reliability evaluation index is:
(10)
in the above-mentioned method, the step of,indicating a confidence rating measure,/->Modulo length representing weight vector, +.>Indicating the trustworthiness of the third party with the certificate +.>Indicate->Preset credibility of individual certificate contracts, < ->The value of (2) is 1 or 2.
Step S33 realizes the credibility real-time evaluation of the primary evidence-storing contract and the secondary evidence-storing contract so as to ensure that the original data uploaded by the user node is consistent with the evidence-storing record and that false and unstable electronic data cannot occur.
After the user node and the node of each third party platform generate different certificate-storing contracts through the preset plum blossom contract, the present certificate-storing method verifies the certificate-storing electronic certificate, step S3 includes step S34, step S34 includes steps S341 to S345, and specifically includes:
s341, a user node sends verification request information to a node of a third party platform to be verified, wherein the verification request information is used for triggering the node of the third party platform to be verified to verify;
s342, after node verification feedback of the third-party platform to be verified is obtained, the user node generates a first verification time stamp;
s343, a user node sends an operation instruction to a node of a third party platform to be verified, wherein the operation instruction is used for triggering the node of the third party platform to be verified to perform the read-write operation of the certification electronic certificate;
s344, after obtaining node read-write operation feedback of the third party platform to be verified, the user node generates a second verification time stamp;
and S345, calculating according to the first verification time stamp, the second verification time stamp and a preset time threshold value to obtain a verification time value, wherein the verification time value is used for feeding back the verification result of the verification electronic certificate to the node of the third party platform to be verified.
In step 345, the first verification timestamp and the second verification timestamp are both specific moments, and when the difference between the moments corresponding to the second verification timestamp and the first verification timestamp is smaller than a preset time threshold, it indicates that the verification is performed on the node of the third party platform to be verified by the current verification time value, and then the verification is performed on the verification-storing electronic certificate without errors;
when the difference between the moments corresponding to the second verification time stamp and the first verification time stamp is larger than a preset time threshold, the fact that the data defect exists in the verification electronic certificate after the current verification time value verifies the node of the third party platform to be verified is indicated.
S4, establishing a certification document target model according to the different certification contracts and the certification requirements uploaded by the user node;
in step S4, the document object model is:
(11)
in the above-mentioned method, the step of,representing a document target model->Representing the certificate storing contract corresponding to the c th solution set +.>Representing the evidence-storing requirement corresponding to the c th solution set +.>
And S5, solving the evidence-storing single-target model by adopting a mathematical programming method to obtain a trusted evidence-storing label, wherein the trusted evidence-storing label is used for carrying out evidence-storing matching on the user node.
In step S5, a mathematical programming method is used to construct a membership function of the single-target model, where the membership function is:
(12)
in the above-mentioned method, the step of,membership function representing a single object model, < ->Representing solution sets->Representing the lower bound of the solution set,representing the upper bound of the solution set.
According to the solution set of the membership function, a trusted certificate label value in (0, 1) can be obtained, and when the trusted certificate label value is 1, the certificate requirement of the user node is indicated to be that all original data are subjected to the certificate; when the trusted certificate label value is 0, indicating that the certificate storage requirement of the user node is that all original data are not subjected to certificate storage; when the trusted certificate label value is a value within 0-1, indicating that the user node certificate requirement is to partially certificate the original data, and calling a corresponding certificate contract according to the specific numerical value of the trusted certificate label value.
Example 2:
as shown in fig. 2, the present embodiment provides a trusted certificate device based on a liga contract, where the device includes:
the acquisition module 901 is used for acquiring the original data and the certificate storage requirement uploaded by the user node;
the certificate generation module 902 is configured to pre-process the original data uploaded by the user node to obtain a certificate-storing electronic certificate corresponding to the user node;
the first processing module 903 is configured to send the certification-preserving electronic certificate to nodes of multiple third-party platforms at the same time, where the certification-preserving electronic certificate is used to trigger a node of each third-party platform to perform certification-preserving feedback, and the certification-preserving feedback is used to trigger the user node and the node of each third-party platform to generate different certification-preserving contracts through corresponding preset lycra contracts;
a second processing module 904, configured to establish a certification goal model according to the different certification contracts and the certification requirements uploaded by the user node;
and a third processing module 905, configured to solve the document storage target model by using a mathematical programming method, to obtain a trusted document storage label, where the trusted document storage label is used for document storage matching by a user node.
In one disclosed implementation of the invention, the certificate generation module 902 includes:
a first processing unit 9021, configured to perform hash computation on the original data uploaded by the user node, to obtain summary information of the original data;
the second processing unit 9022 is configured to perform timestamp recording on summary information of the original data, to obtain a first recording timestamp corresponding to the summary information;
a third processing unit 9023, configured to digitally sign the summary information of the original data, to obtain electronic signature information of the original data;
a fourth processing unit 9024, configured to perform timestamp recording on the electronic signature information of the original data, to obtain a second record timestamp corresponding to the electronic signature information;
a fifth processing unit 9025 is configured to generate a certification electronic certificate according to the digest information of the original data, the signature information of the original data, the first recording time stamp, and the second recording time stamp.
As shown in fig. 3, in one embodiment of the disclosed method, the first processing module 903 includes a signature module 9031, and the signature module 9031 includes:
a first obtaining unit 90311, configured to obtain public parameters required when the node of each third party platform is authenticated;
a sixth processing unit 90312, configured to generate, by using a node of each third party platform, a public-private key corresponding to each node according to the public parameter;
the first signature unit 90313 is configured to combine a public key generated by a node of any one third party platform with a private key generated by nodes of other third party platforms, so as to obtain ring signature information;
a splitting unit 90314, configured to split the ring signature information in a secret manner, and broadcast the split secret shares on nodes of each third party platform in the network;
a second signature unit 90315, configured to solve the split secret shares by using a node of each third party platform, to obtain a partial signature;
and the third signature unit 90316 is configured to perform corresponding certificate signing on the certificate-preserving electronic certificates obtained by sending according to the partial signature by using the node of each third party platform.
In one embodiment of the disclosure, after the signing module 9031, the first processing module 903 further includes a certification contract generating module 9032, where the certification contract generating module 9032 includes:
a second obtaining unit 90321, configured to obtain node addresses of a plurality of third party platforms;
a seventh processing unit 90322, configured to rank node addresses of a plurality of third party platforms, to obtain a primary authentication node and a secondary authentication node;
an eighth processing unit 90323, configured to generate a primary certificate storing contract according to the primary certificate storing node and a preset ligan map contract, where the primary certificate storing contract includes a first hash value and primary contract information;
the ninth processing unit 90324 is configured to generate a secondary certificate storing contract according to the secondary certificate storing node and a preset lyjia drawing contract, where the secondary certificate storing contract includes a second hash value and secondary contract information.
In one embodiment of the disclosed method, after the certification contract generating module 9032, the first processing module 903 further includes an evaluating module 9033, where the evaluating module 9033 includes:
a first calculating unit 90331, configured to establish a judgment matrix through a preset influence factor;
a second calculating unit 90332, configured to convert the determination matrix into a consistency determination matrix through a preset conversion formula;
a third computing unit 90333, configured to perform vector computation on the consistency determination matrix to obtain a weight vector;
and an evaluation unit 90334, configured to determine a reliability evaluation index according to the weight vector, where the reliability evaluation index is used to evaluate the first certificate contract and the second certificate contract respectively.
In one disclosed implementation, after the evaluating module 9033, the first processing module 903 further includes a verification module 9034, where the verification module 9034 includes:
a tenth processing unit 90341, configured to send, by a user node, authentication request information to a node of a third party platform to be authenticated, where the authentication request information is used to trigger the node of the third party platform to be authenticated to perform authentication;
an eleventh processing unit 90342, configured to generate a first verification timestamp by the user node after obtaining node verification feedback of the third party platform to be verified;
the twelfth processing unit 90343 is configured to send an operation instruction to a node of the third party platform to be verified by a user node, where the operation instruction is used to trigger the node of the third party platform to be verified to perform a read-write operation of the certificate-storing electronic certificate;
a thirteenth processing unit 90344, configured to generate a second verification timestamp by the user node after obtaining feedback of a node read-write operation of the third party platform to be verified;
the fourteenth processing unit 90345 is configured to calculate, according to the first verification timestamp, the second verification timestamp, and a preset time threshold, to obtain a verification time value, where the verification time value is used to perform feedback of the verification result of the verification electronic certificate on a node of the third party platform to be verified.
It should be noted that, regarding the apparatus in the above embodiments, the specific manner in which the respective modules perform the operations has been described in detail in the embodiments regarding the method, and will not be described in detail herein.
Example 3:
corresponding to the above method embodiment, a trusted memory card device based on a lycra contract is further provided in this embodiment, and a trusted memory card device based on a lycra contract described below and a trusted memory card method based on a lycra contract described above may be referred to correspondingly with each other.
Fig. 4 is a block diagram illustrating a trusted memory card device 800 based on a ligan contract, according to an example embodiment. As shown in fig. 4, the lyjia diagram contract-based trusted forensic device 800 may include: a processor 801, a memory 802. The lyjia-contract-based trusted forensic device 800 may also include one or more of a multimedia component 803, an I/O interface 804, and a communication component 805.
Wherein the processor 801 is configured to control the overall operation of the trusted memory device 800 based on the lycra contract to perform all or part of the steps of the trusted memory method based on the lycra contract described above. The memory 802 is used to store various types of data to support operation at the lycra contract-based trusted memory device 800, which may include, for example, instructions for any application or method operating on the lycra contract-based trusted memory device 800, as well as application-related data. The multimedia component 803 may include a screen and an audio component. The I/O interface 804 provides an interface between the processor 801 and other interface modules, which may be a keyboard, mouse, buttons, etc. The communication component 805 is configured to perform wired or wireless communication between the trusted memory card device 800 based on the liga diagram contract and other devices.
In another exemplary embodiment, a computer readable storage medium is also provided, comprising program instructions which, when executed by a processor, implement the steps of the above-described trusted memory certification method based on a ligan contract. For example, the computer readable storage medium may be the memory 802 described above that includes program instructions executable by the processor 801 of the lycra contract-based trusted memory device 800 to perform the lycra contract-based trusted memory method described above.
Example 4:
corresponding to the above method embodiment, a readable storage medium is further provided in this embodiment, and a readable storage medium described below and a trusted memory certification method based on a liga map contract described above may be referred to correspondingly.
A readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method for trusted memory certification based on a liga contract of the above method embodiment.
The readable storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, and the like.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (10)

1. A trusted forensic method based on a lyjia diagram contract, comprising:
acquiring original data and a certificate storage requirement uploaded by a user node;
preprocessing the original data uploaded by the user node to obtain a certification-preserving electronic certificate corresponding to the user node;
the certification-preserving electronic certificates are simultaneously sent to nodes of a plurality of third-party platforms, the certification-preserving electronic certificates are used for triggering the nodes of each third-party platform to conduct certification-preserving feedback, and the certification-preserving feedback is used for triggering the user nodes and the nodes of each third-party platform to correspondingly generate different certification-preserving contracts through preset Lijia contracts;
establishing a certification document target model according to the different certification contracts and the certification requirements uploaded by the user node;
and solving the document storage target model by adopting a mathematical programming method to obtain a trusted document storage label, wherein the trusted document storage label is used for document storage matching of user nodes.
2. The trusted forensic method according to claim 1 is characterized in that the preprocessing of the original data uploaded by the user node to obtain the forensic electronic certificate corresponding to the user node comprises the following steps:
carrying out hash calculation on the original data uploaded by the user node to obtain abstract information of the original data;
performing timestamp recording on the summary information of the original data to obtain a first recording timestamp corresponding to the summary information;
carrying out digital signature on the abstract information of the original data to obtain electronic signature information of the original data;
performing timestamp recording on the electronic signature information of the original data to obtain a second recording timestamp corresponding to the electronic signature information;
and generating a certification electronic certificate according to the summary information of the original data, the signature information of the original data, the first recording time stamp and the second recording time stamp.
3. The trusted certificate authority method according to claim 2, wherein when the certificate authority electronic certificate is generated according to the digest information of the original data, the signature information of the original data, the first recording time stamp and the second recording time stamp, the third recording time stamp is obtained by performing time stamp recording on the certificate authority electronic certificate.
4. The trusted memory method of claim 3, wherein the first recording time stamp, the second recording time stamp, and the third recording time stamp are sequentially incremented.
5. The trusted forensic method of claim 1, wherein the different forensic contracts include a primary forensic contract and a secondary forensic contract, and wherein the acquiring of the primary forensic contract and the secondary forensic contract comprises:
acquiring node addresses of a plurality of third party platforms;
grading the node addresses of a plurality of third party platforms to obtain a primary evidence storage node and a secondary evidence storage node;
generating a primary evidence storage contract according to the primary evidence storage node and a preset Lijia diagram contract, wherein the primary evidence storage contract comprises a first hash value and primary contract information;
and generating a secondary evidence storage contract according to the secondary evidence storage node and a preset Lijia diagram contract, wherein the secondary evidence storage contract comprises a second hash value and secondary contract information.
6. The trusted forensic method according to claim 5, wherein after the user node and the node of each third party platform generate different forensic contracts through preset lycra contracts, the method comprises:
establishing a judgment matrix through a preset influence factor;
converting the judgment matrix into a consistency judgment matrix through a preset conversion formula;
vector calculation is carried out on the consistency judgment matrix to obtain a weight vector;
and determining a credibility evaluation index according to the weight vector, wherein the credibility evaluation index is used for evaluating the first evidence-storing contract and the second evidence-storing contract respectively.
7. The trusted memory method of claim 6, wherein the calculation formula of the trusted evaluation index is:
in the above-mentioned method, the step of,indicating a confidence rating measure,/->Modulo length representing weight vector, +.>Indicating the trustworthiness of the third party with the certificate +.>Indicate->Preset credibility of individual certificate contracts, < ->The value of (2) is 1 or 2.
8. The trusted forensic method of claim 1, wherein the forensic electronic certificate is simultaneously sent to nodes of a plurality of third party platforms, the forensic electronic certificate being used to trigger the nodes of each of the third party platforms to conduct forensic feedback, comprising:
obtaining public parameters required by the node certification of each third party platform;
generating a public key and a private key corresponding to each node of each third party platform according to the public parameters;
combining the public key generated by the node of any one third party platform with the private keys generated by the nodes of other third party platforms to obtain ring signature information;
secret segmentation is carried out on the ring signature information, and segmented secret shares are broadcast on nodes of each third party platform in the network;
solving the divided secret shares by the nodes of each third party platform to obtain partial signatures;
and the node of each third party platform carries out corresponding certificate storing signature on the certificate storing electronic certificate obtained through sending according to the partial signature.
9. The trusted forensic method according to claim 1, wherein sending the forensic electronic certificate to nodes of a plurality of third party platforms simultaneously, where the forensic electronic certificate is used to trigger nodes of each third party platform to perform forensic feedback, includes:
the user node sends verification request information to a node of a third party platform to be verified, wherein the verification request information is used for triggering the node of the third party platform to be verified to verify;
after node verification feedback of the third-party platform to be verified is obtained, the user node generates a first verification time stamp;
the user node sends an operation instruction to the node of the third party platform to be verified, wherein the operation instruction is used for triggering the node of the third party platform to be verified to perform the read-write operation of the certification electronic certificate;
after node read-write operation feedback of the third-party platform to be verified is obtained, the user node generates a second verification time stamp;
and calculating according to the first verification time stamp, the second verification time stamp and a preset time threshold value to obtain a verification time value, wherein the verification time value is used for feeding back the verification result of the verification electronic certificate to the node of the third party platform to be verified.
10. A trusted forensic device based on a lycra contract, comprising:
the acquisition module is used for acquiring the original data and the certificate storage requirement uploaded by the user node;
the certificate generation module is used for preprocessing the original data uploaded by the user node to obtain a certification-storing electronic certificate corresponding to the user node;
the first processing module is used for simultaneously sending the certification-preserving electronic certificates to the nodes of a plurality of third-party platforms, the certification-preserving electronic certificates are used for triggering the nodes of each third-party platform to conduct certification-preserving feedback, and the certification-preserving feedback is used for triggering the user nodes and the nodes of each third-party platform to correspondingly generate different certification-preserving contracts through preset plum-Jia graph contracts;
the second processing module is used for establishing a certification document target model according to the different certification contracts and the certification requirements uploaded by the user node;
and the third processing module is used for solving the document storage target model by adopting a mathematical programming method to obtain a trusted document storage label, and the trusted document storage label is used for document storage matching of the user node.
CN202310826290.4A 2023-07-07 2023-07-07 Trusted evidence-storing method and device based on Lejia diagram contracts Active CN116561816B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310826290.4A CN116561816B (en) 2023-07-07 2023-07-07 Trusted evidence-storing method and device based on Lejia diagram contracts

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310826290.4A CN116561816B (en) 2023-07-07 2023-07-07 Trusted evidence-storing method and device based on Lejia diagram contracts

Publications (2)

Publication Number Publication Date
CN116561816A true CN116561816A (en) 2023-08-08
CN116561816B CN116561816B (en) 2023-09-29

Family

ID=87488265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310826290.4A Active CN116561816B (en) 2023-07-07 2023-07-07 Trusted evidence-storing method and device based on Lejia diagram contracts

Country Status (1)

Country Link
CN (1) CN116561816B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200104958A1 (en) * 2018-09-28 2020-04-02 ShelterZoom Smart Contracts
CN111667301A (en) * 2020-05-18 2020-09-15 范国闯 Readable and automatically executable electronic contract method for credible advertisement transaction
CN111737724A (en) * 2020-08-26 2020-10-02 腾讯科技(深圳)有限公司 Data processing method and device, intelligent equipment and storage medium
KR102315328B1 (en) * 2021-02-23 2021-10-21 주식회사 시티랩스 A system and method for providing legal contract services to resolve disputes between parties by storing online conversations in a blockchain
CN113810359A (en) * 2021-03-08 2021-12-17 京东科技信息技术有限公司 Certificate storage method, device and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200104958A1 (en) * 2018-09-28 2020-04-02 ShelterZoom Smart Contracts
CN112970040A (en) * 2018-09-28 2021-06-15 谢尔特纵姆公司 Intelligent contract
CN111667301A (en) * 2020-05-18 2020-09-15 范国闯 Readable and automatically executable electronic contract method for credible advertisement transaction
CN111737724A (en) * 2020-08-26 2020-10-02 腾讯科技(深圳)有限公司 Data processing method and device, intelligent equipment and storage medium
CN112214780A (en) * 2020-08-26 2021-01-12 腾讯科技(深圳)有限公司 Data processing method and device, intelligent equipment and storage medium
KR102315328B1 (en) * 2021-02-23 2021-10-21 주식회사 시티랩스 A system and method for providing legal contract services to resolve disputes between parties by storing online conversations in a blockchain
CN113810359A (en) * 2021-03-08 2021-12-17 京东科技信息技术有限公司 Certificate storage method, device and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
何人可;: "基于区块链的智能合约在金融领域应用及风险防控", 理论探讨, no. 05 *

Also Published As

Publication number Publication date
CN116561816B (en) 2023-09-29

Similar Documents

Publication Publication Date Title
EP4120114A1 (en) Data processing method and apparatus, smart device and storage medium
US9819494B2 (en) Digital signature service system based on hash function and method thereof
CN114282926A (en) Cryptographic method and system for secure extraction of data from blockchains
CN109040341A (en) Intelligent contract address generating method, device, computer equipment and readable storage medium storing program for executing
CN111079197B (en) Audit result data storage method and device, electronic equipment and medium
CN106789080A (en) digital signature generation method and system
JP7337845B2 (en) System architecture and how data is processed therein
TW202014919A (en) Two-dimensional code generation method, data processing method, apparatus, and server
CN110597836B (en) Information inquiry request response method and device based on block chain network
CN113094334B (en) Digital service method, device, equipment and storage medium based on distributed storage
CN104168117B (en) A kind of speech digit endorsement method
CN112613601A (en) Neural network model updating method, device and computer storage medium
Lu et al. Transactive energy system deployment over insecure communication links
CN114491462A (en) Method, system, equipment and storage medium for signing multiple electronic documents once
Weilbach et al. Applying distributed ledger technology to digital evidence integrity
Singh et al. A digital asset inheritance model to convey online persona posthumously
CN116561816B (en) Trusted evidence-storing method and device based on Lejia diagram contracts
CN113221153A (en) Graph neural network training method and device, computing equipment and storage medium
CN115208656B (en) Supply chain data sharing method and system based on blockchain and authority management
CN102024192A (en) Electronic reimbursement process using electronic transaction security support platform
JP2005506623A (en) Data protection method and apparatus
Sangeetha et al. Development of novel blockchain technology for certificate management system using cognitive image steganography techniques
CN112950356A (en) Personal loan processing method, system, device and medium based on digital identity
CN112380577A (en) Multiparty-supported electronic contract repeated signing method and device and computer equipment
Tan et al. Multi-party co-signature scheme based on SM2

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant