CN106650344A - Block chain-based data storage method with third-party authentication - Google Patents
Block chain-based data storage method with third-party authentication Download PDFInfo
- Publication number
- CN106650344A CN106650344A CN201611119562.3A CN201611119562A CN106650344A CN 106650344 A CN106650344 A CN 106650344A CN 201611119562 A CN201611119562 A CN 201611119562A CN 106650344 A CN106650344 A CN 106650344A
- Authority
- CN
- China
- Prior art keywords
- data
- data storage
- user
- storage agent
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013500 data storage Methods 0.000 title claims abstract description 106
- 238000000034 method Methods 0.000 title claims abstract description 29
- 239000011232 storage material Substances 0.000 claims abstract description 79
- 230000008569 process Effects 0.000 claims description 2
- 235000013399 edible fruits Nutrition 0.000 claims 1
- 230000000737 periodic effect Effects 0.000 claims 1
- 238000012795 verification Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 1
- 239000010432 diamond Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000013138 pruning Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Power Engineering (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
本发明公开了一种基于区块链的有第三方认证的数据存储方法,包括:数据存储代理接收用户发送的服务请求数据包,数据包中包含用户ID和待存储的数据;数据存储代理将用户ID和待存储数据等封装到认证请求数据包,并将认证请求数据包发送给第三方认证机构;第三方认证机构对用户ID和待存储数据等做可信签名,并将可信签名发送给数据存储代理;数据存储代理将用户ID、待存储数据和第三方认证机构的可信签名等存储在区块链中。本发明具有如下优点:引入数据存储代理和第三方认证机构两个实体,数据存储代理以统一的数据结构对数据进行表示和存储,第三方认证机构对所有数据进行可信签名,提升了数据存储的可信性、高效性、通用性和可移植性。
The invention discloses a blockchain-based data storage method with third-party authentication, including: a data storage agent receives a service request data packet sent by a user, and the data packet contains a user ID and data to be stored; The user ID and data to be stored are encapsulated into an authentication request packet, and the authentication request packet is sent to a third-party certification body; the third-party certification body makes a trusted signature on the user ID and data to be stored, and sends the trusted signature to To the data storage agent; the data storage agent stores the user ID, the data to be stored, and the trusted signature of the third-party certification body in the blockchain. The present invention has the following advantages: two entities, a data storage agent and a third-party certification agency, are introduced, the data storage agency represents and stores data with a unified data structure, and the third-party certification agency signs all data credibly, which improves data storage. Credibility, efficiency, versatility and portability.
Description
技术领域technical field
本发明涉及网络信息安全领域,具体涉及一种基于区块链的有第三方认证的数据存储方法。The invention relates to the field of network information security, in particular to a blockchain-based data storage method with third-party authentication.
背景技术Background technique
目前,已有一些利用区块链存储数据的用例,如记录音乐作品的版权信息、记录钻石的流通信息等。这些用例通常采用交易驱动的数据存储方式,即发起一次虚拟货币(如比特币)交易,将需存储的数据嵌入交易数据结构中,并以分布式方式存储在区块链中。At present, there are already some use cases of using blockchain to store data, such as recording the copyright information of music works, recording the circulation information of diamonds, etc. These use cases usually adopt a transaction-driven data storage method, that is, initiate a virtual currency (such as Bitcoin) transaction, embed the data to be stored into the transaction data structure, and store it in the blockchain in a distributed manner.
上述方法,利用区块链的分布式特性提高数据存储的可靠性,利用区块链的不可修改特性保证数据不被篡改。但是,这种方法的弊端也很明显:(一)在区块链中存储数据的各方均以自己规定的数据格式存储数据(如版权信息),因此各方难以就所存数据的含义和有效性达成共识;各方一旦因所存数据内容(如版权信息等)发生纠纷,法律机构也难以及时介入并有效识别所存数据的真正含义,进而进行有效裁决;(二)在区块链中存储数据的各方都需投入大量计算力进行数据的存储和检索;区块链分叉、剪枝造成交易失效后,还需重复发布交易以保证数据成功存储,浪费大量计算力;(三)目前区块链技术并不成熟,在安全、效率方面都有较大的改进空间;若区块链升级换代,各方都需要对自己的数据存储系统做修改,工作量很大。The above method uses the distributed characteristics of the blockchain to improve the reliability of data storage, and uses the non-modifiable characteristics of the blockchain to ensure that the data is not tampered with. However, the disadvantages of this method are also obvious: (1) All parties that store data in the blockchain store data in their own specified data format (such as copyright information), so it is difficult for all parties to agree on the meaning and validity of the stored data. Once there is a dispute between the parties due to the content of the stored data (such as copyright information, etc.), it is difficult for the legal agency to intervene in time and effectively identify the true meaning of the stored data, and then make an effective ruling; (2) Store data in the blockchain All parties need to invest a lot of computing power in data storage and retrieval; after blockchain bifurcation and pruning cause transactions to become invalid, transactions need to be issued repeatedly to ensure successful data storage, wasting a lot of computing power; (3) the current blockchain The blockchain technology is immature, and there is a lot of room for improvement in terms of security and efficiency; if the blockchain is upgraded, all parties need to modify their own data storage systems, and the workload is heavy.
发明内容Contents of the invention
本发明旨在解决上述技术问题。The present invention aims to solve the above technical problems.
为此,本发明的一个目的在于提出一种基于区块链的有第三方认证的数据存储方法,解决现有区块链存储数据的方法通用性差、无权威方参与、资源开销大等问题,以提高数据存储的可信性和通用性,降低资源浪费,具有高通用性、高可靠性、高效性和高可移植性等特点。For this reason, an object of the present invention is to propose a data storage method based on blockchain with third-party authentication, which solves the problems of poor versatility, no authoritative party participation, and large resource overhead in existing blockchain data storage methods. In order to improve the credibility and versatility of data storage and reduce resource waste, it has the characteristics of high versatility, high reliability, high efficiency and high portability.
为了实现上述目的,本发明的实施例公开了一种基于区块链的有第三方认证的数据存储方法,包括以下步骤:S1:数据存储代理接收用户发送的服务请求数据包,所述服务请求数据包包括第一时间戳、消息类型、用户ID和待存储数据的字段以及所述用户对所述字段做的数字签名;S2:所述数据存储代理将第二时间戳、消息类型、所述用户ID和所述待存储数据封装到认证请求数据包的相应字段中,对所述认证请求数据包的所述字段做数字签名,并将签名处理后的所述认证请求数据包发送给第三方认证机构,以便所述第三方认证机构对所述数据存储代理的数字签名进行验证,验证通过后由所述第三认证机构对所述认证请求数据包中的所述第二时间戳、所述用户ID、所述待存储数据做可信签名,并将第三时间戳、消息类型、所述用户ID、所述可信签名封装到所述认证结果数据包的相应字段中,对所述认证结果数据包的所述字段做数字签名,并将签名处理后的所述认证结果数据包发送给所述数据存储代理;S3:所述数据存储代理收到所述认证结果数据包后,将第四时间戳、所述用户ID、所述待存储数据和所述可信签名存储在区块链中。In order to achieve the above object, the embodiment of the present invention discloses a blockchain-based data storage method with third-party authentication, including the following steps: S1: The data storage agent receives the service request data packet sent by the user, and the service request The data packet includes a first timestamp, a message type, a user ID, a field of data to be stored, and a digital signature made by the user on the field; S2: the data storage agent stores the second timestamp, the message type, the Encapsulating the user ID and the data to be stored into corresponding fields of the authentication request packet, digitally signing the fields of the authentication request packet, and sending the signed authentication request packet to a third party certification authority, so that the third-party certification authority can verify the digital signature of the data storage agent, and after the verification is passed, the third certification authority will verify the second timestamp, the The user ID and the data to be stored are credibly signed, and the third timestamp, message type, the user ID, and the credible signature are encapsulated into the corresponding fields of the authentication result data packet, and the authentication The field of the result data packet is digitally signed, and the authentication result data packet after signature processing is sent to the data storage agent; S3: After the data storage agent receives the authentication result data packet, the first Four timestamps, the user ID, the data to be stored and the trusted signature are stored in the block chain.
另外,根据本发明上述实施例的基于区块链的有第三方认证的数据存储方法,还可以具有如下附加的技术特征:In addition, the blockchain-based data storage method with third-party authentication according to the above-mentioned embodiments of the present invention may also have the following additional technical features:
进一步地,在步骤S3之后还包括:所述数据存储代理定期扫描所述区块链的更新情况,以便在所述第四时间戳、所述用户ID、所述待存储数据和所述可信签名存储失败时重新进行存储。Further, after step S3, it also includes: the data storage agent regularly scans the update situation of the block chain, so that the fourth time stamp, the user ID, the data to be stored and the trusted Redo the storage when the signature storage fails.
进一步地,在步骤S1之前还包括:所述数据存储代理接收到所述用户的服务请求数据包后,估计服务所述用户所需的资源种类和资源量,并根据本地资源使用情况判断是否接受存储所述待存储数据;接受存储所述待存储数据后,向所述用户反馈接收请求信息;不接受存储所述待存储数据后,向所述用户反馈拒绝请求信息。Further, before step S1, it also includes: after the data storage agent receives the service request data packet of the user, it estimates the type and amount of resources required to serve the user, and judges whether to accept it or not according to the usage of local resources. storing the data to be stored; feeding back receiving request information to the user after accepting and storing the data to be stored; feeding back rejection request information to the user after not accepting storing the data to be stored.
进一步地,所述用户ID是所述用户向所述数据存储代理进行注册后,由所述数据存储代理分配的全网唯一的ID。Further, the user ID is a network-wide unique ID assigned by the data storage agent after the user registers with the data storage agent.
进一步地,在步骤S1之前还包括:所述数据存储代理接收所述用户发送的注册请求数据包,所述注册请求数据包包括第五时间戳、消息类型和MAC地址的字段,以及所述用户对所述字段所做的数字签名;所述数据存储代理验证所述用户对所述注册请求数据包的数字签名,并在验证通过后向所述用户分配全网唯一的ID。Further, before step S1, it also includes: the data storage agent receiving the registration request packet sent by the user, the registration request packet including the fifth timestamp, message type and MAC address fields, and the user A digital signature for the field; the data storage agent verifies the user's digital signature on the registration request packet, and assigns a network-wide unique ID to the user after the verification is passed.
进一步地,所述用户ID根据预设位数的随机二进制字串和所述用户的MAC地址拼接而成。Further, the user ID is formed by concatenating a random binary string of preset digits and the user's MAC address.
进一步地,在所述数据存储代理生成所述认证请求数据包之前还包括:所述数据存储代理验证所述用户对所述服务请求数据包的数字签名,并在验证通过后生成所述认证请求数据包。Further, before the data storage agent generates the authentication request data packet, it further includes: the data storage agent verifies the digital signature of the user on the service request data packet, and generates the authentication request after the verification is passed. data pack.
进一步地,在所述数据存储代理收到所述认证结果数据包后还包括:所述数据存储代理验证所述第三方认证机构对所述认证结果数据包的数字签名,以便在验证通过后所述数据存储代理将所述第四时间戳、所述用户ID、所述待存储数据和所述可信签名存储在区块链中。Further, after the data storage agent receives the authentication result data packet, it further includes: the data storage agent verifies the digital signature of the third-party certification body on the authentication result data packet, so that after the verification is passed, the The data storage agent stores the fourth time stamp, the user ID, the data to be stored and the trusted signature in a block chain.
本发明实施例的基于区块链的有第三方认证的数据存储方法,引入数据存储代理和第三方认证机构两个实体,数据存储代理以统一的数据结构对数据进行表示和存储,保证了区块链中所存数据在形式上的一致性和通用性;第三方认证机构可为权威的政府部门或者法律机构,数据存储代理在区块链中存储的数据均通过第三方认证,提高了信息的可信性,用户一旦因数据发生纠纷,第三方可以及时介入并进行裁决;数据存储代理向用户提供可靠的数据存储和检索服务,使得用户不必关注区块链存储、检索的细节,不必处理存储失败、区块链升级换代等情况,可有效降低计算力的消耗。In the block chain-based data storage method with third-party authentication in the embodiment of the present invention, two entities, the data storage agent and the third-party authentication agency, are introduced. The data storage agent uses a unified data structure to represent and store data, ensuring that the area The consistency and versatility of the data stored in the blockchain; the third-party certification agency can be an authoritative government department or legal institution, and the data stored in the blockchain by the data storage agent has passed the third-party certification, which improves the security of information. Credibility, once a user has a dispute over data, a third party can intervene in time and make a ruling; the data storage agent provides users with reliable data storage and retrieval services, so that users do not have to pay attention to the details of blockchain storage and retrieval, and do not have to deal with storage Failures, blockchain upgrades, etc., can effectively reduce the consumption of computing power.
本发明的附加方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本发明的实践了解到。Additional aspects and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
附图说明Description of drawings
本发明的上述和/或附加的方面和优点从结合下面附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present invention will become apparent and comprehensible from the description of the embodiments in conjunction with the following drawings, wherein:
图1是本发明实施例的基于区块链的有第三方认证的数据存储方法的流程图;Fig. 1 is the flow chart of the data storage method with third-party authentication based on the block chain of the embodiment of the present invention;
图2是本发明一个实施例的用户的注册请求数据包的数据结构示意图;Fig. 2 is a schematic diagram of the data structure of a user's registration request packet according to an embodiment of the present invention;
图3是本发明一个实施例的数据存储代理的注册结果报文的数据结构示意图;Fig. 3 is a schematic diagram of the data structure of the registration result message of the data storage agent according to an embodiment of the present invention;
图4是本发明一个实施例的用户的服务请求数据包的数据结构示意图;Fig. 4 is a schematic diagram of the data structure of the user's service request data packet according to an embodiment of the present invention;
图5是本发明一个实施例的数据存储代理的认证请求数据包的数据结构示意图;5 is a schematic diagram of the data structure of an authentication request packet of a data storage agent according to an embodiment of the present invention;
图6是本发明一个实施例的第三方认证机构的认证结果数据包的数据结构示意图;FIG. 6 is a schematic diagram of the data structure of an authentication result data packet of a third-party authentication agency according to an embodiment of the present invention;
图7是本发明一个实施例的基于区块链的有第三方认证的数据存储方法的系统架构示意图。Fig. 7 is a schematic diagram of the system architecture of a blockchain-based data storage method with third-party authentication according to an embodiment of the present invention.
具体实施方式detailed description
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本发明,而不能理解为对本发明的限制。Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.
在本发明的描述中,需要理解的是,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性。In the description of the present invention, it should be understood that the terms "first" and "second" are used for description purposes only, and should not be understood as indicating or implying relative importance.
参照下面的描述和附图,将清楚本发明的实施例的这些和其他方面。在这些描述和附图中,具体公开了本发明的实施例中的一些特定实施方式,来表示实施本发明的实施例的原理的一些方式,但是应当理解,本发明的实施例的范围不受此限制。相反,本发明的实施例包括落入所附加权利要求书的精神和内涵范围内的所有变化、修改和等同物。These and other aspects of embodiments of the invention will become apparent with reference to the following description and drawings. In these descriptions and drawings, some specific implementations of the embodiments of the present invention are specifically disclosed to represent some ways of implementing the principles of the embodiments of the present invention, but it should be understood that the scope of the embodiments of the present invention is not limited by This restriction. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.
以下结合附图描述本发明。The present invention is described below in conjunction with accompanying drawing.
图1是本发明实施例的基于区块链的有第三方认证的数据存储方法的流程图。如图1所示,本发明实施例的基于区块链的有第三方认证的数据存储方法,包括以下步骤:FIG. 1 is a flow chart of a blockchain-based data storage method with third-party authentication according to an embodiment of the present invention. As shown in Figure 1, the block chain-based data storage method with third-party authentication in the embodiment of the present invention includes the following steps:
S1:数据存储代理接收用户发送的服务请求数据包,所述服务请求数据包包括时间戳、用户ID、消息类型、待存储数据、数字签名等字段。S1: The data storage agent receives the service request data packet sent by the user, and the service request data packet includes fields such as time stamp, user ID, message type, data to be stored, and digital signature.
在本发明的一个实施例中,用户C_i将第一时间戳Timestamp1、消息类型Serv_Req、用户ID_ci、待存储数据S_i填入服务请求数据包中,并按照以下公式对服务请求数据包做数字签名,然后将签名后的服务请求数据包发送给数据存储代理P。In one embodiment of the present invention, the user C_i fills the first timestamp Timestamp1, the message type Serv_Req, the user ID_ci, and the data S_i to be stored into the service request data packet, and digitally signs the service request data packet according to the following formula, Then send the signed service request data packet to the data storage agent P.
Signature_1=Key_pri_ci(Hash(Timestamp1||Serv_Req||ID_ci||S_i))Signature_1=Key_pri_ci(Hash(Timestamp1||Serv_Req||ID_ci||S_i))
其中,Signature_1表示所述用户C_i对服务请求数据包的数字签名;Hash()表示将括号内的字段内容拼接而成的字串做为哈希算法的输入,生成的固定长度的字串;Key_pri_ci()表示所述用户C_i使用自己的私钥对哈希算法输出的字串做加密。Among them, Signature_1 represents the digital signature of the user C_i on the service request data packet; Hash() represents the fixed-length string generated by concatenating the field contents in brackets as the input of the hash algorithm; Key_pri_ci () indicates that the user C_i uses his own private key to encrypt the string output by the hash algorithm.
在本发明的一个实施例中,用户ID_ci是所述用户C_i向所述数据存储代理P进行注册后,由数据存储代理P分配的全网唯一的ID。在本发明的一个实施例中,用户C_i向数据存储代理P进行注册并得到所述用户ID_ci的过程包括:In one embodiment of the present invention, the user ID_ci is the unique ID assigned by the data storage agent P after the user C_i registers with the data storage agent P. In one embodiment of the present invention, the process of user C_i registering with data storage agent P and obtaining said user ID_ci includes:
数据存储代理P接收用户C_i发送的注册请求数据包。注册请求数据包的数字签名是所述用户C_i根据注册请求数据包中的第五时间戳Timestamp5、消息类型Reg_Req、MAC地址MAC_ci生成的。其中,第五时间戳Timestamp5为所述用户生成数字签名时的系统时间。The data storage agent P receives the registration request packet sent by the user C_i. The digital signature of the registration request data packet is generated by the user C_i according to the fifth timestamp Timestamp5, message type Reg_Req, and MAC address MAC_ci in the registration request data packet. Wherein, the fifth timestamp Timestamp5 is the system time when the user generates the digital signature.
具体地,按照以下公式生成数字签名:Specifically, a digital signature is generated according to the following formula:
Signature_5=Key_pri_ci(Hash(Timestamp5||Reg_Req||MAC_ci))。Signature_5=Key_pri_ci(Hash(Timestamp5||Reg_Req||MAC_ci)).
其中,Signature_5表示用户C_i对注册请求数据包的数字签名;Hash()表示将括号内的字段内容拼接而成的字串做为哈希算法的输入,生成的固定长度的字串;Key_pri_ci()表示用户C_i使用自己的私钥对哈希算法输出的字串做加密。Among them, Signature_5 represents the digital signature of user C_i on the registration request packet; Hash() represents the fixed-length string generated by concatenating the field contents in brackets as the input of the hash algorithm; Key_pri_ci() Indicates that user C_i uses his own private key to encrypt the string output by the hash algorithm.
数据存储代理P接收到用户C_i发送的注册请求数据包后,根据用户C_i的公钥解密并验证用户的数字签名Signature_2,并在验证通过后向用户C_i分配全网唯一的ID。After receiving the registration request packet sent by user C_i, the data storage agent P decrypts and verifies the user's digital signature Signature_2 according to the public key of user C_i, and assigns the unique ID of the entire network to user C_i after the verification is passed.
在本发明的一个实施例中,数据存储代理P根据预设位数的随机二进制字串和用户C_i的MAC地址按照以下公式为用户C_i分配ID:In one embodiment of the present invention, the data storage agent P assigns an ID to the user C_i according to the following formula according to the random binary string of preset digits and the MAC address of the user C_i:
ID_ci=(Random_80||MAC_ci)ID_ci=(Random_80||MAC_ci)
其中,Random_80为80位的随机二进制字串,P将Random_80和用户C_i的MAC地址MAC_ci做拼接生成ID_ci,作为分配给用户C_i的用户ID。需要说明的是,本实施例中随机二进制字串的长度并不限定固定的长度,采用的80位仅作为一种示例进行说明,在实际使用中可以根据需要做相应的调整。Among them, Random_80 is an 80-bit random binary string, and P concatenates Random_80 and the MAC address MAC_ci of user C_i to generate ID_ci, which is used as the user ID assigned to user C_i. It should be noted that the length of the random binary string in this embodiment is not limited to a fixed length, and the 80 bits used are only used as an example for illustration, and corresponding adjustments can be made as required in actual use.
在本发明的一个实施例中,在用户C_i获得用户ID之后,且在步骤S1之前还包括以下步骤:In one embodiment of the present invention, after the user C_i obtains the user ID, the following steps are also included before step S1:
数据存储代理P接收用户C_i的服务请求数据包。假设数据存储代理P具备的资源种类为m种,每种资源的编号分别为R_x,每种资源的总量分别为R_x_total,其中x=1,…,m;假设此时数据存储代理正在服务的用户数量为n个,用户ID分别为C_y,其中y=1,…,n。The data storage agent P receives the service request data packet of the user C_i. Assume that the data storage agent P has m kinds of resources, the number of each resource is R_x, and the total amount of each resource is R_x_total, where x=1,...,m; assuming that the data storage agent is serving The number of users is n, and the user IDs are C_y, where y=1,...,n.
数据存储代理P首先估计服务用户C_i所需的资源种类和资源量,并根据本地资源使用情况判断是否接受用户C_i存储待存储数据的服务请求;The data storage agent P first estimates the type and amount of resources required to serve user C_i, and judges whether to accept the service request of user C_i to store the data to be stored according to the usage of local resources;
具体地,数据存储代理P估计为服务用户C_i所需使用的资源R_x的总量,计算公式为:Specifically, the data storage agent P estimates the total amount of resource R_x required to serve the user C_i, and the calculation formula is:
其中,R_x_y表示数据存储代理P为服务客户C_y而消耗的R_x资源量,E(R_x_i)是数据存储代理P为服务用户C_i所需使用的R_x资源量的估计值。Among them, R_x_y represents the amount of R_x resources that data storage agent P consumes to serve customer C_y, and E(R_x_i) is the estimated value of the amount of R_x resources that data storage agent P needs to use to serve user C_i.
数据存储代理P计算本地资源能否满足用户C_i需求,计算方法为:The data storage agent P calculates whether the local resources can meet the needs of the user C_i, and the calculation method is:
F=F(1)∩F(2)∩…∩F(m-1)∩F(m)F=F(1)∩F(2)∩...∩F(m-1)∩F(m)
其中,R_x_res表示数据存储代理P为了保证正常运行而需保留的R_x资源量;F(x)是布尔变量,若资源R_x的可用量满足用户C_i需求,则F(x)为真,否则为假。F是布尔变量,F为真当且仅当所有的F(x)为真。若F为真,表示数据存储代理P的可用资源量满足用户C_i需求,因此数据存储代理P接受用户C_i存储待存储数据的服务请求,并向用户C_i反馈接收请求信息;否则拒绝用户C_i存储待存储数据的服务请求,向用户C_i反馈拒绝请求信息。Among them, R_x_res represents the amount of R_x resources that the data storage agent P needs to reserve in order to ensure normal operation; F(x) is a Boolean variable, if the available amount of resource R_x meets the needs of user C_i, then F(x) is true, otherwise it is false . F is a Boolean variable, F is true if and only if all F(x) are true. If F is true, it means that the amount of available resources of the data storage agent P meets the needs of the user C_i, so the data storage agent P accepts the service request of the user C_i to store the data to be stored, and feeds back the request information to the user C_i; otherwise, the user C_i is rejected to store the data to be stored. For the service request of storing data, the rejection request information is fed back to user C_i.
S2:数据存储代理将第二时间戳、消息类型、用户ID和待存储数据封装到认证请求数据包的相应字段中,使用自身私钥对上述字段做数字签名,并将签名处理后的认证请求数据包发送给第三方认证机构;第三方认证机构使用数据存储代理的公钥对数字签名进行解密和验证,验证通过后由第三认证机构使用自身私钥对认证请求数据包中的时间戳、用户ID、待存储数据做可信签名,并将时间戳、消息类型、用户ID、可信签名封装到认证结果数据包的相应字段中,使用自身私钥对上述字段做数字签名,并将签名处理后的认证结果数据包发送给数据存储代理。S2: The data storage agent encapsulates the second timestamp, message type, user ID and data to be stored into the corresponding fields of the authentication request packet, digitally signs the above fields with its own private key, and signs the processed authentication request The data packet is sent to a third-party certification agency; the third-party certification agency uses the public key of the data storage agent to decrypt and verify the digital signature. After the verification is passed, the third certification agency uses its own private key to verify the timestamp, The user ID and the data to be stored are trusted to sign, and the time stamp, message type, user ID and trusted signature are encapsulated into the corresponding fields of the authentication result data packet, and the above fields are digitally signed with their own private key, and the signature The processed authentication result data packet is sent to the data storage agent.
具体地,数据存储代理P使用用户C_i的公钥解密并验证用户C_i对服务请求数据包的数字签名,并在验证通过后将第二时间戳Timestamp2、消息类型Auth_Req、用户ID_ci、用户提交的待存储数据S_i嵌入认证请求数据包中,并按照以下公式对认证请求数据包进行数字签名Specifically, the data storage agent P uses the public key of the user C_i to decrypt and verify the digital signature of the user C_i on the service request packet, and after the verification is passed, the second timestamp Timestamp2, the message type Auth_Req, the user ID_ci, the pending The storage data S_i is embedded in the authentication request packet, and the authentication request packet is digitally signed according to the following formula
Signature_2=Key_pri_p(Hash(Timestamp2||Auth_Req||ID_ci||S_i))Signature_2=Key_pri_p(Hash(Timestamp2||Auth_Req||ID_ci||S_i))
其中,Signature_2为数据存储代理P对认证请求数据包的数字签名;Hash()表示将括号内的字段内容拼接而成的字串做为哈希算法的输入,生成的固定长度的字串;Key_pri_p()表示数据存储代理P使用自己的私钥对哈希算法输出的字串做加密。Among them, Signature_2 is the digital signature of the data storage agent P on the authentication request packet; Hash() indicates that the string formed by splicing the contents of the fields in the brackets is used as the input of the hash algorithm to generate a fixed-length string; Key_pri_p () indicates that the data storage agent P uses its own private key to encrypt the string output by the hash algorithm.
第三方认证机构A接收到认证请求数据包后,首先使用数据存储代理P的公钥解密并验证数字签名Signature_2。若验证通过,则进入如下步骤:After the third-party certification authority A receives the certification request packet, it first uses the public key of the data storage agent P to decrypt and verify the digital signature Signature_2. If the verification is passed, proceed to the following steps:
第三方认证机构A根据认证请求数据包中的第二时间戳Timestamp2、用户ID_ci、待存储数据S_i进行可信签名Signature_AuthThe third-party authentication agency A performs a trusted signature Signature_Auth according to the second timestamp Timestamp2, user ID_ci, and data S_i to be stored in the authentication request packet.
Signature_Auth=Key_pri_a(Hash(Timestamp2||ID_ci||S_i))Signature_Auth=Key_pri_a(Hash(Timestamp2||ID_ci||S_i))
其中,Signature_Auth为第三方认证机构A所做的可信签名;Hash()表示将括号内的字段内容拼接而成的字串做为哈希算法的输入,生成的固定长度的字串;Key_pri_a()表示第三方认证机构A使用自己的私钥对哈希算法输出的字串做加密。Among them, Signature_Auth is the trusted signature made by the third-party certification authority A; Hash() indicates that the string of fields in brackets is spliced as the input of the hash algorithm to generate a fixed-length string; Key_pri_a( ) indicates that the third-party certification authority A uses its own private key to encrypt the string output by the hash algorithm.
第三方认证机构A根据将第三时间戳Timestamp3、消息类型Auth_Res、用户ID_ci、可信签名Signature_Auth封装到认证结果数据包中,并使用自身私钥对上述字段做数字签名Signature_3,发送给数据存储代理P:Third-party certification agency A encapsulates the third timestamp Timestamp3, message type Auth_Res, user ID_ci, and trusted signature Signature_Auth into the authentication result data packet, and digitally signs Signature_3 on the above fields with its own private key, and sends it to the data storage agent P:
Signature_3=Key_pri_a(Hash(Timestamp3||Auth_Res||ID_ci||Signature_Auth))。Signature_3=Key_pri_a(Hash(Timestamp3||Auth_Res||ID_ci||Signature_Auth)).
其中,Signature_3为第三方A为认证结果数据包所做的数字签名;Hash()表示将括号内的字段内容拼接而成的字串做为哈希算法的输入,生成的固定长度的字串;Key_pri_a()表示第三方认证机构A使用自己的私钥对哈希算法输出的字串做加密。Among them, Signature_3 is the digital signature made by the third party A for the authentication result data packet; Hash() means that the string formed by splicing the contents of the fields in the brackets is used as the input of the hash algorithm to generate a fixed-length string; Key_pri_a() indicates that the third-party certification authority A uses its own private key to encrypt the string output by the hash algorithm.
S3:数据存储代理收到认证结果数据包后,首先使用第三方代理机构A的公钥解密并验证数字签名。若验证通过,则将第四时间戳、用户ID、待存储数据和可信签名存储在区块链中。S3: After the data storage agent receives the authentication result packet, it first decrypts and verifies the digital signature using the public key of the third-party agency A. If the verification is passed, the fourth time stamp, user ID, data to be stored and trusted signature are stored in the block chain.
在本发明的一个实施例中,数据存储代理P使用第三方A的公钥解密并验证第三方A对认证结果数据包的数字签名Signature_4,若验证通过则调用区块链的通信接口,将第四时间戳Timestamp4、用户ID_ci、待存储数据S_i和第三方可信签名Signature_Auth存储在区块链中。In one embodiment of the present invention, the data storage agent P uses the public key of the third party A to decrypt and verify the digital signature Signature_4 of the third party A on the authentication result data packet. If the verification is passed, the communication interface of the blockchain is called, and the first Four timestamp Timestamp4, user ID_ci, data to be stored S_i and third-party trusted signature Signature_Auth are stored in the blockchain.
在本发明的一个实施例中,步骤S3之后还包括:In one embodiment of the present invention, after step S3, it also includes:
数据存储代理P定期扫描区块链的更新情况,以便在Timestamp4、ID_ci、S_i和Signature_Auth存储失败时重新进行存储。The data storage agent P regularly scans the update of the blockchain to re-store Timestamp4, ID_ci, S_i and Signature_Auth when the storage fails.
为使本领域技术人员进一步理解本发明,将通过以下实施例进行详细说明。In order for those skilled in the art to further understand the present invention, the following examples will be described in detail.
图2表示用户C_i申请注册时,向数据存储代理P发送的注册请求数据包的报文结构。其中,时间戳Timestamp字段128位,消息类型MsgType字段64位,MAC地址MAC字段64位,数字签名Signature字段1024位。时间戳Timestamp字段通过填写Unix系统时间戳并在高位填0以扩充为128位;MAC字段在主机48位MAC地址的基础上在高位填0扩充为64位;签名Signature字段是对Timestamp、MsgType、MAC、Signature字段所做的数字签名。下文中各数据包的时间戳Timestamp字段、用户ID字段、数字签名Signature字段的规定同注册请求数据包。Fig. 2 shows the message structure of the registration request packet sent to the data storage agent P when the user C_i applies for registration. Among them, the Timestamp field has 128 bits, the message type MsgType field has 64 bits, the MAC address MAC field has 64 bits, and the digital signature Signature field has 1024 bits. The Timestamp Timestamp field is expanded to 128 bits by filling in the Unix system timestamp and filling the high bits with 0; the MAC field is expanded to 64 bits based on the host’s 48-bit MAC address; the Signature field is for Timestamp, MsgType, Digital signature made by MAC and Signature fields. The provisions of the timestamp Timestamp field, user ID field, and digital signature Signature field of each data packet in the following are the same as the registration request data packet.
图3表示数据存储代理P向用户C_i返回的注册结果数据包的报文结构。其中,时间戳Timestamp字段128位,消息类型MsgType字段64位,用户ID字段128位,数字签名Signature字段1024位。Fig. 3 shows the message structure of the registration result data packet returned by the data storage agent P to the user C_i. Among them, the Timestamp field has 128 bits, the message type MsgType field has 64 bits, the user ID field has 128 bits, and the digital signature Signature field has 1024 bits.
图4表示用户C_i向数据存储代理P发送的服务请求数据包的报文结构。其中,时间戳Timestamp字段128位,消息类型MsgType字段64位,用户ID字段128位,数字签名Signature字段1024位。待存储数据Data字段长度可变,最长不超过3776位。Fig. 4 shows the message structure of the service request data packet sent by the user C_i to the data storage agent P. Among them, the Timestamp field has 128 bits, the message type MsgType field has 64 bits, the user ID field has 128 bits, and the digital signature Signature field has 1024 bits. The length of the Data field of the data to be stored is variable, and the longest does not exceed 3776 bits.
图5表示数据存储代理P向第三方A发送的认证请求数据包的报文结构。需要注意的是,虽然此报文结构和图4报文结构的结构相同,但是各字段均由P重新填写,并非直接转发用户C_i所发送的报文。FIG. 5 shows the message structure of the authentication request packet sent by the data storage proxy P to the third party A. It should be noted that although the structure of this message is the same as the structure of the message structure in Figure 4, each field is refilled by P, instead of directly forwarding the message sent by user C_i.
图6表示第三方认证机构A向数据存储代理P发送的认证结果数据包的报文结构。时间戳Timestamp字段128位,消息类型MsgType字段64位,用户ID字段128位,A的可信签名Signature_Auth字段1024位,A对本数据包的数字签名Signature字段1024位。FIG. 6 shows the message structure of the authentication result packet sent by the third-party authentication agency A to the data storage agent P. The Timestamp field has 128 bits, the message type MsgType field has 64 bits, the user ID field has 128 bits, the trusted signature Signature_Auth field of A has 1024 bits, and the Signature field of A's digital signature for this data packet has 1024 bits.
图7表示由用户、数据存储代理、第三方等实体组成的系统架构。需要指出的是,区块链并不是本发明的一部分,此处为了说明实体间相互关系而将区块链绘出。Figure 7 shows the system architecture composed of entities such as users, data storage agents, and third parties. It should be pointed out that the blockchain is not part of the present invention, and the blockchain is drawn here to illustrate the relationship between entities.
本发明虽将数据存储于区块链中,但不对区块链的具体类型、存在方式、数据存储方式和通信接口等做特别假设。数据存储代理向上对用户提供统一的通信接口,向下根据区块链具体情况实现存储及检索功能。本发明提出的系统架构可以基于任何区块链实现,并可有效完成所有功能。第三方认证机构为公认权威的政府监管机构或者权威法律机构,可以根据隐私政策及用户需求对数据进行认证,表明第三方认可用户所存储的数据。Although the present invention stores data in the blockchain, it does not make special assumptions about the specific type, existence mode, data storage mode, and communication interface of the blockchain. The data storage agent provides a unified communication interface for users upwards, and realizes storage and retrieval functions downwards according to the specific conditions of the blockchain. The system architecture proposed by the present invention can be implemented based on any blockchain, and can effectively complete all functions. The third-party certification agency is a recognized and authoritative government regulatory agency or authoritative legal agency, which can authenticate the data according to the privacy policy and user needs, indicating that the third party approves the data stored by the user.
本发明实施例的基于区块链的有第三方认证的数据存储方法,引入了数据存储代理和第三方认证结构两个实体,数据存储代理为用户提供可靠的数据存储服务,使用户不必再关注存储细节,节省了计算力,提高了网络工作效率;所有数据以统一格式存储,且经过了第三方认证机构的认证,因此区块链中存储的数据可以得到各方的认可。本发明解决了当前利用区块链存储数据方法的弊端,具有高通用性、高可靠性、高效性、高可移植性,对节约计算力、提升网络工作效率也具有重要意义。The block chain-based data storage method with third-party authentication in the embodiment of the present invention introduces two entities, the data storage agent and the third-party authentication structure. The data storage agent provides users with reliable data storage services, so that users do not have to pay attention to Storing details saves computing power and improves network work efficiency; all data is stored in a unified format and has been certified by a third-party certification body, so the data stored in the blockchain can be recognized by all parties. The present invention solves the drawbacks of the current method of storing data using the block chain, has high versatility, high reliability, high efficiency, and high portability, and is also of great significance for saving computing power and improving network work efficiency.
另外,本发明实施例的基于区块链的有第三方认证的数据存储方法的其它构成以及作用对于本领域的技术人员而言都是已知的,为了减少冗余,不做赘述。In addition, other components and functions of the blockchain-based third-party-certified data storage method in the embodiment of the present invention are known to those skilled in the art, and will not be repeated in order to reduce redundancy.
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。In the description of this specification, descriptions referring to the terms "one embodiment", "some embodiments", "example", "specific examples", or "some examples" mean that specific features described in connection with the embodiment or example , structure, material or characteristic is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the specific features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
尽管已经示出和描述了本发明的实施例,本领域的普通技术人员可以理解:在不脱离本发明的原理和宗旨的情况下可以对这些实施例进行多种变化、修改、替换和变型,本发明的范围由权利要求及其等同限定。Although the embodiments of the present invention have been shown and described, those skilled in the art can understand that various changes, modifications, substitutions and modifications can be made to these embodiments without departing from the principle and spirit of the present invention. The scope of the invention is defined by the claims and their equivalents.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611119562.3A CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611119562.3A CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106650344A true CN106650344A (en) | 2017-05-10 |
CN106650344B CN106650344B (en) | 2019-05-31 |
Family
ID=58818749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611119562.3A Active CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106650344B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107277108A (en) * | 2017-05-18 | 2017-10-20 | 北京众享比特科技有限公司 | Message treatment method, apparatus and system at a kind of node of block chain |
CN107330694A (en) * | 2017-07-03 | 2017-11-07 | 重庆小犀智能科技有限公司 | Copyright trading system and method for commerce based on block chain |
CN107332826A (en) * | 2017-06-09 | 2017-11-07 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107358551A (en) * | 2017-07-03 | 2017-11-17 | 重庆小犀智能科技有限公司 | Notarization system and method based on block chain |
CN107566360A (en) * | 2017-08-25 | 2018-01-09 | 北京中星仝创科技有限公司 | A kind of generation method of data authentication code |
CN108287661A (en) * | 2017-12-05 | 2018-07-17 | 兴业数字金融服务(上海)股份有限公司 | A kind of chain store system verified in central authority |
CN108347429A (en) * | 2017-12-29 | 2018-07-31 | 北京世纪互联宽带数据中心有限公司 | A kind of information eyewitness system, method and device |
CN108734018A (en) * | 2018-05-21 | 2018-11-02 | 北京京东尚科信息技术有限公司 | authentication method, device, system and computer readable storage medium |
CN109002732A (en) * | 2018-07-17 | 2018-12-14 | 深圳前海微众银行股份有限公司 | Data deposit card method, apparatus and system and data evidence collecting method |
CN109033841A (en) * | 2018-07-12 | 2018-12-18 | 杨城 | It is a kind of to write the weak center's trusted data storage system and management method for testing separation |
CN109344631A (en) * | 2018-09-18 | 2019-02-15 | 百度在线网络技术(北京)有限公司 | The data modification and block verification method, device, equipment and medium of block chain |
CN109359223A (en) * | 2018-09-17 | 2019-02-19 | 重庆邮电大学 | Distributed storage technology of blockchain ledger based on erasure code |
CN109413014A (en) * | 2018-02-13 | 2019-03-01 | 李茗 | Digital content playback method, device and equipment based on block chain |
CN109492351A (en) * | 2018-11-23 | 2019-03-19 | 北京奇眸科技有限公司 | Copy-right protection method, device and readable storage medium storing program for executing based on block chain |
CN109558453A (en) * | 2018-11-27 | 2019-04-02 | 深圳市链联科技有限公司 | A kind of storage of block chain data networkization and move the method deposited |
CN110110003A (en) * | 2018-01-26 | 2019-08-09 | 广州中国科学院计算机网络信息中心 | The data storage control method and device of M2M platform |
CN110226317A (en) * | 2018-01-03 | 2019-09-10 | 百度(美国)有限责任公司 | Data authentication method, device and system |
CN110264351A (en) * | 2019-05-15 | 2019-09-20 | 阿里巴巴集团控股有限公司 | Copyright distribution method and device based on block chain |
US11093650B2 (en) | 2019-05-15 | 2021-08-17 | Advanced New Technologies Co., Ltd. | Blockchain-based copyright distribution |
CN114338795A (en) * | 2021-12-23 | 2022-04-12 | 杭州趣链科技有限公司 | Data communication method and device for block chain client |
US11328080B2 (en) | 2019-11-18 | 2022-05-10 | Frostbyte, Llc | Cryptographic key management |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105719172A (en) * | 2016-01-19 | 2016-06-29 | 布比(北京)网络技术有限公司 | Information issuing method and device |
CN105721543A (en) * | 2015-06-15 | 2016-06-29 | 清华大学深圳研究生院 | Cross-protocol distribution-type cloud storage system based on operation control unit and data management method |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
-
2016
- 2016-12-07 CN CN201611119562.3A patent/CN106650344B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721543A (en) * | 2015-06-15 | 2016-06-29 | 清华大学深圳研究生院 | Cross-protocol distribution-type cloud storage system based on operation control unit and data management method |
CN105719172A (en) * | 2016-01-19 | 2016-06-29 | 布比(北京)网络技术有限公司 | Information issuing method and device |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107277108A (en) * | 2017-05-18 | 2017-10-20 | 北京众享比特科技有限公司 | Message treatment method, apparatus and system at a kind of node of block chain |
CN107277108B (en) * | 2017-05-18 | 2020-09-08 | 北京众享比特科技有限公司 | Method, device and system for processing messages at nodes of block chain |
CN107332826B (en) * | 2017-06-09 | 2019-12-03 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107332826A (en) * | 2017-06-09 | 2017-11-07 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107358551A (en) * | 2017-07-03 | 2017-11-17 | 重庆小犀智能科技有限公司 | Notarization system and method based on block chain |
CN107330694A (en) * | 2017-07-03 | 2017-11-07 | 重庆小犀智能科技有限公司 | Copyright trading system and method for commerce based on block chain |
CN107566360A (en) * | 2017-08-25 | 2018-01-09 | 北京中星仝创科技有限公司 | A kind of generation method of data authentication code |
CN107566360B (en) * | 2017-08-25 | 2019-11-26 | 北京中星仝创科技有限公司 | A kind of generation method of data authentication code |
CN108287661A (en) * | 2017-12-05 | 2018-07-17 | 兴业数字金融服务(上海)股份有限公司 | A kind of chain store system verified in central authority |
CN108347429A (en) * | 2017-12-29 | 2018-07-31 | 北京世纪互联宽带数据中心有限公司 | A kind of information eyewitness system, method and device |
CN110226317B (en) * | 2018-01-03 | 2022-03-08 | 百度(美国)有限责任公司 | Data authentication method, device and system |
CN110226317A (en) * | 2018-01-03 | 2019-09-10 | 百度(美国)有限责任公司 | Data authentication method, device and system |
CN110110003A (en) * | 2018-01-26 | 2019-08-09 | 广州中国科学院计算机网络信息中心 | The data storage control method and device of M2M platform |
CN109413014A (en) * | 2018-02-13 | 2019-03-01 | 李茗 | Digital content playback method, device and equipment based on block chain |
CN108734018B (en) * | 2018-05-21 | 2021-03-30 | 北京京东尚科信息技术有限公司 | Authentication method, device, system and computer readable storage medium |
CN108734018A (en) * | 2018-05-21 | 2018-11-02 | 北京京东尚科信息技术有限公司 | authentication method, device, system and computer readable storage medium |
CN109033841B (en) * | 2018-07-12 | 2022-02-01 | 杨城 | Write-check separated weakly centralized trusted data storage system and management method |
CN109033841A (en) * | 2018-07-12 | 2018-12-18 | 杨城 | It is a kind of to write the weak center's trusted data storage system and management method for testing separation |
CN109002732A (en) * | 2018-07-17 | 2018-12-14 | 深圳前海微众银行股份有限公司 | Data deposit card method, apparatus and system and data evidence collecting method |
CN109002732B (en) * | 2018-07-17 | 2022-04-26 | 深圳前海微众银行股份有限公司 | Data storage method, equipment and system, and data forensics method |
CN109359223A (en) * | 2018-09-17 | 2019-02-19 | 重庆邮电大学 | Distributed storage technology of blockchain ledger based on erasure code |
CN109344631A (en) * | 2018-09-18 | 2019-02-15 | 百度在线网络技术(北京)有限公司 | The data modification and block verification method, device, equipment and medium of block chain |
CN109344631B (en) * | 2018-09-18 | 2020-11-06 | 百度在线网络技术(北京)有限公司 | Data modification and block verification method, device, equipment and medium for block chain |
CN109492351A (en) * | 2018-11-23 | 2019-03-19 | 北京奇眸科技有限公司 | Copy-right protection method, device and readable storage medium storing program for executing based on block chain |
CN109558453B (en) * | 2018-11-27 | 2021-01-26 | 深圳市链联科技有限公司 | Block chain data network storage and relocation method |
CN109558453A (en) * | 2018-11-27 | 2019-04-02 | 深圳市链联科技有限公司 | A kind of storage of block chain data networkization and move the method deposited |
CN110264351B (en) * | 2019-05-15 | 2020-11-17 | 创新先进技术有限公司 | Copyright distribution method and device based on block chain |
CN112651836A (en) * | 2019-05-15 | 2021-04-13 | 创新先进技术有限公司 | Copyright distribution method and device based on block chain |
US11093650B2 (en) | 2019-05-15 | 2021-08-17 | Advanced New Technologies Co., Ltd. | Blockchain-based copyright distribution |
CN110264351A (en) * | 2019-05-15 | 2019-09-20 | 阿里巴巴集团控股有限公司 | Copyright distribution method and device based on block chain |
US11328080B2 (en) | 2019-11-18 | 2022-05-10 | Frostbyte, Llc | Cryptographic key management |
CN114338795A (en) * | 2021-12-23 | 2022-04-12 | 杭州趣链科技有限公司 | Data communication method and device for block chain client |
Also Published As
Publication number | Publication date |
---|---|
CN106650344B (en) | 2019-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106650344A (en) | Block chain-based data storage method with third-party authentication | |
WO2022095244A1 (en) | Cross-chain transaction method, system and apparatus, device, and storage medium | |
WO2019184924A1 (en) | Identity management method, equipment, communication network, and storage medium | |
CN112003889A (en) | Distributed cross-chain system and cross-chain information interaction and system access control mechanism | |
CN108768988A (en) | Block chain access control method, equipment and computer readable storage medium | |
CN111010372A (en) | Blockchain network identity authentication system, data processing method and gateway device | |
US20090055902A1 (en) | Secure delegation using public key authentication | |
WO2021139140A1 (en) | Password management method and apparatus employing blockchain, electronic device, and computer-readable storage medium | |
CN113783699B (en) | Data processing method, device and equipment based on block chain and readable storage medium | |
TW201917614A (en) | Digital certificate application | |
GB2410658A (en) | Cascaded delegation | |
CN108696358A (en) | Management method, device, readable storage medium storing program for executing and the service terminal of digital certificate | |
US10715332B2 (en) | Encryption for transactions in a memory fabric | |
CN112398798B (en) | A method, device and terminal for processing an Internet phone | |
US11665045B2 (en) | Systems and methods for subscribing topics and registering computer server event notifications | |
US11843500B2 (en) | Systems and methods for registering computer server event notifications | |
CN111835774A (en) | Data processing method, apparatus, equipment and storage medium | |
WO2022161098A1 (en) | Secret key distribution method and electronic device | |
CN111241492A (en) | Product multi-tenant secure credit granting method, system and electronic equipment | |
CN113382002B (en) | Data request method, request response method, data communication system, and storage medium | |
CN103326856A (en) | Cloud storage data responsibility confirmation structure and method based on two-way digital signature | |
CN116684179A (en) | Equipment identity authentication method, system, equipment and medium based on blockchain | |
CN112132581A (en) | PKI identity authentication system and method based on IOTA | |
CN111314269B (en) | Address automatic allocation protocol security authentication method and equipment | |
CN111884988A (en) | Method for secure transmission of data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |