CN102413313A - Data integrity authentication information generation method and device as well as data integrity authentication method and device - Google Patents

Data integrity authentication information generation method and device as well as data integrity authentication method and device Download PDF

Info

Publication number
CN102413313A
CN102413313A CN2010102953121A CN201010295312A CN102413313A CN 102413313 A CN102413313 A CN 102413313A CN 2010102953121 A CN2010102953121 A CN 2010102953121A CN 201010295312 A CN201010295312 A CN 201010295312A CN 102413313 A CN102413313 A CN 102413313A
Authority
CN
China
Prior art keywords
data
hash
integrity verification
information
verification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102953121A
Other languages
Chinese (zh)
Inventor
许良玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Priority to CN2010102953121A priority Critical patent/CN102413313A/en
Publication of CN102413313A publication Critical patent/CN102413313A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a data integrity authentication information generation method and device. The device comprises a Hash structure generation unit, a common authentication information acquisition unit and an integrity authentication information generation unit, wherein the Hash structure generation unit can generate a Hash structure corresponding to a specific time period according to Hash values of data sections contained in multiple data sources in the specific time period, so that the Hash value in each data section can respectively represent a child node at the lowest level of the Hash structure in order to calculate a root Hash value of the child node; the common authentication information acquisition unit can acquire the common authentication information according to the root Hash values; the integrity authentication information generation unit can generate the integrity authentication information of the data sections contained in the multiple data sources in the specific time period for the multiple data sources, wherein the integrity authentication information of each data section comprises common authentication information, path information containing from the Hash value of the data section of the leaf node at the lowest level in the Hash structure to the root node, and the relevant node Hash value of the child node in the path. The invention also provides a data integrity authentication device and method.

Description

The data integrity authorization information generates method and apparatus, data integrity verification method and device
Technical field
Present invention relates in general to the technical field of data processing, more specifically, relate to the method and apparatus that is used to generate the data integrity authorization information, and the method and apparatus that the integrality of data is verified.
Background technology
Video monitoring is playing an increasingly important role at aspects such as social security, delinquency prevention, case evidence obtainings, many enterprises and institutions, traffic route, public place, even individual dwelling house has all been installed monitoring camera.According to the regulation of " Criminal Procedure Law of the People's Republic of China " the 42nd, audiovisuals can be used as the basis of verdict through verified evidence.But because video data is forged easily and distorted, can video and recording (hereinafter to be referred as video) exist dispute as the vaild evidence of court always in the reality.In other words, video is to guarantee that video does not promptly guarantee integrality through any distorting (for example shielding, abridge, revise content etc.) after recording as a necessary condition of court evidence.
Guarantee that integrality has a lot of methods in coding theory and field of cryptography, can adopt diverse ways according to the intensity difference of integrality demand.A kind of provable security prevents effectively or detects that the method that video is distorted is to use the integrality in addition real-time guard of timestamp to institute's recorded video; Promptly by the monitoring camera online in real time to the (TSA of timestamp authorized organization; Time Stamp Authority) application time stabs; Make the video of adding a cover timestamp can not distort (but or tamper detection), the time is authentic and valid, thereby the integrality that guarantees video can be proved by any people's checking or authoritative institution.Thereby add a cover monitor video acquire full legal force on integrality of timestamp.There are at present many TSA to can be provided in the timestamp service (for example addressable http://www.faqs.org/rfcs/rfc3161.html obtains relevant information) of line both at home and abroad; Can be to integrality, the ageing protection in addition of any data; And acquire full legal force (for example through timestamp service centre, referring to http://www.tsa.cn/).Monitoring camera is divided into plurality of segments with video according to the time, for each segmentation acquisition time stabs, and video segmentation and correspondent time is preserved simultaneously.Anyone can verify the integrality, ageing of corresponding segments according to timestamp.
It is higher that but line duration stabs cost, and it relates to network bandwidth cost and single service fee.Especially just particularly outstanding for its cost problem of the unit that a plurality of cameras have been installed.For example, Fig. 1 has provided through line duration and has stabbed the example to protecting from the data of a plurality of cameras.As shown in the figure; If the video monitoring system 100 of a unit has been installed plurality of video camera 102-110; Each camera all needs to stab service in the alignment TSA application time separately, requires the network bandwidth of broad, and bigger from the video data volume of each camera; Required timestamp service times is a lot, and TSA normally charges according to the timestamp service times.So if the independent application time of each camera is stabbed (authorization information), network bandwidth cost and timestamp service fee are directly proportional with the number of camera.
In order to practice thrift required bandwidth of a plurality of cameras and timestamp service fee, should reduce the request times of timestamp, make the size of authorization information be unlikely to excessive simultaneously.
Fig. 2 has provided a kind of whole hash method of the prior art.As shown in Figure 2; Whole Hash is meant carrying out Hash from the video data segment integral body of some cameras (being camera A-E among Fig. 2) in the section sometime; For example be to carry out Hash in Fig. 2, promptly ask for the cryptographic hash H of the integral body of these video data segment for separately the integral body of video data segment A2-E2 among the camera A-E AE2, then this cryptographic hash is applied for stabbing a common time Timestamp (H to TSA AE2).Stab the authorization information that can be used as all camera A-E corresponding video data in this time period this common time.The advantage of this method is to have significantly reduced the number of times of application time stamp and the space of storage authentication information (being timestamp).Can not deposit separately and verified from the video data of a camera but this method makes, and the video data that needs to guarantee all cameras exists simultaneously, could verify its integrality.All make troubles to video preservation, montage and checking like this.
Summary of the invention
In view of the foregoing, need provide a kind of can be efficiently and accomplish the apparatus and method of protecting separately and verifying from the integrality of the data of a plurality of data sources easily.In addition, preferably cost is effective for this apparatus and method.
According to embodiments of the invention a kind of device that is used to generate the integrity verification information of data is provided, has comprised:
Hash structure generation unit; The cryptographic hash of the data sementation that it is configured to comprise separately in certain period of time through a plurality of data sources generates and the corresponding Hash structure of this special time period, makes the child node of the bottom that the cryptographic hash of all data sementations represents this Hash structure respectively so that calculate the root cryptographic hash of the root node of this Hash structure;
Public authorization information acquiring unit, it is configured to obtain the public authorization information to the root cryptographic hash;
The integrity verification information generating unit; It is configured to the integrity verification information that a plurality of data sources are created on the data sementation that comprises separately in the above-mentioned certain period of time, wherein the integrity verification information of each data sementation comprise in public authorization information, the Hash structure, the cryptographic hash from the cryptographic hash of this data sementation of the child node of representing lowermost layer to the routing information and the node that this path, comprise, relevant with this child node of root node.
Also provide a kind of according to embodiments of the invention, having comprised for data provide the system of integrity protection:
A plurality of data sources, these a plurality of data sources are divided in first to the Z level Hash zone, and wherein, L level Hash zone comprises M in first to the Z level Hash zone LIndividual Hash structure, L=1 ...; Z, and wherein each Hash structure all comprises a management data source, each management data source all has as stated the device according to the integrity verification information of the generation data of the embodiment of the invention; Wherein Z is the integer more than or equal to 2, M LIt is integer more than or equal to 1;
For each the Hash structure in the K level Hash zone; The cryptographic hash of the data sementation that the management data source of this Hash structure is configured to himself and the data source of being managed thereof are comprised in special time period generates this Hash structure as the child node of the bottom respectively; Perhaps; The root node value of at least one corresponding Hash structure generates this Hash structure as the child node of the bottom respectively in the cryptographic hash of the data sementation that the management data source of this Hash structure is configured to himself is comprised in special time period and the K-1 level Hash zone, and wherein K is more than or equal to 1 and smaller or equal to the integer of Z;
Root node value based on each Hash structure in the Z level Hash zone generates final root cryptographic hash; And preassigned highest management data source is configured to obtain the public authorization information to final root cryptographic hash in the management data source that comprises in the Z level Hash zone; And
Highest management data source is configured to the child node generation integrity verification information of the bottom in each Hash structure in Z level Hash zone, corresponding with data source, and this integrity verification information comprises above-mentioned public authorization information, cryptographic hash in Z level Hash zone, the routing information from this child node to said final root node and the node relevant with this child node that this path, comprise; And
For each the Hash structure the Q level Hash zone among from the first order to Z-1 level Hash zone; The child node that management data source in this Hash structure is configured to other bottoms in this Hash structure, corresponding with data source generates integrity verification information; This integrity verification information comprises the integrity verification information, the routing information from this child node to root node in said Q level Hash zone of the root node of this Hash structure and the cryptographic hash of the node relevant with this child node on this path; Wherein, The root node of this Hash structure is as the child node of the lowermost layer of corresponding Hash structure in the Q+1 level Hash zone; Its integrity verification information is that the management data source through corresponding Hash structure in the Q+1 level Hash zone generates, and wherein Q is more than or equal to 1 and smaller or equal to the integer of Z-1.
According to embodiments of the invention a kind of method that generates the integrity verification information of data is provided also, has comprised:
The Hash structure generates step; The cryptographic hash of the data sementation that it comprises a plurality of data sources in certain period of time separately generates and the corresponding Hash structure of this special time period as the child node of the bottom, and the child node of the lowermost layer through this Hash structure is calculated the root cryptographic hash of the root node of this Hash structure;
Public authorization information obtaining step, it obtains the public authorization information to the root cryptographic hash; With
Integrity verification information generates step; Each data sementation in its data sementation that in this certain period of time, comprises separately to above-mentioned a plurality of data sources generates the integrity verification information of this data sementation based on following information: in above-mentioned public authorization information, the Hash structure, the cryptographic hash from the cryptographic hash of this data sementation of the child node of representing lowermost layer to the routing information and the node that this path, comprise, relevant with this child node of root node.
According to embodiments of the invention a kind of device that the integrality of data is verified is provided also, has comprised:
Public authorization information authentication unit, its public authorization information that is configured to comprise in the integrity verification information that data sementation had of corresponding data source in special time period to a plurality of data sources is verified; And
The integrity verification unit; The root cryptographic hash that comprises in root cryptographic hash that it is configured to the cryptographic hash according to the integrity verification information that data sementation had of above-mentioned corresponding data source and this data sementation is calculated and the integrity verification information compares; And the checking of comparative result and public authorization information authentication unit as a result the both be under the positive situation, confirm that said data sementation is complete;
Wherein, The integrity verification information of said data sementation comprise above-mentioned public authorization information, with the corresponding Hash structure of above-mentioned special time period in, cryptographic hash from the child node of the lowermost layer of the cryptographic hash of this data sementation representative to the routing information and the node that this path, comprise, relevant with this child node of root node; Wherein represent the child node of lowermost layer to generate with the corresponding Hash structure of special time period through the cryptographic hash of the data sementation that makes above-mentioned a plurality of data source and in special time period, comprise separately, the root cryptographic hash is the cryptographic hash of the root node of Hash structure.
According to embodiments of the invention a kind of method that the integrality of data is verified is provided also, has comprised:
Public authorization information verification step, the public authorization information that comprises in the integrity verification information that data sementation had of corresponding data source in special time period to a plurality of data sources is verified;
Comparison step, the root cryptographic hash that comprises in root cryptographic hash that will calculate according to the cryptographic hash of the integrity verification information that data sementation had of above-mentioned corresponding data source and this data sementation and the integrity verification information compares; And
Integrality is confirmed step; If the comparative result of comparison step shows that the root cryptographic hash that comprises in the root cryptographic hash calculated and the integrity verification information is consistent; And the checking result of public authorization information verification step is positive, and then the specified data segmentation is complete
Wherein, The integrity verification information of data sementation comprise above-mentioned public authorization information, with the corresponding Hash structure of above-mentioned special time period in, cryptographic hash from the child node of the lowermost layer of the cryptographic hash of this data sementation representative to the routing information and the node that this path, comprise, relevant with this child node of root node; Wherein represent the child node of lowermost layer to generate with the corresponding Hash structure of special time period through the cryptographic hash of the data sementation that makes above-mentioned a plurality of data source and in special time period, comprise separately, the root cryptographic hash is calculated through this Hash structure.
According to the method and apparatus of the integrity verification information of the generation data of various embodiments of the present invention make can through based on the simple means of Hash structure for to carry out effective integrity protection separately from the data of a plurality of data sources.Correspondingly, the method and apparatus of verifying according to the integrality to data of various embodiments of the present invention can carry out integrity verification separately to the data from a plurality of data sources rapidly and accurately.Thus, can realize efficiently, reliably separately protected and checking according to the data integrity protection of various embodiments of the present invention and demo plant and method from the integrality of the data of a plurality of data sources.In addition, owing to adopted simple structural arrangements and realization means, realized effective reduction of cost.
Other embodiment of the present invention also provide a kind of video camera apparatus, and this video camera apparatus comprises the aforesaid device that generates the integrity verification information of data according to an embodiment of the invention.
Additional embodiments of the present invention also provides a kind of program product that stores the instruction code of machine-readable; When this instruction code is read and carried out by machine, can carry out the method for the aforesaid integrity verification information that generates data according to an embodiment of the invention and/or the method that the integrality of data is verified.
Additional embodiments of the present invention also provides a kind of storage medium that carries above-mentioned program product.
Description of drawings
The description of specific embodiments of the invention in conjunction with the drawings of the present inventionly above will become clear with other purpose, characteristics and advantage.In each accompanying drawing, identical or similar Reference numeral is represented identical or similar functional part or step.In the accompanying drawings:
The video data to a plurality of video frequency pick-up heads that Fig. 1 shows prior art carries out the simplified block diagram of the configuration of timestamp protection respectively;
Fig. 2 shows the simplified block diagram of the configuration of the whole timestamp protection that the video data to a plurality of video frequency pick-up heads of prior art carries out;
Fig. 3 shows the designs simplification block diagram according to the device of the integrity verification information of the generation data of the embodiment of the invention;
Fig. 4 shows a kind of simplified schematic diagram of instantiation of operation of device of the integrity verification information of the generation data among Fig. 3;
Fig. 5 shows the simplified schematic diagram of another kind of instantiation of operation of device of the integrity verification information of the generation data among Fig. 3;
Fig. 6 shows the sketch map of the encapsulation of data of the integrity verification information that device generated with the integrity verification information through generating data according to an embodiment of the invention;
Fig. 7 shows the device through the integrity verification information of utilizing the generation data among Fig. 3, carries out the sketch map of the instance of integrity protection through the sub-hash chain in inside for the sub-segmentation of the data of certain data source;
Fig. 8 shows the device through the integrity verification information of utilizing the generation data among Fig. 3, carries out the sketch map of the instance of integrity protection through the sub-Hash tree in inside for the sub-segmentation of the data of certain data source;
Fig. 9 A-9B shows common possible Hash tree structural representation;
Figure 10 A-10D shows the simplified block diagram that device that utilization generates the integrity verification data according to an embodiment of the invention generates the process of efficient Hash binary tree;
Figure 11 shows the simplified structure block diagram of the picture pick-up device of the device that is equipped with the integrity verification information that is used to generate data according to an embodiment of the invention;
Figure 12 A shows the simplified structure block diagram of the system of the integrity verification information that generates data according to an embodiment of the invention; Wherein a plurality of data sources are divided into multistage Hash zone, and the Hash structure that comprises in each grade Hash zone all is equipped with the management data source of the device of the integrity verification information with generation data as shown in Figure 3;
Figure 12 B shows the simplified structure block diagram as the system of the integrity verification information of the generation data of a kind of variant of the system of Figure 12 A;
Figure 13 shows the general flow chart of the method for the integrity verification information that is used to generate data according to an embodiment of the invention;
Figure 14 shows according to an embodiment of the invention the simplified structure block diagram of the device that the integrity verification information of data is verified;
Figure 15 shows the sketch of a kind of concrete implementation of method shown in Figure 14;
Figure 16 shows according to an embodiment of the invention the general flow chart of the method that the integrity verification information of data is verified; And
Figure 17 illustrates the schematic block diagram that can be used for implementing according to the computer system of the method and apparatus of the embodiment of the invention.
Embodiment
Embodiments of the invention are described with reference to the accompanying drawings.Should be noted that for fear of having blured the present invention, only show in the accompanying drawings and closely-related device structure of scheme according to the present invention and/or treatment step, and omitted other details little with relation of the present invention because of unnecessary details.Formation element or part identical or similar in each accompanying drawing utilize identical or similar Reference numeral to represent.
Fig. 3 shows the designs simplification block diagram according to the device 300 of the integrity verification information of the generation data of the embodiment of the invention.As shown in the figure, this device 300 comprises Hash structure generation unit 310, public authorization information acquiring unit 320 and integrity verification information generating unit 330.The cryptographic hash of the data sementation that Hash structure generation unit 310 comprises in certain period of time through a plurality of data sources separately generates and the corresponding Hash structure of this special time period, makes the child node of lowermost layer that the cryptographic hash of all data sementations represents this Hash structure respectively so that calculate the root cryptographic hash of this Hash structure.Public authorization information acquiring unit 320 obtains the public authorization information to this root cryptographic hash.Integrity verification information generating unit 330 is created on the integrity verification information of the data sementation that comprises separately in this certain period of time for a plurality of data sources.Wherein the integrity verification information of each data sementation comprise in this public authorization information, this Hash structure, the cryptographic hash from the cryptographic hash of this data sementation of the child node of representing this lowermost layer to the routing information and the node that this path, comprise, relevant with the child node of this bottom of this root node.
Need explanation, refer to the node of the subordinate's child node that in the Hash structure, does not have oneself in this said " child node of lowermost layer ".Understand easily, when the Hash structure was Hash tree, this " child node of lowermost layer " was exactly leaf node.
Fig. 4 shows a kind of simplified schematic diagram of instantiation of the operation of the device 300 among Fig. 3.
As shown in the figure, in this example, timestamp agency 410 operates as a kind of concrete way of realization of device as shown in Figure 3 300.This timestamp agency 410 is from a plurality of data sources, and promptly the video data of picture pick-up device A-E generates integrity verification information.This instance generates integrity verification information through the mode of structure hash chain.Hash structure generation unit among the timestamp agency 410 is through constructing hash chain with the cryptographic hash from the data sementation of picture pick-up device A-E in a certain special time period according to the chain mode; Public authorization information acquiring unit among the timestamp agency 410 is added a cover stamp common time with end-node (the being root node) value of hash chain through the TSA of timestamp authorized organization 420 then, obtains public authorization information Timestamp (H thus AE2).For example, schematically show each picture pick-up device separately data sementation A1-A3 to E1-E3 in three time periods among the figure.Suppose that these data sementations cryptographic hash separately is H for the data sementation A2-E2 that produces at certain special time period picture pick-up device A-E A2-H E2Cryptographic hash H A2And H B2Carry out Hash after the connection and obtain cryptographic hash H AB2, cryptographic hash H AB2And H C2Carry out Hash after the connection and obtain cryptographic hash H AC2, cryptographic hash H AC2And H D2Carry out Hash after the connection and obtain cryptographic hash H AD2, cryptographic hash H AD2And H E2Carry out Hash after the connection and obtain cryptographic hash H AE2As shown in the figure, constructed a hash chain based on the cryptographic hash of the data sementation of a plurality of data sources (being picture pick-up device A-E) in this special time period, wherein can be with the cryptographic hash H of these data sementations A2-H E2See the child node (that is, not having the node of the subordinate's child node of oneself) of representing lowermost layer as, cryptographic hash H AB2, H AC2And H AD2Be respectively the father node of upper level, the final endpoint value H of hash chain AE2The root cryptographic hash of representing this hash chain.The basic conception of cryptographic hash and preparation method thereof are technology well known in the art, and this is repeated no more.The integrity verification information of integrity verification information generating unit data sementation A2-E2 among the timestamp agency 410.For example, the integrity verification information of the data sementation D2 of picture pick-up device D in this special time period comprises public authorization information Timestamp (H AE2), from the cryptographic hash H of this data sementation D2 D2To root cryptographic hash H AE2Routing information and hash chain on along the cryptographic hash of some node in this path.In hash chain from the child node H of lowermost layer D2To root node H AE2The path in comprise node H D2And H AD2, the cryptographic hash H of the node relevant with these nodes AC2And H E2Just constituted the part of the integrity verification information of data sementation D2.
Fig. 5 shows the simplified schematic diagram of another kind of instantiation of operation of device 300 of the integrity verification information of the generation data among Fig. 3.As shown in the figure, in this example, timestamp agency 510 operates as the another kind of concrete way of realization of device as shown in Figure 3 300.
In this example, timestamp agency 510 is from a plurality of data sources, and promptly the video data of picture pick-up device A-E generates integrity verification information.This instance generates integrity verification information through the mode of structure Hash tree.The generation of the calculating of timestamp agency 510 main responsible Hash trees, timestamp application, integrity verification information etc.Timestamp agency 510 for example can implement through the computer that connects the internet; Each picture pick-up device A-E for example can be connected with it through LAN; And it has the information that the visit line duration stabs the voucher (for example username and password) of the TSA of authorized organization 520 and characterizes monitoring unit (that is, a plurality of data source affiliated unit) identity.
Hash structure generation unit among the timestamp agency 510 is through constructing Hash tree with the cryptographic hash from the data sementation of picture pick-up device A-E in a certain special time period according to tree-shaped mode; Public authorization information acquiring unit among the timestamp agency 510 is added a cover stamp common time with the cryptographic hash of the root node of Hash tree through the TSA520 of timestamp authorized organization then, obtains public authorization information Timestamp (H thus AE2).For example, schematically show each picture pick-up device separately data sementation A1-A3 to E1-E3 in three time periods among the figure.Suppose that these data sementations cryptographic hash separately is H for the data sementation A2-E2 that produces at certain special time period picture pick-up device A-E A2-H E2Cryptographic hash H A2And H B2Carry out Hash after the merging and obtain cryptographic hash H AB2, cryptographic hash H C2And H D2Carry out Hash after the merging and obtain cryptographic hash H CD2, cryptographic hash H AB2And H CD2Carry out Hash after the merging and obtain cryptographic hash H AD2, cryptographic hash H AD2And H E2Carry out Hash after the merging and obtain cryptographic hash H AE2As shown in the figure, constructed a Hash tree based on the cryptographic hash of the data sementation of a plurality of data sources (being picture pick-up device A-E) in this special time period, wherein can be with the cryptographic hash H of these data sementations A2-H E2See the child node of the lowermost layer of this Hash tree as, i.e. leaf node, cryptographic hash H AB2, H CD2And H AD2Be respectively each higher level's father node, the final endpoint value H of Hash tree AE2The root cryptographic hash of representing this Hash tree.Timestamp agency 510 receives the cryptographic hash of video data segment in this special time period from each picture pick-up device, and for example can write down the numbering (be used in the proof procedure subsequently picture pick-up device is identified) of each picture pick-up device in addition.As stated, timestamp agency 510 from leaf node, calculates the superior node of Hash tree with the leaf node of these cryptographic hash as the y-bend Hash tree step by step, and superior node is the cryptographic hash after two node of subordinate connect.It should be noted that; The number of picture pick-up device possibly not be 2 index times (promptly this y-bend Hash tree possibly not be a full binary tree); Therefore part possibly not be the bottom (for example shown in Figure 5, the cryptographic hash of picture pick-up device E is just used when calculating root node) that is positioned at Hash tree from the cryptographic hash of picture pick-up device.Finally calculate the cryptographic hash of root node according to this method of unification in twos.This all nodal values and node location information by the Hash tree that timestamp agency 510 calculates for example can temporarily be kept in timestamp agency 510 the memory.Timestamp agency 510 with the demand encapsulation of information such as the value of the root node of Hash tree and identity according to timestamp standard (for example can obtain relevant information) referring to http://www.faqs.org/rfcs/rfc3161.html after, send to the TSA of timestamp authorized organization 520.It (is public checking letter Timestamp (H that TSA 520 returns the time corresponding stamp AE2)).After receiving this timestamp information, the integrity verification information generating unit among the timestamp agency 510 is that the data sementation of a plurality of picture pick-up device A-E in this special time period generates integrity verification information respectively.The integrity verification information of each picture pick-up device is all inequality, according to the corresponding leaf node of picture pick-up device position and different in Hash tree.The authorization information of a picture pick-up device comprises two parts: a part is public authorization information (being timestamp), and another part is part of nodes value and the routing information on the Hash tree.The routing information of the Hash tree in the integrity verification information obtains and the choosing method of this top, path node is: find the pairing leaf node of the data sementation of this picture pick-up device in this special time period on the Hash tree; Obtain to arrive with this as the starting point the path (thick dashed line with the band arrow illustrates in the drawings) of root node then, and obtain the cryptographic hash of the brotgher of node of the node on this path successively.Routing information comprises the position of each selected node with respect to the path, as node in Hash tree level and with respect to about this path the relation.For example in Fig. 5, the integrity verification information of the D2 of the data sementation of picture pick-up device D in above-mentioned special time period is ([l, H C2], [l, H AB2], [r, H E2], Timestamp (H AE2)), wherein putting in order of node expressed the order that arrives root node from leaf node, i.e. routing information, and r, l represent that the brotgher of node is right node or left sibling with respect to this path.For comprise in the routing information with respect to about this path the relation, the arrangement method of the Hash tree of can at first making an appointment.For example, if root node is placed on top, then the cryptographic hash H of interdependent node C2, H AB2, H E2About relation for r, r, l (that is, the right side, the right side, a left side), and in the integrity verification information shown in Fig. 5 about relation be the result who obtains under the situation below root node is placed on.This and interdependent node in the path about the l of relation, r information is essential for Hash tree.If but the Hash structure is a hash chain, then can not store l, r information, because this l, r information is implicitly included in the queueing discipline of cryptographic hash in the integrity verification information.In the following description, for brevity, when integrity verification information, do not express l, r information, still this information is actually and is present in the routing information.
Above-mentioned hierarchical information can be represented individually, also can make an appointment according to certain form, and what come first such as agreement is the nodal value of the interdependent node of minimum level, by that analogy.Be to infer the level of node in the instance that Fig. 5 provides according to putting in order of each node in the integrity verification information.
Detailed description according to above-mentioned combination Figure 4 and 5 can be found out; The benefit that is used to the mode of a plurality of data sources generation integrity verification information according to an embodiment of the invention is: independent separately integrity verification information can separately deposited and have to the data of each data source; Make and the integrality that in subsequent authentication process (back will be described in detail), can verify the data of each data source separately improved efficient and accuracy thus the integrity protection of data.In addition, for from the data in a certain special time period of a plurality of data sources, only need timestamp of application, therefore significantly reduced the request times of timestamp, reduction data communication expense has reduced cost thus.
As a kind of concrete implementation; Timestamp agency 410 or 510 can send to the integrity verification information of the data sementation of a plurality of picture pick-up devices in special time period that is generated corresponding picture pick-up device, uses when subsequently the integrality of the data sementation of picture pick-up device being verified.Can be as an alternative; Timestamp agency 410 or 510 also can store the integrity verification information that is generated together with the identifying information (for example this integrity verification information is the integrity verification information that belongs to data sementation which picture pick-up device, in which special time period) of the pairing data sementation of this integrity information, so that in follow-up proof procedure, use.In addition; The integrity verification distribution of information is being given under the situation of corresponding picture pick-up device; After confirming that each picture pick-up device is all received corresponding integrity verification information; Timestamp agency 410 or 510 can then carry out the Hash tree deletion of this temporary cache to generate processing corresponding to the next integrity verification information of next special time period.This mode can save time and stab agency's memory space.
In a kind of instantiation, the device 300 of the integrity verification information of generation data according to the embodiment of the invention as shown in Figure 3 also can comprise the data encapsulation unit.For example; Can this device 300 be arranged in the data source; After then the integrity verification information generating unit in device 300 had generated the integrity verification information of corresponding data segmentation, this data encapsulation unit can be with this integrity verification information setting after this corresponding data sementation.So that form the encapsulation of data of the data source under this data sementation.Fig. 6 shows a kind of of this encapsulation of data maybe form.As shown in the figure; Provided the encapsulation of data of certain data source; Wherein C1 is illustrated in the data sementation in the different special time periods with C2, follows information VC1 after C1 and promptly be the integrity verification information that is generated through the device 300 according to the integrity verification information of the generation data of the embodiment of the invention.Similarly, integrity verification information VC2 follows after data sementation C2.So, in follow-up proof procedure, when obtaining the data sementation that need carry out integrity verification, can easily read out corresponding with it integrity verification information simultaneously.Through such mode, can strengthen the contact between the data sementation of pending integrity verification and the corresponding with it integrity verification information, this and then convenient the carrying out of follow-up data integrity proof procedure (below will describe in detail).
For example, the above-mentioned this encapsulation of data of data sementation and integrity verification information thereof that combined can be kept on the inner memory device of corresponding data source, perhaps sends to monitoring central server in order to keep watch on or to file through network.
In another kind of instantiation; The device 300 of the integrity verification information of generation data according to the embodiment of the invention as shown in Figure 3 can comprise that also corresponding relation creates the unit; It can be the integrity verification information centralized stores that the data sementation that in certain period of time, comprises separately of a plurality of data sources generates with the integrity verification information generating unit, and creates integrity verification information and the corresponding relation between the data sementation accordingly.In follow-up integrity verification procedures, can obtain the integrity verification information corresponding through this corresponding relation, for carrying out integrity verification with the data sementation of pending integrity verification.Through with integrity verification information centralized stores, can prevent better that these information from being destroyed.In addition, owing to set up the corresponding relation between data sementation and the integrity verification information, therefore guaranteed the accuracy of subsequent authentication process.
In the instance that provides in the above; Each picture pick-up device carries out Hash with the data sementation in certain special time period, and the device (for example timestamp agency) that then cryptographic hash is sent to the integrity verification information that generates data according to an embodiment of the invention is to carry out the generation of integrity verification information.In this case (being data sementation) length of special time period for example for minute the order of magnitude, for example 1 minute.Yet in some was used, more accurately the data sementation in the locator data source promptly needed shorter time slice or data sementation length.In order to satisfy this demand, Fig. 7-8 has provided corresponding solution.
Fig. 7 shows through utilizing the device 300 like the integrity verification information of the generation data among Fig. 3, carries out the sketch map of the instance of integrity protection through the sub-hash chain in inside for the sub-segmentation of the data of certain data source.Still explain as the example of data source in this example with picture pick-up device.As shown in Figure 7, among the picture pick-up device A that device 300 makes in a plurality of picture pick-up device A-D, the data sementation in certain certain period of time carefully is divided into 4 sub-segmentation A1-A4 of data again, the sub-segmentation of these data cryptographic hash separately is H1-H4.Through with the child node of these cryptographic hash as lowermost layer; In the sub-hash chain of picture pick-up device A internal structure (the outside Hash tree that constitutes with the cryptographic hash of the data sementation in special time period of picture pick-up device A-D comparatively speaking), and calculate the sub-root cryptographic hash H of this sub-hash chain 14(with the root cryptographic hash of outside Hash tree comparatively speaking).Root cryptographic hash H with inner hash chain 14As the cryptographic hash of camera A, through outside Hash tree (that is, by the cryptographic hash H of the data sementation of picture pick-up device A-D in this certain period of time A-H DHash tree as the outside of leaf node structure) processing is to timestamp agency (for example realizing through device 300) application time stamp (for example can adopt the mode shown in Fig. 5 to carry out); After the timestamp agency returns public authorization information, carry out the distribution of one-time authentication information in the picture pick-up device A again.That is, handle through Hash tree externally on himself routing information and this path of integrity verification information, inner hash chain that obtain of camera A the cryptographic hash of interdependent node form the integrity verification information of the inner sub-segmentation A1-A4 of each data of camera A.In a kind of preferred implementation; If the checking of the sub-segmentation of data is relatively independent; Then for conserve storage; The sub-segmentation of each data only need be stored the cryptographic hash of the sub-segmentation of data, and for example the authorization information of the sub-segmentation of A1 data only need be stored H (A1), stores the authorization information V of A1~A4 then in the back of four sub-segmentations of data 14, the authorization information of promptly returning that is used for picture pick-up device A from the timestamp agency.When follow-up checking, regenerate inner hash chain according to the cryptographic hash of other segmentation, use V 14Interior authorization information is verified the cryptographic hash of the root node of inner hash chain.The sub-stepwise deletion of some data in big segmentation, but under the situation that the cryptographic hash of the sub-segmentation of missing data exists, still can verify the integrality of the sub-segmentation of each remaining data separately, thus improved the precision and the granularity of checking.
Understand easily; Though be to carry out the configuration of integrity protection shown in Fig. 7 through a picture pick-up device A is made up inner sub-hash chain; But it will be apparent to those skilled in the art that; Depend on actual needs and system's actual treatment ability, can carry out this configuration all picture pick-up device A-D or wherein optional some picture pick-up devices.
Fig. 8 shows through utilizing the device 300 like the integrity verification information of the generation data among Fig. 3, carries out the sketch map of the instance of integrity protection through the sub-Hash tree in inside for the sub-segmentation of the data of certain data source.As shown in Figure 8, among the picture pick-up device A in a plurality of picture pick-up device A-D, device 300 makes the data sementation in certain certain period of time carefully be divided into 4 sub-segmentation A1-A4 of data again, and the sub-segmentation of these data cryptographic hash separately is H 1-H 4Through with these cryptographic hash as leaf node, at the sub-Hash tree of picture pick-up device A internal structure, and calculate the sub-root cryptographic hash H of this sub-Hash tree 14Root cryptographic hash H with inner Hash tree 14As the cryptographic hash of camera A, through outside Hash tree (that is, by the cryptographic hash H of the data sementation of picture pick-up device A-D in this certain period of time A-H DHash tree as the outside of leaf node structure) processing is to timestamp agency (for example realizing through device 300) application time stamp (for example can adopt the mode shown in Fig. 5 to carry out); After the timestamp agency returns public authorization information, carry out the distribution of one-time authentication information in the picture pick-up device A again.That is, handle through Hash tree externally on himself routing information and this path of integrity verification information, inner Hash tree that obtain of camera A the cryptographic hash of interdependent node form the integrity verification information of the inner sub-segmentation A1-A4 of each data of camera A.With the example class shown in Fig. 7 seemingly; In a kind of preferred implementation; If the checking of the sub-segmentation of data is relatively independent,, for example can make the cryptographic hash that only need store the sub-segmentation of data after the sub-segmentation of each data then for conserve storage; For example the authorization information of the sub-segmentation of A1 data only need be stored H1, stores the authorization information V of A1~A4 then in the back of four sub-segmentations of data 14, the authorization information of promptly returning from the timestamp agency.In follow-up proof procedure, regenerate inner Hash tree according to the cryptographic hash of other segmentation, use V 14Interior authorization information is verified the root node of inner Hash tree.The sub-stepwise deletion of some data in big data sementation; But under the situation that the cryptographic hash of the sub-segmentation of missing data still exists; Still the integrality of the sub-segmentation of each remaining data be can verify separately, thereby the precision and the granularity of follow-up integrity verification improved.
Likewise; Understand easily; Though be to carry out the configuration of integrity protection shown in Fig. 8 through a picture pick-up device A is made up inner sub-Hash tree; But it will be appreciated by those skilled in the art that actual needs and the system's actual treatment ability of depending on, can carry out this configuration all picture pick-up device A-D or wherein optional some picture pick-up devices.
In above-mentioned Fig. 7 and the two kinds of solutions shown in Figure 8; Device 300 according to the integrity verification information of the generation data of the embodiment of the invention generates the integrity verification information of data sementation littler in the data source through the technology in the inside of corresponding data source utilization chain or tree-shaped Hash structure, thereby can further improve the precision and the granularity of checking.Can save memory space in addition, because the authorization information of whole big data sementation only need be stored once.
It is noted that above-mentioned two kinds of solutions can select for use according to different application scenes, so that obtain better technical benefits.Particularly, if the checking of the little sub-segmentation of data of big data sementation inside is relatively independent, that is, the checking of a sub-segmentation of data depends on the existence of the cryptographic hash of the sub-segmentation of other data, but the original contents of the sub-segmentation of other data can lack.In this case, only need store the cryptographic hash of himself after the sub-segmentation of each data, chain Hash structure realizes more easily like this, needs bigger memory space and calculate Hash tree, therefore uses hash chain to have more advantage.If require the checking of the sub-segmentation of each data in the big data sementation still absolute independent; The sub-segmentation of each data just is storage authentication information and do not rely on the original contents of the sub-segmentation of other data and the existence of cryptographic hash respectively; Even that is to say sub-segmentation of other data and cryptographic hash thereof disappearance; The sub-segmentation of remaining data still can independently be verified, because the authorization information of the sub-segmentation of each data has been preserved the information of interdependent node on checking path and this path thereof.In the checking of the sub-segmentation of this data is definitely independently under the situation; Then the chain hash method need be the authorization information of the sub-fragmented storage more volume of each data; The length of the authorization information after the sub-segmentation of data is directly proportional with the number of sub-segmentation; And tree-shaped hash method makes the length of the authorization information after the sub-segmentation become logarithmic relationship with the number of sub-segmentation, and therefore tree-shaped Hash has more advantage.Certainly, understand easily, if the permission of the disposal ability of system, the checking that the configuration mode of inside hash chain shown in Fig. 7 and 8 and Hash tree can be applied to the sub-segmentation of data arbitrarily is relatively independent or definitely independently various scene.
In addition, in the solution of above-mentioned Fig. 7 and Fig. 8, inner Hash structure and outside Hash structure can combination in any.That is to say that inner Hash structure and outside Hash structure can all be Hash tree or hash chain; Perhaps inner Hash structure is a Hash tree, and outside Hash structure is a hash chain; Perhaps inner Hash structure is a hash chain, and outside Hash structure is a Hash tree.
Though having only a data source in a plurality of data sources to adopt the solution of inner Hash structure shown in Fig. 7 and Fig. 8; But those skilled in the art understand easily; According to actual needs, can and even all take above-mentioned solution to the part in a plurality of data sources.
Under normal conditions; Need protect and the number of a plurality of data sources of verifying (the for example picture pick-up device in the supervisory control system) maybe be more fixing its data integrity; The shape of the Hash tree of the device of therefore believing through the integrity verification that generates data according to an embodiment of the invention (for example being embodied as the timestamp agency) structure is fixed, and can specify suitable Hash tree efficiently of structure thus in advance.But; The a little situations that have in the reality can make the number generation dynamic change of picture pick-up device, for example: the increase of new picture pick-up device, picture pick-up device is cancelled; If do not work because of fault as equipment; The protection class of each picture pick-up device different (length of the special time period that for example data sementation is corresponding is different) etc., this makes that in the different time section number of the cryptographic hash that the timestamp agency receives is dynamic change.Thereby the solution that needs the efficient Hash tree of dynamic structure of a kind of suitable timestamp agency use.
When the number of picture pick-up device can constitute full y-bend Hash tree, when the number that also is picture pick-up device is 2 a index times, has the authorization information of minimum volume.When the number of camera head is not 2 index times, there is the method for multiple structure Hash tree.For example Fig. 9 A and 9B show the Hash tree of under the situation with 7 picture pick-up devices, constructing.The Hash tree number of plies as among Fig. 9 B is less, and the less Hash tree of the number of plies has the authorization information volume of average minimum.Therefore constructing efficiently, Hash tree is exactly the Hash tree of structure minimum number of layers.
The instantiation of device of integrity verification information that is used for generating data according to the embodiment of the invention can comprise Hash tree high computational subelement and Hash tree constructor unit, is used to construct Hash tree efficiently.The number of supposing picture pick-up device is N (N for greater than 1 natural number), and the number of the data sementation that in certain special time period, produces of these picture pick-up devices is N, then the height h=ceil (log of Hash tree high computational subunit computes Hash tree 2N), ceil representes to get and is not less than log 2The smallest positive integral of N.The structure of efficient Hash tree is accomplished in Hash tree constructor unit through following mode: if log 2N is an integer, and then directly structure height is the full binary tree of h.If log 2N is not an integer; For example can be earlier with the cryptographic hash of this N data segmentation as the leaf node full binary tree that to come height of virtual construct be h; Then with N node; Leaf node order from left to right according to virtual full binary tree is confirmed N the position of node in this virtual full binary tree successively, removes unnecessary node then, and tightening at last is an efficient Hash binary tree of target.Figure 10 A-10D has provided the process of the efficient binary tree of structure under the situation of number N=13 of leaf node.Height h=ceil (the log of Hash tree high computational subunit computes Hash tree 213)=4.Because log 213 is not integer, and the height of Hash tree constructor unit structure shown in Fig. 9 A is 4 virtual full binary tree.Then,, confirm this 13 nodes position in this virtual full binary tree successively, remove unnecessary node, shown in Figure 10 B-10C according to the leaf node order from left to right of this virtual full binary tree with these 13 nodes.Obtain the efficient Hash binary tree shown in Figure 10 D at last.
In each instance that provides in the above, the public authorization information acquiring unit in the device 300 of the integrity verification information of generation data as shown in Figure 3 is through stabbing the protection that realizes the integrality of the data sementation of each data source in special time period for the root cryptographic hash acquisition time of Hash structure.According to can be, can also be to encrypt or signature etc. to the integrity protection means of data for the execution mode of choosing.
Under the situation of the integrity protection of realizing data through cryptographic means, the root cryptographic hash and the check information of Hash structure are encrypted through predetermined encryption key.For example; Can be to the additional check code (for example length is the check code of 10 bits) of root cryptographic hash as check information; Utilize this encryption key to encrypt the data that obtain like this, as public authorization information, and make the interpolater can't obtain this encryption key the root cryptographic hash of having encrypted and check code; Thereby make the root cryptographic hash of process encryption and people or the mechanism's checking that check code only can be had encryption key, and then the integrality of checking corresponding data.And do not know encryption key anyone can not carry out any modification to the data that receive encipherment protection, also can be found even revise by the verifier.When public authorization information is verified, come root cryptographic hash and the check code encrypted are deciphered the root cryptographic hash calculation check sign indicating number that obtains according to deciphering through this predetermined encryption key.If checking is passed through, that is, the check code that calculates is consistent with the check code that deciphering obtains, and can confirm that then the checking of public authorization information is passed through, that is, the checking result is positive.Can also recover simultaneously the root cryptographic hash that comprises in the public authorization information, in follow-up proof procedure, using (back will be described in detail).According to another example; Can also carry out hash calculation one time to the root cryptographic hash; Obtain another cryptographic hash (below be called " checking cryptographic hash ") as check information; Utilize predetermined encryption key that the root cryptographic hash and the combination of checking cryptographic hash are encrypted, as public authorization information, and make the interpolater can't obtain this encryption key the data of having encrypted; Thereby the root cryptographic hash that makes process encrypt only can be had people or mechanism's checking of encryption key with the checking cryptographic hash, and then verifies the integrality of corresponding data.And do not know encryption key anyone can not carry out any modification to the data that receive encipherment protection, also can be found even revise by the verifier.When public authorization information is verified, come the root cryptographic hash of encrypting is deciphered with the checking cryptographic hash through this predetermined encryption key, the root cryptographic hash that deciphering obtains is carried out hash calculation one time.If checking is passed through, that is, the cryptographic hash that this hash calculation obtains is consistent with the checking cryptographic hash that deciphering obtains, and can confirm that then the checking of public authorization information is passed through, that is, the checking result is positive.Similarly, this checking is handled and can also be recovered the root cryptographic hash that comprises in the public authorization information, in follow-up proof procedure, using.As stated; Owing in ciphering process, added check information (check code in the for example above-mentioned example and checking cryptographic hash) to the root cryptographic hash; Therefore can confirm in the processing that public authorization information is verified whether the root cryptographic hash that deciphering obtains is original cryptographic hash by means of this check information; Also promptly, can recover the root cryptographic hash that comprises in the public authorization information, in follow-up proof procedure, using.
Under the situation of the integrity protection of realizing data through the digital signature means; Behind the root cryptographic hash signature of predetermined secret private key to the Hash structure; The integrity verification information of the data sementation that produces can be verified by any people or mechanism that holds the public key certificate corresponding with above-mentioned predetermined secret private key, and can confirm data are carried out the identity information of signer.The interpolater is not knowing under the situation of secret private key, can't carry out any modification to data, can be found by the verifier even revise yet.Can realize protection thus to the integrality of data.When public authorization information is verified, come if checking is passed through, can confirm that then the checking of public authorization information is passed through that promptly, the checking result is positive through the public key certificate corresponding to root cryptographic hash checking through signature with this secret private key.With above-mentioned similar through the root cryptographic hash being encrypted the situation that generates public authorization information, confirm checking through in can also recover the root cryptographic hash that comprises in the public authorization information, in follow-up proof procedure, using.
In addition, also can obtain public authorization information, make the data of process integrity protection can have the kinds of protect attribute, so that satisfy user's different demands through the combination in any of above-mentioned encryption, signature, timestamp mode.
In the instance that provides in the above, a plurality of data sources are video camera apparatus, and the data of integrity verification information to be generated are the video datas from a plurality of video camera apparatus.But it will be apparent to those skilled in the art that; Can also be according to the device of the integrity verification information of the generation data of the embodiment of the invention to data from any kind of the data source of a plurality of any types; For example audio frequency, literal, picture, the combination etc. of the data of real time data and these kinds generates integrity verification information arbitrarily, and then realizes the integrity protection to these data.Concrete generative process and above-mentioned video data similar repeated no more at this.
The device 300 of the integrity verification information of generation data as shown in Figure 3 can be used as independently functional device and realizes, that kind described in Fig. 4-5 for example, 7-8, but it also can be combined in the data source of pending integrity protection.For example, can device 300 (for example timestamp agencies) be become one with data source (for example picture pick-up device) for selecting in the execution mode a kind of, thereby can make this data source itself have the function of the integrity verification information that generates data.
Figure 11 shows the designs simplification block diagram of an example of the picture pick-up device 1100 with this function.Shown in figure 11, picture pick-up device 1100 comprises video acquisition unit 1102, device 300 as shown in Figure 3 and communication interface 1104.Video acquisition unit 1102 offers the Hash structure generation unit 310 that comprises in the device 300 with the video data that collects, and this Hash structure generation unit 310 forms Hash structure (for example Hash tree or hash chain) through each data sementation cryptographic hash corresponding with specific time slice as the child node of lowermost layer.The public authorization information acquiring unit 320 that device comprises in 300 obtains public authorization information for the root cryptographic hash of the Hash structure that obtains from Hash structure generation unit 310, for example can realize through technological means such as above-mentioned timestamp, encryption and digital signature.With the timestamp mode is example; Public authorization information acquiring unit 320 obtains timestamp information via communication interface 1104 from the TSA (not shown); This timestamp information can send the integrity verification information generating unit 330 in the device 300 to via communication interface 1104; The Hash structural information that it utilizes this public authorization information and obtains from Hash structure generation unit 310 is for corresponding data sementation generates integrity verification information.In addition, the integrity verification information that is generated for example can send corresponding data source to through communication interface 1104.
It is noted that the configuration mode in the picture pick-up device shown in figure 11 between each component units is not limited to the concrete mode that Figure 11 provides as long as make the final picture pick-up device that obtains can realize data are generated the function of integrity verification information.For example; Also can Hash structure generation unit in the device 300 310 and video acquisition unit be combined; The public authorization information acquiring unit 320 that perhaps will install in 300 combines with integrity verification information generating unit 330 and communication interface 1104, or the like.
Understand easily; This picture pick-up device that is integrated with the integrity verification information that is used to generate data makes and can save the integrity verification information that independent device 300 (for example timestamp agency) generates the corresponding data segmentation; Thereby help reducing the structural complexity of the integrity protection system of data, can reduce cost in addition.
In the instance of describing, realize the generation of integrity verification information through the device 300 (for example being embodied as the timestamp agency) of the integrity verification information of the generation data of enforcement in the above according to the present invention.But the additional embodiments according to the present invention for example, also can be stabbed agency's function and independent timestamp agency need not be set by one or more data source deadline in a plurality of data sources.
Still describe as the example of data source with picture pick-up device.In fact, timestamp agency's amount of calculation and required memory space are smaller, can be implemented in fully in some or a plurality of picture pick-up devices, can reduce the difficulty of plant maintenance thus.Therefore, when disposing a plurality of picture pick-up device as a plurality of data sources, for example can be by the user selected or confirm a main picture pick-up device at random, other picture pick-up device be connected with this main picture pick-up device through LAN.Main picture pick-up device connects the generation that external network is responsible for the generation of Hash tree, timestamp application, integrity verification information.This main picture pick-up device for example can be realized through the picture pick-up device shown in above-mentioned Figure 11.
Under the more situation of picture pick-up device, for example can picture pick-up device be formed structure shown in Figure 12 A-12B.Figure 12 A shows the simplified structure block diagram of the system of the integrity verification information that generates data according to an embodiment of the invention; Wherein a plurality of data sources are divided into multistage Hash zone, and Figure 12 B shows the simplified structure block diagram as the system of the integrity verification information of the generation data of a kind of variant of the system of Figure 12 A.
In the configuration shown in Figure 12 A-12B, all picture pick-up devices are divided into a plurality of Hash zone, that is, and first order Hash zone among Figure 12 A and second level Hash zone, and the first order among Figure 12 B to third level Hash zone.Shown in Figure 12 A, comprise four Hash structures in the first order Hash zone, be Hash tree at this, can represent with a-e respectively.Each Hash tree comprises 5 data sources, that is, and and picture pick-up device, and comprise a management picture pick-up device in each Hash tree, be used for being responsible for the generation of its Hash tree of managing, the distribution of integrity verification information etc.Shown in Figure 12 A; For example; In first order Hash zone, picture pick-up device A is as the management picture pick-up device of picture pick-up device group A1~A5, and picture pick-up device B is as the management picture pick-up device of picture pick-up device group B1~B4; Picture pick-up device C is as the management picture pick-up device of picture pick-up device group C1~C5, and picture pick-up device D is as the management picture pick-up device of picture pick-up device group D1~D5.In Hash zone, the second level, by picture pick-up device E as the management picture pick-up device.Shown in Figure 12 B, in first order Hash zone, comprise three Hash structures, i.e. Hash tree a-c.Each Hash tree comprises 4 data sources, that is, and and picture pick-up device, and comprise a management picture pick-up device in each Hash tree, be used for being responsible for the generation of its Hash tree of managing, the distribution of integrity verification information etc.Shown in Figure 12 B, picture pick-up device A, B, C respectively as the picture pick-up device group (A1~A3, A), (B1~B3, B), (C1~C3, management picture pick-up device C).Similarly, in Hash zone, the second level, comprise two Hash tree d and e, respectively by picture pick-up device D and E as the management picture pick-up device.Understand easily; A plurality of data sources the number of the picture pick-up device that comprises in quantity and each the Hash structure of the Hash structure (for example, Hash tree or hash chain) that comprises in the progression, each grade Hash zone in the Hash zone that can be divided into can correspondingly adjust according to actual needs and be not limited to the concrete configuration example shown in Figure 12 A-12B.
Above-mentioned management picture pick-up device for example also can be realized through the picture pick-up device shown in above-mentioned Figure 11.Below concise and to the point each management picture pick-up device of describing how to generate the Hash tree that it is managed.Be example with Figure 12 A earlier; The cryptographic hash of for example managing picture pick-up device A comprises himself and the picture pick-up device A1-A4 that managed thereof in special time period data sementation generates Hash tree a as the child node of the bottom respectively; And management picture pick-up device E is through the cryptographic hash and the previous stage of data sementation that himself is comprised in special time period, and promptly the root node value of corresponding Hash tree a-d generates Hash tree e as the child node of the bottom respectively in the first order Hash zone.Again referring to Figure 12 B; For example, the cryptographic hash of in the second level Hash zone management picture pick-up device D data sementation that can himself and the picture pick-up device of being managed D1-D3 thereof be comprised in special time period generates Hash tree d as the child node of the bottom respectively.The cryptographic hash and the previous stage of another management picture pick-up device E in the Hash zone, the second level can comprise himself in special time period data sementation, promptly the root node value of corresponding Hash tree a-c generates Hash tree e as the child node of the bottom respectively in the first order Hash zone.The process that other management picture pick-up devices generate its Hash trees of managing among Figure 12 A-12B with above-mentioned be similar, give unnecessary details no longer one by one.
Then, the process of management picture pick-up device generation authorization information in the Hash at different levels zone is summarized.
In the configuration of Figure 12 A and 12B, management picture pick-up device E and F lay respectively in the Hash tree in the highest Hash zone, its can be known as " highest management picture pick-up device " (that is aforesaid main picture pick-up device).This highest management picture pick-up device is used for generating final root cryptographic hash according to the root node value of each Hash structure in highest Hash zone; And; This superlative degree management picture pick-up device obtain carried out protection to this final root cryptographic hash (for example through the timestamp mode, cipher mode or digital signature mode etc.) information as public authorization information.Though it is noted that in Figure 12 A and 12B, include only a Hash structure in the highest Hash zone, this is not determinate, according to actual needs, can comprise a plurality of Hash structures in the highest Hash zone equally.In this case, can specify in advance by which management picture pick-up device in these Hash structures and manage picture pick-up device as the superlative degree.
In five-star Hash zone; Highest management data source be the child node generation integrity verification information of the bottom in each Hash structure in this superlative degree Hash zone, corresponding with data source, and this integrity verification information comprises above-mentioned public authorization information, routing information in this superlative degree Hash zone, from this child node to final root node and the cryptographic hash of the node relevant with this child node that this path, comprise.
For certain the Hash structure in other grades Hash zone except highest Hash zone, the management picture pick-up device in this Hash structure is that the child node of other bottoms in this Hash structure, corresponding with picture pick-up device generates integrity verification information.This integrity verification information comprises the integrity verification information, the routing information from this child node to root node in this grade Hash zone of the root node of this Hash structure and the cryptographic hash of the node relevant with this child node on this path.As stated, the root node of this Hash structure is owing to the child node as the lowermost layer of corresponding Hash structure in the upper level Hash zone, and its integrity verification information can generate through the management picture pick-up device of corresponding Hash structure in this upper level Hash zone.
Referring to Figure 12 A and 12B; For example; In Figure 12 A; Obtain node A ' by the leaf node of picture pick-up device A1-A4 cryptographic hash representative of data sementation in this special time period through twice combination, the cryptographic hash of the data sementation that in this special time period, is comprised by management picture pick-up device A then combines to obtain node A with the cryptographic hash of node A ' " cryptographic hash.Can find out that from figure the cryptographic hash of the data sementation that all picture pick-up devices comprise in the picture pick-up device group of being managed through management picture pick-up device A makes up Hash tree a as leaf node in special time period.Similarly, obtain the root node B of each Hash tree b-d through management picture pick-up device B-D ", C ", D " cryptographic hash.Node A "-D " cryptographic hash obtain the cryptographic hash of node E ' through twice combination.Cryptographic hash and each root node B through the data sementation that in certain period of time, comprises by highest picture pick-up device E ", C ", D " and E " cryptographic hash form Hash tree e.Be responsible for the generation of Hash tree e by highest picture pick-up device E, calculate the root node E of Hash tree e " cryptographic hash, and finally be responsible for the application of timestamp by highest picture pick-up device E.Among the picture pick-up device A-E each for example can have structure shown in Figure 11 and configuration.Through for example generating the integrity verification information that is used for each picture pick-up device based on the integrity verification information that cryptographic hash constituted of the respective nodes on public authorization information, Hash tree routing information and the path of timestamp.For example, can the integrity verification distribution of information that generated be arrived each picture pick-up device through highest picture pick-up device E.For example, can generate the integrity verification information of each picture pick-up device through the operation that above-mentioned combination Fig. 5 describes, details repeats no more at this.
Shown in Figure 12 B, management picture pick-up device A at different levels, B, C, D, E, F are responsible for Hash tree a in the first order to the third level Hash zone, b, c, d, e, the generation of f respectively.Management picture pick-up device A, B, C are with Hash tree a, and b, the root node a3 of c, b3 and c3 send to management picture pick-up device E.Picture pick-up device D and E are with Hash tree d in management, and the root node d3 of e and e3 send to the highest picture pick-up device F that manages, and are responsible for the generation of Hash tree f by it, and are directed against the root node f2 application time and stab.Correspondingly; The root node that highest management picture pick-up device F obtains to have added a cover timestamp is as public authorization information; And should public authorization information and each leaf node of Hash tree f e3, the authorization information that d3 and F are corresponding (cryptographic hash of routing information and some interdependent node) sends to management picture pick-up device E and D and F self.Be responsible for Hash tree e, the generation and the distribution of the authorization information relevant among the d respectively by management picture pick-up device E and D with each picture pick-up device.
System according to the embodiment shown in Figure 12 A-12B of the present invention; The picture pick-up device (being management picture pick-up devices at different levels) of being responsible for the calculating Hash tree only need be responsible for the Hash tree generation of few part respectively; Carry out the load uniform distribution effectively, improved the efficient of system, avoided causing system bottleneck.
Understand easily, can also carry out various variations for the configuration of the system shown in above-mentioned Figure 12 A-12B.For example, the Hash tree that comprises in the Hash at different levels zone also can be taked other Hash structures, and for example hash chain is a Hash tree partly perhaps, and part is a hash chain, or the like.And, according to actual needs, can dispose the Hash zone of any number of stages, and be not limited to the concrete progression shown in Figure 12 A-12B.
Embodiments of the invention also provide a kind of method that generates the integrity verification information of data.Figure 13 has provided the general flow chart of this method.Shown in figure 13, method 1300 starts from step S1310, comprises that the Hash structure generates step S1320, public authorization information obtaining step 1330 and integrity verification information and generates step S1340, and finishes at step S1350.Generate step S1320 in the Hash structure; The cryptographic hash of the data sementation that a plurality of data sources are comprised in certain period of time separately generates and the corresponding Hash structure of said special time period as the child node of lowermost layer, and the child node of the lowermost layer through this Hash structure is calculated the root cryptographic hash of this Hash structure.At public authorization information obtaining step S1330, obtain public authorization information to this root cryptographic hash.Generate step S1340 in integrity verification information; Each data sementation in the data sementation that in this certain period of time, comprises separately to a plurality of data sources generates the integrity verification information of this data sementation based on following information: in public authorization information, the Hash structure, the cryptographic hash from the cryptographic hash of this data sementation of the child node of representing lowermost layer to the routing information and the node that this path, comprise, relevant with this child node of root node.
In a kind of instantiation according to said method 1300; Can generate and the corresponding Hash minor structure of special time period at least one data source in a plurality of data sources of pending data integrity protection, so that integrity verification information is provided littler data sementation in this at least one data source.Thereby the precision and the granularity of follow-up integrity verification have been improved.For example, can realize this instance through the configuration shown in above-mentioned Fig. 7 and 8.Detail can repeat no more at this referring to top description to Fig. 7-8.Similar with the situation among Fig. 7-8, the Hash minor structure that is generated can be Hash tree or hash chain, perhaps, and for some data source generates sub-Hash tree, for some data source generates sub-hash chain.
In another kind of instantiation, can have the integrity verification information that the system configured shown in above-mentioned Figure 12 A-12B generates to being directed against according to said method 1300.The concrete details of handling for example can detail referring to above-mentioned description to Figure 12 A-12B no longer one by one.
In another instantiation, can in Hash structure (for example Hash tree and hash chain) under the dynamic situation about changing of leaf node, construct Hash tree efficiently, i.e. the Hash tree of minimum number of layers according to said method 1300.Detail can be referring to top to Fig. 9 A-9B, and the description of 10A-10D is repeated no more at this.
In another instantiation according to said method 1300; Also can comprise the data encapsulation step; After the integrity verification information that has generated the corresponding data segmentation; This data encapsulation step can be with this integrity verification information setting after this corresponding data sementation, so that form the encapsulation of data of the data source under this data sementation.The description that detail can be carried out referring to top combination Fig. 6 is repeated no more at this.
In another kind of instantiation according to said method 1300; Also can comprise the corresponding relation foundation step; It can generate step with integrity verification information is the integrity verification information centralized stores that data sementation that a plurality of data sources comprise in certain period of time separately generates, and creates integrity verification information and the corresponding relation between the data sementation accordingly.In follow-up integrity verification procedures, can obtain the integrity verification information corresponding through this corresponding relation, for carrying out integrity verification with the data sementation of pending integrity verification.Through with integrity verification information centralized stores, can prevent better that these information from being destroyed.In addition, owing to set up the corresponding relation between data sementation and the integrity verification information, therefore guaranteed the accuracy of subsequent authentication process.
Understand easily; Similar with the above-mentioned Fig. 3 of combination to the device 300 of the integrity verification information that generates data according to an embodiment of the invention; In said method 1300 according to an embodiment of the invention, public authorization information obtaining step S1330 is through stabbing the protection that realizes the integrality of the data sementation of each data source in special time period for the root cryptographic hash acquisition time of Hash structure.Yet; According to the execution mode that can replace choosing; Integrity protection means to data can also be encryption or signature etc.; Perhaps also can obtain public authorization information through the combination in any of above-mentioned encryption, signature, timestamp, feasible data through overprotection can have the kinds of protect attribute, so that satisfy user's different demands.
According to the method 1300 of this embodiment of the invention and wherein the processing of each step for example can realize through the device or the system that are used to generate integrity verification information with the configuration shown in above-mentioned Fig. 3-12 etc.Detail can repeat no more at this referring to the description to above-mentioned each figure.
Generating the integrity verification information of data, is in order in follow-up checking is handled, to come the integrality of these data is verified according to this integrity verification information.For this reason, according to embodiments of the invention, a kind of device that the integrality of data is verified is provided also.Figure 14 shows the structure diagram of this device 1400.This device 1400 comprises public authorization information authentication unit 1410 and integrity verification unit 1420.The public authorization information that comprises in the integrity verification information that data sementation had of corresponding data source in special time period of 1410 pairs of a plurality of data sources of public authorization information authentication unit is verified.The root cryptographic hash that comprises in root cryptographic hash that integrity verification unit 1420 will calculate according to the cryptographic hash of the integrity verification information that data sementation had of corresponding data source and this data sementation and the integrity verification information compares; And the checking of comparative result and above-mentioned public authorization information authentication unit as a result the both be under the positive situation, confirm that said data sementation is complete.Wherein, the integrity verification information of data sementation comprise public authorization information, with the corresponding Hash structure of special time period in, from the child node of the lowermost layer of the cryptographic hash of this data sementation representative to the routing information of root node and this path the cryptographic hash of the node relevant that comprise with child node this lowermost layer.Represent the child node of lowermost layer to generate with the corresponding Hash structure of special time period through the cryptographic hash of the data sementation that makes a plurality of data sources and in this special time period, comprise separately, and the root cryptographic hash is the cryptographic hash of the root node of said Hash structure.
Figure 15 has provided the flow process of concrete operations that the integrity verification device 1400 shown in Figure 14 is realized an example of verification operations.Through utilizing method according to the above embodiment of the present invention is each data source; Picture pick-up device for example; The integrity verification information that data sementation generated in certain period of time, the correct time section of can be for example utilizing integrity verification device 1400 according to an embodiment of the invention to verify the integrality of these data sementations and record through any personal verification or trusted third party.Shown in figure 15, suppose and need verify the integrality of the data sementation C2 of the picture pick-up device C shown in Fig. 5 in certain special time period.Integrity verification information (H according to this data sementation D2, H AB2, H E2, Timestamp (H AE2)) verify.As top pointed in being directed against the description of Fig. 5; In order to narrate for simplicity; Do not express l in the integrity verification information that other places provide in the integrity verification information that in this example, provides and this specification; In r etc. the table routing information each interdependent node about the information element of relation, but this information element is actually and is present in the routing information.In addition, the hierarchical information in the routing information for example can be through the rule of making an appointment, and is expressed by putting in order of the cryptographic hash of each node in the integrity verification information or the like.In proof procedure illustrated in fig. 15, at first verify public authorization information (be common time stab), can obtain TSA adds a cover timestamp when video record believable correct time in the timestamp.The root certificate (this root certificate for example comprises the root cryptographic hash of Hash structure and is that this root cryptographic hash is distributed timestamp information etc.) that the checking of timestamp need use TSA to provide; 1510; According to relevant criterion (for example can obtain relevant information), based on public authorization information Timestamp (H with reference to http://www.faqs.org/rfcs/rfc3161.html AE2) extract temporal information and root cryptographic hash, and verify the integrality of these data.If integrity verification does not pass through in this processing, then directly obtain the result of authentication failed.If integrity verification passes through in this processing, then utilize the integrity verification information (H of this data sementation AB2, H D2, H E2, Timestamp (H AE2)) calculate the root cryptographic hash of data sementation to be verified.Particularly, extract the brotgher of node value and the routing information that comprise in the integrity verification information,, recover the root node value H of Hash tree according to unifying calculation mode step by step in twos AE2.Then, 1520, the root cryptographic hash H that will from integrity verification information, extract AE2With 1520 in the root node value H that calculates AE2, compare.If these two values are identical, show that then the integrity verification of this data sementation passes through, otherwise checking is not passed through.
In above-mentioned processing, for example, according to integrity verification information (H AB2, H D2, H E2, Timestamp (H AE2)) calculate the cryptographic hash H of root node AE2, also can with 1510 in the processing of the checking of stabbing common time carry out synchronously, rather than just carry out under for positive prerequisite in 1510 checking result.
Can replace in the execution mode of choosing at other; Integrity verification unit 1420 needn't the checking result of public authorization information authentication unit 1410 just calculate under for positive situation according to the integrity verification information of the data sementation of integrality to be verified the root cryptographic hash and with its with integrity verification information in the root cryptographic hash that comprises compare, but the checking processing that can be carried out with public authorization information authentication unit 1410 is side by side or even carry out the calculating and the comparison of root cryptographic hash previously.At last the checking of comparative result and public authorization information authentication unit 1410 as a result the both for positive situation under just specified data be complete; In other words, if one of any among both be negative, show that then the integrality of data is destroyed.
Be that the several number that at least one data source is segmented in certain special time period again generates under the situation of integrity verification information according to sub-segmentation in the configuration shown in above-mentioned Fig. 7-8; According to an instantiation of the device 1400 of the embodiment of the invention, can verify the integrality of the sub-segmentation of this data.
With the example that is configured to shown in Fig. 8.Suppose that the data sementation in certain special time period is divided into 4 sub-segmentation A1-A4 of data among the picture pick-up device A, the cryptographic hash through the sub-segmentation of these data forms sub-Hash tree.The sub-root cryptographic hash H of the sub-root node of this sub-Hash tree 14As the cryptographic hash of picture pick-up device A at the data sementation of this special time period.Cryptographic hash through the data sementation of picture pick-up device A-D in this special time period forms Hash tree, and the root cryptographic hash of this Hash tree is H ABCDThe agency obtains public authorization information for this root cryptographic hash through timestamp.Thus; Can obtain the integrity verification information of the sub-segmentation of each data among the picture pick-up device A; Can this integrity verification information to the sub-segmentation of data be called secondary integrity verification information at this, so as with distinguish mutually to the integrity verification information of the time slice in the special time period of picture pick-up device B-D.For the sub-segmentation of each data; This secondary integrity verification information comprise in the integrity verification information (for example can obtaining), Hash minor structure of the data sementation under the sub-segmentation of these data through the mode that above-mentioned combination Fig. 5 describes, from the leaf node of the cryptographic hash representative of the sub-segmentation of these data to the routing information of the sub-root node of this Hash minor structure and this path the cryptographic hash of the node (that is, the brotgher of node) relevant with this leaf node.For example, the cryptographic hash of supposing picture pick-up device A-D data sementation in this special time period is respectively H A-H D, and the timestamp agency is root cryptographic hash H ABCDThe public authorization information that obtains is Timestamp (H ABCD), then the integrity verification information of picture pick-up device A is (H B, H CD, Timestamp (H ABCD)).For example the secondary integrity verification information of the sub-segmentation A1 of data is (H 2, H 34, H B, H CD, Timestamp (H ABCD)).Integrity verification unit 1420 according in the device 1400 of the integrality of the verification msg of the embodiment of the invention is verified the secondary integrity verification information of the sub-segmentation of these data through following mode.Calculate sub-root cryptographic hash according to the secondary integrity verification information of the sub-segmentation A1 of data and the cryptographic hash H1 of the sub-segmentation of these data.Account form is similar with the mode of describing with reference to Figure 15,, obtains sub-root cryptographic hash H according to the cryptographic hash of the relevant brotgher of node on the routing information that comprises in the secondary integrity verification information and this path that is 14Then, with the cryptographic hash of this sub-root cryptographic hash, according to the integrity verification information (H of this cryptographic hash and this data sementation as the data sementation under the sub-segmentation of these data B, H CD, Timestamp (H ABCD)) calculate the root cryptographic hash of outside Hash tree, and the root cryptographic hash that comprises in root cryptographic hash that will calculate and the integrity verification information compares.If above-mentioned comparative result shows that both are consistent, and the checking result of public authorization information authentication unit 1410 is positive simultaneously, then the sub-segmentation A1 of specified data is complete.If one of the checking result of above-mentioned comparative result and public authorization information authentication unit 1410 is any is negative, the destroy integrity of the sub-segmentation A1 of specified data then.
For the situation that in certain picture pick-up device, forms sub-hash chain shown in Fig. 7, its processing and situation among above-mentioned Fig. 8 for the integrity verification of the sub-segmentation of data is similar, gives unnecessary details no longer one by one at this.
In the system configuration like above-mentioned combination Figure 12 A-12B; Under the more situation of data source (for example picture pick-up device); Can picture pick-up device be divided into several Hash zones; The Hash structure that comprises in each Hash zone is managed the generation that picture pick-up device is responsible for this Hash structure by one, and by finally being responsible for generating integrity verification information by five-star management picture pick-up device.When the data sementation that each data source (for example picture pick-up device) is comprised in certain period of time separately carries out integrity verification, utilize public authorization information authentication unit to verify the public authorization information that comprises in the integrity verification information corresponding with this data sementation.The final root cryptographic hash that comprises in root cryptographic hash that the integrity verification unit will calculate according to the cryptographic hash of integrity verification information that this data sementation had and this data sementation and the integrity verification information compares; The checking of the result of this comparison and public authorization information authentication unit as a result the both be that corresponding data sementation is complete under the positive situation.Wherein, The cryptographic hash of the routing information that the child node of the lowermost layer of cryptographic hash that comprise and this data sementation representative is relevant in the integrity verification information according to this data sementation and the brotgher of node of being correlated with that in this path, comprises is calculated the root cryptographic hash that will compare with the final root cryptographic hash that comprises in the integrity verification information of this data sementation.
If the data of pending integrity verification are the encapsulation of data shown in Fig. 6; The public authorization information authentication unit 1410 that then installs in 1400 directly obtains the data sementation to be verified and the integrity verification information of this data sementation with integrity verification Information Authentication unit 1420 from corresponding encapsulation of data, so that for example carry out integrity verification according to the process shown in Figure 15.For the situation that the sub-segmentation of the data among Fig. 7-8 is encapsulated according to mode shown in Figure 6, the integrity verification information that device 1400 directly obtains corresponding sub-segmentation similarly is so that carry out integrity verification.
The storage separately if the integrity verification information of data sementation is not set directly at after the corresponding data sementation, but make up the corresponding relation between data sementation and the integrity verification information.Then install public authorization information authentication unit 1410 and integrity verification Information Authentication unit 1420 in 1400 and from corresponding relation, obtain the integrity verification information of corresponding data sementation, so that carry out integrity verification according to the process shown in Figure 15.For the situation that the sub-segmentation of the data among Fig. 7-8 is encapsulated according to mode shown in Figure 6, device 1400 obtains the integrity verification information of corresponding sub-segmentation so that carry out integrity verification through corresponding relation similarly.
As stated; Except through stabbing for the root cryptographic hash acquisition time of Hash structure the protection that realizes the integrality of the data sementation of each data source in special time period; According to can be, can also be to encrypt or signature etc. to the integrity protection means of data for the execution mode of choosing.Under the situation of the integrity protection of realizing data through cryptographic means; When the integrality of data is verified; Come the public authorization information of having encrypted is deciphered and utilized the check information that comprises in the public authorization information (for example aforesaid check code with checking cryptographic hash etc.) to realize checking through using predetermined encryption key according to the device 1400 of the embodiment of the invention; If checking is passed through; Can also recover the root cryptographic hash that comprises in the public authorization information, in follow-up proof procedure, using.In this way, can avoid not knowing encryption key either party can carry out any modification to the data that receive encipherment protection, also can be found even perhaps revise by authentication.Under the situation of the integrity protection of realizing data through the digital signature means; Behind the root cryptographic hash signature of predetermined secret private key to the Hash structure; Device 1400 according to the embodiment of the invention if checking is passed through, can confirm then that the checking of public authorization information is passed through to the root cryptographic hash checking through signature through the corresponding public key certificate of secret private key that uses and should be scheduled to; Can also recover simultaneously the root cryptographic hash that comprises in the public authorization information, in follow-up proof procedure, using.In this way, can avoid the interpolater not knowing under the situation of secret private key data to be carried out any modification, also can be found by authentication even perhaps revise.
Correspondingly, according to embodiments of the invention a kind of method that the integrality of data is verified is provided also.Figure 16 shows the general flow chart of this method 1600.As shown in the figure, method 1600 starts from step S1610, comprises public authorization information verification step S1620, and comparison step S1630 and integrality are confirmed step S1640, and finish at step S1650.At public authorization information verification step S1620, the public authorization information that comprises in the integrity verification information that data sementation had of corresponding data source in special time period to a plurality of data sources is verified.At comparison step S1630, the root cryptographic hash that comprises in root cryptographic hash that will calculate according to the cryptographic hash of the integrity verification information that data sementation had of corresponding data source and this data sementation and the integrity verification information compares.Confirm step S1640 in integrality; If the comparative result of comparison step S1630 shows that the root cryptographic hash that comprises in the root cryptographic hash calculated and the integrity verification information is consistent; And the checking result of public authorization information verification step S1620 is positive, confirms that then this data sementation is complete.Wherein, the integrity verification information of data sementation comprise public authorization information, with the corresponding Hash structure of special time period in, cryptographic hash from the child node of the lowermost layer of the cryptographic hash of this data sementation representative to the routing information and the node that this path, comprise, relevant with this child node of root node.Represent the child node of lowermost layer to generate with the corresponding Hash structure of special time period through the cryptographic hash of the data sementation that makes a plurality of data sources and in special time period, comprise separately, and the root cryptographic hash is calculated through this Hash structure.
In the configuration shown in above-mentioned Fig. 7-8 be at least one data source in certain special time period again the several number of segmentation according under the situation of sub-segmentation integrity verification information; According to an instantiation of the method 1600 of the embodiment of the invention, the integrality of the sub-segmentation of this data is verified.For example can realize this integrity verification through the device 1400 shown in above-mentioned Figure 14, the processing details of concrete verification method can be referring to above-mentioned with reference to Fig. 7, and the description of the operation of 8,15 pairs of devices 1400 is given unnecessary details at this no longer one by one.
Method 1600 according to this embodiment of the invention can also be verified to the integrity verification information that under the situation with the system configuration shown in Figure 12 A-12B, obtains.Concrete proof procedure for example can referring to top with reference to Figure 12 A-12B to installing the description of 1400 operation, repeat no more at this.
If the data of pending integrity verification are the encapsulation of data shown in Fig. 6; Then the method 1600 according to present embodiment directly obtains the data sementation to be verified and the integrity verification information of this data sementation from corresponding encapsulation of data, so that carry out integrity verification according to the process shown in Figure 15.For the situation that the sub-segmentation of the data among Fig. 7-8 is encapsulated according to mode shown in Figure 6, the secondary integrity verification information that method 1600 directly obtains corresponding sub-segmentation similarly is so that carry out integrity verification.
The storage separately if the integrity verification information of data sementation is not set directly at after the corresponding data sementation, but make up the corresponding relation between data sementation and the integrity verification information.Then the method for carrying out integrity verification 1600 according to present embodiment obtains the integrity verification information of corresponding data sementation from corresponding relation, so that carry out integrity verification according to the process shown in Figure 15.For the situation that the sub-segmentation of the data among Fig. 7-8 is encapsulated according to mode shown in Figure 6, the secondary integrity verification information that method 1600 obtains corresponding sub-segmentation through corresponding relation similarly is so that carry out integrity verification.
As stated; Under the situation of the integrity protection of realizing data through cryptographic means, method 1600 realizes the checking of public authorization information through utilizing the check information that comprises in predetermined encryption key that the root cryptographic hash of Hash structure is encrypted and the public authorization information (for example aforesaid check code with checking cryptographic hash etc.) according to an embodiment of the invention.In addition; Under the situation of the integrity protection of realizing data through the digital signature means, the predetermined corresponding public key certificate of secret private key that uses when carrying out digital signature according to the method 1600 of the embodiment of the invention through use and to data is realized the checking of public authorization information.The concrete details that realizes for example can be participated in the top description that is directed against the device 1400 of the integrality that is used for verification msg, repeats no more at this.
According to device, the method for the integrity verification information of the generation data of various embodiments of the present invention and be used for apparatus and method that the integrality of data is verified; For the video monitoring system that has a plurality of picture pick-up devices (a kind of example of data source) provides a kind of scheme of integrity protection efficiently; Feasible different video data sementation to all picture pick-up devices; Only need apply for timestamp one time, the number of the picture equipment that moves the camera to follow the subject's movement is irrelevant.Thereby can realize independent integrity protection efficiently to the data sementation in the special time period of each picture pick-up device.In addition, the network bandwidth and timestamp expense have also been practiced thrift greatly.And the length of the authorization information that each picture pick-up device is stored becomes logarithmic relationship with the number of picture pick-up device, has prevented the expansion of authorization information effectively.Under the situation of utilizing cryptographic means or digital signature means to realize the integrality of root node value is protected, efficient, accurate data integrity protection can be provided equally also.Can simplified system dispose in addition, reduce cost.
The number of supposing picture pick-up device is N, and the number of the data sementation that produces at certain special time period also is N, and then the height of the efficient binary tree that constructs is h=ceil (log 2N), ceil representes to get and is not less than log 2The smallest positive integral of N.The path that arrives root node from each leaf node is h, thus in the authorization information on the store path number of the brotgher of node be the length h in path, and h becomes to be similar to logarithmic relationship with the number of picture pick-up device.For example working as a supervisory control system has 1000 picture pick-up devices, and the height of the Hash tree of structure is 10, so the authorization information of each segmentation need be stored 10 cryptographic hash.
Through a concrete example application relevant beneficial effect is described below.Supposing has 100 picture pick-up devices in the system, the video code rate of establishing monitoring camera equipment is 2Mbps, timestamp of application in per 30 seconds.At first the height of binary tree is 7; The authorization information that then video data need be stored in 30 of each picture pick-up device seconds is to stab 7 cryptographic hash and a common time; Suppose to use SHA256; The length of cryptographic hash is 256bits, and the size of timestamp is assumed to be 3000bits, so the authorization information length of each segmentation in 30 seconds is 7*256+3000=4792bits=600bytes.And 30 seconds video data length is 2M*30bits=7.5Mbytes, so authorization information accounts for the 600/7.5M=0.01% of entire video data.Therefore the code check that causes because of the adding of authorization information expands and can ignore.Number of plies of timestamp agency needs structure is 7 binary tree, needs maximum 256 cryptographic hash of Hash, and the amount of calculation that promptly needs is that the data of 256*256/8=8Kbytes are carried out Hash operation.Present common computer or microcontroller or embedded device for example picture pick-up device can be competent at this amount of calculation fully.It is 256 cryptographic hash and timestamp that the timestamp agency needs memory space, and needing memory space approximately is (256*256+3000)/8=9Kbytes, and such memory space all is not too high requirement for common computer or microcontroller or embedded device.
Generate the apparatus and method of integrity verification information according to an embodiment of the invention; And the safe class of the complete preservation that apparatus and method provided that is used for the integrality of data is verified is identical with the method for each picture pick-up device SEPARATE APPLICATION timestamp, and its safe class is all based on the anti-second primary image ability of hash function.It is thus clear that above-mentioned solution according to the present invention has significantly improved the efficient and the accuracy of integrity protection.
Need explanation at this, length limit, and above-named each embodiment is schematic with concrete applying examples but not exhaustive, neither be intended to and will constitute restriction to the present invention.For example, above the various concrete instance shown in each embodiment can make up arbitrarily as required respectively with concrete implementation, rather than only be limited to the integrated mode that top instantiation and implementation provide.In addition, in the above in the description to each embodiment and instantiation, the statement relevant " 1 " with numeral; " 2 "; " one ", " two ", " first "; " second " or the like only is parts or the element of being modified by these numerals in order to distinguish, rather than in order to show order or importance degree between these parts or the element or the like.
In addition; Above-mentioned Fig. 3-5,7-8,11; The device of the generation integrity verification information shown in 12,14 and device or each component units, subelement and parts in the system that the integrality of data is verified can be configured through the mode of software, firmware, hardware or its combination.Dispose spendable concrete means or mode and be well known to those skilled in the art, repeat no more at this.Under situation about realizing through software or firmware; Can the program that constitute this software be installed to the computer with specialized hardware structure (all-purpose computer 1700 for example shown in Figure 17) from storage medium or network; This computer can be carried out various functions etc. when various program is installed.
Shown in figure 17, CPU (CPU) 1701 carries out various processing according to program stored among read-only memory (ROM) 1702 or from the program that storage area 1708 is loaded into random-access memory (ram) 1703.In RAM 1703, also store data required when CPU 1701 carries out various processing or the like as required.CPU 1701, ROM 1702 and RAM 1703 are connected to each other via bus 1704.Input/output interface 1705 also is connected to bus 1704.
Following parts are connected to input/output interface 1705: importation 1706 (comprising keyboard, mouse or the like), output 1707 (comprise display; Such as cathode ray tube (CRT), LCD (LCD) etc. and loud speaker etc.), storage area 1708 (comprising hard disk etc.), communications portion 1709 (comprising that NIC is such as LAN card, modulator-demodulator etc.).Communications portion 1709 is handled such as the internet executive communication via network.As required, driver 1710 also can be connected to input/output interface 1705.Detachable media 1711 can be installed on the driver 1710 such as disk, CD, magneto optical disk, semiconductor memory or the like as required, makes the computer program of therefrom reading be installed to as required in the storage area 1708.
Realizing through software under the situation of above-mentioned series of processes, from network for example internet or storage medium for example detachable media 1711 program that constitutes softwares is installed.
It will be understood by those of skill in the art that this storage medium is not limited to shown in Figure 17 wherein having program stored therein, distribute so that the detachable media 17011 of program to be provided to the user with equipment with being separated.The example of detachable media 1711 comprises disk (comprising floppy disk (registered trade mark)), CD (comprising compact disc read-only memory (CD-ROM) and digital universal disc (DVD)), magneto optical disk (comprising mini-disk (MD) (registered trade mark)) and semiconductor memory.Perhaps, storage medium can be hard disk that comprises in ROM 1702, the storage area 1708 or the like, computer program stored wherein, and be distributed to the user with the equipment that comprises them.
The present invention also proposes a kind of program product that stores the instruction code of machine-readable.When said instruction code is read and carried out by machine, can carry out the method for the integrity verification information of above-mentioned generation data according to the embodiment of the invention, perhaps be used for the method that the integrality of data is verified.
Correspondingly, the storage medium that is used for carrying the program product of the above-mentioned instruction code that stores machine-readable is also included within of the present invention open.Said storage medium includes but not limited to floppy disk, CD, magneto optical disk, storage card, memory stick or the like.
In the above in the description to the specific embodiment of the invention; Characteristic to a kind of execution mode is described and/or illustrated can be used in one or more other execution mode with identical or similar mode; Combined with the characteristic in other execution mode, or substitute the characteristic in other execution mode.
Should stress that term " comprises/comprise " existence that when this paper uses, refers to characteristic, key element, step or assembly, but not get rid of the existence of one or more further feature, key element, step or assembly or additional.
In addition, according to the method for various embodiments of the present invention with handle the time sequencing of describing in being not limited to specifications and carry out, also can according to other time sequencing ground, carry out concurrently or independently.Therefore, the whole bag of tricks of describing in this specification and the execution sequence of processing do not constitute restriction to technical scope of the present invention.
Although the present invention is disclosed above, should be appreciated that all above-mentioned embodiment and example all are exemplary, and nonrestrictive through description to specific embodiment of the present invention.Those skilled in the art can be in the spirit of accompanying claims and scope design to various modifications of the present invention, improve or equivalent.These modifications, improvement or equivalent also should be believed to comprise in protection scope of the present invention.

Claims (33)

1. device that is used to generate the integrity verification information of data comprises:
Hash structure generation unit; The cryptographic hash of the data sementation that it is configured to comprise separately in certain period of time through a plurality of data sources generates and the corresponding Hash structure of said special time period, makes the child node of the bottom that the cryptographic hash of all data sementations represents said Hash structure respectively so that calculate the root cryptographic hash of the root node of said Hash structure;
Public authorization information acquiring unit, it is configured to obtain the public authorization information to said cryptographic hash;
The integrity verification information generating unit; It is configured to the integrity verification information that said a plurality of data source is created on the data sementation that comprises separately in the said certain period of time, wherein the integrity verification information of each data sementation comprise in said public authorization information, the said Hash structure, the cryptographic hash from the cryptographic hash of this data sementation of the child node of representing lowermost layer to the routing information and the node that said path, comprise, relevant with this child node of said root node.
2. device as claimed in claim 1, wherein
Said Hash structure generation unit comprises that the Hash minor structure generates subelement, and it is configured to through following mode is that each data source at least one data sources of said a plurality of data sources generates and the corresponding Hash minor structure of said special time period:
The data sementation of this data source in said special time period is divided into the sub-segmentation of a plurality of data; Cryptographic hash through the sub-segmentation of each data generates said Hash minor structure, makes the child node of the bottom that the cryptographic hash of the sub-segmentation of said each data represents said Hash minor structure so that calculate the sub-root cryptographic hash of the sub-root node of said sub-Hash structure;
Said integrity verification information generating unit is configured to generate secondary integrity verification information respectively to the sub-segmentation of a plurality of data of this data source; Wherein, At the integrity verification of the sub-segmentation of said data is definitely independently under the situation, the secondary integrity verification information of the sub-segmentation of each data comprise in the integrity verification information of the data sementation under the sub-segmentation of these data, the said Hash minor structure, from the cryptographic hash of the child node of the lowermost layer of the cryptographic hash representative of the sub-segmentation of the said data node relevant to the routing information of the sub-root node of said Hash minor structure and the said path with this child node; Perhaps; Under the integrity verification of the sub-segmentation of said data is relatively independent situation; The secondary integrity verification information of the sub-segmentation of each data comprises the integrity verification information of the data sementation under the sub-segmentation of these data, and the cryptographic hash of the sub-segmentation of these data.
3. device as claimed in claim 2, wherein, the Hash structure that said Hash structure generation unit is generated is Hash tree or hash chain, and the Hash minor structure that said Hash minor structure generates the subelement generation is Hash tree or hash chain.
4. device as claimed in claim 3, wherein, the Hash structure that said Hash structure generation unit is generated is a Hash tree, and said Hash structure generation unit comprises:
Hash tree high computational subelement, it is configured to N data segmentation in said special time period, producing for said a plurality of data sources, calculates h=ceil (log 2N), ceil representes to get and is not less than log 2The smallest positive integral of N, h represents the height of Hash tree, and N is the natural number greater than 1; And
Hash tree constructor unit, it is configured at log 2N is under the situation of integer, with said N data segmentation cryptographic hash separately as N leaf node come structure height be h full y-bend Hash tree as with the corresponding Hash tree of said special time period, and, at log 2N is not under the situation of integer; Coming structure height with said N data segmentation cryptographic hash separately as N leaf node is the virtual full y-bend Hash tree of h; Then for this virtual N leaf node of expiring the cryptographic hash representative of N data segmentation in y-bend Hash tree; Confirm the position of N leaf node in this virtual full y-bend Hash tree successively according to the leaf node order from left to right of this virtual full y-bend Hash tree; Remove unnecessary node in this virtual full y-bend Hash tree according to definite result, obtain thus and the corresponding Hash tree of said special time period.
5. like any described device among the claim 1-4, also comprise the data encapsulation unit, it is configured to:
With said integrity verification information generating unit is that the integrity verification information setting that generates of the data sementation that in said certain period of time, comprises separately of said a plurality of data source is after the data sementation of correspondence, so that form the encapsulation of data with integrity verification information of said a plurality of data sources; And/or
With said integrity verification information generating unit is that the secondary integrity verification information setting that generates of the sub-segmentation of the data that in said certain period of time, comprise separately of said a plurality of data source is after the sub-segmentation of the data of correspondence, so that form the encapsulation of data of the secondary integrity verification information of having of said a plurality of data sources.
6. like any described device among the claim 1-4, also comprise corresponding relation establishment unit, it is configured to:
With said integrity verification information generating unit is the integrity verification information centralized stores that the data sementation that in said certain period of time, comprises separately of said a plurality of data source generates, and creates said integrity verification information and first corresponding relation between the data sementation accordingly; And/or
With said integrity verification information generating unit is the secondary integrity verification information centralized stores that the sub-segmentation of the data that in said certain period of time, comprise separately of said a plurality of data source generates, and creates second corresponding relation between said secondary integrity verification information and the sub-segmentation of data accordingly.
7. like each described device among the claim 1-4, wherein, said public authorization information acquiring unit obtains the public authorization information to said cryptographic hash through at least a operation in carrying out as follows:
Be the timestamp of said cryptographic hash request through authentication, with the root cryptographic hash of having added a cover said timestamp as said public authorization information;
Through predetermined encryption key said cryptographic hash and check information are encrypted, root cryptographic hash and the check information that will pass through encryption are as said public authorization information; And
Secret private key through predetermined is signed to said cryptographic hash, and the root cryptographic hash that will pass through signature is as said public authorization information.
8. like each described device among the claim 1-4, wherein, each data source in said a plurality of data sources is a video camera apparatus, and said data are the data from said a plurality of video camera apparatus.
9. video camera apparatus, it has the device like the integrity verification information of each described generation data among the claim 1-8.
10. one kind for data provide the system of integrity protection, comprising:
A plurality of data sources, said a plurality of data sources are divided in first to the Z level Hash zone, and wherein, L level Hash zone comprises M in said first to the Z level Hash zone LIndividual Hash structure, L=1 ...; Z, and wherein each Hash structure all comprises a management data source, each said management data source all has the device like the integrity verification information of each described generation data among the claim 1-8; Wherein Z is the integer more than or equal to 2, M LIt is integer more than or equal to 1;
For each the Hash structure in the K level Hash zone; The cryptographic hash of the data sementation that the management data source of this Hash structure is configured to himself and the data source of being managed thereof are comprised in special time period generates this Hash structure as the child node of the bottom respectively; Perhaps; The root node value of at least one corresponding Hash structure generates this Hash structure as the child node of the bottom respectively in the cryptographic hash of the data sementation that the management data source of this Hash structure is configured to himself is comprised in special time period and the K-1 level Hash zone, and wherein K is more than or equal to 1 and smaller or equal to the integer of Z;
Root node value based on each Hash structure in the said Z level Hash zone generates final root cryptographic hash; And preassigned highest management data source is configured to obtain the public authorization information to said final root cryptographic hash in the management data source that comprises in the said Z level Hash zone; And
Said highest management data source is configured to the child node generation integrity verification information of the bottom in each Hash structure in said Z level Hash zone, corresponding with data source, and this integrity verification information comprises said public authorization information, cryptographic hash in said Z level Hash zone, the routing information from said child node to said final root node and the node relevant with said child node that said path, comprise; And
For each the Hash structure the Q level Hash zone among from the first order to Z-1 level Hash zone; The child node that management data source in this Hash structure is configured to other bottoms in this Hash structure, corresponding with data source generates integrity verification information; This integrity verification information comprises the integrity verification information, the routing information from said child node to said root node in said Q level Hash zone of the root node of this Hash structure and the cryptographic hash of the node relevant with this child node on this path; Wherein, The root node of this Hash structure is as the child node of the lowermost layer of corresponding Hash structure in the Q+1 level Hash zone; Its integrity verification information is that the management data source through corresponding Hash structure described in the Q+1 level Hash zone generates, and wherein Q is more than or equal to 1 and smaller or equal to the integer of Z-1.
11. system as claimed in claim 10, wherein, each the Hash structure that comprises in said first to the Z level Hash zone is Hash tree or hash chain.
12. a method that generates the integrity verification information of data comprises:
The Hash structure generates step; The cryptographic hash of the data sementation that it comprises a plurality of data sources in certain period of time separately generates and the corresponding Hash structure of said special time period as the child node of the bottom, and the child node of the lowermost layer through said Hash structure is calculated the root cryptographic hash of the root node of said Hash structure;
Public authorization information obtaining step, it obtains the public authorization information to said cryptographic hash; With
Integrity verification information generates step; Each data sementation in its data sementation that in said certain period of time, comprises separately to said a plurality of data sources generates the integrity verification information of this data sementation based on following information: in said public authorization information, the said Hash structure, the cryptographic hash from the cryptographic hash of this data sementation of the child node of representing lowermost layer to the routing information and the node that said path, comprise, relevant with this child node of said root node.
13. method as claimed in claim 12; Wherein, Said Hash structure generates step and comprises that the Hash minor structure generates substep, and it is that each data source at least one data sources of said a plurality of data sources generates and the corresponding Hash minor structure of said special time period through following mode:
The data sementation of this data source in said special time period is divided into the sub-segmentation of a plurality of data; The cryptographic hash of the sub-segmentation of each data is generated said Hash minor structure as the child node of the bottom of said Hash minor structure, and the child node of the lowermost layer through said Hash minor structure is calculated the sub-root cryptographic hash of the sub-root node of said sub-Hash structure;
Said integrity verification information generates a plurality of data sub-segmentation of step to this data source; Wherein, At the integrity verification of the sub-segmentation of said data is definitely independently under the situation, comes to generate respectively the secondary integrity verification information of the sub-segmentation of each data based on following information: in the integrity verification information of the data sementation under the sub-segmentation of these data, the said Hash minor structure, the cryptographic hash of the node relevant the routing information from the child node of the lowermost layer of the cryptographic hash representative of the sub-segmentation of these data to the sub-root node of said Hash minor structure and the said path with this child node; Perhaps; Under the integrity verification of the sub-segmentation of said data is relatively independent situation; Come to generate respectively the secondary integrity verification information of the sub-segmentation of each data based on following information: the integrity verification information of the data sementation under the sub-segmentation of these data, and the cryptographic hash of the sub-segmentation of these data.
14. method as claimed in claim 13, wherein, it is Hash tree or hash chain that said Hash structure generates the Hash structure that step generated, and the Hash minor structure that said Hash minor structure generates the substep generation is Hash tree or hash chain.
15. method as claimed in claim 14, wherein, it is Hash tree that said Hash structure generates the Hash structure that step generated, and said Hash structure generation step comprises:
Hash tree high computational substep, h=ceil (log is calculated in N the data segmentation that it produces in said special time period for said a plurality of data sources 2N), ceil representes to get and is not less than log 2The smallest positive integral of N, h represents the height of Hash tree, and N is big 1 natural number; And
Hash tree constructor step is at log 2N is under the situation of integer, with said N data segmentation cryptographic hash separately as N leaf node come structure height be h full y-bend Hash tree as with the corresponding Hash tree of said special time period, and, at log 2N is not under the situation of integer; Coming structure height with said N data segmentation cryptographic hash separately as N leaf node is the virtual full y-bend Hash tree of h; Then for this virtual N leaf node of expiring the cryptographic hash representative of N data segmentation in y-bend Hash tree; Confirm the position of N leaf node in this virtual full y-bend Hash tree successively according to the leaf node order from left to right of this virtual full y-bend Hash tree; Remove unnecessary node in this virtual full y-bend Hash tree according to definite result, obtain thus and the corresponding Hash tree of said special time period.
16. like any described method among the claim 12-15, also comprise the data encapsulation step, be used for:
It is that the integrity verification information setting that generates of data sementation that said a plurality of data source comprises in said certain period of time separately is after the data sementation of correspondence, so that form the encapsulation of data with integrity verification information of said a plurality of data sources that said integrity verification information is generated step; And/or
It is that the secondary integrity verification information setting that generates of the sub-segmentation of data that said a plurality of data source comprises in said certain period of time separately is after the sub-segmentation of the data of correspondence, so that form the encapsulation of data of the secondary integrity verification information of having of said a plurality of data sources that said integrity verification information is generated step.
17. like any described method among the claim 12-15, also comprise the corresponding relation foundation step, be used for:
It is the integrity verification information centralized stores that data sementation that said a plurality of data source comprises in said certain period of time separately generates that said integrity verification information is generated step, and creates said integrity verification information and first corresponding relation between the data sementation accordingly; And/or
It is the secondary integrity verification information centralized stores that the sub-segmentation of data that said a plurality of data source comprises in said certain period of time separately generates that said integrity verification information is generated step, and creates second corresponding relation between said secondary integrity verification information and the sub-segmentation of data accordingly.
18. like each described method among the claim 12-15, wherein, said public authorization information obtaining step obtains the public authorization information to said cryptographic hash through at least a operation in carrying out as follows:
Be the timestamp of said cryptographic hash request through authentication, with the root cryptographic hash of adding a cover said timestamp as said public authorization information;
Through predetermined encryption key said cryptographic hash and check information are encrypted, root cryptographic hash and the check information that will pass through encryption are as said public authorization information; And
Secret private key through predetermined comes said cryptographic hash signed, and the root cryptographic hash that will pass through signature is as said public authorization information.
19. like each described method among the claim 12-15, wherein, each data source in said a plurality of data sources is a video camera apparatus, said data are the data from said a plurality of video camera apparatus.
20. the device that the integrality of data is verified comprises:
Public authorization information authentication unit, its public authorization information that is configured to comprise in the integrity verification information that data sementation had of corresponding data source in special time period to a plurality of data sources is verified; And
The integrity verification unit; The root cryptographic hash that comprises in root cryptographic hash that it is configured to the cryptographic hash according to the integrity verification information that data sementation had of corresponding data source and said data sementation is calculated and the said integrity verification information compares; And the checking of said comparative result and said public authorization information authentication unit as a result the both be under the positive situation, confirm that said data sementation is complete;
Wherein, The integrity verification information of said data sementation comprise said public authorization information, with the corresponding Hash structure of said special time period in, cryptographic hash from the child node of the lowermost layer of the cryptographic hash of this data sementation representative to the routing information and the node that said path, comprise, relevant with this child node of said root node; On behalf of the child node of lowermost layer, wherein said and the corresponding Hash structure of special time period generate through the cryptographic hash of the data sementation that makes said a plurality of data source and in said special time period, comprise separately, and said cryptographic hash is the cryptographic hash of the root node of said Hash structure.
21. device as claimed in claim 20; Wherein, Said integrity verification unit is configured to through following mode, and the integrity verification information that comprises in the data sementation according to corresponding data source and the cryptographic hash of said data sementation are calculated the root cryptographic hash:
According to the cryptographic hash of the said relevant node that comprises in the said integrity verification information and the path of said routing information indication, through the cryptographic hash of said interdependent node is combined to obtain in twos the root cryptographic hash of said calculating along said path.
22. device as claimed in claim 20, wherein
For each data source of at least one data source in said a plurality of data sources, under following situation:
The data sementation of this data source in said special time period is divided into the sub-segmentation of a plurality of data; Represent the child node of lowermost layer to generate the Hash minor structure corresponding through the cryptographic hash that makes the sub-segmentation of each data with said special time period; Wherein the sub-segmentation of each data has been assigned with secondary integrity verification information, said secondary integrity verification information comprise in the integrity verification information of the data sementation under the sub-segmentation of said data, the said Hash minor structure, from the child node of the lowermost layer of the cryptographic hash representative of the sub-segmentation of said data to the routing information of the sub-root node of said Hash minor structure and said path the cryptographic hash of the node relevant with said child node;
The public authorization information that comprises in the secondary integrity verification information of the corresponding sub-segmentation of data in the sub-segmentation of said a plurality of data that said public authorization information authentication unit is configured to said data source is comprised in said special time period is verified;
Said integrity verification unit is configured to through following mode the integrality of the sub-segmentation of corresponding data verified:
The root cryptographic hash that comprises in root cryptographic hash that the secondary integrity verification information that will be had according to the sub-segmentation of corresponding data and the cryptographic hash of the sub-segmentation of these corresponding data calculate and the said integrity verification information compares; The checking of said comparative result and said public authorization information authentication unit as a result the both be that the sub-segmentation of corresponding data is complete under the positive situation.
23. like each described device among the claim 20-22, wherein, said Hash structure is Hash tree or hash chain, and said Hash minor structure is Hash tree or hash chain.
24. like any described device among the claim 20-22, wherein, said public authorization information authentication unit and said integrity verification unit are configured to:
From the encapsulation of data of the special time period of corresponding data source, obtain integrity verification information so that carry out integrity verification; Wherein, said encapsulation of data is through the integrity verification information setting relevant with the data sementation that corresponding data source comprises in said certain period of time separately formed after corresponding data sementation; And/or
From the encapsulation of data of the special time period of corresponding data source, obtain secondary integrity verification information so that carry out integrity verification; Wherein, form after the sub-segmentation of corresponding data with the relevant secondary integrity verification information setting of the sub-segmentation of data that corresponding data source comprises in said certain period of time separately.
25. like any described device among the claim 20-22, wherein, said public authorization information authentication unit and said integrity verification unit are configured to:
Obtain integrity verification information and said integrity verification information and first corresponding relation between the corresponding data sementation of the centralized stores of said data sementation, so as when corresponding data sementation to be carried out integrity verification through said first corresponding relation acquisition integrity verification information relevant with this data sementation; And/or
Obtain secondary integrity verification information and said secondary integrity verification information and second corresponding relation between the corresponding sub-segmentation of data of the centralized stores of the sub-segmentation of said data, so as when integrity verification to be carried out in sub-segmentation to corresponding data through the said second corresponding relation acquisition secondary integrity verification information relevant with the sub-segmentation of these data.
26. like any described device among the claim 20-22, wherein, said public authorization information authentication unit is configured to carry out in the following operation any one and comes said public authorization information is verified:
Under the situation of root cryptographic hash as public authorization information of the timestamp of having added a cover the process authentication; Said public authorization information authentication unit is verified integrity verification information or the timestamp information in the secondary integrity verification information that the data sementation or the sub-segmentation of data of integrality to be verified had when carrying out integrity verification with respect to disclosed certificate of timestamp service centre; If checking is passed through; The checking result who then confirms public authorization information is positive, and recovers the root cryptographic hash that comprises in the said public authorization information;
Under the root cryptographic hash and the situation of check information of having carried out through predetermined encryption key encrypting as public authorization information; Said public authorization information authentication unit is when carrying out integrity verification; Through utilizing said encryption key and said check information to come integrity verification information that data sementation or the sub-segmentation of data to integrality to be verified had or the public authorization information in the secondary integrity verification information to verify; If checking is passed through; The checking result who then confirms public authorization information is positive, and recovers the root cryptographic hash that comprises in the said public authorization information; And
Under the situation of root cryptographic hash as public authorization information of having carried out through predetermined secret private key signing; Said public authorization information authentication unit comes integrity verification information that data sementation or the sub-segmentation of data to integrality to be verified had or the public authorization information in the secondary integrity verification information to verify through the public key certificate corresponding with said secret private key when carrying out integrity verification; If checking is passed through; The checking result who then confirms public authorization information is positive, and recovers the root cryptographic hash that comprises in the said public authorization information.
27. the method that the integrality of data is verified comprises:
Public authorization information verification step, the public authorization information that comprises in the integrity verification information that data sementation had of corresponding data source in special time period to a plurality of data sources is verified;
Comparison step, the root cryptographic hash that comprises in root cryptographic hash that will calculate according to the cryptographic hash of the integrity verification information that data sementation had of corresponding data source and said data sementation and the said integrity verification information compares; And
Integrality is confirmed step; If the root cryptographic hash that comprises in the root cryptographic hash that the comparative result of said comparison step shows said calculating and the said integrity verification information is consistent; And the checking result of said public authorization information verification step is positive, confirms that then said data sementation is complete
Wherein, The integrity verification information of said data sementation comprise said public authorization information, with the corresponding Hash structure of said special time period in, cryptographic hash from the child node of the lowermost layer of the cryptographic hash of this data sementation representative to the routing information and the node that said path, comprise, relevant with said child node of said root node; On behalf of the child node of lowermost layer, wherein said and the corresponding Hash structure of special time period generate through the cryptographic hash of the data sementation that makes said a plurality of data source and in said special time period, comprise separately, and said cryptographic hash calculated through said Hash structure.
28. method as claimed in claim 27, wherein, said comparison step comprises that through following mode the integrity verification information that comprises in the data sementation according to corresponding data source and the cryptographic hash of said data sementation are calculated the root cryptographic hash:
According to the cryptographic hash of the said interdependent node that comprises in the said integrity verification information and the path of said routing information indication, through the cryptographic hash of said interdependent node is combined to obtain in twos the root cryptographic hash of said calculating along said path.
29. method as claimed in claim 27, wherein
For each data source of at least one data source in said a plurality of data sources, under following situation:
The data sementation of this data source in said special time period is divided into the sub-segmentation of a plurality of data; Represent the child node of lowermost layer to generate the Hash minor structure corresponding through the cryptographic hash that makes the sub-segmentation of each data with said special time period; Wherein the sub-segmentation of each data has been assigned with secondary integrity verification information, said secondary integrity verification information comprise in the integrity verification information of the data sementation under the sub-segmentation of said data, the said Hash minor structure, from the child node of the lowermost layer of the cryptographic hash representative of the sub-segmentation of said data to the routing information of the sub-root node of said Hash minor structure and said path the cryptographic hash of the node relevant with said child node;
Said public authorization information verification step comprises in the sub-segmentation of said a plurality of data that said data source is comprised that the public authorization information that comprises in the secondary integrity verification information of the corresponding sub-segmentation of data verifies in said special time period;
Said comparison step comprises: the root cryptographic hash that comprises in root cryptographic hash that will calculate according to the cryptographic hash of secondary integrity verification information that is had in the sub-segmentation of corresponding data and the sub-segmentation of these corresponding data and the said integrity verification information compares; And
Said integrality confirms that checking result that result that step is included in said comparison step shows the consistent and said public authorization information verification step of the root cryptographic hash that comprises in the root cryptographic hash that calculates and the said integrity verification information under the positive situation, confirms that the sub-segmentation of corresponding data is complete.
30. like each described method among the claim 27-29, wherein, said Hash structure is Hash tree or hash chain, and said Hash minor structure is Hash tree or hash chain.
31. like any described method among the claim 27-29, wherein, said public authorization information verification step and said comparison step comprise:
From the encapsulation of data of the special time period of corresponding data source, obtain integrity verification information to carry out integrity verification; Wherein, The relevant integrity verification information setting of the data sementation that in said certain period of time, comprises separately with corresponding data source is after corresponding data sementation, so that form the encapsulation of data with integrity verification information of corresponding data source; And/or
From the encapsulation of data of the special time period of corresponding data source, obtain secondary integrity verification information to carry out integrity verification; Wherein, The relevant secondary integrity verification information setting of the sub-segmentation of data that in said certain period of time, comprises separately with corresponding data source is after the sub-segmentation of corresponding data, so that form the encapsulation of data of the secondary integrity verification information of having of corresponding data source.
32. like any described method among the claim 27-29, wherein, said public authorization information verification step and said comparison step comprise:
Obtain integrity verification information and said integrity verification information and first corresponding relation between the corresponding data sementation of the centralized stores of said data sementation, so as when corresponding data sementation to be carried out integrity verification through said first corresponding relation acquisition integrity verification information relevant with this data sementation; And/or
Obtain secondary integrity verification information and said secondary integrity verification information and second corresponding relation between the corresponding sub-segmentation of data of the centralized stores of the sub-segmentation of said data, so as when integrity verification to be carried out in sub-segmentation to corresponding data through the said second corresponding relation acquisition secondary integrity verification information relevant with the sub-segmentation of these data.
33. like any described method among the claim 27-29, wherein, said public authorization information verification step comprises that carrying out in the following operation any one comes said public authorization information is verified:
Under the situation of root cryptographic hash as public authorization information of the timestamp of having added a cover the process authentication; Said public authorization information verification step is verified integrity verification information or the timestamp information in the secondary integrity verification information that the data sementation or the sub-segmentation of data of integrality to be verified had when carrying out integrity verification with respect to disclosed certificate of timestamp service centre; If checking is passed through; The checking result who then confirms public authorization information is positive, and recovers the root cryptographic hash that comprises in the said public authorization information;
Under the root cryptographic hash and the situation of check information of having carried out through predetermined encryption key encrypting as public authorization information; Said public authorization information verification step is when carrying out integrity verification; Through utilizing said encryption key and said check information to come integrity verification information that data sementation or the sub-segmentation of data to integrality to be verified had or the public authorization information in the secondary integrity verification information to verify; If checking is passed through; The checking result who then confirms public authorization information is positive, and recovers the root cryptographic hash that comprises in the said public authorization information; And
Under the situation of root cryptographic hash as public authorization information of having carried out through predetermined secret private key signing; Said public authorization information verification step comes integrity verification information that data sementation or the sub-segmentation of data to integrality to be verified had or the public authorization information in the secondary integrity verification information to verify through the public key certificate corresponding with said secret private key when carrying out integrity verification; If checking is passed through; The checking result who then confirms public authorization information is positive, and recovers the root cryptographic hash that comprises in the said public authorization information.
CN2010102953121A 2010-09-26 2010-09-26 Data integrity authentication information generation method and device as well as data integrity authentication method and device Pending CN102413313A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102953121A CN102413313A (en) 2010-09-26 2010-09-26 Data integrity authentication information generation method and device as well as data integrity authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102953121A CN102413313A (en) 2010-09-26 2010-09-26 Data integrity authentication information generation method and device as well as data integrity authentication method and device

Publications (1)

Publication Number Publication Date
CN102413313A true CN102413313A (en) 2012-04-11

Family

ID=45915124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102953121A Pending CN102413313A (en) 2010-09-26 2010-09-26 Data integrity authentication information generation method and device as well as data integrity authentication method and device

Country Status (1)

Country Link
CN (1) CN102413313A (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664893A (en) * 2012-04-23 2012-09-12 重庆理工大学 Adaptive retransmission and signature segmented embedding data transmission method
CN104429091A (en) * 2012-09-26 2015-03-18 尼尔森(美国)有限公司 Methods and apparatus for identifying media
CN104486614A (en) * 2014-12-10 2015-04-01 央视国际网络无锡有限公司 MP4 (Mobile Pentium 4) video format corruption detection method
CN104579556A (en) * 2014-12-05 2015-04-29 苏州沃斯麦机电科技有限公司 Inter-multiple-node data integral transmission system
CN104579557A (en) * 2014-12-05 2015-04-29 苏州沃斯麦机电科技有限公司 Data integrity transmission method among multiple nodes
CN104579558A (en) * 2014-12-05 2015-04-29 苏州沃斯麦机电科技有限公司 Method for detecting integrity in data transmission process
CN103067363B (en) * 2012-12-20 2015-06-17 华中科技大学 Index conversion method for public data integrity checking
CN104735160A (en) * 2015-04-08 2015-06-24 鹰潭嘉坤云计算科技有限公司 Method and system for monitoring fire water supply information
CN105187218A (en) * 2015-09-30 2015-12-23 谈建 Digital record signature method for multicore infrastructure and verification method
CN105227680A (en) * 2015-10-26 2016-01-06 广东佳学信息科技有限公司 A kind of smart machine file download Validity control method
CN105608530A (en) * 2015-12-18 2016-05-25 北京四方继保自动化股份有限公司 Operation, distribution and dispatching data integrity verification method for power distribution network
CN106230880A (en) * 2016-07-12 2016-12-14 何晓行 A kind of storage method of data and application server
WO2017008658A1 (en) * 2015-07-14 2017-01-19 阿里巴巴集团控股有限公司 Storage checking method and system for text data
CN106454385A (en) * 2015-08-04 2017-02-22 中国科学院深圳先进技术研究院 Video frame tamper detection method
CN106686333A (en) * 2016-11-02 2017-05-17 四川秘无痕信息安全技术有限责任公司 Method for producing video added watermarks for Android equipment
CN107452207A (en) * 2016-06-01 2017-12-08 高德软件有限公司 Floating car data source evaluation method, apparatus and system
CN107480535A (en) * 2017-08-18 2017-12-15 郑州云海信息技术有限公司 The reliable hardware layer design method and device of a kind of two-way server
CN107612988A (en) * 2017-09-12 2018-01-19 北京泛融科技有限公司 A kind of account book synchronization system and method based on Internet of Things
CN107707395A (en) * 2017-09-28 2018-02-16 浙江大华技术股份有限公司 A kind of data transmission method, device and system
CN108337479A (en) * 2018-02-05 2018-07-27 深圳华博高科光电技术有限公司 Video monitoring system and video frequency monitoring method
CN108809467A (en) * 2018-05-22 2018-11-13 深圳华博高科光电技术有限公司 Monitor the method, apparatus and computer readable storage medium of picture certification
CN109154971A (en) * 2016-03-30 2019-01-04 艾升集团有限公司 The verifying of the integrality of data
CN109194483A (en) * 2018-08-10 2019-01-11 北京首汽智行科技有限公司 Data verification method based on block chain
US10303887B2 (en) 2015-09-14 2019-05-28 T0.Com, Inc. Data verification methods and systems using a hash tree, such as a time-centric merkle hash tree
CN111373388A (en) * 2017-12-28 2020-07-03 卓普网盘股份有限公司 Efficiently propagating differentiated values
CN111565331A (en) * 2020-04-10 2020-08-21 苏州鑫竹智能建筑科技有限公司 Optimization method for wireless transmission of video image data
CN112131609A (en) * 2020-08-27 2020-12-25 国网湖北省电力有限公司电力科学研究院 Merkle tree-based electric energy quality data exchange format file integrity verification method and system
US10937083B2 (en) 2017-07-03 2021-03-02 Medici Ventures, Inc. Decentralized trading system for fair ordering and matching of trades received at multiple network nodes and matched by multiple network nodes within decentralized trading system
CN112559547A (en) * 2020-12-24 2021-03-26 北京百度网讯科技有限公司 Method and device for determining consistency among multiple storage object copies
KR20210047666A (en) * 2019-10-22 2021-04-30 한국전자기술연구원 Device for generating Hash chain and Method for generating Hash chain to have integrity based on continuous data
WO2021114918A1 (en) * 2019-12-13 2021-06-17 华为技术有限公司 Integrity checking method and apparatus, terminal device and verification server
CN113190863A (en) * 2019-03-29 2021-07-30 神讯电脑(昆山)有限公司 Verification code generation method, data verification method and electronic device
US20210272108A1 (en) * 2020-07-22 2021-09-02 Baidu Online Network Technology (Beijing ) Co., Ltd. Method and apparatus of processing deposit, and storage medium
CN113536956A (en) * 2021-06-23 2021-10-22 华南理工大学 Multimedia data tampering detection method
CN113632418A (en) * 2019-04-03 2021-11-09 特里布泰克解决方案有限公司 Device and method for integrity checking of sensor data streams
WO2021243594A1 (en) * 2020-06-03 2021-12-09 铨鸿资讯有限公司 Collective verification-based method for verifying partial data
CN114169014A (en) * 2021-12-13 2022-03-11 中国人民解放军战略支援部队信息工程大学 Integrity checking method and related device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1741010A (en) * 2004-08-24 2006-03-01 侯方勇 Method and apparatus for optimizing test of Hasche tree integrity
CN1841255A (en) * 2005-03-30 2006-10-04 侯方勇 Method and apparatus for protecting confidentiality and integrity of data storage
JP2006313964A (en) * 2005-05-06 2006-11-16 Ricoh Co Ltd Data processing apparatus, data processing system, image forming apparatus, and image processing system
CN101278298A (en) * 2005-10-05 2008-10-01 国际商业机器公司 System and method for performing a trust-preserving migration of data objects from a source to a target
US20100088522A1 (en) * 2008-10-02 2010-04-08 John Barrus Method and Apparatus for Tamper Proof Camera Logs
CN101741845A (en) * 2009-12-08 2010-06-16 中国科学院声学研究所 Fragmentation-based content authentication method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1741010A (en) * 2004-08-24 2006-03-01 侯方勇 Method and apparatus for optimizing test of Hasche tree integrity
CN1841255A (en) * 2005-03-30 2006-10-04 侯方勇 Method and apparatus for protecting confidentiality and integrity of data storage
JP2006313964A (en) * 2005-05-06 2006-11-16 Ricoh Co Ltd Data processing apparatus, data processing system, image forming apparatus, and image processing system
CN101278298A (en) * 2005-10-05 2008-10-01 国际商业机器公司 System and method for performing a trust-preserving migration of data objects from a source to a target
US20100088522A1 (en) * 2008-10-02 2010-04-08 John Barrus Method and Apparatus for Tamper Proof Camera Logs
CN101741845A (en) * 2009-12-08 2010-06-16 中国科学院声学研究所 Fragmentation-based content authentication method

Cited By (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664893A (en) * 2012-04-23 2012-09-12 重庆理工大学 Adaptive retransmission and signature segmented embedding data transmission method
CN104429091A (en) * 2012-09-26 2015-03-18 尼尔森(美国)有限公司 Methods and apparatus for identifying media
CN104429091B (en) * 2012-09-26 2018-02-02 尼尔森(美国)有限公司 Method and apparatus for identifying media
CN103067363B (en) * 2012-12-20 2015-06-17 华中科技大学 Index conversion method for public data integrity checking
CN104579556A (en) * 2014-12-05 2015-04-29 苏州沃斯麦机电科技有限公司 Inter-multiple-node data integral transmission system
CN104579558A (en) * 2014-12-05 2015-04-29 苏州沃斯麦机电科技有限公司 Method for detecting integrity in data transmission process
CN104579557A (en) * 2014-12-05 2015-04-29 苏州沃斯麦机电科技有限公司 Data integrity transmission method among multiple nodes
CN104486614A (en) * 2014-12-10 2015-04-01 央视国际网络无锡有限公司 MP4 (Mobile Pentium 4) video format corruption detection method
CN104735160A (en) * 2015-04-08 2015-06-24 鹰潭嘉坤云计算科技有限公司 Method and system for monitoring fire water supply information
WO2017008658A1 (en) * 2015-07-14 2017-01-19 阿里巴巴集团控股有限公司 Storage checking method and system for text data
CN106454385B (en) * 2015-08-04 2019-06-25 中国科学院深圳先进技术研究院 Video frame altering detecting method
CN106454385A (en) * 2015-08-04 2017-02-22 中国科学院深圳先进技术研究院 Video frame tamper detection method
US10303887B2 (en) 2015-09-14 2019-05-28 T0.Com, Inc. Data verification methods and systems using a hash tree, such as a time-centric merkle hash tree
US10831902B2 (en) 2015-09-14 2020-11-10 tZERO Group, Inc. Data verification methods and systems using a hash tree, such as a time-centric Merkle hash tree
CN105187218B (en) * 2015-09-30 2018-11-23 谈建 A kind of digitized record signature, the verification method of multi-core infrastructure
CN105187218A (en) * 2015-09-30 2015-12-23 谈建 Digital record signature method for multicore infrastructure and verification method
CN105227680A (en) * 2015-10-26 2016-01-06 广东佳学信息科技有限公司 A kind of smart machine file download Validity control method
CN105608530B (en) * 2015-12-18 2020-01-14 北京四方继保自动化股份有限公司 Power distribution network operation, distribution and dispatching data integrity checking method
CN105608530A (en) * 2015-12-18 2016-05-25 北京四方继保自动化股份有限公司 Operation, distribution and dispatching data integrity verification method for power distribution network
CN109154971B (en) * 2016-03-30 2022-12-06 艾升集团有限公司 Verification of the integrity of data
US11658831B2 (en) 2016-03-30 2023-05-23 The Ascent Group Ltd Validation of the integrity of data
CN109154971A (en) * 2016-03-30 2019-01-04 艾升集团有限公司 The verifying of the integrality of data
CN107452207A (en) * 2016-06-01 2017-12-08 高德软件有限公司 Floating car data source evaluation method, apparatus and system
CN106230880A (en) * 2016-07-12 2016-12-14 何晓行 A kind of storage method of data and application server
CN106686333A (en) * 2016-11-02 2017-05-17 四川秘无痕信息安全技术有限责任公司 Method for producing video added watermarks for Android equipment
US11948182B2 (en) 2017-07-03 2024-04-02 Tzero Ip, Llc Decentralized trading system for fair ordering and matching of trades received at multiple network nodes and matched by multiple network nodes within decentralized trading system
US10937083B2 (en) 2017-07-03 2021-03-02 Medici Ventures, Inc. Decentralized trading system for fair ordering and matching of trades received at multiple network nodes and matched by multiple network nodes within decentralized trading system
CN107480535A (en) * 2017-08-18 2017-12-15 郑州云海信息技术有限公司 The reliable hardware layer design method and device of a kind of two-way server
CN107612988B (en) * 2017-09-12 2024-02-02 北京泛融科技有限公司 Account book synchronization system and method based on Internet of things
CN107612988A (en) * 2017-09-12 2018-01-19 北京泛融科技有限公司 A kind of account book synchronization system and method based on Internet of Things
CN107707395A (en) * 2017-09-28 2018-02-16 浙江大华技术股份有限公司 A kind of data transmission method, device and system
CN111373388A (en) * 2017-12-28 2020-07-03 卓普网盘股份有限公司 Efficiently propagating differentiated values
US11657067B2 (en) 2017-12-28 2023-05-23 Dropbox Inc. Updating a remote tree for a client synchronization service
US12061623B2 (en) 2017-12-28 2024-08-13 Dropbox, Inc. Selective synchronization of content items in a content management system
US11669544B2 (en) 2017-12-28 2023-06-06 Dropbox, Inc. Allocation and reassignment of unique identifiers for synchronization of content items
US11704336B2 (en) 2017-12-28 2023-07-18 Dropbox, Inc. Efficient filename storage and retrieval
US11836151B2 (en) 2017-12-28 2023-12-05 Dropbox, Inc. Synchronizing symbolic links
CN111373388B (en) * 2017-12-28 2024-03-15 卓普网盘股份有限公司 Method and apparatus for efficiently propagating differential values
CN108337479A (en) * 2018-02-05 2018-07-27 深圳华博高科光电技术有限公司 Video monitoring system and video frequency monitoring method
CN108809467A (en) * 2018-05-22 2018-11-13 深圳华博高科光电技术有限公司 Monitor the method, apparatus and computer readable storage medium of picture certification
CN109194483A (en) * 2018-08-10 2019-01-11 北京首汽智行科技有限公司 Data verification method based on block chain
CN113190863A (en) * 2019-03-29 2021-07-30 神讯电脑(昆山)有限公司 Verification code generation method, data verification method and electronic device
CN113190863B (en) * 2019-03-29 2024-01-30 神讯电脑(昆山)有限公司 Verification code generation method, data verification method and electronic device
CN113632418A (en) * 2019-04-03 2021-11-09 特里布泰克解决方案有限公司 Device and method for integrity checking of sensor data streams
KR102408728B1 (en) * 2019-10-22 2022-06-14 한국전자기술연구원 Device for generating Hash chain and Method for generating Hash chain to have integrity based on continuous data
KR20210047666A (en) * 2019-10-22 2021-04-30 한국전자기술연구원 Device for generating Hash chain and Method for generating Hash chain to have integrity based on continuous data
CN112989430A (en) * 2019-12-13 2021-06-18 华为技术有限公司 Integrity verification method and device, terminal equipment and verification server
WO2021114918A1 (en) * 2019-12-13 2021-06-17 华为技术有限公司 Integrity checking method and apparatus, terminal device and verification server
CN111565331A (en) * 2020-04-10 2020-08-21 苏州鑫竹智能建筑科技有限公司 Optimization method for wireless transmission of video image data
WO2021243594A1 (en) * 2020-06-03 2021-12-09 铨鸿资讯有限公司 Collective verification-based method for verifying partial data
US20210272108A1 (en) * 2020-07-22 2021-09-02 Baidu Online Network Technology (Beijing ) Co., Ltd. Method and apparatus of processing deposit, and storage medium
CN112131609A (en) * 2020-08-27 2020-12-25 国网湖北省电力有限公司电力科学研究院 Merkle tree-based electric energy quality data exchange format file integrity verification method and system
CN112559547B (en) * 2020-12-24 2023-09-19 北京百度网讯科技有限公司 Method and device for determining consistency among multiple storage object copies
CN112559547A (en) * 2020-12-24 2021-03-26 北京百度网讯科技有限公司 Method and device for determining consistency among multiple storage object copies
CN113536956B (en) * 2021-06-23 2023-06-27 华南理工大学 Method for detecting multimedia data tampering
CN113536956A (en) * 2021-06-23 2021-10-22 华南理工大学 Multimedia data tampering detection method
CN114169014A (en) * 2021-12-13 2022-03-11 中国人民解放军战略支援部队信息工程大学 Integrity checking method and related device
CN114169014B (en) * 2021-12-13 2024-09-17 中国人民解放军战略支援部队信息工程大学 Integrity checking method and related device

Similar Documents

Publication Publication Date Title
CN102413313A (en) Data integrity authentication information generation method and device as well as data integrity authentication method and device
EP3361408B1 (en) Verifiable version control on authenticated and/or encrypted electronic documents
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
US11151259B2 (en) Method and system for data security, validation, verification and provenance within independent computer systems and digital networks
Akhil et al. Enhanced cloud data security using AES algorithm
Shimbre et al. Enhancing distributed data storage security for cloud computing using TPA and AES algorithm
US10880100B2 (en) Apparatus and method for certificate enrollment
US20100005318A1 (en) Process for securing data in a storage unit
CN104392185B (en) The method that data integrity validation is realized in cloud environment daily record evidence obtaining
CN102024123B (en) Method and device for importing mirror image of virtual machine in cloud calculation
US20070014399A1 (en) High assurance key management overlay
JP2022501971A (en) Methods for key management, user devices, management devices, storage media and computer program products
CN103339958A (en) Key transport protocol
CN107276752A (en) The methods, devices and systems that limitation key is decrypted are paid to cloud
CN112866990A (en) Conditional identity anonymous privacy protection public auditing method with incentive mechanism
KR20110028968A (en) Method for verifying the integrity of a user's data in remote computing and system thereof
CN112906056A (en) Cloud storage key security management method based on block chain
KR20190120559A (en) System and Method for Security Provisioning based on Blockchain
CN108933659B (en) Identity verification system and method for smart power grid
Shin et al. A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage.
CN106992865B (en) Data signature method and system, data sign test method and device
CN117454442A (en) Anonymous security and traceable distributed digital evidence obtaining method and system
CN116781332A (en) Block chain-based network flow evidence obtaining and tracing method and system
CN102833239B (en) Method for implementing nesting protection of client account information based on network identity
JP5768543B2 (en) Electronic signature system, signature server, signer client, electronic signature method, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120411