CN106650344B - A kind of date storage method for having Third Party Authentication based on block chain - Google Patents
A kind of date storage method for having Third Party Authentication based on block chain Download PDFInfo
- Publication number
- CN106650344B CN106650344B CN201611119562.3A CN201611119562A CN106650344B CN 106650344 B CN106650344 B CN 106650344B CN 201611119562 A CN201611119562 A CN 201611119562A CN 106650344 B CN106650344 B CN 106650344B
- Authority
- CN
- China
- Prior art keywords
- data
- user
- storage agent
- data storage
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003860 storage Methods 0.000 title claims abstract description 36
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000013500 data storage Methods 0.000 claims abstract description 88
- 239000011232 storage material Substances 0.000 claims abstract description 81
- 230000007246 mechanism Effects 0.000 claims abstract description 27
- 230000000737 periodic effect Effects 0.000 claims description 3
- 230000008901 benefit Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000033228 biological regulation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000013138 pruning Methods 0.000 description 1
- 239000004575 stone Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Abstract
The invention discloses a kind of date storage methods for having Third Party Authentication based on block chain, comprising: data storage agent receives the requests of packets of data that user sends, and includes User ID and data to be stored in data packet;User ID and data to be stored etc. are encapsulated into certification request data packet by data storage agent, and certification request data packet is sent to Third Party Authentication mechanism;Trusted signature does to User ID and data to be stored etc. in Third Party Authentication mechanism, and trusted signature is sent to data storage agent;User ID, data to be stored and trusted signature of Third Party Authentication mechanism etc. are stored in block chain by data storage agent.The present invention has the advantage that introducing two entities of data storage agent and Third Party Authentication mechanism, data storage agent is indicated and is stored to data with unified data structure, Third Party Authentication mechanism carries out trusted signature to all data, improves credibility, high efficiency, versatility and the portability of data storage.
Description
Technical field
The present invention relates to filed of network information security, and in particular to a kind of data for having Third Party Authentication based on block chain
Storage method.
Background technique
Currently, having some use-cases using block chain storing data, the copyright information of musical works is such as recorded, record bores
The circulation information etc. of stone.These use-cases generally use the data storage method of transaction driven, that is, initiate ideal money (such as than
Special coin) transaction, the data that need to be stored are embedded in transaction data structure, and is stored in block chain in a distributed way.
The above method, using block chain distributed nature improve data storage reliability, using block chain can not
Modification characteristic guarantees that data are not tampered.But the drawbacks of this method, is also apparent from: (one) storing data in block chain
Each side with data format storing data (such as copyright information) as defined in oneself, therefore each side be difficult to regard to stored data meaning and
Validity is reached common understanding;Each side once because stored data content (such as copyright information) occur dispute, legal agency be also difficult to and
When intervene and effectively identify the real meaning of stored data, and then the effective ruling of progress;(2) storing data in block chain
Each side all needs to put into a large amount of storages and retrieval for calculating power and carrying out data;After block chain bifurcated, beta pruning cause transaction to fail, also need
Publication transaction is repeated to guarantee that data successfully store, wastes and largely calculates power;(3) block chain technology and immature at present, is pacifying
Entirely, there is biggish room for improvement in terms of efficiency;If block chain upgrades, each side requires the data-storage system to oneself
It makes an amendment, workload is very big.
Summary of the invention
Present invention seek to address that above-mentioned technical problem.
For this purpose, an object of the present invention is to provide a kind of data storage side for having Third Party Authentication based on block chain
Method solves the method poor universality of existing block chain storing data, without the problems such as authorities participate in, resource overhead is big, to improve
The credibility and versatility of data storage, reduce the wasting of resources, have high universalizable, high reliability, high efficiency and high portable
The features such as property.
To achieve the goals above, embodiment of the invention discloses a kind of numbers for having Third Party Authentication based on block chain
According to storage method, comprising the following steps: S1: data storage agent receives the requests of packets of data that user sends, the service
Request data package include at the first time stamp, type of message, the field of User ID and data to be stored and the user to described
The digital signature that field is done;S2: the data storage agent by the second timestamp, type of message, the User ID and it is described to
Storing data is encapsulated into the respective field of certification request data packet, does number to the field of the certification request data packet
Signature, and will signature treated that the certification request data packet is sent to Third Party Authentication mechanism, so that the third party recognizes
Card mechanism verifies the digital signature of the data storage agent, by the third certification authority to described after being verified
Second timestamp in certification request data packet, the User ID, the data to be stored do trusted signature, and by third
Timestamp, type of message, the User ID, the trusted signature are encapsulated into the respective field of the authentication result data packet,
Digital signature done to the field of the authentication result data packet, and will signature treated the authentication result data packet hair
Give the data storage agent;S3: after the data storage agent receives the authentication result data packet, by the 4th time
Stamp, the User ID, the data to be stored and the trusted signature are stored in block chain.
In addition, the date storage method according to the above embodiment of the present invention that have Third Party Authentication based on block chain, also
It can have following additional technical characteristic:
Further, after step s 3 further include: the update of block chain described in the data storage agent periodic scanning
Situation, so as to the weight when the 4th timestamp, the User ID, the data to be stored and the trusted signature store failure
Newly stored.
Further, before step S1 further include: the data storage agent receives the service request of the user
After data packet, resource category and stock number needed for estimation services the user, and be according to the judgement of local resource service condition
No receiving stores the data to be stored;Receive after storing the data to be stored, Xiang Suoshu user feedback receives solicited message;
Do not receive after storing the data to be stored, solicited message is refused in Xiang Suoshu user feedback.
Further, the User ID is after the user registers to the data storage agent, by the data
The unique ID of the whole network of storage agent distribution.
Further, before step S1 further include: the data storage agent receives the registration that the user sends and asks
Data packet is sought, the registration request data packet includes the field and the use of the 5th timestamp, type of message and MAC Address
The digital signature that the field is done at family;The data storage agent verifies the user to the registration request data packet
Digital signature, and distribute the whole network unique ID to the user after being verified.
Further, the User ID is spelled according to the random binary word string of presetting digit capacity and the MAC Address of the user
It connects.
Further, before the data storage agent generates the certification request data packet further include: the data
Storage agent verifies the user to the digital signature of the requests of packets of data, and the certification is generated after being verified
Request data package.
Further, after the data storage agent receives the authentication result data packet further include: the data are deposited
Third Party Authentication mechanism described in proxy authentication is stored up to the digital signature of the authentication result data packet, so as to the institute after being verified
Data storage agent is stated to be stored in the 4th timestamp, the User ID, the data to be stored and the trusted signature
In block chain.
The date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention introduces data storage agent
With two entities of Third Party Authentication mechanism, data storage agent is indicated and is stored to data with unified data structure, is protected
The consistency and versatility of stored data in form in block chain are demonstrate,proved;Third Party Authentication mechanism can be the government department of authority
Or legal agency, the data that data storage agent stores in block chain pass through Third Party Authentication, improve information can
Letter property, once because dispute occurs for data, third party can intervene in time and carry out ruling user;Data storage agent is mentioned to user
For reliable data storage and search service, so that user need not pay close attention to the details of the storage of block chain, retrieval, it is not necessary to processing storage
Situations such as failure, the upgrading of block chain, it can effectively reduce the consumption for calculating power.
Additional aspect and advantage of the invention will be set forth in part in the description, and will partially become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures
Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart of the date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention;
Fig. 2 is the data structure schematic diagram of the registration request data packet of the user of one embodiment of the invention;
Fig. 3 is the data structure schematic diagram of the registering result message of the data storage agent of one embodiment of the invention;
Fig. 4 is the data structure schematic diagram of the requests of packets of data of the user of one embodiment of the invention;
Fig. 5 is the data structure schematic diagram of the certification request data packet of the data storage agent of one embodiment of the invention;
Fig. 6 is the data structure signal of the authentication result data packet of the Third Party Authentication mechanism of one embodiment of the invention
Figure;
Fig. 7 is the system tray of the date storage method for having Third Party Authentication based on block chain of one embodiment of the invention
Structure schematic diagram.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not considered as limiting the invention.
In the description of the present invention, it is to be understood that, term " first ", " second " are used for description purposes only, and cannot
It is interpreted as indication or suggestion relative importance.
Referring to following description and drawings, it will be clear that these and other aspects of the embodiment of the present invention.In these descriptions
In attached drawing, some particular implementations in the embodiment of the present invention are specifically disclosed, to indicate to implement implementation of the invention
Some modes of the principle of example, but it is to be understood that the scope of embodiments of the invention is not limited.On the contrary, of the invention
Embodiment includes all changes, modification and the equivalent fallen within the scope of the spirit and intension of attached claims.
The present invention is described below in conjunction with attached drawing.
Fig. 1 is the flow chart of the date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention.Such as
Shown in Fig. 1, the date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention, comprising the following steps:
S1: data storage agent receives the requests of packets of data that user sends, when the requests of packets of data includes
Between the fields such as stamp, User ID, type of message, data to be stored, digital signature.
In one embodiment of the invention, first time is stabbed Timestamp1, type of message Serv_ by user C_i
Req, User ID _ ci, data to be stored S_i are inserted in requests of packets of data, and according to following formula to service data
Packet does digital signature, and the requests of packets of data after signature is then sent to data storage agent P.
Signature_1=Key_pri_ci (Hash (Timestamp1 | | Serv_Req | | ID_ci | | S_i))
Wherein, Signature_1 indicates the user C_i to the digital signature of requests of packets of data;Hash () is indicated
Input of the word string that field contents in bracket are spliced as hash algorithm, the word string of the regular length of generation;Key_
Pri_ci () indicates that the user C_i is encrypted using the word string that the private key of oneself exports hash algorithm.
In one embodiment of the invention, User ID _ ci is that the user C_i is carried out to the data storage agent P
After registration, the unique ID of the whole network that is distributed by data storage agent P.In one embodiment of the invention, user C_i is to data
The process that storage agent P was registered and obtained the User ID _ ci includes:
Data storage agent P receives the registration request data packet that user C_i is sent.The digital signature of registration request data packet
It is the user C_i according to the 5th time stamp T imestamp5, type of message Reg_Req, MAC in registration request data packet
What location MAC_ci was generated.Wherein, the 5th time stamp T imestamp5 is system time when the user generated word is signed.
Specifically, digital signature is generated according to following formula:
Signature_5=Key_pri_ci (Hash (Timestamp5 | | Reg_Req | | MAC_ci)).
Wherein, Signature_5 indicates user C_i to the digital signature of registration request data packet;Hash () expression will include
Input of the word string that field contents in number are spliced as hash algorithm, the word string of the regular length of generation;Key_pri_
Ci () indicates that user C_i is encrypted using the word string that the private key of oneself exports hash algorithm.
After data storage agent P receives the registration request data packet of user C_i transmission, according to the public key solution of user C_i
Digital signature Signature_2 that is close and verifying user, and distribute the whole network unique ID being verified rear line C_i.
In one embodiment of the invention, data storage agent P is according to the random binary word string and use of presetting digit capacity
The MAC Address of family C_i is that user C_i distributes ID according to following formula:
ID_ci=(Random_80 | | MAC_ci)
Wherein, Random_80 is 80 random binary word strings, and P is by the MAC Address of Random_80 and user C_i
MAC_ci does splicing and generates ID_ci, as the User ID for distributing to user C_i.It should be noted that random two in the present embodiment
The length of system word string does not limit fixed length, and 80 of use are only illustrated as an example, are actually using
In can according to need and do corresponding adjustment.
In one embodiment of the invention, after user C_i obtains User ID, and before step S1 further include with
Lower step:
The requests of packets of data of data storage agent P reception user C_i.Assuming that the resource that data storage agent P has
Type is m kind, and the number of every kind of resource is respectively R_x, and the total amount of every kind of resource is respectively R_x_total, wherein x=1 ...,
m;Assuming that data storage agent number of users being served is n at this time, User ID is respectively C_y, wherein y=1 ..., n.
Data storage agent P estimates resource category and stock number needed for servicing user C_i first, and according to local resource
Service condition judges whether to receive the service request of user C_i storage data to be stored;
Specifically, data storage agent P is estimated as the total amount of the resource R_x used needed for service user C_i, calculation formula
Are as follows:
Wherein, R_x_y indicates the R_x stock number that data storage agent P consumes for services client C_y, and E (R_x_i) is
Data storage agent P is the estimated value of the R_x stock number used needed for servicing user C_i.
Can data storage agent P calculates local resource meet user's C_i demand, calculation method are as follows:
F=F (1) ∩ F (2) ∩ ... ∩ F (m-1) ∩ F (m)
Wherein, the R_x stock number that R_x_res expression data storage agent P need to retain to guarantee normal operation;F(x)
It is Boolean variable, if the available quantity of resource R_x meets user's C_i demand, otherwise it is false that F (x), which is true,.F is Boolean variable, F
Be very and if only if all F (x) be true.If F is very, to indicate that the available volume of resources of data storage agent P meets user's C_i need
It asks, therefore data storage agent P receives the service request of user C_i storage data to be stored, and asks to user's C_i feedback reception
Seek information;Otherwise the service request of refusal user C_i storage data to be stored feeds back refusal solicited message to user C_i.
S2: the second timestamp, type of message, User ID and data to be stored are encapsulated into certification request by data storage agent
In the respective field of data packet, digital signature done to above-mentioned field using own private key, and will signature treated certification request
Data packet is sent to Third Party Authentication mechanism;Third Party Authentication mechanism carries out digital signature using the public key of data storage agent
Decryption and verifying use own private key to the timestamp in certification request data packet, use after being verified by third certification authority
Family ID, data to be stored do trusted signature, and timestamp, type of message, User ID, trusted signature are encapsulated into authentication result number
According in the respective field of packet, digital signature done to above-mentioned field using own private key, and will signature treated authentication result number
Data storage agent is sent to according to packet.
Specifically, data storage agent P using user C_i public key decryptions and verify user C_i to service data
The digital signature of packet, and after being verified by the second time stamp T imestamp2, type of message Auth_Req, User ID _ ci,
User submit data to be stored S_i insertion certification request data packet in, and according to following formula to certification request data packet into
Row digital signature
Signature_2=Key_pri_p (Hash (Timestamp2 | | Auth_Req | | ID_ci | | S_i))
Wherein, Signature_2 is digital signature of the data storage agent P to certification request data packet;Hash () is indicated
Input of the word string that field contents in bracket are spliced as hash algorithm, the word string of the regular length of generation;Key_
Pri_p () indicates that data storage agent P is encrypted using the word string that the private key of oneself exports hash algorithm.
After Third Party Authentication mechanism A receives certification request data packet, the public key decryptions of data storage agent P are used first
And verify digital signature Signature_2.If being verified, enter following steps:
Third Party Authentication mechanism A according in certification request data packet the second time stamp T imestamp2, User ID _ ci,
Data to be stored S_i carries out trusted signature Signature_Auth
Signature_Auth=Key_pri_a (Hash (Timestamp2 | | ID_ci | | S_i))
Wherein, the trusted signature that Signature_Auth is done by Third Party Authentication mechanism A;Hash () expression will be in bracket
Input of the word string that is spliced of field contents as hash algorithm, the word string of the regular length of generation;Key_pri_a()
Indicate that Third Party Authentication mechanism A is encrypted using the word string that the private key of oneself exports hash algorithm.
Third Party Authentication mechanism A according to by third time stamp T imestamp3, type of message Auth_Res, User ID _ ci,
Trusted signature Signature_Auth is encapsulated into authentication result data packet, and makees digital label to above-mentioned field using own private key
Name Signature_3, is sent to data storage agent P:
Signature_3=Key_pri_a (Hash (Timestamp3 | | Auth_Res | | ID_ci | | Signature_
Auth))。
Wherein, Signature_3 is digital signature that authentication result data packet is done by third party A;Hash () is indicated will
Input of the word string that field contents in bracket are spliced as hash algorithm, the word string of the regular length of generation;Key_
Pri_a () indicates that Third Party Authentication mechanism A is encrypted using the word string that the private key of oneself exports hash algorithm.
S3: after data storage agent receives authentication result data packet, the public key decryptions of third-party agent mechanism A are used first
And verify digital signature.If being verified, the 4th timestamp, User ID, data to be stored and trusted signature are stored in area
In block chain.
In one embodiment of the invention, data storage agent P using third party A public key decryptions and verify third party
A calls the communication interface of block chain to the digital signature Signature_4 of authentication result data packet if being verified, by
Four time stamp T imestamp4, User ID _ ci, data to be stored S_i and third party's trusted signature Signature_Auth storage
In block chain.
In one embodiment of the invention, after step S3 further include:
The update status of data storage agent P periodic scanning block chain, so as in Timestamp4, ID_ci, S_i and
Storage is re-started when Signature_Auth storage failure.
To make it is further understood that the present invention, will be described in detail by following embodiment.
When Fig. 2 indicates that user C_i applies for the registration of, the message knot of the registration request data packet sent to data storage agent P
Structure.Wherein, time stamp T imestamp field 128, type of message MsgType field 64, MAC Address MAC field 64,
Digital signature Signature field 1024.Time stamp T imestamp field is by filling in Unix system timestamp and in a high position
0 is filled out to be extended for 128;MAC field fills out 0 in a high position on the basis of 48 bit mac address of host and is extended for 64;Signature
Signature field is the digital signature done to Timestamp, MsgType, MAC, Signature field.Hereinafter each number
According to the time stamp T imestamp field of packet, user's id field, the regulation of digital signature Signature field with registration request number
According to packet.
Fig. 3 indicates the message structure for the registering result data packet that data storage agent P is returned to user C_i.Wherein, the time
Stamp Timestamp field 128, type of message MsgType field 64, user's id field 128, digital signature
Signature field 1024.
Fig. 4 indicates message structure of the user C_i to the data storage agent P requests of packets of data sent.Wherein, the time
Stamp Timestamp field 128, type of message MsgType field 64, user's id field 128, digital signature
Signature field 1024.Data to be stored Data field length is variable, and no longer than 3776.
Fig. 5 indicates the message structure for the certification request data packet that data storage agent P is sent to third party A.It should be noted that
Although this message structure is identical with the structure of Fig. 4 message structure, each field is rewritten by P, and indirect turn
Message transmitted by the C_i of hair family.
Fig. 6 indicates the message structure for the authentication result data packet that Third Party Authentication mechanism A is sent to data storage agent P.
Time stamp T imestamp field 128, type of message MsgType field 64, user's id field 128, the trusted signature of A
Signature_Auth field 1024, digital signature Signature field 1024 of the A to notebook data packet.
Fig. 7 indicates the system architecture being made of entities such as user, data storage agent, third parties.It is pointed out that area
Block chain is not a part of the invention, draws block chain here for correlation between entity is illustrated.
Though the present invention stores data in block chain, the concrete type of block chain, existing way, data are not stored
Mode and communication interface etc. do special hypothesis.Data storage agent provides user unified communication interface, downward basis upwards
Block chain concrete condition realizes storage and search function.System architecture proposed by the present invention can be based on any block chain and realize,
And it is functional to efficiently accomplish institute.Third Party Authentication mechanism is the government monitoring agencies or authoritative legal agency of acknowledged authority,
Data can be authenticated according to privacy policy and user demand, show the data that third party authorised user is stored.
The date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention introduces data storage generation
Reason and two entities of Third Party Authentication structure, data storage agent provide reliable data storage service for user, make user not
Storage details must be paid close attention to again, saved calculating power, improved network operating efficiency;All data are passed through with unified format storage
The approval for the available each side of data having crossed the certification of Third Party Authentication mechanism, therefore having been stored in block chain.The present invention solves
It is current using block chain storing data method the drawbacks of, there is high universalizable, high reliability, high efficiency, high portable, it is right
It saves and calculates power, promotion network operating efficiency is also of great significance.
In addition, other compositions of the date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention with
And effect be all for a person skilled in the art it is known, in order to reduce redundancy, do not repeat them here.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiment or examples in can be combined in any suitable manner.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that: not
A variety of change, modification, replacement and modification can be carried out to these embodiments in the case where being detached from the principle of the present invention and objective, this
The range of invention is by claim and its equivalent limits.
Claims (8)
1. a kind of date storage method for having Third Party Authentication based on block chain, which comprises the following steps:
S1: data storage agent receives the requests of packets of data that user sends, when the requests of packets of data includes first
Between stamp, type of message, the field of User ID and data to be stored and the user digital signature that the field is done;
S2: the second timestamp, type of message, the User ID and the data to be stored are encapsulated by the data storage agent
In the respective field of certification request data packet, digital signature is done to the field of the certification request data packet, and will signature
Treated, and the certification request data packet is sent to Third Party Authentication mechanism,
So that the Third Party Authentication mechanism verifies the digital signature of the data storage agent, by institute after being verified
Third Party Authentication mechanism is stated to the second timestamp, User ID, described wait store in the certification request data packet
Data do trusted signature, and third timestamp, type of message, the User ID, the trusted signature are encapsulated into authentication result
In the respective field of data packet, digital signature is done to the field of the authentication result data packet, and treated by signature
The authentication result data packet is sent to the data storage agent;
S3: after the data storage agent receives the authentication result data packet, by the 4th timestamp, User ID, described
Data to be stored and the trusted signature are stored in block chain.
2. the date storage method according to claim 1 that have Third Party Authentication based on block chain, which is characterized in that
After step S3 further include:
The update status of block chain described in the data storage agent periodic scanning, so as in the 4th timestamp, the use
Storage is re-started when family ID, the data to be stored and trusted signature storage failure.
3. the date storage method according to claim 1 that have Third Party Authentication based on block chain, which is characterized in that step
Rapid S1 further include:
After the data storage agent receives the requests of packets of data of the user, money needed for estimation services the user
Source category and stock number, and judge whether to receive to store the data to be stored according to local resource service condition;
Receive after storing the data to be stored, Xiang Suoshu user feedback receives solicited message;It is described wait store not receive storage
After data, solicited message is refused in Xiang Suoshu user feedback.
4. the date storage method according to claim 1 that have Third Party Authentication based on block chain, which is characterized in that institute
Stating User ID is after the user registers to the data storage agent, and the whole network distributed by the data storage agent is only
One ID.
5. the date storage method according to claim 4 that have Third Party Authentication based on block chain, which is characterized in that
Before step S1 further include:
The data storage agent receives the registration request data packet that the user sends, and the registration request data packet includes the
The digital signature that five timestamps, the field of type of message and MAC Address and the user do the field;
The data storage agent verifies the user to the digital signature of the registration request data packet, and after being verified
Distribute the whole network unique ID to the user.
6. the date storage method according to claim 5 that have Third Party Authentication based on block chain, which is characterized in that institute
User ID is stated to be spliced according to the random binary word string of presetting digit capacity and the MAC Address of the user.
7. the date storage method according to claim 5 or 6 that have Third Party Authentication based on block chain, feature exist
In before the data storage agent generates the certification request data packet further include:
The data storage agent verifies the user to the digital signature of the requests of packets of data, and after being verified
Generate the certification request data packet.
8. the date storage method according to claim 1 that have Third Party Authentication based on block chain, which is characterized in that
After the data storage agent receives the authentication result data packet further include:
The data storage agent verifies the Third Party Authentication mechanism to the digital signature of the authentication result data packet, so as to
The data storage agent is by the 4th timestamp, the User ID, the data to be stored and described after being verified
Trusted signature is stored in block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611119562.3A CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611119562.3A CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106650344A CN106650344A (en) | 2017-05-10 |
CN106650344B true CN106650344B (en) | 2019-05-31 |
Family
ID=58818749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611119562.3A Active CN106650344B (en) | 2016-12-07 | 2016-12-07 | A kind of date storage method for having Third Party Authentication based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106650344B (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107277108B (en) * | 2017-05-18 | 2020-09-08 | 北京众享比特科技有限公司 | Method, device and system for processing messages at nodes of block chain |
CN107332826B (en) * | 2017-06-09 | 2019-12-03 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107358551A (en) * | 2017-07-03 | 2017-11-17 | 重庆小犀智能科技有限公司 | Notarization system and method based on block chain |
CN107330694A (en) * | 2017-07-03 | 2017-11-07 | 重庆小犀智能科技有限公司 | Copyright trading system and method for commerce based on block chain |
CN107566360B (en) * | 2017-08-25 | 2019-11-26 | 北京中星仝创科技有限公司 | A kind of generation method of data authentication code |
CN108287661A (en) * | 2017-12-05 | 2018-07-17 | 兴业数字金融服务(上海)股份有限公司 | A kind of chain store system verified in central authority |
CN108347429A (en) * | 2017-12-29 | 2018-07-31 | 北京世纪互联宽带数据中心有限公司 | A kind of information eyewitness system, method and device |
US10880285B2 (en) * | 2018-01-03 | 2020-12-29 | Baidu Usa Llc | Self-driving vehicle test authentication |
CN110110003A (en) * | 2018-01-26 | 2019-08-09 | 广州中国科学院计算机网络信息中心 | The data storage control method and device of M2M platform |
CN109413014A (en) * | 2018-02-13 | 2019-03-01 | 李茗 | Digital content playback method, device and equipment based on block chain |
CN108734018B (en) * | 2018-05-21 | 2021-03-30 | 北京京东尚科信息技术有限公司 | Authentication method, device, system and computer readable storage medium |
CN109033841B (en) * | 2018-07-12 | 2022-02-01 | 杨城 | Write-check separated weakly centralized trusted data storage system and management method |
CN109002732B (en) * | 2018-07-17 | 2022-04-26 | 深圳前海微众银行股份有限公司 | Data evidence storage method, equipment and system and data evidence obtaining method |
CN109359223A (en) * | 2018-09-17 | 2019-02-19 | 重庆邮电大学 | The block chain account book distributed storage technology realized based on correcting and eleting codes |
CN109344631B (en) * | 2018-09-18 | 2020-11-06 | 百度在线网络技术(北京)有限公司 | Data modification and block verification method, device, equipment and medium for block chain |
CN109492351A (en) * | 2018-11-23 | 2019-03-19 | 北京奇眸科技有限公司 | Copy-right protection method, device and readable storage medium storing program for executing based on block chain |
CN109558453B (en) * | 2018-11-27 | 2021-01-26 | 深圳市链联科技有限公司 | Block chain data network storage and relocation method |
CN112651836A (en) * | 2019-05-15 | 2021-04-13 | 创新先进技术有限公司 | Copyright distribution method and device based on block chain |
US10872170B2 (en) | 2019-05-15 | 2020-12-22 | Advanced New Technologies Co., Ltd. | Blockchain-based copyright distribution |
US11328080B2 (en) | 2019-11-18 | 2022-05-10 | Frostbyte, Llc | Cryptographic key management |
CN114338795A (en) * | 2021-12-23 | 2022-04-12 | 杭州趣链科技有限公司 | Data communication method and device for block chain client |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721543A (en) * | 2015-06-15 | 2016-06-29 | 清华大学深圳研究生院 | Cross-protocol distribution-type cloud storage system based on operation control unit and data management method |
CN105719172A (en) * | 2016-01-19 | 2016-06-29 | 布比(北京)网络技术有限公司 | Information issuing method and device |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
-
2016
- 2016-12-07 CN CN201611119562.3A patent/CN106650344B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721543A (en) * | 2015-06-15 | 2016-06-29 | 清华大学深圳研究生院 | Cross-protocol distribution-type cloud storage system based on operation control unit and data management method |
CN105719172A (en) * | 2016-01-19 | 2016-06-29 | 布比(北京)网络技术有限公司 | Information issuing method and device |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
Also Published As
Publication number | Publication date |
---|---|
CN106650344A (en) | 2017-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106650344B (en) | A kind of date storage method for having Third Party Authentication based on block chain | |
CN109829326B (en) | Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain | |
US10911457B2 (en) | Immediate policy effectiveness in eventually consistent systems | |
WO2021139140A1 (en) | Password management method and apparatus employing blockchain, electronic device, and computer-readable storage medium | |
US7676835B2 (en) | System and method for regulating access to objects in a content repository | |
Mukta et al. | Blockchain-based verifiable credential sharing with selective disclosure | |
US20100228973A1 (en) | Electronic data communication system | |
US20080034204A1 (en) | Communications Network Security Certificate Revocation | |
TW201215070A (en) | Key Management Systems and methods for shared secret ciphers | |
JP2007518369A (en) | Efficiently signable real-time credentials for OCSP and distributed OCSP | |
WO2021012643A1 (en) | Method, device and system for object distribution processing | |
CN112953930A (en) | Cloud storage data processing method and device and computer system | |
CN111080299B (en) | Anti-repudiation method for transaction information, client and server | |
US20220300643A1 (en) | Cryptographically secure data protection | |
US20220407701A1 (en) | Processing of requests to control information stored at multiple servers | |
US20230050222A1 (en) | Cryptographically secure request verification | |
CN112311779B (en) | Data access control method and device applied to block chain system | |
CN111814083B (en) | Display result generation method, system, device, readable storage medium and equipment | |
US8495154B2 (en) | Content usage tracking in superdistribution | |
CN103326856A (en) | Cloud storage data responsibility confirmation structure and method based on two-way digital signature | |
Guo et al. | Using blockchain to control access to cloud data | |
WO2022033350A1 (en) | Service registration method and device | |
Etemad et al. | Efficient key authentication service for secure end-to-end communications | |
Kher et al. | Building trust in storage outsourcing: Secure accounting of utility storage | |
US11954672B1 (en) | Systems and methods for cryptocurrency pool management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |