CN106650344B - A kind of date storage method for having Third Party Authentication based on block chain - Google Patents

A kind of date storage method for having Third Party Authentication based on block chain Download PDF

Info

Publication number
CN106650344B
CN106650344B CN201611119562.3A CN201611119562A CN106650344B CN 106650344 B CN106650344 B CN 106650344B CN 201611119562 A CN201611119562 A CN 201611119562A CN 106650344 B CN106650344 B CN 106650344B
Authority
CN
China
Prior art keywords
data
user
storage agent
data storage
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611119562.3A
Other languages
Chinese (zh)
Other versions
CN106650344A (en
Inventor
徐恪
吕亮
沈蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201611119562.3A priority Critical patent/CN106650344B/en
Publication of CN106650344A publication Critical patent/CN106650344A/en
Application granted granted Critical
Publication of CN106650344B publication Critical patent/CN106650344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Abstract

The invention discloses a kind of date storage methods for having Third Party Authentication based on block chain, comprising: data storage agent receives the requests of packets of data that user sends, and includes User ID and data to be stored in data packet;User ID and data to be stored etc. are encapsulated into certification request data packet by data storage agent, and certification request data packet is sent to Third Party Authentication mechanism;Trusted signature does to User ID and data to be stored etc. in Third Party Authentication mechanism, and trusted signature is sent to data storage agent;User ID, data to be stored and trusted signature of Third Party Authentication mechanism etc. are stored in block chain by data storage agent.The present invention has the advantage that introducing two entities of data storage agent and Third Party Authentication mechanism, data storage agent is indicated and is stored to data with unified data structure, Third Party Authentication mechanism carries out trusted signature to all data, improves credibility, high efficiency, versatility and the portability of data storage.

Description

A kind of date storage method for having Third Party Authentication based on block chain
Technical field
The present invention relates to filed of network information security, and in particular to a kind of data for having Third Party Authentication based on block chain Storage method.
Background technique
Currently, having some use-cases using block chain storing data, the copyright information of musical works is such as recorded, record bores The circulation information etc. of stone.These use-cases generally use the data storage method of transaction driven, that is, initiate ideal money (such as than Special coin) transaction, the data that need to be stored are embedded in transaction data structure, and is stored in block chain in a distributed way.
The above method, using block chain distributed nature improve data storage reliability, using block chain can not Modification characteristic guarantees that data are not tampered.But the drawbacks of this method, is also apparent from: (one) storing data in block chain Each side with data format storing data (such as copyright information) as defined in oneself, therefore each side be difficult to regard to stored data meaning and Validity is reached common understanding;Each side once because stored data content (such as copyright information) occur dispute, legal agency be also difficult to and When intervene and effectively identify the real meaning of stored data, and then the effective ruling of progress;(2) storing data in block chain Each side all needs to put into a large amount of storages and retrieval for calculating power and carrying out data;After block chain bifurcated, beta pruning cause transaction to fail, also need Publication transaction is repeated to guarantee that data successfully store, wastes and largely calculates power;(3) block chain technology and immature at present, is pacifying Entirely, there is biggish room for improvement in terms of efficiency;If block chain upgrades, each side requires the data-storage system to oneself It makes an amendment, workload is very big.
Summary of the invention
Present invention seek to address that above-mentioned technical problem.
For this purpose, an object of the present invention is to provide a kind of data storage side for having Third Party Authentication based on block chain Method solves the method poor universality of existing block chain storing data, without the problems such as authorities participate in, resource overhead is big, to improve The credibility and versatility of data storage, reduce the wasting of resources, have high universalizable, high reliability, high efficiency and high portable The features such as property.
To achieve the goals above, embodiment of the invention discloses a kind of numbers for having Third Party Authentication based on block chain According to storage method, comprising the following steps: S1: data storage agent receives the requests of packets of data that user sends, the service Request data package include at the first time stamp, type of message, the field of User ID and data to be stored and the user to described The digital signature that field is done;S2: the data storage agent by the second timestamp, type of message, the User ID and it is described to Storing data is encapsulated into the respective field of certification request data packet, does number to the field of the certification request data packet Signature, and will signature treated that the certification request data packet is sent to Third Party Authentication mechanism, so that the third party recognizes Card mechanism verifies the digital signature of the data storage agent, by the third certification authority to described after being verified Second timestamp in certification request data packet, the User ID, the data to be stored do trusted signature, and by third Timestamp, type of message, the User ID, the trusted signature are encapsulated into the respective field of the authentication result data packet, Digital signature done to the field of the authentication result data packet, and will signature treated the authentication result data packet hair Give the data storage agent;S3: after the data storage agent receives the authentication result data packet, by the 4th time Stamp, the User ID, the data to be stored and the trusted signature are stored in block chain.
In addition, the date storage method according to the above embodiment of the present invention that have Third Party Authentication based on block chain, also It can have following additional technical characteristic:
Further, after step s 3 further include: the update of block chain described in the data storage agent periodic scanning Situation, so as to the weight when the 4th timestamp, the User ID, the data to be stored and the trusted signature store failure Newly stored.
Further, before step S1 further include: the data storage agent receives the service request of the user After data packet, resource category and stock number needed for estimation services the user, and be according to the judgement of local resource service condition No receiving stores the data to be stored;Receive after storing the data to be stored, Xiang Suoshu user feedback receives solicited message; Do not receive after storing the data to be stored, solicited message is refused in Xiang Suoshu user feedback.
Further, the User ID is after the user registers to the data storage agent, by the data The unique ID of the whole network of storage agent distribution.
Further, before step S1 further include: the data storage agent receives the registration that the user sends and asks Data packet is sought, the registration request data packet includes the field and the use of the 5th timestamp, type of message and MAC Address The digital signature that the field is done at family;The data storage agent verifies the user to the registration request data packet Digital signature, and distribute the whole network unique ID to the user after being verified.
Further, the User ID is spelled according to the random binary word string of presetting digit capacity and the MAC Address of the user It connects.
Further, before the data storage agent generates the certification request data packet further include: the data Storage agent verifies the user to the digital signature of the requests of packets of data, and the certification is generated after being verified Request data package.
Further, after the data storage agent receives the authentication result data packet further include: the data are deposited Third Party Authentication mechanism described in proxy authentication is stored up to the digital signature of the authentication result data packet, so as to the institute after being verified Data storage agent is stated to be stored in the 4th timestamp, the User ID, the data to be stored and the trusted signature In block chain.
The date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention introduces data storage agent With two entities of Third Party Authentication mechanism, data storage agent is indicated and is stored to data with unified data structure, is protected The consistency and versatility of stored data in form in block chain are demonstrate,proved;Third Party Authentication mechanism can be the government department of authority Or legal agency, the data that data storage agent stores in block chain pass through Third Party Authentication, improve information can Letter property, once because dispute occurs for data, third party can intervene in time and carry out ruling user;Data storage agent is mentioned to user For reliable data storage and search service, so that user need not pay close attention to the details of the storage of block chain, retrieval, it is not necessary to processing storage Situations such as failure, the upgrading of block chain, it can effectively reduce the consumption for calculating power.
Additional aspect and advantage of the invention will be set forth in part in the description, and will partially become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart of the date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention;
Fig. 2 is the data structure schematic diagram of the registration request data packet of the user of one embodiment of the invention;
Fig. 3 is the data structure schematic diagram of the registering result message of the data storage agent of one embodiment of the invention;
Fig. 4 is the data structure schematic diagram of the requests of packets of data of the user of one embodiment of the invention;
Fig. 5 is the data structure schematic diagram of the certification request data packet of the data storage agent of one embodiment of the invention;
Fig. 6 is the data structure signal of the authentication result data packet of the Third Party Authentication mechanism of one embodiment of the invention Figure;
Fig. 7 is the system tray of the date storage method for having Third Party Authentication based on block chain of one embodiment of the invention Structure schematic diagram.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not considered as limiting the invention.
In the description of the present invention, it is to be understood that, term " first ", " second " are used for description purposes only, and cannot It is interpreted as indication or suggestion relative importance.
Referring to following description and drawings, it will be clear that these and other aspects of the embodiment of the present invention.In these descriptions In attached drawing, some particular implementations in the embodiment of the present invention are specifically disclosed, to indicate to implement implementation of the invention Some modes of the principle of example, but it is to be understood that the scope of embodiments of the invention is not limited.On the contrary, of the invention Embodiment includes all changes, modification and the equivalent fallen within the scope of the spirit and intension of attached claims.
The present invention is described below in conjunction with attached drawing.
Fig. 1 is the flow chart of the date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention.Such as Shown in Fig. 1, the date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention, comprising the following steps:
S1: data storage agent receives the requests of packets of data that user sends, when the requests of packets of data includes Between the fields such as stamp, User ID, type of message, data to be stored, digital signature.
In one embodiment of the invention, first time is stabbed Timestamp1, type of message Serv_ by user C_i Req, User ID _ ci, data to be stored S_i are inserted in requests of packets of data, and according to following formula to service data Packet does digital signature, and the requests of packets of data after signature is then sent to data storage agent P.
Signature_1=Key_pri_ci (Hash (Timestamp1 | | Serv_Req | | ID_ci | | S_i))
Wherein, Signature_1 indicates the user C_i to the digital signature of requests of packets of data;Hash () is indicated Input of the word string that field contents in bracket are spliced as hash algorithm, the word string of the regular length of generation;Key_ Pri_ci () indicates that the user C_i is encrypted using the word string that the private key of oneself exports hash algorithm.
In one embodiment of the invention, User ID _ ci is that the user C_i is carried out to the data storage agent P After registration, the unique ID of the whole network that is distributed by data storage agent P.In one embodiment of the invention, user C_i is to data The process that storage agent P was registered and obtained the User ID _ ci includes:
Data storage agent P receives the registration request data packet that user C_i is sent.The digital signature of registration request data packet It is the user C_i according to the 5th time stamp T imestamp5, type of message Reg_Req, MAC in registration request data packet What location MAC_ci was generated.Wherein, the 5th time stamp T imestamp5 is system time when the user generated word is signed.
Specifically, digital signature is generated according to following formula:
Signature_5=Key_pri_ci (Hash (Timestamp5 | | Reg_Req | | MAC_ci)).
Wherein, Signature_5 indicates user C_i to the digital signature of registration request data packet;Hash () expression will include Input of the word string that field contents in number are spliced as hash algorithm, the word string of the regular length of generation;Key_pri_ Ci () indicates that user C_i is encrypted using the word string that the private key of oneself exports hash algorithm.
After data storage agent P receives the registration request data packet of user C_i transmission, according to the public key solution of user C_i Digital signature Signature_2 that is close and verifying user, and distribute the whole network unique ID being verified rear line C_i.
In one embodiment of the invention, data storage agent P is according to the random binary word string and use of presetting digit capacity The MAC Address of family C_i is that user C_i distributes ID according to following formula:
ID_ci=(Random_80 | | MAC_ci)
Wherein, Random_80 is 80 random binary word strings, and P is by the MAC Address of Random_80 and user C_i MAC_ci does splicing and generates ID_ci, as the User ID for distributing to user C_i.It should be noted that random two in the present embodiment The length of system word string does not limit fixed length, and 80 of use are only illustrated as an example, are actually using In can according to need and do corresponding adjustment.
In one embodiment of the invention, after user C_i obtains User ID, and before step S1 further include with Lower step:
The requests of packets of data of data storage agent P reception user C_i.Assuming that the resource that data storage agent P has Type is m kind, and the number of every kind of resource is respectively R_x, and the total amount of every kind of resource is respectively R_x_total, wherein x=1 ..., m;Assuming that data storage agent number of users being served is n at this time, User ID is respectively C_y, wherein y=1 ..., n.
Data storage agent P estimates resource category and stock number needed for servicing user C_i first, and according to local resource Service condition judges whether to receive the service request of user C_i storage data to be stored;
Specifically, data storage agent P is estimated as the total amount of the resource R_x used needed for service user C_i, calculation formula Are as follows:
Wherein, R_x_y indicates the R_x stock number that data storage agent P consumes for services client C_y, and E (R_x_i) is Data storage agent P is the estimated value of the R_x stock number used needed for servicing user C_i.
Can data storage agent P calculates local resource meet user's C_i demand, calculation method are as follows:
F=F (1) ∩ F (2) ∩ ... ∩ F (m-1) ∩ F (m)
Wherein, the R_x stock number that R_x_res expression data storage agent P need to retain to guarantee normal operation;F(x) It is Boolean variable, if the available quantity of resource R_x meets user's C_i demand, otherwise it is false that F (x), which is true,.F is Boolean variable, F Be very and if only if all F (x) be true.If F is very, to indicate that the available volume of resources of data storage agent P meets user's C_i need It asks, therefore data storage agent P receives the service request of user C_i storage data to be stored, and asks to user's C_i feedback reception Seek information;Otherwise the service request of refusal user C_i storage data to be stored feeds back refusal solicited message to user C_i.
S2: the second timestamp, type of message, User ID and data to be stored are encapsulated into certification request by data storage agent In the respective field of data packet, digital signature done to above-mentioned field using own private key, and will signature treated certification request Data packet is sent to Third Party Authentication mechanism;Third Party Authentication mechanism carries out digital signature using the public key of data storage agent Decryption and verifying use own private key to the timestamp in certification request data packet, use after being verified by third certification authority Family ID, data to be stored do trusted signature, and timestamp, type of message, User ID, trusted signature are encapsulated into authentication result number According in the respective field of packet, digital signature done to above-mentioned field using own private key, and will signature treated authentication result number Data storage agent is sent to according to packet.
Specifically, data storage agent P using user C_i public key decryptions and verify user C_i to service data The digital signature of packet, and after being verified by the second time stamp T imestamp2, type of message Auth_Req, User ID _ ci, User submit data to be stored S_i insertion certification request data packet in, and according to following formula to certification request data packet into Row digital signature
Signature_2=Key_pri_p (Hash (Timestamp2 | | Auth_Req | | ID_ci | | S_i))
Wherein, Signature_2 is digital signature of the data storage agent P to certification request data packet;Hash () is indicated Input of the word string that field contents in bracket are spliced as hash algorithm, the word string of the regular length of generation;Key_ Pri_p () indicates that data storage agent P is encrypted using the word string that the private key of oneself exports hash algorithm.
After Third Party Authentication mechanism A receives certification request data packet, the public key decryptions of data storage agent P are used first And verify digital signature Signature_2.If being verified, enter following steps:
Third Party Authentication mechanism A according in certification request data packet the second time stamp T imestamp2, User ID _ ci, Data to be stored S_i carries out trusted signature Signature_Auth
Signature_Auth=Key_pri_a (Hash (Timestamp2 | | ID_ci | | S_i))
Wherein, the trusted signature that Signature_Auth is done by Third Party Authentication mechanism A;Hash () expression will be in bracket Input of the word string that is spliced of field contents as hash algorithm, the word string of the regular length of generation;Key_pri_a() Indicate that Third Party Authentication mechanism A is encrypted using the word string that the private key of oneself exports hash algorithm.
Third Party Authentication mechanism A according to by third time stamp T imestamp3, type of message Auth_Res, User ID _ ci, Trusted signature Signature_Auth is encapsulated into authentication result data packet, and makees digital label to above-mentioned field using own private key Name Signature_3, is sent to data storage agent P:
Signature_3=Key_pri_a (Hash (Timestamp3 | | Auth_Res | | ID_ci | | Signature_ Auth))。
Wherein, Signature_3 is digital signature that authentication result data packet is done by third party A;Hash () is indicated will Input of the word string that field contents in bracket are spliced as hash algorithm, the word string of the regular length of generation;Key_ Pri_a () indicates that Third Party Authentication mechanism A is encrypted using the word string that the private key of oneself exports hash algorithm.
S3: after data storage agent receives authentication result data packet, the public key decryptions of third-party agent mechanism A are used first And verify digital signature.If being verified, the 4th timestamp, User ID, data to be stored and trusted signature are stored in area In block chain.
In one embodiment of the invention, data storage agent P using third party A public key decryptions and verify third party A calls the communication interface of block chain to the digital signature Signature_4 of authentication result data packet if being verified, by Four time stamp T imestamp4, User ID _ ci, data to be stored S_i and third party's trusted signature Signature_Auth storage In block chain.
In one embodiment of the invention, after step S3 further include:
The update status of data storage agent P periodic scanning block chain, so as in Timestamp4, ID_ci, S_i and Storage is re-started when Signature_Auth storage failure.
To make it is further understood that the present invention, will be described in detail by following embodiment.
When Fig. 2 indicates that user C_i applies for the registration of, the message knot of the registration request data packet sent to data storage agent P Structure.Wherein, time stamp T imestamp field 128, type of message MsgType field 64, MAC Address MAC field 64, Digital signature Signature field 1024.Time stamp T imestamp field is by filling in Unix system timestamp and in a high position 0 is filled out to be extended for 128;MAC field fills out 0 in a high position on the basis of 48 bit mac address of host and is extended for 64;Signature Signature field is the digital signature done to Timestamp, MsgType, MAC, Signature field.Hereinafter each number According to the time stamp T imestamp field of packet, user's id field, the regulation of digital signature Signature field with registration request number According to packet.
Fig. 3 indicates the message structure for the registering result data packet that data storage agent P is returned to user C_i.Wherein, the time Stamp Timestamp field 128, type of message MsgType field 64, user's id field 128, digital signature Signature field 1024.
Fig. 4 indicates message structure of the user C_i to the data storage agent P requests of packets of data sent.Wherein, the time Stamp Timestamp field 128, type of message MsgType field 64, user's id field 128, digital signature Signature field 1024.Data to be stored Data field length is variable, and no longer than 3776.
Fig. 5 indicates the message structure for the certification request data packet that data storage agent P is sent to third party A.It should be noted that Although this message structure is identical with the structure of Fig. 4 message structure, each field is rewritten by P, and indirect turn Message transmitted by the C_i of hair family.
Fig. 6 indicates the message structure for the authentication result data packet that Third Party Authentication mechanism A is sent to data storage agent P. Time stamp T imestamp field 128, type of message MsgType field 64, user's id field 128, the trusted signature of A Signature_Auth field 1024, digital signature Signature field 1024 of the A to notebook data packet.
Fig. 7 indicates the system architecture being made of entities such as user, data storage agent, third parties.It is pointed out that area Block chain is not a part of the invention, draws block chain here for correlation between entity is illustrated.
Though the present invention stores data in block chain, the concrete type of block chain, existing way, data are not stored Mode and communication interface etc. do special hypothesis.Data storage agent provides user unified communication interface, downward basis upwards Block chain concrete condition realizes storage and search function.System architecture proposed by the present invention can be based on any block chain and realize, And it is functional to efficiently accomplish institute.Third Party Authentication mechanism is the government monitoring agencies or authoritative legal agency of acknowledged authority, Data can be authenticated according to privacy policy and user demand, show the data that third party authorised user is stored.
The date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention introduces data storage generation Reason and two entities of Third Party Authentication structure, data storage agent provide reliable data storage service for user, make user not Storage details must be paid close attention to again, saved calculating power, improved network operating efficiency;All data are passed through with unified format storage The approval for the available each side of data having crossed the certification of Third Party Authentication mechanism, therefore having been stored in block chain.The present invention solves It is current using block chain storing data method the drawbacks of, there is high universalizable, high reliability, high efficiency, high portable, it is right It saves and calculates power, promotion network operating efficiency is also of great significance.
In addition, other compositions of the date storage method for having Third Party Authentication based on block chain of the embodiment of the present invention with And effect be all for a person skilled in the art it is known, in order to reduce redundancy, do not repeat them here.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although an embodiment of the present invention has been shown and described, it will be understood by those skilled in the art that: not A variety of change, modification, replacement and modification can be carried out to these embodiments in the case where being detached from the principle of the present invention and objective, this The range of invention is by claim and its equivalent limits.

Claims (8)

1. a kind of date storage method for having Third Party Authentication based on block chain, which comprises the following steps:
S1: data storage agent receives the requests of packets of data that user sends, when the requests of packets of data includes first Between stamp, type of message, the field of User ID and data to be stored and the user digital signature that the field is done;
S2: the second timestamp, type of message, the User ID and the data to be stored are encapsulated by the data storage agent In the respective field of certification request data packet, digital signature is done to the field of the certification request data packet, and will signature Treated, and the certification request data packet is sent to Third Party Authentication mechanism,
So that the Third Party Authentication mechanism verifies the digital signature of the data storage agent, by institute after being verified Third Party Authentication mechanism is stated to the second timestamp, User ID, described wait store in the certification request data packet Data do trusted signature, and third timestamp, type of message, the User ID, the trusted signature are encapsulated into authentication result In the respective field of data packet, digital signature is done to the field of the authentication result data packet, and treated by signature The authentication result data packet is sent to the data storage agent;
S3: after the data storage agent receives the authentication result data packet, by the 4th timestamp, User ID, described Data to be stored and the trusted signature are stored in block chain.
2. the date storage method according to claim 1 that have Third Party Authentication based on block chain, which is characterized in that After step S3 further include:
The update status of block chain described in the data storage agent periodic scanning, so as in the 4th timestamp, the use Storage is re-started when family ID, the data to be stored and trusted signature storage failure.
3. the date storage method according to claim 1 that have Third Party Authentication based on block chain, which is characterized in that step Rapid S1 further include:
After the data storage agent receives the requests of packets of data of the user, money needed for estimation services the user Source category and stock number, and judge whether to receive to store the data to be stored according to local resource service condition;
Receive after storing the data to be stored, Xiang Suoshu user feedback receives solicited message;It is described wait store not receive storage After data, solicited message is refused in Xiang Suoshu user feedback.
4. the date storage method according to claim 1 that have Third Party Authentication based on block chain, which is characterized in that institute Stating User ID is after the user registers to the data storage agent, and the whole network distributed by the data storage agent is only One ID.
5. the date storage method according to claim 4 that have Third Party Authentication based on block chain, which is characterized in that Before step S1 further include:
The data storage agent receives the registration request data packet that the user sends, and the registration request data packet includes the The digital signature that five timestamps, the field of type of message and MAC Address and the user do the field;
The data storage agent verifies the user to the digital signature of the registration request data packet, and after being verified Distribute the whole network unique ID to the user.
6. the date storage method according to claim 5 that have Third Party Authentication based on block chain, which is characterized in that institute User ID is stated to be spliced according to the random binary word string of presetting digit capacity and the MAC Address of the user.
7. the date storage method according to claim 5 or 6 that have Third Party Authentication based on block chain, feature exist In before the data storage agent generates the certification request data packet further include:
The data storage agent verifies the user to the digital signature of the requests of packets of data, and after being verified Generate the certification request data packet.
8. the date storage method according to claim 1 that have Third Party Authentication based on block chain, which is characterized in that After the data storage agent receives the authentication result data packet further include:
The data storage agent verifies the Third Party Authentication mechanism to the digital signature of the authentication result data packet, so as to The data storage agent is by the 4th timestamp, the User ID, the data to be stored and described after being verified Trusted signature is stored in block chain.
CN201611119562.3A 2016-12-07 2016-12-07 A kind of date storage method for having Third Party Authentication based on block chain Active CN106650344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611119562.3A CN106650344B (en) 2016-12-07 2016-12-07 A kind of date storage method for having Third Party Authentication based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611119562.3A CN106650344B (en) 2016-12-07 2016-12-07 A kind of date storage method for having Third Party Authentication based on block chain

Publications (2)

Publication Number Publication Date
CN106650344A CN106650344A (en) 2017-05-10
CN106650344B true CN106650344B (en) 2019-05-31

Family

ID=58818749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611119562.3A Active CN106650344B (en) 2016-12-07 2016-12-07 A kind of date storage method for having Third Party Authentication based on block chain

Country Status (1)

Country Link
CN (1) CN106650344B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277108B (en) * 2017-05-18 2020-09-08 北京众享比特科技有限公司 Method, device and system for processing messages at nodes of block chain
CN107332826B (en) * 2017-06-09 2019-12-03 中国联合网络通信集团有限公司 The communication means and device of block chain agent node
CN107358551A (en) * 2017-07-03 2017-11-17 重庆小犀智能科技有限公司 Notarization system and method based on block chain
CN107330694A (en) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 Copyright trading system and method for commerce based on block chain
CN107566360B (en) * 2017-08-25 2019-11-26 北京中星仝创科技有限公司 A kind of generation method of data authentication code
CN108287661A (en) * 2017-12-05 2018-07-17 兴业数字金融服务(上海)股份有限公司 A kind of chain store system verified in central authority
CN108347429A (en) * 2017-12-29 2018-07-31 北京世纪互联宽带数据中心有限公司 A kind of information eyewitness system, method and device
US10880285B2 (en) * 2018-01-03 2020-12-29 Baidu Usa Llc Self-driving vehicle test authentication
CN110110003A (en) * 2018-01-26 2019-08-09 广州中国科学院计算机网络信息中心 The data storage control method and device of M2M platform
CN109413014A (en) * 2018-02-13 2019-03-01 李茗 Digital content playback method, device and equipment based on block chain
CN108734018B (en) * 2018-05-21 2021-03-30 北京京东尚科信息技术有限公司 Authentication method, device, system and computer readable storage medium
CN109033841B (en) * 2018-07-12 2022-02-01 杨城 Write-check separated weakly centralized trusted data storage system and management method
CN109002732B (en) * 2018-07-17 2022-04-26 深圳前海微众银行股份有限公司 Data evidence storage method, equipment and system and data evidence obtaining method
CN109359223A (en) * 2018-09-17 2019-02-19 重庆邮电大学 The block chain account book distributed storage technology realized based on correcting and eleting codes
CN109344631B (en) * 2018-09-18 2020-11-06 百度在线网络技术(北京)有限公司 Data modification and block verification method, device, equipment and medium for block chain
CN109492351A (en) * 2018-11-23 2019-03-19 北京奇眸科技有限公司 Copy-right protection method, device and readable storage medium storing program for executing based on block chain
CN109558453B (en) * 2018-11-27 2021-01-26 深圳市链联科技有限公司 Block chain data network storage and relocation method
CN112651836A (en) * 2019-05-15 2021-04-13 创新先进技术有限公司 Copyright distribution method and device based on block chain
US10872170B2 (en) 2019-05-15 2020-12-22 Advanced New Technologies Co., Ltd. Blockchain-based copyright distribution
US11328080B2 (en) 2019-11-18 2022-05-10 Frostbyte, Llc Cryptographic key management
CN114338795A (en) * 2021-12-23 2022-04-12 杭州趣链科技有限公司 Data communication method and device for block chain client

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721543A (en) * 2015-06-15 2016-06-29 清华大学深圳研究生院 Cross-protocol distribution-type cloud storage system based on operation control unit and data management method
CN105719172A (en) * 2016-01-19 2016-06-29 布比(北京)网络技术有限公司 Information issuing method and device
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721543A (en) * 2015-06-15 2016-06-29 清华大学深圳研究生院 Cross-protocol distribution-type cloud storage system based on operation control unit and data management method
CN105719172A (en) * 2016-01-19 2016-06-29 布比(北京)网络技术有限公司 Information issuing method and device
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets

Also Published As

Publication number Publication date
CN106650344A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN106650344B (en) A kind of date storage method for having Third Party Authentication based on block chain
CN109829326B (en) Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain
US10911457B2 (en) Immediate policy effectiveness in eventually consistent systems
WO2021139140A1 (en) Password management method and apparatus employing blockchain, electronic device, and computer-readable storage medium
US7676835B2 (en) System and method for regulating access to objects in a content repository
Mukta et al. Blockchain-based verifiable credential sharing with selective disclosure
US20100228973A1 (en) Electronic data communication system
US20080034204A1 (en) Communications Network Security Certificate Revocation
TW201215070A (en) Key Management Systems and methods for shared secret ciphers
JP2007518369A (en) Efficiently signable real-time credentials for OCSP and distributed OCSP
WO2021012643A1 (en) Method, device and system for object distribution processing
CN112953930A (en) Cloud storage data processing method and device and computer system
CN111080299B (en) Anti-repudiation method for transaction information, client and server
US20220300643A1 (en) Cryptographically secure data protection
US20220407701A1 (en) Processing of requests to control information stored at multiple servers
US20230050222A1 (en) Cryptographically secure request verification
CN112311779B (en) Data access control method and device applied to block chain system
CN111814083B (en) Display result generation method, system, device, readable storage medium and equipment
US8495154B2 (en) Content usage tracking in superdistribution
CN103326856A (en) Cloud storage data responsibility confirmation structure and method based on two-way digital signature
Guo et al. Using blockchain to control access to cloud data
WO2022033350A1 (en) Service registration method and device
Etemad et al. Efficient key authentication service for secure end-to-end communications
Kher et al. Building trust in storage outsourcing: Secure accounting of utility storage
US11954672B1 (en) Systems and methods for cryptocurrency pool management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant