CN106650344A - Block chain-based data storage method with third-party authentication - Google Patents

Block chain-based data storage method with third-party authentication Download PDF

Info

Publication number
CN106650344A
CN106650344A CN201611119562.3A CN201611119562A CN106650344A CN 106650344 A CN106650344 A CN 106650344A CN 201611119562 A CN201611119562 A CN 201611119562A CN 106650344 A CN106650344 A CN 106650344A
Authority
CN
China
Prior art keywords
data
data storage
user
storage agent
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611119562.3A
Other languages
Chinese (zh)
Other versions
CN106650344B (en
Inventor
徐恪
吕亮
沈蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201611119562.3A priority Critical patent/CN106650344B/en
Publication of CN106650344A publication Critical patent/CN106650344A/en
Application granted granted Critical
Publication of CN106650344B publication Critical patent/CN106650344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain-based data storage method with third-party authentication. The method comprises the steps that a data storage agent receives a service request data package sent by a user, wherein the data package contains a user ID and to-be-stored data; the data storage agent packages the user ID and the to-be-stored data in an authentication request data package, and sends the authentication request data package to a third-party authentication mechanism; the third-party authentication mechanism performs credible signing on the user ID and the to-be-stored data, and sends a credible signature to the data storage agent; and the data storage agent stores the user ID, the to-be-stored data and the credible signature of the third-party authentication mechanism in a block chain. The method has the following advantages: two entities including the data storage agent and the third-party authentication mechanism are introduced; the data storage agent performs representation and storage on the data by a unified data structure; and the third-party authentication mechanism performs credible signing on all the data, so that the credibility, efficiency, universality and portability of data storage are improved.

Description

A kind of date storage method for having a Third Party Authentication based on block chain
Technical field
The present invention relates to filed of network information security, and in particular to a kind of data for having a Third Party Authentication based on block chain Storage method.
Background technology
At present, some use-cases using block chain data storage, the such as copyright information of record musical works, record brill are had Circulation information of stone etc..These use-cases generally using the data storage method of transaction driven, that is, initiate ideal money (such as than Special coin) transaction, the data that need to be stored are embedded in transaction data structure, and be stored in a distributed way in block chain.
Said method, using block chain distributed nature improve data storage reliability, using block chain can not Modification characteristic ensures that data are not tampered with.But, it is also apparent from the drawbacks of this method:(1) data storage in block chain Each side with oneself specify data form data storage (such as copyright information), therefore each side be difficult to regard to stored data implication and Validity is reached common understanding;Each side once because stored data content (such as copyright information) occur dispute, legal agency be also difficult to and When the intervention and effective real meaning of identification stored data, and then carry out effective ruling;(2) data storage in block chain Each side all needs to put into a large amount of computing powers and carries out the storage and retrieval of data;Block chain bifurcated, beta pruning are caused after transaction failure, are also needed Repeat to issue transaction to ensure that data are successfully stored, waste a large amount of computing powers;(3) current block chain technology and immature, in peace Entirely, efficiency aspect has larger room for improvement;If block chain upgrades, each side is required for the data-storage system to oneself Make an amendment, workload is very big.
The content of the invention
Present invention seek to address that above-mentioned technical problem.
For this purpose, it is an object of the present invention to proposing a kind of data storage side for having a Third Party Authentication based on block chain Method, solve existing block chain data storage method poor universality, participate in without authorities, the problems such as resource overhead is big, to improve The credible and versatility of data storage, reduces the wasting of resources, with high universalizable, high reliability, high efficiency and high portable The features such as property.
To achieve these goals, embodiment of the invention discloses that a kind of number for having a Third Party Authentication based on block chain According to storage method, comprise the following steps:S1:The requests of packets of data that data storage agent receive user sends, the service Request data package includes the field of very first time stamp, type of message, ID and data to be stored and the user to described The digital signature that field is done;S2:The data storage agent is by the second timestamp, type of message, the ID and described treats Data storage is encapsulated in the respective field of certification request packet, and to the field of the certification request packet numeral is done Signature, and the certification request packet after signature is processed is sent to Third Party Authentication mechanism, so that the third party recognizes Card mechanism verifies to the digital signature of the data storage agent, by the 3rd certification authority to described after being verified Second timestamp, the ID in certification request packet, the data to be stored do trusted signature, and by the 3rd Timestamp, type of message, the ID, the trusted signature are encapsulated in the respective field of the authentication result packet, Digital signature is done to the field of the authentication result packet, and the authentication result packet after signature is processed is sent out Give the data storage agent;S3:The data storage agent is received after the authentication result packet, by the 4th time Stamp, the ID, the data to be stored and the trusted signature are stored in block chain.
In addition, the date storage method for having a Third Party Authentication based on block chain according to the above embodiment of the present invention, also There can be following additional technical characteristic:
Further, also include after step s 3:The renewal of block chain described in the data storage agent periodic scanning Situation, so as to the weight in the storage failure of the 4th timestamp, the ID, the data to be stored and the trusted signature Newly stored.
Further, also included before step S1:The data storage agent receives the service request of the user After packet, the resource category and stock number needed for the service user is estimated, and be according to the judgement of local resource service condition It is no to receive the storage data to be stored;After receiving the storage data to be stored, to the user feedback solicited message is received; After not receiving the storage data to be stored, to the user feedback solicited message is refused.
Further, the ID is after the user is registered to the data storage agent, by the data The unique ID of the whole network of storage agent distribution.
Further, also included before step S1:The data storage agent receives the registration of user's transmission please Packet, the registration request packet is asked to include the field of the 5th timestamp, type of message and MAC Address, and the use The digital signature that family is done to the field;The data storage agent verifies the user to the registration request packet Digital signature, and distribute the whole network unique ID to the user after being verified.
Further, the ID is spelled according to the random binary word string of presetting digit capacity and the MAC Address of the user Connect and form.
Further, also included before the data storage agent generates the certification request packet:The data Storage agent verifies digital signature of the user to the requests of packets of data, and the certification is generated after being verified Request data package.
Further, also include after the data storage agent receives the authentication result packet:The data are deposited Digital signature of the Third Party Authentication mechanism to the authentication result packet described in storage proxy authentication, so as to the institute after being verified State data storage agent to be stored in the 4th timestamp, the ID, the data to be stored and the trusted signature In block chain.
The date storage method for having a Third Party Authentication based on block chain of the embodiment of the present invention, introduces data storage agent With two entities of Third Party Authentication mechanism, data storage agent is indicated to data and stored with unified data structure, protects The uniformity in form of stored data in block chain and versatility are demonstrate,proved;Third Party Authentication mechanism can be the government department of authority Or legal agency, by Third Party Authentication, improve information can for the data that data storage agent is stored in block chain Letter property, once user's factor data occurs dispute, third party can in time intervene and carry out ruling;Data storage agent to user carries For reliable data storage and search service so that user need not pay close attention to the storage of block chain, the details of retrieval, it is not necessary to process storage Situations such as failure, block chain upgrade, can effectively reduce the consumption of computing power.
The additional aspect and advantage of the present invention will be set forth in part in the description, and partly will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention will become from the description with reference to accompanying drawings below to embodiment It is substantially and easy to understand, wherein:
Fig. 1 be the embodiment of the present invention based on block chain have Third Party Authentication date storage method flow chart;
Fig. 2 is the data structure schematic diagram of the registration request packet of the user of one embodiment of the invention;
Fig. 3 is the data structure schematic diagram of the registering result message of the data storage agent of one embodiment of the invention;
Fig. 4 is the data structure schematic diagram of the requests of packets of data of the user of one embodiment of the invention;
Fig. 5 is the data structure schematic diagram of the certification request packet of the data storage agent of one embodiment of the invention;
Fig. 6 is that the data structure of the authentication result packet of the Third Party Authentication mechanism of one embodiment of the invention is illustrated Figure;
Fig. 7 be one embodiment of the invention based on block chain have Third Party Authentication date storage method system tray Structure schematic diagram.
Specific embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finish Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not considered as limiting the invention.
In describing the invention, it is to be understood that term " first ", " second " are only used for describing purpose, and can not It is interpreted as indicating or implying relative importance.
With reference to explained below and accompanying drawing, it will be clear that these and other aspects of embodiments of the invention.In these descriptions In accompanying drawing, specifically disclose some particular implementations in embodiments of the invention to represent the enforcement for implementing the present invention Some modes of the principle of example, but it is to be understood that the scope of embodiments of the invention is not limited.Conversely, the present invention Embodiment includes all changes, modification and the equivalent fallen in the range of the spirit and intension of attached claims.
Below in conjunction with the Description of Drawings present invention.
Fig. 1 be the embodiment of the present invention based on block chain have Third Party Authentication date storage method flow chart.Such as Shown in Fig. 1, the date storage method for having a Third Party Authentication based on block chain of the embodiment of the present invention is comprised the following steps:
S1:The requests of packets of data that data storage agent receive user sends, when the requests of packets of data includes Between the field such as stamp, ID, type of message, data to be stored, digital signature.
In one embodiment of the invention, user C_i will stab Timestamp1, type of message Serv_ the very first time Req, ID _ ci, data S_i to be stored are inserted in requests of packets of data, and according to below equation to service data Bag does digital signature, then the requests of packets of data after signature is sent to into data storage agent P.
Signature_1=Key_pri_ci (Hash (Timestamp1 | | Serv_Req | | ID_ci | | S_i))
Wherein, Signature_1 represents digital signature of the user C_i to requests of packets of data;Hash () is represented The word string that field contents in bracket are spliced as hash algorithm input, the word string of the regular length of generation;Key_ Pri_ci () represents that the user C_i is encrypted using the private key of oneself to the word string that hash algorithm is exported.
In one embodiment of the invention, ID _ ci is that the user C_i is carried out to the data storage agent P After registration, the unique ID of the whole network distributed by data storage agent P.In one embodiment of the invention, user C_i is to data Storage agent P is registered and obtained the process of the ID _ ci to be included:
The registration request packet that data storage agent P receive users C_i send.The digital signature of registration request packet It is fiveth time stamp T imestamp5, type of message Reg_Req, MAC ground of the user C_i in registration request packet What location MAC_ci was generated.Wherein, the 5th time stamp T imestamp5 is system time when the user generated word is signed.
Specifically, digital signature is generated according to below equation:
Signature_5=Key_pri_ci (Hash (Timestamp5 | | Reg_Req | | MAC_ci)).
Wherein, Signature_5 represents digital signature of the user C_i to registration request packet;Hash () is represented and will included The word string that field contents in number are spliced as hash algorithm input, the word string of the regular length of generation;Key_pri_ Ci () represents that user C_i is encrypted using the private key of oneself to the word string that hash algorithm is exported.
Data storage agent P is received after the registration request packet of user C_i transmissions, according to the public key solution of user C_i Digital signature Signature_2 that is close and verifying user, and distribute the whole network unique ID rear line C_i is verified.
In one embodiment of the invention, random binary word strings and use of the data storage agent P according to presetting digit capacity The MAC Address of family C_i is that user C_i distributes ID according to below equation:
ID_ci=(Random_80 | | MAC_ci)
Wherein, Random_80 is the random binary word string of 80, and P is by Random_80 and the MAC Address of user C_i MAC_ci does splicing and generates ID_ci, used as the ID for distributing to user C_i.It should be noted that random two in the present embodiment The length of system word string does not limit fixed length, and 80 of employing only illustrate as a kind of example, actually used In can as needed do corresponding adjustment.
In one embodiment of the invention, user C_i obtain ID after, and also included before step S1 with Lower step:
The requests of packets of data of data storage agent P receive users C_i.Assume the resource that data storage agent P possesses Species is m kinds, and the numbering of every kind of resource is respectively R_x, and the total amount of every kind of resource is respectively R_x_total, wherein x=1 ..., m;Assume that the number of users that now data storage agent is being serviced is n, ID is respectively C_y, wherein y=1 ..., n.
Data storage agent P estimates first the resource category and stock number needed for service user C_i, and according to local resource Service condition judges whether to receive the service request that user C_i stores data to be stored;
Specifically, data storage agent P is estimated as the total amount of resource R_x used needed for service user C_i, computing formula For:
Wherein, R_x_y represents the R_x stock numbers that data storage agent P is consumed for services client C_y, and E (R_x_i) is The estimate of the R_x stock numbers that data storage agent P is used for needed for service user C_i.
Can data storage agent P calculates local resource meet user's C_i demands, and computational methods are:
F=F (1) ∩ F (2) ∩ ... ∩ F (m-1) ∩ F (m)
Wherein, R_x_res represents data storage agent P for the R_x stock numbers for ensureing normally to run and need to retain;F(x) It is Boolean variable, if the available quantity of resource R_x meets user's C_i demands, F (x) is true, is otherwise false.F is Boolean variable, F All of F (x) is true to be that very and if only if.If F is true, the available volume of resources for representing data storage agent P meets user's C_i need Ask, therefore data storage agent P receives the service request that user C_i stores data to be stored, and please to user C_i feedback receptions Seek information;Otherwise refuse the service request that user C_i stores data to be stored, to user C_i feedback refusal solicited messages.
S2:Second timestamp, type of message, ID and data to be stored are encapsulated into certification request by data storage agent In the respective field of packet, digital signature, and the certification request after signature is processed are done to above-mentioned field using own private key Packet is sent to Third Party Authentication mechanism;Third Party Authentication mechanism is carried out using the public key of data storage agent to digital signature Decryption and checking, are used own private key to the timestamp in certification request packet, are used after being verified by the 3rd certification authority Family ID, data to be stored do trusted signature, and timestamp, type of message, ID, trusted signature are encapsulated into into authentication result number In respective field according to bag, digital signature, and the authentication result number after signature is processed are done to above-mentioned field using own private key Data storage agent is sent to according to bag.
Specifically, data storage agent P using user C_i public key decryptions and verify user C_i to service data The digital signature of bag, and after being verified by the second time stamp T imestamp2, type of message Auth_Req, ID _ ci, In the embedded certification request packet of data S_i to be stored that user submits to, and certification request packet is entered according to below equation Row digital signature
Signature_2=Key_pri_p (Hash (Timestamp2 | | Auth_Req | | ID_ci | | S_i))
Wherein, Signature_2 is digital signature of the data storage agent P to certification request packet;Hash () is represented The word string that field contents in bracket are spliced as hash algorithm input, the word string of the regular length of generation;Key_ Pri_p () represents that data storage agent P is encrypted using the private key of oneself to the word string that hash algorithm is exported.
Third Party Authentication mechanism A is received after certification request packet, first by the public key decryptions of data storage agent P And verify digital signature Signature_2.If being verified, into following steps:
Second time stamp Ts imestamp2 of the Third Party Authentication mechanism A in certification request packet, ID _ ci, Data S_i to be stored carry out trusted signature Signature_Auth
Signature_Auth=Key_pri_a (Hash (Timestamp2 | | ID_ci | | S_i))
Wherein, the trusted signature that Signature_Auth is done by Third Party Authentication mechanism A;Hash () is represented in bracket The word string that is spliced of field contents as hash algorithm input, the word string of the regular length of generation;Key_pri_a() Represent that Third Party Authentication mechanism A is encrypted using the private key of oneself to the word string that hash algorithm is exported.
Third Party Authentication mechanism A according to by the 3rd time stamp T imestamp3, type of message Auth_Res, ID _ ci, Trusted signature Signature_Auth is encapsulated in authentication result packet, and makees digital label to above-mentioned field using own private key Name Signature_3, is sent to data storage agent P:
Signature_3=Key_pri_a (Hash (Timestamp3 | | Auth_Res | | ID_ci | | Signature_ Auth))。
Wherein, the digital signature that Signature_3 is done by third party A for authentication result packet;Hash () is represented will The word string that field contents in bracket are spliced as hash algorithm input, the word string of the regular length of generation;Key_ Pri_a () represents that Third Party Authentication mechanism A is encrypted using the private key of oneself to the word string that hash algorithm is exported.
S3:Data storage agent is received after authentication result packet, first by the public key decryptions of third-party agent mechanism A And verify digital signature.If being verified, the 4th timestamp, ID, data to be stored and trusted signature are stored in into area In block chain.
In one embodiment of the invention, data storage agent P using third party A public key decryptions and verify third party Digital signature Signature_4 of the A to authentication result packet, calls the communication interface of block chain if being verified, by Four time stamp Ts imestamp4, ID _ ci, data S_i to be stored and third party's trusted signature Signature_Auth storage In block chain.
In one embodiment of the invention, also include after step S3:
The update status of data storage agent P periodic scanning block chains, so as in Timestamp4, ID_ci, S_i and Storage is re-started during Signature_Auth storage failures.
To make it is further understood that the present invention, will be described in detail by following examples.
When Fig. 2 represents that user C_i applies for the registration of, the message knot of the registration request packet sent to data storage agent P Structure.Wherein, time stamp T imestamp field 128, type of message MsgType fields 64, MAC Address MAC fields 64, Digital signature Signature field 1024.Time stamp T imestamp field is by filling in Unix system timestamp and in a high position Fill out 0 to be extended for 128;MAC fields are filled out 0 and are extended for 64 on the basis of the bit mac address of main frame 48 in a high position;Signature Signature fields are the digital signature done to Timestamp, MsgType, MAC, Signature field.Hereinafter each number According to time stamp T imestamp field, user's id field, the regulation of digital signature Signature field of bag with registration request number According to bag.
Fig. 3 represents the message structure of the registering result packet that data storage agent P is returned to user C_i.Wherein, the time Stamp Timestamp fields 128, type of message MsgType fields 64, user's id field 128, digital signature Signature fields 1024.
Fig. 4 represents the message structure of the requests of packets of data that user C_i sends to data storage agent P.Wherein, the time Stamp Timestamp fields 128, type of message MsgType fields 64, user's id field 128, digital signature Signature fields 1024.Data Data field length to be stored is variable, no longer than 3776.
Fig. 5 represents the message structure of the certification request packet that data storage agent P sends to third party A.Should be noted Be, although this message structure is identical with the structure of Fig. 4 message structures, but each field is rewritten by P, and non-immediate turn The message that hair family C_i is sent.
Fig. 6 represents the message structure of the authentication result packet that Third Party Authentication mechanism A sends to data storage agent P. Time stamp T imestamp field 128, type of message MsgType fields 64, user's id field 128, the trusted signature of A Signature_Auth fields 1024, digital signature Signature fields 1024 of the A to notebook data bag.
Fig. 7 represents the system architecture being made up of entities such as user, data storage agent, third parties.It is pointed out that area Block chain is not the part of the present invention, draws on block chain here for explanation inter-entity correlation.
Though the present invention is stored data in block chain, particular type not to block chain, existing way, data storage Mode and communication interface etc. do especially hypothesis.Data storage agent provides unified communication interface, downward basis to user upwards Block chain concrete condition realizes storage and search function.System architecture proposed by the present invention can be realized based on any block chain, And it is functional to efficiently accomplish institute.Third Party Authentication mechanism for acknowledged authority government monitoring agencies or authoritative legal agency, Data can be authenticated according to privacy policy and user's request, show the data that third party authorised user is stored.
The date storage method for having a Third Party Authentication based on block chain of the embodiment of the present invention, introduces data storage generation Reason and two entities of Third Party Authentication structure, data storage agent provides the user reliable data storage service, makes user not Storage details must be again paid close attention to, computing power is saved, network operating efficiency is improve;All data are stored with consolidation form, and Jing Having crossed the data stored in the certification of Third Party Authentication mechanism, therefore block chain can obtain the accreditation of each side.The present invention is solved It is the drawbacks of current utilization block chain data storage method, right with high universalizable, high reliability, high efficiency, high portable Save computing power, lifting network operating efficiency also significant.
In addition, the embodiment of the present invention based on block chain have Third Party Authentication date storage method other constitute with And effect is all for a person skilled in the art known, in order to reduce redundancy, is not repeated.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means to combine specific features, structure, material or spy that the embodiment or example are described Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any One or more embodiments or example in combine in an appropriate manner.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that:Not These embodiments can be carried out with various changes, modification, replacement and modification in the case of the principle and objective that depart from the present invention, this The scope of invention is limited by claim and its equivalent.

Claims (8)

1. a kind of date storage method for having a Third Party Authentication based on block chain, it is characterised in that comprise the following steps:
S1:The requests of packets of data that data storage agent receive user sends, when the requests of packets of data includes first Between stamp, type of message, ID and data to be stored field and user digital signature that the field is done;
S2:The data storage agent is encapsulated into the second timestamp, type of message, the ID and the data to be stored In the respective field of certification request packet, digital signature is done to the field of the certification request packet, and will signature The certification request packet after process is sent to Third Party Authentication mechanism,
So that the Third Party Authentication mechanism verifies to the digital signature of the data storage agent, by institute after being verified Second timestamp, the ID during the 3rd certification authority is stated to the certification request packet, the number to be stored According to doing trusted signature, and the 3rd timestamp, type of message, the ID, the trusted signature are encapsulated into into the certification knot In the respective field of fruit packet, digital signature is done to the field of the authentication result packet, and after signature is processed The authentication result packet be sent to the data storage agent;
S3:The data storage agent is received after the authentication result packet, by the 4th timestamp, ID, described Data to be stored and the trusted signature are stored in block chain.
2. the date storage method for having a Third Party Authentication based on block chain according to claim 1, it is characterised in that Also include after step S3:
The update status of block chain described in the data storage agent periodic scanning, so as in the 4th timestamp, the use Storage is re-started during the storage failure of family ID, the data to be stored and the trusted signature.
3. the date storage method for having a Third Party Authentication based on block chain according to claim 1, it is characterised in that step Rapid S1 also includes:
The data storage agent is received after the requests of packets of data of the user, estimates the money needed for the service user Source category and stock number, and judged whether to receive the storage data to be stored according to local resource service condition;
After receiving the storage data to be stored, to the user feedback solicited message is received;Do not receive storage described to be stored After data, to the user feedback solicited message is refused.
4. the date storage method for having a Third Party Authentication based on block chain according to claim 1, it is characterised in that institute Stating ID is after the user is registered to the data storage agent, and the whole network distributed by the data storage agent is only One ID.
5. the date storage method for having a Third Party Authentication based on block chain according to claim 4, it is characterised in that Also include before step S1:
The data storage agent receives the registration request packet that the user sends, and the registration request packet includes the The field of five timestamps, type of message and MAC Address, and the digital signature that the user is done to the field;
The data storage agent verifies digital signature of the user to the registration request packet, and after being verified Distribute the whole network unique ID to the user.
6. the date storage method for having a Third Party Authentication based on block chain according to claim 5, it is characterised in that institute State ID to be spliced according to the random binary word string of presetting digit capacity and the MAC Address of the user.
7. the date storage method for having a Third Party Authentication based on block chain according to claim 5 or 6, its feature exists In also including before the data storage agent generates the certification request packet:
The data storage agent verifies digital signature of the user to the requests of packets of data, and after being verified Generate the certification request packet.
8. the date storage method for having a Third Party Authentication based on block chain according to claim 1, it is characterised in that The data storage agent is received also to be included after the authentication result packet:
The data storage agent verifies digital signature of the Third Party Authentication mechanism to the authentication result packet, so as to The data storage agent is by the 4th timestamp, the ID, data to be stored and described after being verified Trusted signature is stored in block chain.
CN201611119562.3A 2016-12-07 2016-12-07 A kind of date storage method for having Third Party Authentication based on block chain Active CN106650344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611119562.3A CN106650344B (en) 2016-12-07 2016-12-07 A kind of date storage method for having Third Party Authentication based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611119562.3A CN106650344B (en) 2016-12-07 2016-12-07 A kind of date storage method for having Third Party Authentication based on block chain

Publications (2)

Publication Number Publication Date
CN106650344A true CN106650344A (en) 2017-05-10
CN106650344B CN106650344B (en) 2019-05-31

Family

ID=58818749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611119562.3A Active CN106650344B (en) 2016-12-07 2016-12-07 A kind of date storage method for having Third Party Authentication based on block chain

Country Status (1)

Country Link
CN (1) CN106650344B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277108A (en) * 2017-05-18 2017-10-20 北京众享比特科技有限公司 Message treatment method, apparatus and system at a kind of node of block chain
CN107332826A (en) * 2017-06-09 2017-11-07 中国联合网络通信集团有限公司 The communication means and device of block chain agent node
CN107330694A (en) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 Copyright trading system and method for commerce based on block chain
CN107358551A (en) * 2017-07-03 2017-11-17 重庆小犀智能科技有限公司 Notarization system and method based on block chain
CN107566360A (en) * 2017-08-25 2018-01-09 北京中星仝创科技有限公司 A kind of generation method of data authentication code
CN108287661A (en) * 2017-12-05 2018-07-17 兴业数字金融服务(上海)股份有限公司 A kind of chain store system verified in central authority
CN108347429A (en) * 2017-12-29 2018-07-31 北京世纪互联宽带数据中心有限公司 A kind of information eyewitness system, method and device
CN108734018A (en) * 2018-05-21 2018-11-02 北京京东尚科信息技术有限公司 authentication method, device, system and computer readable storage medium
CN109002732A (en) * 2018-07-17 2018-12-14 深圳前海微众银行股份有限公司 Data deposit card method, apparatus and system and data evidence collecting method
CN109033841A (en) * 2018-07-12 2018-12-18 杨城 It is a kind of to write the weak center's trusted data storage system and management method for testing separation
CN109344631A (en) * 2018-09-18 2019-02-15 百度在线网络技术(北京)有限公司 The data modification and block verification method, device, equipment and medium of block chain
CN109359223A (en) * 2018-09-17 2019-02-19 重庆邮电大学 The block chain account book distributed storage technology realized based on correcting and eleting codes
CN109413014A (en) * 2018-02-13 2019-03-01 李茗 Digital content playback method, device and equipment based on block chain
CN109492351A (en) * 2018-11-23 2019-03-19 北京奇眸科技有限公司 Copy-right protection method, device and readable storage medium storing program for executing based on block chain
CN109558453A (en) * 2018-11-27 2019-04-02 深圳市链联科技有限公司 A kind of storage of block chain data networkization and move the method deposited
CN110110003A (en) * 2018-01-26 2019-08-09 广州中国科学院计算机网络信息中心 The data storage control method and device of M2M platform
CN110226317A (en) * 2018-01-03 2019-09-10 百度(美国)有限责任公司 Data authentication method, device and system
CN110264351A (en) * 2019-05-15 2019-09-20 阿里巴巴集团控股有限公司 Copyright distribution method and device based on block chain
US11093650B2 (en) 2019-05-15 2021-08-17 Advanced New Technologies Co., Ltd. Blockchain-based copyright distribution
CN114338795A (en) * 2021-12-23 2022-04-12 杭州趣链科技有限公司 Data communication method and device for block chain client
US11328080B2 (en) 2019-11-18 2022-05-10 Frostbyte, Llc Cryptographic key management

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721543A (en) * 2015-06-15 2016-06-29 清华大学深圳研究生院 Cross-protocol distribution-type cloud storage system based on operation control unit and data management method
CN105719172A (en) * 2016-01-19 2016-06-29 布比(北京)网络技术有限公司 Information issuing method and device
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721543A (en) * 2015-06-15 2016-06-29 清华大学深圳研究生院 Cross-protocol distribution-type cloud storage system based on operation control unit and data management method
CN105719172A (en) * 2016-01-19 2016-06-29 布比(北京)网络技术有限公司 Information issuing method and device
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277108A (en) * 2017-05-18 2017-10-20 北京众享比特科技有限公司 Message treatment method, apparatus and system at a kind of node of block chain
CN107277108B (en) * 2017-05-18 2020-09-08 北京众享比特科技有限公司 Method, device and system for processing messages at nodes of block chain
CN107332826A (en) * 2017-06-09 2017-11-07 中国联合网络通信集团有限公司 The communication means and device of block chain agent node
CN107332826B (en) * 2017-06-09 2019-12-03 中国联合网络通信集团有限公司 The communication means and device of block chain agent node
CN107358551A (en) * 2017-07-03 2017-11-17 重庆小犀智能科技有限公司 Notarization system and method based on block chain
CN107330694A (en) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 Copyright trading system and method for commerce based on block chain
CN107566360A (en) * 2017-08-25 2018-01-09 北京中星仝创科技有限公司 A kind of generation method of data authentication code
CN107566360B (en) * 2017-08-25 2019-11-26 北京中星仝创科技有限公司 A kind of generation method of data authentication code
CN108287661A (en) * 2017-12-05 2018-07-17 兴业数字金融服务(上海)股份有限公司 A kind of chain store system verified in central authority
CN108347429A (en) * 2017-12-29 2018-07-31 北京世纪互联宽带数据中心有限公司 A kind of information eyewitness system, method and device
CN110226317B (en) * 2018-01-03 2022-03-08 百度(美国)有限责任公司 Data authentication method, device and system
CN110226317A (en) * 2018-01-03 2019-09-10 百度(美国)有限责任公司 Data authentication method, device and system
CN110110003A (en) * 2018-01-26 2019-08-09 广州中国科学院计算机网络信息中心 The data storage control method and device of M2M platform
CN109413014A (en) * 2018-02-13 2019-03-01 李茗 Digital content playback method, device and equipment based on block chain
CN108734018B (en) * 2018-05-21 2021-03-30 北京京东尚科信息技术有限公司 Authentication method, device, system and computer readable storage medium
CN108734018A (en) * 2018-05-21 2018-11-02 北京京东尚科信息技术有限公司 authentication method, device, system and computer readable storage medium
CN109033841B (en) * 2018-07-12 2022-02-01 杨城 Write-check separated weakly centralized trusted data storage system and management method
CN109033841A (en) * 2018-07-12 2018-12-18 杨城 It is a kind of to write the weak center's trusted data storage system and management method for testing separation
CN109002732A (en) * 2018-07-17 2018-12-14 深圳前海微众银行股份有限公司 Data deposit card method, apparatus and system and data evidence collecting method
CN109002732B (en) * 2018-07-17 2022-04-26 深圳前海微众银行股份有限公司 Data evidence storage method, equipment and system and data evidence obtaining method
CN109359223A (en) * 2018-09-17 2019-02-19 重庆邮电大学 The block chain account book distributed storage technology realized based on correcting and eleting codes
CN109344631A (en) * 2018-09-18 2019-02-15 百度在线网络技术(北京)有限公司 The data modification and block verification method, device, equipment and medium of block chain
CN109344631B (en) * 2018-09-18 2020-11-06 百度在线网络技术(北京)有限公司 Data modification and block verification method, device, equipment and medium for block chain
CN109492351A (en) * 2018-11-23 2019-03-19 北京奇眸科技有限公司 Copy-right protection method, device and readable storage medium storing program for executing based on block chain
CN109558453B (en) * 2018-11-27 2021-01-26 深圳市链联科技有限公司 Block chain data network storage and relocation method
CN109558453A (en) * 2018-11-27 2019-04-02 深圳市链联科技有限公司 A kind of storage of block chain data networkization and move the method deposited
CN110264351B (en) * 2019-05-15 2020-11-17 创新先进技术有限公司 Copyright distribution method and device based on block chain
CN112651836A (en) * 2019-05-15 2021-04-13 创新先进技术有限公司 Copyright distribution method and device based on block chain
US11093650B2 (en) 2019-05-15 2021-08-17 Advanced New Technologies Co., Ltd. Blockchain-based copyright distribution
CN110264351A (en) * 2019-05-15 2019-09-20 阿里巴巴集团控股有限公司 Copyright distribution method and device based on block chain
US11328080B2 (en) 2019-11-18 2022-05-10 Frostbyte, Llc Cryptographic key management
CN114338795A (en) * 2021-12-23 2022-04-12 杭州趣链科技有限公司 Data communication method and device for block chain client

Also Published As

Publication number Publication date
CN106650344B (en) 2019-05-31

Similar Documents

Publication Publication Date Title
CN106650344A (en) Block chain-based data storage method with third-party authentication
CN112422532B (en) Service communication method, system and device and electronic equipment
US6499110B1 (en) Method and apparatus for facilitating information security policy control on a per security engine user basis
US8799981B2 (en) Privacy protection system
US8433898B2 (en) Trust information delivery scheme for certificate validation
US9461828B2 (en) Signature-efficient real time credentials for OCSP and distributed OCSP
US6192130B1 (en) Information security subscriber trust authority transfer system with private key history transfer
US8341715B2 (en) System and method for shared resource owner based access control
US20070150737A1 (en) Certificate registration after issuance for secure communication
US20130283056A1 (en) Providing security services on the cloud
JP2016509443A (en) Validation system and method providing additional security for input records with lower entropy
US20020078347A1 (en) Method and system for using with confidence certificates issued from certificate authorities
JP2007518369A (en) Efficiently signable real-time credentials for OCSP and distributed OCSP
GB2410658A (en) Cascaded delegation
CN1679066A (en) Network attached encryption
US8578170B2 (en) Bundle verification
CN111080299B (en) Anti-repudiation method for transaction information, client and server
CN112311779B (en) Data access control method and device applied to block chain system
KR20190079186A (en) Method for security communication in Network Functional Virtualization and System thereof
CN111563279A (en) Cloud data privacy protection system based on block chain
Huang et al. A survey of key management service in cloud
CN113612616A (en) Vehicle communication method and device based on block chain
CN106713256A (en) Method for authenticating software and hardware binding of computer special for tax control
Feng et al. One-stop efficient PKI authentication service model based on blockchain
CN116805078A (en) Logistics information platform data intelligent management system and method based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant