CN106650344A - Block chain-based data storage method with third-party authentication - Google Patents
Block chain-based data storage method with third-party authentication Download PDFInfo
- Publication number
- CN106650344A CN106650344A CN201611119562.3A CN201611119562A CN106650344A CN 106650344 A CN106650344 A CN 106650344A CN 201611119562 A CN201611119562 A CN 201611119562A CN 106650344 A CN106650344 A CN 106650344A
- Authority
- CN
- China
- Prior art keywords
- data
- data storage
- user
- storage agent
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013500 data storage Methods 0.000 title claims abstract description 99
- 238000000034 method Methods 0.000 title claims abstract description 32
- 239000011232 storage material Substances 0.000 claims abstract description 81
- 230000007246 mechanism Effects 0.000 claims abstract description 26
- 230000000737 periodic effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 235000013399 edible fruits Nutrition 0.000 claims 1
- 230000008901 benefit Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 241001074085 Scophthalmus aquosus Species 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000000205 computational method Methods 0.000 description 1
- 238000007596 consolidation process Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000013138 pruning Methods 0.000 description 1
- 241000894007 species Species 0.000 description 1
- 239000004575 stone Substances 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Power Engineering (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain-based data storage method with third-party authentication. The method comprises the steps that a data storage agent receives a service request data package sent by a user, wherein the data package contains a user ID and to-be-stored data; the data storage agent packages the user ID and the to-be-stored data in an authentication request data package, and sends the authentication request data package to a third-party authentication mechanism; the third-party authentication mechanism performs credible signing on the user ID and the to-be-stored data, and sends a credible signature to the data storage agent; and the data storage agent stores the user ID, the to-be-stored data and the credible signature of the third-party authentication mechanism in a block chain. The method has the following advantages: two entities including the data storage agent and the third-party authentication mechanism are introduced; the data storage agent performs representation and storage on the data by a unified data structure; and the third-party authentication mechanism performs credible signing on all the data, so that the credibility, efficiency, universality and portability of data storage are improved.
Description
Technical field
The present invention relates to filed of network information security, and in particular to a kind of data for having a Third Party Authentication based on block chain
Storage method.
Background technology
At present, some use-cases using block chain data storage, the such as copyright information of record musical works, record brill are had
Circulation information of stone etc..These use-cases generally using the data storage method of transaction driven, that is, initiate ideal money (such as than
Special coin) transaction, the data that need to be stored are embedded in transaction data structure, and be stored in a distributed way in block chain.
Said method, using block chain distributed nature improve data storage reliability, using block chain can not
Modification characteristic ensures that data are not tampered with.But, it is also apparent from the drawbacks of this method:(1) data storage in block chain
Each side with oneself specify data form data storage (such as copyright information), therefore each side be difficult to regard to stored data implication and
Validity is reached common understanding;Each side once because stored data content (such as copyright information) occur dispute, legal agency be also difficult to and
When the intervention and effective real meaning of identification stored data, and then carry out effective ruling;(2) data storage in block chain
Each side all needs to put into a large amount of computing powers and carries out the storage and retrieval of data;Block chain bifurcated, beta pruning are caused after transaction failure, are also needed
Repeat to issue transaction to ensure that data are successfully stored, waste a large amount of computing powers;(3) current block chain technology and immature, in peace
Entirely, efficiency aspect has larger room for improvement;If block chain upgrades, each side is required for the data-storage system to oneself
Make an amendment, workload is very big.
The content of the invention
Present invention seek to address that above-mentioned technical problem.
For this purpose, it is an object of the present invention to proposing a kind of data storage side for having a Third Party Authentication based on block chain
Method, solve existing block chain data storage method poor universality, participate in without authorities, the problems such as resource overhead is big, to improve
The credible and versatility of data storage, reduces the wasting of resources, with high universalizable, high reliability, high efficiency and high portable
The features such as property.
To achieve these goals, embodiment of the invention discloses that a kind of number for having a Third Party Authentication based on block chain
According to storage method, comprise the following steps:S1:The requests of packets of data that data storage agent receive user sends, the service
Request data package includes the field of very first time stamp, type of message, ID and data to be stored and the user to described
The digital signature that field is done;S2:The data storage agent is by the second timestamp, type of message, the ID and described treats
Data storage is encapsulated in the respective field of certification request packet, and to the field of the certification request packet numeral is done
Signature, and the certification request packet after signature is processed is sent to Third Party Authentication mechanism, so that the third party recognizes
Card mechanism verifies to the digital signature of the data storage agent, by the 3rd certification authority to described after being verified
Second timestamp, the ID in certification request packet, the data to be stored do trusted signature, and by the 3rd
Timestamp, type of message, the ID, the trusted signature are encapsulated in the respective field of the authentication result packet,
Digital signature is done to the field of the authentication result packet, and the authentication result packet after signature is processed is sent out
Give the data storage agent;S3:The data storage agent is received after the authentication result packet, by the 4th time
Stamp, the ID, the data to be stored and the trusted signature are stored in block chain.
In addition, the date storage method for having a Third Party Authentication based on block chain according to the above embodiment of the present invention, also
There can be following additional technical characteristic:
Further, also include after step s 3:The renewal of block chain described in the data storage agent periodic scanning
Situation, so as to the weight in the storage failure of the 4th timestamp, the ID, the data to be stored and the trusted signature
Newly stored.
Further, also included before step S1:The data storage agent receives the service request of the user
After packet, the resource category and stock number needed for the service user is estimated, and be according to the judgement of local resource service condition
It is no to receive the storage data to be stored;After receiving the storage data to be stored, to the user feedback solicited message is received;
After not receiving the storage data to be stored, to the user feedback solicited message is refused.
Further, the ID is after the user is registered to the data storage agent, by the data
The unique ID of the whole network of storage agent distribution.
Further, also included before step S1:The data storage agent receives the registration of user's transmission please
Packet, the registration request packet is asked to include the field of the 5th timestamp, type of message and MAC Address, and the use
The digital signature that family is done to the field;The data storage agent verifies the user to the registration request packet
Digital signature, and distribute the whole network unique ID to the user after being verified.
Further, the ID is spelled according to the random binary word string of presetting digit capacity and the MAC Address of the user
Connect and form.
Further, also included before the data storage agent generates the certification request packet:The data
Storage agent verifies digital signature of the user to the requests of packets of data, and the certification is generated after being verified
Request data package.
Further, also include after the data storage agent receives the authentication result packet:The data are deposited
Digital signature of the Third Party Authentication mechanism to the authentication result packet described in storage proxy authentication, so as to the institute after being verified
State data storage agent to be stored in the 4th timestamp, the ID, the data to be stored and the trusted signature
In block chain.
The date storage method for having a Third Party Authentication based on block chain of the embodiment of the present invention, introduces data storage agent
With two entities of Third Party Authentication mechanism, data storage agent is indicated to data and stored with unified data structure, protects
The uniformity in form of stored data in block chain and versatility are demonstrate,proved;Third Party Authentication mechanism can be the government department of authority
Or legal agency, by Third Party Authentication, improve information can for the data that data storage agent is stored in block chain
Letter property, once user's factor data occurs dispute, third party can in time intervene and carry out ruling;Data storage agent to user carries
For reliable data storage and search service so that user need not pay close attention to the storage of block chain, the details of retrieval, it is not necessary to process storage
Situations such as failure, block chain upgrade, can effectively reduce the consumption of computing power.
The additional aspect and advantage of the present invention will be set forth in part in the description, and partly will become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention will become from the description with reference to accompanying drawings below to embodiment
It is substantially and easy to understand, wherein:
Fig. 1 be the embodiment of the present invention based on block chain have Third Party Authentication date storage method flow chart;
Fig. 2 is the data structure schematic diagram of the registration request packet of the user of one embodiment of the invention;
Fig. 3 is the data structure schematic diagram of the registering result message of the data storage agent of one embodiment of the invention;
Fig. 4 is the data structure schematic diagram of the requests of packets of data of the user of one embodiment of the invention;
Fig. 5 is the data structure schematic diagram of the certification request packet of the data storage agent of one embodiment of the invention;
Fig. 6 is that the data structure of the authentication result packet of the Third Party Authentication mechanism of one embodiment of the invention is illustrated
Figure;
Fig. 7 be one embodiment of the invention based on block chain have Third Party Authentication date storage method system tray
Structure schematic diagram.
Specific embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finish
Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached
The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not considered as limiting the invention.
In describing the invention, it is to be understood that term " first ", " second " are only used for describing purpose, and can not
It is interpreted as indicating or implying relative importance.
With reference to explained below and accompanying drawing, it will be clear that these and other aspects of embodiments of the invention.In these descriptions
In accompanying drawing, specifically disclose some particular implementations in embodiments of the invention to represent the enforcement for implementing the present invention
Some modes of the principle of example, but it is to be understood that the scope of embodiments of the invention is not limited.Conversely, the present invention
Embodiment includes all changes, modification and the equivalent fallen in the range of the spirit and intension of attached claims.
Below in conjunction with the Description of Drawings present invention.
Fig. 1 be the embodiment of the present invention based on block chain have Third Party Authentication date storage method flow chart.Such as
Shown in Fig. 1, the date storage method for having a Third Party Authentication based on block chain of the embodiment of the present invention is comprised the following steps:
S1:The requests of packets of data that data storage agent receive user sends, when the requests of packets of data includes
Between the field such as stamp, ID, type of message, data to be stored, digital signature.
In one embodiment of the invention, user C_i will stab Timestamp1, type of message Serv_ the very first time
Req, ID _ ci, data S_i to be stored are inserted in requests of packets of data, and according to below equation to service data
Bag does digital signature, then the requests of packets of data after signature is sent to into data storage agent P.
Signature_1=Key_pri_ci (Hash (Timestamp1 | | Serv_Req | | ID_ci | | S_i))
Wherein, Signature_1 represents digital signature of the user C_i to requests of packets of data;Hash () is represented
The word string that field contents in bracket are spliced as hash algorithm input, the word string of the regular length of generation;Key_
Pri_ci () represents that the user C_i is encrypted using the private key of oneself to the word string that hash algorithm is exported.
In one embodiment of the invention, ID _ ci is that the user C_i is carried out to the data storage agent P
After registration, the unique ID of the whole network distributed by data storage agent P.In one embodiment of the invention, user C_i is to data
Storage agent P is registered and obtained the process of the ID _ ci to be included:
The registration request packet that data storage agent P receive users C_i send.The digital signature of registration request packet
It is fiveth time stamp T imestamp5, type of message Reg_Req, MAC ground of the user C_i in registration request packet
What location MAC_ci was generated.Wherein, the 5th time stamp T imestamp5 is system time when the user generated word is signed.
Specifically, digital signature is generated according to below equation:
Signature_5=Key_pri_ci (Hash (Timestamp5 | | Reg_Req | | MAC_ci)).
Wherein, Signature_5 represents digital signature of the user C_i to registration request packet;Hash () is represented and will included
The word string that field contents in number are spliced as hash algorithm input, the word string of the regular length of generation;Key_pri_
Ci () represents that user C_i is encrypted using the private key of oneself to the word string that hash algorithm is exported.
Data storage agent P is received after the registration request packet of user C_i transmissions, according to the public key solution of user C_i
Digital signature Signature_2 that is close and verifying user, and distribute the whole network unique ID rear line C_i is verified.
In one embodiment of the invention, random binary word strings and use of the data storage agent P according to presetting digit capacity
The MAC Address of family C_i is that user C_i distributes ID according to below equation:
ID_ci=(Random_80 | | MAC_ci)
Wherein, Random_80 is the random binary word string of 80, and P is by Random_80 and the MAC Address of user C_i
MAC_ci does splicing and generates ID_ci, used as the ID for distributing to user C_i.It should be noted that random two in the present embodiment
The length of system word string does not limit fixed length, and 80 of employing only illustrate as a kind of example, actually used
In can as needed do corresponding adjustment.
In one embodiment of the invention, user C_i obtain ID after, and also included before step S1 with
Lower step:
The requests of packets of data of data storage agent P receive users C_i.Assume the resource that data storage agent P possesses
Species is m kinds, and the numbering of every kind of resource is respectively R_x, and the total amount of every kind of resource is respectively R_x_total, wherein x=1 ...,
m;Assume that the number of users that now data storage agent is being serviced is n, ID is respectively C_y, wherein y=1 ..., n.
Data storage agent P estimates first the resource category and stock number needed for service user C_i, and according to local resource
Service condition judges whether to receive the service request that user C_i stores data to be stored;
Specifically, data storage agent P is estimated as the total amount of resource R_x used needed for service user C_i, computing formula
For:
Wherein, R_x_y represents the R_x stock numbers that data storage agent P is consumed for services client C_y, and E (R_x_i) is
The estimate of the R_x stock numbers that data storage agent P is used for needed for service user C_i.
Can data storage agent P calculates local resource meet user's C_i demands, and computational methods are:
F=F (1) ∩ F (2) ∩ ... ∩ F (m-1) ∩ F (m)
Wherein, R_x_res represents data storage agent P for the R_x stock numbers for ensureing normally to run and need to retain;F(x)
It is Boolean variable, if the available quantity of resource R_x meets user's C_i demands, F (x) is true, is otherwise false.F is Boolean variable, F
All of F (x) is true to be that very and if only if.If F is true, the available volume of resources for representing data storage agent P meets user's C_i need
Ask, therefore data storage agent P receives the service request that user C_i stores data to be stored, and please to user C_i feedback receptions
Seek information;Otherwise refuse the service request that user C_i stores data to be stored, to user C_i feedback refusal solicited messages.
S2:Second timestamp, type of message, ID and data to be stored are encapsulated into certification request by data storage agent
In the respective field of packet, digital signature, and the certification request after signature is processed are done to above-mentioned field using own private key
Packet is sent to Third Party Authentication mechanism;Third Party Authentication mechanism is carried out using the public key of data storage agent to digital signature
Decryption and checking, are used own private key to the timestamp in certification request packet, are used after being verified by the 3rd certification authority
Family ID, data to be stored do trusted signature, and timestamp, type of message, ID, trusted signature are encapsulated into into authentication result number
In respective field according to bag, digital signature, and the authentication result number after signature is processed are done to above-mentioned field using own private key
Data storage agent is sent to according to bag.
Specifically, data storage agent P using user C_i public key decryptions and verify user C_i to service data
The digital signature of bag, and after being verified by the second time stamp T imestamp2, type of message Auth_Req, ID _ ci,
In the embedded certification request packet of data S_i to be stored that user submits to, and certification request packet is entered according to below equation
Row digital signature
Signature_2=Key_pri_p (Hash (Timestamp2 | | Auth_Req | | ID_ci | | S_i))
Wherein, Signature_2 is digital signature of the data storage agent P to certification request packet;Hash () is represented
The word string that field contents in bracket are spliced as hash algorithm input, the word string of the regular length of generation;Key_
Pri_p () represents that data storage agent P is encrypted using the private key of oneself to the word string that hash algorithm is exported.
Third Party Authentication mechanism A is received after certification request packet, first by the public key decryptions of data storage agent P
And verify digital signature Signature_2.If being verified, into following steps:
Second time stamp Ts imestamp2 of the Third Party Authentication mechanism A in certification request packet, ID _ ci,
Data S_i to be stored carry out trusted signature Signature_Auth
Signature_Auth=Key_pri_a (Hash (Timestamp2 | | ID_ci | | S_i))
Wherein, the trusted signature that Signature_Auth is done by Third Party Authentication mechanism A;Hash () is represented in bracket
The word string that is spliced of field contents as hash algorithm input, the word string of the regular length of generation;Key_pri_a()
Represent that Third Party Authentication mechanism A is encrypted using the private key of oneself to the word string that hash algorithm is exported.
Third Party Authentication mechanism A according to by the 3rd time stamp T imestamp3, type of message Auth_Res, ID _ ci,
Trusted signature Signature_Auth is encapsulated in authentication result packet, and makees digital label to above-mentioned field using own private key
Name Signature_3, is sent to data storage agent P:
Signature_3=Key_pri_a (Hash (Timestamp3 | | Auth_Res | | ID_ci | | Signature_
Auth))。
Wherein, the digital signature that Signature_3 is done by third party A for authentication result packet;Hash () is represented will
The word string that field contents in bracket are spliced as hash algorithm input, the word string of the regular length of generation;Key_
Pri_a () represents that Third Party Authentication mechanism A is encrypted using the private key of oneself to the word string that hash algorithm is exported.
S3:Data storage agent is received after authentication result packet, first by the public key decryptions of third-party agent mechanism A
And verify digital signature.If being verified, the 4th timestamp, ID, data to be stored and trusted signature are stored in into area
In block chain.
In one embodiment of the invention, data storage agent P using third party A public key decryptions and verify third party
Digital signature Signature_4 of the A to authentication result packet, calls the communication interface of block chain if being verified, by
Four time stamp Ts imestamp4, ID _ ci, data S_i to be stored and third party's trusted signature Signature_Auth storage
In block chain.
In one embodiment of the invention, also include after step S3:
The update status of data storage agent P periodic scanning block chains, so as in Timestamp4, ID_ci, S_i and
Storage is re-started during Signature_Auth storage failures.
To make it is further understood that the present invention, will be described in detail by following examples.
When Fig. 2 represents that user C_i applies for the registration of, the message knot of the registration request packet sent to data storage agent P
Structure.Wherein, time stamp T imestamp field 128, type of message MsgType fields 64, MAC Address MAC fields 64,
Digital signature Signature field 1024.Time stamp T imestamp field is by filling in Unix system timestamp and in a high position
Fill out 0 to be extended for 128;MAC fields are filled out 0 and are extended for 64 on the basis of the bit mac address of main frame 48 in a high position;Signature
Signature fields are the digital signature done to Timestamp, MsgType, MAC, Signature field.Hereinafter each number
According to time stamp T imestamp field, user's id field, the regulation of digital signature Signature field of bag with registration request number
According to bag.
Fig. 3 represents the message structure of the registering result packet that data storage agent P is returned to user C_i.Wherein, the time
Stamp Timestamp fields 128, type of message MsgType fields 64, user's id field 128, digital signature
Signature fields 1024.
Fig. 4 represents the message structure of the requests of packets of data that user C_i sends to data storage agent P.Wherein, the time
Stamp Timestamp fields 128, type of message MsgType fields 64, user's id field 128, digital signature
Signature fields 1024.Data Data field length to be stored is variable, no longer than 3776.
Fig. 5 represents the message structure of the certification request packet that data storage agent P sends to third party A.Should be noted
Be, although this message structure is identical with the structure of Fig. 4 message structures, but each field is rewritten by P, and non-immediate turn
The message that hair family C_i is sent.
Fig. 6 represents the message structure of the authentication result packet that Third Party Authentication mechanism A sends to data storage agent P.
Time stamp T imestamp field 128, type of message MsgType fields 64, user's id field 128, the trusted signature of A
Signature_Auth fields 1024, digital signature Signature fields 1024 of the A to notebook data bag.
Fig. 7 represents the system architecture being made up of entities such as user, data storage agent, third parties.It is pointed out that area
Block chain is not the part of the present invention, draws on block chain here for explanation inter-entity correlation.
Though the present invention is stored data in block chain, particular type not to block chain, existing way, data storage
Mode and communication interface etc. do especially hypothesis.Data storage agent provides unified communication interface, downward basis to user upwards
Block chain concrete condition realizes storage and search function.System architecture proposed by the present invention can be realized based on any block chain,
And it is functional to efficiently accomplish institute.Third Party Authentication mechanism for acknowledged authority government monitoring agencies or authoritative legal agency,
Data can be authenticated according to privacy policy and user's request, show the data that third party authorised user is stored.
The date storage method for having a Third Party Authentication based on block chain of the embodiment of the present invention, introduces data storage generation
Reason and two entities of Third Party Authentication structure, data storage agent provides the user reliable data storage service, makes user not
Storage details must be again paid close attention to, computing power is saved, network operating efficiency is improve;All data are stored with consolidation form, and Jing
Having crossed the data stored in the certification of Third Party Authentication mechanism, therefore block chain can obtain the accreditation of each side.The present invention is solved
It is the drawbacks of current utilization block chain data storage method, right with high universalizable, high reliability, high efficiency, high portable
Save computing power, lifting network operating efficiency also significant.
In addition, the embodiment of the present invention based on block chain have Third Party Authentication date storage method other constitute with
And effect is all for a person skilled in the art known, in order to reduce redundancy, is not repeated.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means to combine specific features, structure, material or spy that the embodiment or example are described
Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any
One or more embodiments or example in combine in an appropriate manner.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that:Not
These embodiments can be carried out with various changes, modification, replacement and modification in the case of the principle and objective that depart from the present invention, this
The scope of invention is limited by claim and its equivalent.
Claims (8)
1. a kind of date storage method for having a Third Party Authentication based on block chain, it is characterised in that comprise the following steps:
S1:The requests of packets of data that data storage agent receive user sends, when the requests of packets of data includes first
Between stamp, type of message, ID and data to be stored field and user digital signature that the field is done;
S2:The data storage agent is encapsulated into the second timestamp, type of message, the ID and the data to be stored
In the respective field of certification request packet, digital signature is done to the field of the certification request packet, and will signature
The certification request packet after process is sent to Third Party Authentication mechanism,
So that the Third Party Authentication mechanism verifies to the digital signature of the data storage agent, by institute after being verified
Second timestamp, the ID during the 3rd certification authority is stated to the certification request packet, the number to be stored
According to doing trusted signature, and the 3rd timestamp, type of message, the ID, the trusted signature are encapsulated into into the certification knot
In the respective field of fruit packet, digital signature is done to the field of the authentication result packet, and after signature is processed
The authentication result packet be sent to the data storage agent;
S3:The data storage agent is received after the authentication result packet, by the 4th timestamp, ID, described
Data to be stored and the trusted signature are stored in block chain.
2. the date storage method for having a Third Party Authentication based on block chain according to claim 1, it is characterised in that
Also include after step S3:
The update status of block chain described in the data storage agent periodic scanning, so as in the 4th timestamp, the use
Storage is re-started during the storage failure of family ID, the data to be stored and the trusted signature.
3. the date storage method for having a Third Party Authentication based on block chain according to claim 1, it is characterised in that step
Rapid S1 also includes:
The data storage agent is received after the requests of packets of data of the user, estimates the money needed for the service user
Source category and stock number, and judged whether to receive the storage data to be stored according to local resource service condition;
After receiving the storage data to be stored, to the user feedback solicited message is received;Do not receive storage described to be stored
After data, to the user feedback solicited message is refused.
4. the date storage method for having a Third Party Authentication based on block chain according to claim 1, it is characterised in that institute
Stating ID is after the user is registered to the data storage agent, and the whole network distributed by the data storage agent is only
One ID.
5. the date storage method for having a Third Party Authentication based on block chain according to claim 4, it is characterised in that
Also include before step S1:
The data storage agent receives the registration request packet that the user sends, and the registration request packet includes the
The field of five timestamps, type of message and MAC Address, and the digital signature that the user is done to the field;
The data storage agent verifies digital signature of the user to the registration request packet, and after being verified
Distribute the whole network unique ID to the user.
6. the date storage method for having a Third Party Authentication based on block chain according to claim 5, it is characterised in that institute
State ID to be spliced according to the random binary word string of presetting digit capacity and the MAC Address of the user.
7. the date storage method for having a Third Party Authentication based on block chain according to claim 5 or 6, its feature exists
In also including before the data storage agent generates the certification request packet:
The data storage agent verifies digital signature of the user to the requests of packets of data, and after being verified
Generate the certification request packet.
8. the date storage method for having a Third Party Authentication based on block chain according to claim 1, it is characterised in that
The data storage agent is received also to be included after the authentication result packet:
The data storage agent verifies digital signature of the Third Party Authentication mechanism to the authentication result packet, so as to
The data storage agent is by the 4th timestamp, the ID, data to be stored and described after being verified
Trusted signature is stored in block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611119562.3A CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611119562.3A CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106650344A true CN106650344A (en) | 2017-05-10 |
CN106650344B CN106650344B (en) | 2019-05-31 |
Family
ID=58818749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611119562.3A Active CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106650344B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107277108A (en) * | 2017-05-18 | 2017-10-20 | 北京众享比特科技有限公司 | Message treatment method, apparatus and system at a kind of node of block chain |
CN107332826A (en) * | 2017-06-09 | 2017-11-07 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107330694A (en) * | 2017-07-03 | 2017-11-07 | 重庆小犀智能科技有限公司 | Copyright trading system and method for commerce based on block chain |
CN107358551A (en) * | 2017-07-03 | 2017-11-17 | 重庆小犀智能科技有限公司 | Notarization system and method based on block chain |
CN107566360A (en) * | 2017-08-25 | 2018-01-09 | 北京中星仝创科技有限公司 | A kind of generation method of data authentication code |
CN108287661A (en) * | 2017-12-05 | 2018-07-17 | 兴业数字金融服务(上海)股份有限公司 | A kind of chain store system verified in central authority |
CN108347429A (en) * | 2017-12-29 | 2018-07-31 | 北京世纪互联宽带数据中心有限公司 | A kind of information eyewitness system, method and device |
CN108734018A (en) * | 2018-05-21 | 2018-11-02 | 北京京东尚科信息技术有限公司 | authentication method, device, system and computer readable storage medium |
CN109002732A (en) * | 2018-07-17 | 2018-12-14 | 深圳前海微众银行股份有限公司 | Data deposit card method, apparatus and system and data evidence collecting method |
CN109033841A (en) * | 2018-07-12 | 2018-12-18 | 杨城 | It is a kind of to write the weak center's trusted data storage system and management method for testing separation |
CN109344631A (en) * | 2018-09-18 | 2019-02-15 | 百度在线网络技术(北京)有限公司 | The data modification and block verification method, device, equipment and medium of block chain |
CN109359223A (en) * | 2018-09-17 | 2019-02-19 | 重庆邮电大学 | The block chain account book distributed storage technology realized based on correcting and eleting codes |
CN109413014A (en) * | 2018-02-13 | 2019-03-01 | 李茗 | Digital content playback method, device and equipment based on block chain |
CN109492351A (en) * | 2018-11-23 | 2019-03-19 | 北京奇眸科技有限公司 | Copy-right protection method, device and readable storage medium storing program for executing based on block chain |
CN109558453A (en) * | 2018-11-27 | 2019-04-02 | 深圳市链联科技有限公司 | A kind of storage of block chain data networkization and move the method deposited |
CN110110003A (en) * | 2018-01-26 | 2019-08-09 | 广州中国科学院计算机网络信息中心 | The data storage control method and device of M2M platform |
CN110226317A (en) * | 2018-01-03 | 2019-09-10 | 百度(美国)有限责任公司 | Data authentication method, device and system |
CN110264351A (en) * | 2019-05-15 | 2019-09-20 | 阿里巴巴集团控股有限公司 | Copyright distribution method and device based on block chain |
US11093650B2 (en) | 2019-05-15 | 2021-08-17 | Advanced New Technologies Co., Ltd. | Blockchain-based copyright distribution |
CN114338795A (en) * | 2021-12-23 | 2022-04-12 | 杭州趣链科技有限公司 | Data communication method and device for block chain client |
US11328080B2 (en) | 2019-11-18 | 2022-05-10 | Frostbyte, Llc | Cryptographic key management |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721543A (en) * | 2015-06-15 | 2016-06-29 | 清华大学深圳研究生院 | Cross-protocol distribution-type cloud storage system based on operation control unit and data management method |
CN105719172A (en) * | 2016-01-19 | 2016-06-29 | 布比(北京)网络技术有限公司 | Information issuing method and device |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
-
2016
- 2016-12-07 CN CN201611119562.3A patent/CN106650344B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721543A (en) * | 2015-06-15 | 2016-06-29 | 清华大学深圳研究生院 | Cross-protocol distribution-type cloud storage system based on operation control unit and data management method |
CN105719172A (en) * | 2016-01-19 | 2016-06-29 | 布比(北京)网络技术有限公司 | Information issuing method and device |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107277108A (en) * | 2017-05-18 | 2017-10-20 | 北京众享比特科技有限公司 | Message treatment method, apparatus and system at a kind of node of block chain |
CN107277108B (en) * | 2017-05-18 | 2020-09-08 | 北京众享比特科技有限公司 | Method, device and system for processing messages at nodes of block chain |
CN107332826A (en) * | 2017-06-09 | 2017-11-07 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107332826B (en) * | 2017-06-09 | 2019-12-03 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107358551A (en) * | 2017-07-03 | 2017-11-17 | 重庆小犀智能科技有限公司 | Notarization system and method based on block chain |
CN107330694A (en) * | 2017-07-03 | 2017-11-07 | 重庆小犀智能科技有限公司 | Copyright trading system and method for commerce based on block chain |
CN107566360A (en) * | 2017-08-25 | 2018-01-09 | 北京中星仝创科技有限公司 | A kind of generation method of data authentication code |
CN107566360B (en) * | 2017-08-25 | 2019-11-26 | 北京中星仝创科技有限公司 | A kind of generation method of data authentication code |
CN108287661A (en) * | 2017-12-05 | 2018-07-17 | 兴业数字金融服务(上海)股份有限公司 | A kind of chain store system verified in central authority |
CN108347429A (en) * | 2017-12-29 | 2018-07-31 | 北京世纪互联宽带数据中心有限公司 | A kind of information eyewitness system, method and device |
CN110226317B (en) * | 2018-01-03 | 2022-03-08 | 百度(美国)有限责任公司 | Data authentication method, device and system |
CN110226317A (en) * | 2018-01-03 | 2019-09-10 | 百度(美国)有限责任公司 | Data authentication method, device and system |
CN110110003A (en) * | 2018-01-26 | 2019-08-09 | 广州中国科学院计算机网络信息中心 | The data storage control method and device of M2M platform |
CN109413014A (en) * | 2018-02-13 | 2019-03-01 | 李茗 | Digital content playback method, device and equipment based on block chain |
CN108734018B (en) * | 2018-05-21 | 2021-03-30 | 北京京东尚科信息技术有限公司 | Authentication method, device, system and computer readable storage medium |
CN108734018A (en) * | 2018-05-21 | 2018-11-02 | 北京京东尚科信息技术有限公司 | authentication method, device, system and computer readable storage medium |
CN109033841B (en) * | 2018-07-12 | 2022-02-01 | 杨城 | Write-check separated weakly centralized trusted data storage system and management method |
CN109033841A (en) * | 2018-07-12 | 2018-12-18 | 杨城 | It is a kind of to write the weak center's trusted data storage system and management method for testing separation |
CN109002732A (en) * | 2018-07-17 | 2018-12-14 | 深圳前海微众银行股份有限公司 | Data deposit card method, apparatus and system and data evidence collecting method |
CN109002732B (en) * | 2018-07-17 | 2022-04-26 | 深圳前海微众银行股份有限公司 | Data evidence storage method, equipment and system and data evidence obtaining method |
CN109359223A (en) * | 2018-09-17 | 2019-02-19 | 重庆邮电大学 | The block chain account book distributed storage technology realized based on correcting and eleting codes |
CN109344631A (en) * | 2018-09-18 | 2019-02-15 | 百度在线网络技术(北京)有限公司 | The data modification and block verification method, device, equipment and medium of block chain |
CN109344631B (en) * | 2018-09-18 | 2020-11-06 | 百度在线网络技术(北京)有限公司 | Data modification and block verification method, device, equipment and medium for block chain |
CN109492351A (en) * | 2018-11-23 | 2019-03-19 | 北京奇眸科技有限公司 | Copy-right protection method, device and readable storage medium storing program for executing based on block chain |
CN109558453B (en) * | 2018-11-27 | 2021-01-26 | 深圳市链联科技有限公司 | Block chain data network storage and relocation method |
CN109558453A (en) * | 2018-11-27 | 2019-04-02 | 深圳市链联科技有限公司 | A kind of storage of block chain data networkization and move the method deposited |
CN110264351B (en) * | 2019-05-15 | 2020-11-17 | 创新先进技术有限公司 | Copyright distribution method and device based on block chain |
CN112651836A (en) * | 2019-05-15 | 2021-04-13 | 创新先进技术有限公司 | Copyright distribution method and device based on block chain |
US11093650B2 (en) | 2019-05-15 | 2021-08-17 | Advanced New Technologies Co., Ltd. | Blockchain-based copyright distribution |
CN110264351A (en) * | 2019-05-15 | 2019-09-20 | 阿里巴巴集团控股有限公司 | Copyright distribution method and device based on block chain |
US11328080B2 (en) | 2019-11-18 | 2022-05-10 | Frostbyte, Llc | Cryptographic key management |
CN114338795A (en) * | 2021-12-23 | 2022-04-12 | 杭州趣链科技有限公司 | Data communication method and device for block chain client |
Also Published As
Publication number | Publication date |
---|---|
CN106650344B (en) | 2019-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106650344A (en) | Block chain-based data storage method with third-party authentication | |
CN112422532B (en) | Service communication method, system and device and electronic equipment | |
US6499110B1 (en) | Method and apparatus for facilitating information security policy control on a per security engine user basis | |
US8799981B2 (en) | Privacy protection system | |
US8433898B2 (en) | Trust information delivery scheme for certificate validation | |
US9461828B2 (en) | Signature-efficient real time credentials for OCSP and distributed OCSP | |
US6192130B1 (en) | Information security subscriber trust authority transfer system with private key history transfer | |
US8341715B2 (en) | System and method for shared resource owner based access control | |
US20070150737A1 (en) | Certificate registration after issuance for secure communication | |
US20130283056A1 (en) | Providing security services on the cloud | |
JP2016509443A (en) | Validation system and method providing additional security for input records with lower entropy | |
US20020078347A1 (en) | Method and system for using with confidence certificates issued from certificate authorities | |
JP2007518369A (en) | Efficiently signable real-time credentials for OCSP and distributed OCSP | |
GB2410658A (en) | Cascaded delegation | |
CN1679066A (en) | Network attached encryption | |
US8578170B2 (en) | Bundle verification | |
CN111080299B (en) | Anti-repudiation method for transaction information, client and server | |
CN112311779B (en) | Data access control method and device applied to block chain system | |
KR20190079186A (en) | Method for security communication in Network Functional Virtualization and System thereof | |
CN111563279A (en) | Cloud data privacy protection system based on block chain | |
Huang et al. | A survey of key management service in cloud | |
CN113612616A (en) | Vehicle communication method and device based on block chain | |
CN106713256A (en) | Method for authenticating software and hardware binding of computer special for tax control | |
Feng et al. | One-stop efficient PKI authentication service model based on blockchain | |
CN116805078A (en) | Logistics information platform data intelligent management system and method based on big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |