CN107506661A - A kind of method of the generation house historical record based on block chain - Google Patents
A kind of method of the generation house historical record based on block chain Download PDFInfo
- Publication number
- CN107506661A CN107506661A CN201710696827.4A CN201710696827A CN107506661A CN 107506661 A CN107506661 A CN 107506661A CN 201710696827 A CN201710696827 A CN 201710696827A CN 107506661 A CN107506661 A CN 107506661A
- Authority
- CN
- China
- Prior art keywords
- block
- information
- hash
- data
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000004048 modification Effects 0.000 claims abstract description 69
- 238000012986 modification Methods 0.000 claims abstract description 69
- 230000008859 change Effects 0.000 claims abstract description 19
- 238000013500 data storage Methods 0.000 claims abstract description 10
- 101150060512 SPATA6 gene Proteins 0.000 claims description 75
- 230000007246 mechanism Effects 0.000 claims description 51
- 230000008569 process Effects 0.000 claims description 32
- 238000012795 verification Methods 0.000 claims description 25
- 230000008520 organization Effects 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 239000000428 dust Substances 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/16—Real estate
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to real estate domain, discloses a kind of method of the generation house historical record based on block chain, specifically inserts information first, block chain is operated, the first block number evidence in house is regenerated, verifies the legitimacy of the first block number evidence, then the first block number evidence is stored in whole block chain;When in house, state changes, such as carry out data renewal or carry out the change of owner, the data of lastblock are first obtained from whole block chain, perhaps changed content is further filled with modification, block chain is operated, current block data are generated, verify the perhaps integrality of changed content, then by current block data storage in whole block chain in the validity and modification of current block data signature.The present invention forms unified house historical record, and it is open after information can not distort, it is ensured that the accuracy of houseclearing and can not tamper.
Description
Technical field
This programme is related to real estate domain, and in particular to a kind of method of the generation house historical record based on block chain.
Background technology
Block chain is substantially the distributed data base of a decentralization, and it is acted on behalf of without centralization, realizes one kind
Point-to-point direct interaction so that high efficiency, extensive, non-stop layerization agency information interaction approach become reality.Simultaneously
Block chain ensures that data with existing can not possibly be tampered using the method for cryptography, each block number evidence recorded on block chain,
All keep true and reliable while open and clear, (but dealer is personal or mechanism can be anonymous) can be checked by other people,
So being formed one kind to strange counterparty's understanding and trust, need not need to only see the letter of counterparty on block chain
Breath, assets etc. are believable in itself, it is possible to are relievedly merchandised.Here any trust intermediary is not needed.
Because block chain have can extend on a large scale, data are open and clear and because each client data it is consistent, i.e.,
Part client is ruined the technical characterstics such as the reliability that nor affects on data safety, particularly can effectively solve the strange human world
Trust problem, thus this technology extend to it is all can be with digitized field, for example digital cash, pay clearance, numeral
Bill, rights and interests prove, reference, government affairs service, medical records etc..
In existing house transaction system, the construction in ununified record house, history is overhauled, hires out and buys and sells,
House Property is not apparent, thus occurs that the room two of owner one is sold or leased and has damaged house so that house buyer or rent
Borrower has dust thrown into the eyes.
The content of the invention
It is an object of the invention to:Unified house historical record is formed, and the information after disclosure can not distort, it is ensured that
A kind of accuracy of houseclearing and can not tamper, there is provided method of the generation house historical record based on block chain.
The technical solution adopted by the present invention is as follows:
A kind of method of the generation house historical record based on block chain, including following steps:
Step 1:The information in house is inserted, block chain is handled information, regenerates the first block number evidence in house, checking
The legitimacy of first block number evidence, then the first block number evidence is stored in whole block chain;
Step 2:If house state changes, the concrete condition of state change is judged, if house carries out owner's change,
Then enter step 4;Otherwise step 3 is entered;
Step 3:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are verified according to lastblock is referred to
The data crossed;Modification information is further filled with, block chain is handled modification information, generates mth block data, verifies mth block data
The validity of signature and the integrality of modification content, then by mth block data storage in whole block chain;
Step 4:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are verified according to lastblock is referred to
The data crossed, owner B information is further filled with, block chain is handled owner B information, owner A changes
For owner B, nth block data are obtained, nth block data are verified, again by nth block data storage in whole block after being verified
In chain.
Specifically, the step 1 specifically includes following steps:
Step 1.1:Insert the information in house, including house initial information, mechanism A public keys and owner's A public keys;
Wherein, house initial information includes house data, house unique identifier, house are located, building structure and house
Purposes;Mechanism A public keys are externally announced and can verify that;
Step 1.2:Information is calculated to generation cryptographic Hash, i.e. HASH [1] jointly, then HASH [1] carried out with mechanism A private keys
Signature, mechanism A signature SIGNATURE [1] are obtained, information, HASH [1] and mechanism A signature SIGNATURE [1] are formed into house
The first block number evidence, then by the first block number according to being stored in whole block chain;
Step 1.3:Then to first block number in house according to verifying, first block number in house is verified according to whether effective,
If effectively, the first block number evidence in house has complete validity and legitimacy;
Specifically, the step 3 specifically includes following steps:
Step 3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are tested according to lastblock is referred to
The data demonstrate,proved;Modification information is inserted, modification information is calculated into generation SUB_HASH [m], then with mechanism A private keys to SUB_HASH
[m] is signed, and obtains mechanism A signature SUB_SIGNATURE [m], modification information, SUB_HASH [m] and mechanism A signatures SUB_
SIGNATURE [m] collectively constitutes modification content;
Step 3.2:Change content, owner's public key and M-1 block numbers and generate HASH [m] according to common calculate, then use institute
People A private keys of having the right are signed to HASH [m], obtain owner A signature SIGNATURE [m], modification content, owner
Public key, M-1 block numbers evidence, HASH [m] and owner A signature SIGNATURE [m] collectively constitute mth block data;
Step 3.3:Mth block data are verified, are stored at after being verified in whole block chain;
Specifically, the step 4 specifically includes following steps:
Step 4.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are tested according to lastblock is referred to
The data demonstrate,proved;The legitimacy of N-1 block number evidences is verified, confirms N-1 block numbers according to legal;
Step 4.2:Modification information is inserted, modification information and owner A private keys are calculated into generation HASH [n] jointly, then
HASH [n] is signed with owner's private key, obtains owner A signature SIGNATURE [n], by modification information,
HASH [n] and owner A signature SIGNATURE [n] form nth block data;
Wherein, modification information includes change details and owner's B public keys;
Step 4.3:Nth block data are verified, are stored at after being verified in whole block chain.
Further, the verification process of step 1 includes following steps:
Step 1.3.1:To first block number in house according to starting to verify, the information inserted first is verified;
Step 1.3.2:With mechanism A public key decryptions mechanism A signature SIGNATURE [1] of first block number in, obtain in plain text
Plaintext [1], then verify whether HASHs [1] of the plaintext plaintext [1] with the first block number in be consistent, if unanimously,
Signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, and flow stops;
Step 1.3.3:The cryptographic Hash of information in calculation procedure 1, obtain HASH [1];Verify in HASH [1] and data
Whether HASH [1] is consistent, if unanimously, the information inserted is not tampered with, into next step, otherwise information has been tampered, mark
Information is fly-by-night, and flow stops;
Step 1.3.4:Body release A public key, the machine claimed in certifying organization A public key and information are obtained from trusted sources
Whether structure A public key is consistent, if unanimously, it is mechanism A issues to represent information, into next step;Otherwise represent that information is usurped
Change, label information is fly-by-night, and flow stops;
Step 1.3.5:First block number is according to complete effective, verification process completion.
Further, the verification process of step 3 includes following steps:
Step 3.3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are tested according to lastblock is referred to
The data demonstrate,proved, whether checking M-1 block numbers evidence is complete effectively, if effectively, into next step, mth block number is represented if invalid
According to also certain invalid, flow stopping;
Step 3.3.2:Owner A public key of the M-1 block numbers in is obtained, with owner's A public key decryptions ownership A
People signature SIGNATUR [m], obtain plaintext plaintext [m], checking plaintext [m] and the HASH [m] in mth block data
It is whether consistent, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, flow
Stop;
Step 3.3.3:The complete content of M-1 block number evidences is calculated into cryptographic Hash together with the information of mth block data, obtained
To info_hash [m], whether checking info_hash [m] and the HASH [m] in mth block data is consistent, if unanimously, information is not
It is tampered, the signature of mth block data is effective, into next step;Otherwise information has been tampered, label information to be fly-by-night,
Flow stops;
Step 3.3.4:Modification information, including mechanism A public keys and modification content are inserted, it is public with the mechanism A in mth block data
Key decryption mechanism A signature SUB_SIGNATURE [m], obtain plaintext sub_plaintext [m], checking sub_plaintext [m]
It is whether consistent with the SUB_HASH [n] in mth block data, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign,
Label information is fly-by-night, and flow stops;
Step 3.3.5:The cryptographic Hash of modification information is calculated, obtains sub_info_hash [m], verifies sub_info_hash
Whether [m] be consistent with the SUB_HASH [n] in mth block data, if unanimously, then it represents that information is not tampered with, into next step;It is no
Then information has been tampered, and label information is fly-by-night, and flow stops;
Step 3.3.6:Body release A public key, the machine claimed in certifying organization A public key and information are obtained from trusted sources
Whether structure A public key is consistent, if unanimously, then it represents that information is mechanism A modifications, into next step;Otherwise representing information is not
Mechanism A modifications, it has been tampered, label information is fly-by-night, and flow stops;
Step 3.3.7:Mth block data content has integrality.
Further, the verification process of the step 4 includes following steps:
Step 4.3.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are tested according to lastblock is referred to
The data demonstrate,proved, whether checking N-1 block numbers evidence is complete effectively, if effectively, entering in next step;Otherwise nth block data are illustrated
Also certain invalid, label information is fly-by-night, and flow stops;
Step 4.3.2:Nth block data are verified, owner A public key of the N-1 block numbers in is obtained first, uses
Owner's A public key decryptions owner signs, and whether unanimously to obtain plaintext S [t], checking S [t] and the HASH [n] in data,
If consistent, signature is effective, and into next step, it is invalid otherwise to sign, and label information is fly-by-night, and flow stops;
Step 4.3.3:The complete content of lastblock data is calculated into cryptographic Hash together with the information of current block data, obtained
To HASH [t], whether checking HASH [t] and the HASH [n] in data is consistent, if unanimously, showing that information is not tampered with, entering
Enter in next step, otherwise information is also tampered, and label information is fly-by-night, and flow stops;
Step 4.3.4:Owner's B public keys in current block data marked new owner B, owner's change
Complete, by nth block data storage in whole block chain.
Specifically, the operation workflow of block chain includes following steps:
Step I:When once new modification produces, other nodes that can first be broadcast in block chain network;
Step II:The cryptographic Hash of not verified modification can be collected into block by each node, and each block may include 1
Secondary or multiple modification;
Step III:Each node all carries out verifying the legitimacy of modification, and knot is issued by the node for being initially completed checking
Fruit;
Step IV:The block of oneself is broadcast to other all sections by the node that the node being initially completed obtains checking power
Point;
Step V:Each node verification simultaneously links new block, and whether the modification included in other node verification blocks has
Effect, after confirming the validity, is just put into block chain by this block;
Step VI:All nodes once receive new block, and the block do not verified also currently is just to be invalid, modification checking
Complete, each node creates the checking calculating that a new block waits for next time.
Further, the step 1-3 points of processes and verification process for generation data block, the verification process and generation number
Carried out jointly according to the process of block or verification process is individually carried out.
In summary, by adopting the above-described technical solution, the beneficial effects of the invention are as follows:
1. the present invention, because there is verification process, in the data in using block chain, the data being verified all are credible
Appoint, in transmitting procedure have can not tamper, will not because of error of transmission or malice forge and carry out mistake on this basis
Flow by mistake;
2. the present invention uses block chain, user can inquire about disclosed house historical information at any time, more convenient, also will not
The personal information of housing ownership people is revealed, also with confidentiality while with publicity, mass data can be stored, without
It is error-prone;
3. the verification process of the present invention can prevent mistake in time or the flow forged is carried out, can avoid because of transmitting procedure
Error in data caused by error or artificial forgery, without because the data transfer of mistake causes whole database all mistakes;
4. the present invention can specify the owner in house, the behavior that owner is swindled can be effectively prevented, prevents from using
Have dust thrown into the eyes at family;
5. the present invention forms the unified record of building management, can immediate inquiring house state, discern whether to hand over
Easily.
Brief description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is first block number in house according to product process figure;
Fig. 2 is first piece of data verification flow chart in house;
Fig. 3 is the flow chart of third-party institution's modification record;
Fig. 4 is the flow chart for changing the legitimacy that data are verified in recording process;
Fig. 5 is the flow chart for changing the integrality of checking modification content in recording process;
Fig. 6 is the flow chart of owner's change;
Fig. 7 is the checking flow chart during change.
Embodiment
All features disclosed in this specification, or disclosed all methods or during the step of, except mutually exclusive
Feature and/or step beyond, can combine in any way.
The present invention is elaborated below in conjunction with the accompanying drawings.
A kind of method of the generation house historical record based on block chain, including following steps:
Step 1:The information in house is inserted, block chain is handled information, regenerates the first block number evidence in house, checking
The legitimacy of first block number evidence, then the first block number evidence is stored in whole block chain;
Step 2:If house state changes, the concrete condition of state change is judged, if house carries out owner's change,
Then enter step 4;Otherwise step 3 is entered;
Step 3:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are verified according to lastblock is referred to
The data crossed;Modification information is further filled with, block chain is handled modification information, generates mth block data, verifies mth block data
The validity of signature and the integrality of modification content, then by mth block data storage in whole block chain;
Step 4:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are verified according to lastblock is referred to
The data crossed, owner B information is further filled with, block chain is handled owner B information, owner A changes
For owner B, nth block data are obtained, nth block data are verified, again by nth block data storage in whole block after being verified
In chain.
Specifically, as shown in figure 1, the step 1 specifically includes following steps:
Step 1.1:Insert the information in house, including house initial information, mechanism A public keys and owner's A public keys;
Wherein, house initial information includes house data, house unique identifier, house are located, building structure and house
Purposes;Mechanism A public keys are externally announced and can verify that;
Step 1.2:Information is calculated to generation cryptographic Hash, i.e. HASH [1] jointly, then HASH [1] carried out with mechanism A private keys
Signature, mechanism A signature SIGNATURE [1] are obtained, information, HASH [1] and mechanism A signature SIGNATURE [1] are formed into house
The first block number evidence, then by the first block number according to being stored in whole block chain;
Step 1.3:Then to first block number in house according to verifying, first block number in house is verified according to whether effective,
If effectively, the first block number evidence in house has complete validity and legitimacy;
Specifically, as shown in figure 3, the step 3 specifically includes following steps:
Step 3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are tested according to lastblock is referred to
The data demonstrate,proved;Modification information is inserted, modification information is calculated into generation SUB_HASH [m], then with mechanism A private keys to SUB_HASH
[m] is signed, and obtains mechanism A signature SUB_SIGNATURE [m], modification information, SUB_HASH [m] and mechanism A signatures SUB_
SIGNATURE [m] collectively constitutes modification content;
Step 3.2:Change content, owner's public key and M-1 block numbers and generate HASH [m] according to common calculate, then use institute
People A private keys of having the right are signed to HASH [m], obtain owner A signature SIGNATURE [m], modification content, owner
Public key, M-1 block numbers evidence, HASH [m] and owner A signature SIGNATURE [m] collectively constitute mth block data;
Step 3.3:Mth block data are verified, are stored at after being verified in whole block chain;
Specifically, as shown in fig. 6, the step 4 specifically includes following steps:
Step 4.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are tested according to lastblock is referred to
The data demonstrate,proved;The legitimacy of N-1 block number evidences is verified, confirms N-1 block numbers according to legal;
Step 4.2:Modification information is inserted, modification information and owner A private keys are calculated into generation HASH [n] jointly, then
HASH [n] is signed with owner's private key, obtains owner A signature SIGNATURE [n], by modification information,
HASH [n] and owner A signature SIGNATURE [n] form nth block data;
Wherein, modification information includes change details and owner's B public keys;
Step 4.3:Nth block data are verified, are stored at after being verified in whole block chain.
Further, as shown in Fig. 2 the verification process of step 1 includes following steps:
Step 1.3.1:To first block number in house according to starting to verify, the information inserted first is verified;
Step 1.3.2:With mechanism A public key decryptions mechanism A signature SIGNATURE [1] of first block number in, obtain in plain text
Plaintext [1], then verify whether HASHs [1] of the plaintext plaintext [1] with the first block number in be consistent, if unanimously,
Signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, and flow stops;
Step 1.3.3:The cryptographic Hash of information in calculation procedure 1, obtain HASH [1];Verify in HASH [1] and data
Whether HASH [1] is consistent, if unanimously, the information inserted is not tampered with, into next step, otherwise information has been tampered, mark
Information is fly-by-night, and flow stops;
Step 1.3.4:Body release A public key, the machine claimed in certifying organization A public key and information are obtained from trusted sources
Whether structure A public key is consistent, if unanimously, it is mechanism A issues to represent information, into next step;Otherwise represent that information is usurped
Change, label information is fly-by-night, and flow stops;
Step 1.3.5:First block number is according to complete effective, verification process completion.
Further, as shown in Figure 4, Figure 5, the verification process of step 3 includes following steps:
Step 3.3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are tested according to lastblock is referred to
The data demonstrate,proved, whether checking M-1 block numbers evidence is complete effectively, if effectively, into next step, mth block number is represented if invalid
According to also certain invalid, flow stopping;
Step 3.3.2:Owner A public key of the M-1 block numbers in is obtained, with owner's A public key decryptions ownership A
People signature SIGNATUR [m], obtain plaintext plaintext [m], checking plaintext [m] and the HASH [m] in mth block data
It is whether consistent, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, flow
Stop;
Step 3.3.3:The complete content of M-1 block number evidences is calculated into cryptographic Hash together with the information of mth block data, obtained
To info_hash [m], whether checking info_hash [m] and the HASH [m] in mth block data is consistent, if unanimously, information is not
It is tampered, the signature of mth block data is effective, into next step;Otherwise information has been tampered, label information to be fly-by-night,
Flow stops;
Step 3.3.4:Modification information, including mechanism A public keys and modification content are inserted, it is public with the mechanism A in mth block data
Key decryption mechanism A signature SUB_SIGNATURE [m], obtain plaintext sub_plaintext [m], checking sub_plaintext [m]
It is whether consistent with the SUB_HASH [n] in mth block data, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign,
Label information is fly-by-night, and flow stops;
Step 3.3.5:The cryptographic Hash of modification information is calculated, obtains sub_info_hash [m], verifies sub_info_hash
Whether [m] be consistent with the SUB_HASH [n] in mth block data, if unanimously, then it represents that information is not tampered with, into next step;It is no
Then information has been tampered, and label information is fly-by-night, and flow stops;
Step 3.3.6:Body release A public key, the machine claimed in certifying organization A public key and information are obtained from trusted sources
Whether structure A public key is consistent, if unanimously, then it represents that information is mechanism A modifications, into next step;Otherwise representing information is not
Mechanism A modifications, it has been tampered, label information is fly-by-night, and flow stops;
Step 3.3.7:Mth block data content has integrality.
Further, as shown in fig. 7, the verification process of the step 4 includes following steps:
Step 4.3.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are tested according to lastblock is referred to
The data demonstrate,proved, whether checking N-1 block numbers evidence is complete effectively, if effectively, entering in next step;Otherwise nth block data are illustrated
Also certain invalid, label information is fly-by-night, and flow stops;
Step 4.3.2:Nth block data are verified, owner A public key of the N-1 block numbers in is obtained first, uses
Owner's A public key decryptions owner signs, and whether unanimously to obtain plaintext S [t], checking S [t] and the HASH [n] in data,
If consistent, signature is effective, and into next step, it is invalid otherwise to sign, and label information is fly-by-night, and flow stops;
Step 4.3.3:The complete content of lastblock data is calculated into cryptographic Hash together with the information of current block data, obtained
To HASH [t], whether checking HASH [t] and the HASH [n] in data is consistent, if unanimously, showing that information is not tampered with, entering
Enter in next step, otherwise information is also tampered, and label information is fly-by-night, and flow stops;
Step 4.3.4:Owner's B public keys in current block data marked new owner B, owner's change
Complete, by nth block data storage in whole block chain.
Specifically, the operation workflow of block chain includes following steps:
Step I:When once new modification produces, other nodes that can first be broadcast in block chain network;
Step II:The cryptographic Hash of not verified modification can be collected into block by each node, and each block may include 1
Secondary or multiple modification;
Step III:Each node all carries out verifying the legitimacy of modification, and knot is issued by the node for being initially completed checking
Fruit;
Step IV:The block of oneself is broadcast to other all sections by the node that the node being initially completed obtains checking power
Point;
Step V:Each node verification simultaneously links new block, and whether the modification included in other node verification blocks has
Effect, after confirming the validity, is just put into block chain by this block;
Step VI:All nodes once receive new block, and the block do not verified also currently is just to be invalid, modification checking
Complete, each node creates the checking calculating that a new block waits for next time.
Further, step 1, step 3 and the step 4 are divided into the process and verification process of generation data block, described to test
The progress common with the process for generating data block of card process or verification process are individually carried out.
Claims (5)
- A kind of 1. method of the generation house historical record based on block chain, it is characterised in that including following steps:Step 1:The information in house is inserted, block chain is handled information, regenerates the first block number evidence in house, checking first The legitimacy of block number evidence, then the first block number evidence is stored in whole block chain;Step 2:If house state changes, the concrete condition of state change is judged, if house carries out owner's change, enter Enter step 4;Otherwise step 3 is entered;Step 3:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are authenticated according to lastblock progress is referred to Data;Modification information is further filled with, block chain is handled modification information, generates mth block data, verifies mth block data signature Validity and modification content integrality, then by mth block data storage in whole block chain;Step 4:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are authenticated according to lastblock progress is referred to Data, owner B information is further filled with, block chain is handled owner B information, and owner A is changed to institute Have the right people B, obtains nth block data, nth block data is verified, again by nth block data storage in whole block chain after being verified In.
- It is 2. according to claim 1, it is characterised in that the step 1 specifically includes following steps:Step 1.1:Insert the information in house, including house initial information, mechanism A public keys and owner's A public keys;Wherein, house initial information includes house data, house unique identifier, house are located, building structure and dwelling use; Mechanism A public keys are externally announced and can verify that;Step 1.2:Information is calculated to generation cryptographic Hash, i.e. HASH [1] jointly, then HASH [1] signed with mechanism A private keys Name, mechanism A signature SIGNATURE [1] are obtained, information, HASH [1] and mechanism A signature SIGNATURE [1] are formed into house First block number evidence, then the first block number evidence is stored in whole block chain;Step 1.3:Then to first block number in house according to verifying, first block number in house is verified according to whether effective, if having Imitate, then the first block number evidence in house has complete validity and legitimacy;The step 3 specifically includes following steps:Step 3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are authenticated according to lastblock progress is referred to Data;Modification information is inserted, modification information is calculated into generation SUB_HASH [m], then with mechanism A private keys to SUB_HASH [m] Signed, obtain mechanism A signature SUB_SIGNATURE [m], modification information, SUB_HASH [m] and mechanism A signatures SUB_ SIGNATURE [m] collectively constitutes modification content;Step 3.2:Change content, owner's public key and M-1 block numbers and generate HASH [m] according to common calculate, then use ownership People A private keys are signed to HASH [m], obtain owner A signature SIGNATURE [m], modification content, owner's public key, M-1 block numbers evidence, HASH [m] and owner A signature SIGNATURE [m] collectively constitute mth block data;Step 3.3:Mth block data are verified, are stored at after being verified in whole block chain;The step 4 specifically includes following steps:Step 4.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are authenticated according to lastblock progress is referred to Data;The legitimacy of N-1 block number evidences is verified, confirms N-1 block numbers according to legal;Step 4.2:Modification information is inserted, modification information and owner A private keys are calculated into generation HASH [n] jointly, then use institute People's private key of having the right is signed to HASH [n], owner A signature SIGNATURE [n] is obtained, by modification information, HASH [n] and owner A signature SIGNATURE [n] form nth block data;Wherein, modification information includes change details and owner's B public keys;Step 4.3:Nth block data are verified, are stored at after being verified in whole block chain.
- 3. according to claim 1 or 2, there is verification step step 1,3 and 4, it is characterised in thatThe verification process of step 1 includes following steps:Step 1.3.1:To first block number in house according to starting to verify, the information inserted first is verified;Step 1.3.2:With mechanism A public key decryptions mechanism A signature SIGNATURE [1] of first block number in, obtain in plain text Plaintext [1], then verify whether HASHs [1] of the plaintext plaintext [1] with the first block number in be consistent, if unanimously, Signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, and flow stops;Step 1.3.3:The cryptographic Hash of information in calculation procedure 1, obtain HASH [1];Verify HASH [1] and the HASH in data Whether [1] consistent, if unanimously, the information inserted is not tampered with, into next step, otherwise information has been tampered, label information To be fly-by-night, flow stops;Step 1.3.4:Body release A public key, the mechanism A claimed in certifying organization A public key and information are obtained from trusted sources Public key it is whether consistent, if unanimously, represent information be mechanism A issue, into next step;Otherwise represent that information has been tampered, Label information is fly-by-night, and flow stops;Step 1.3.5:First block number is according to complete effective, verification process completion.The verification process of step 3 includes following steps:Step 3.3.1:M-1 block number evidences are obtained from whole block chain, wherein, M-1 block numbers are authenticated according to lastblock progress is referred to Data, checking M-1 block numbers according to whether it is complete effectively, if effectively, into next step, mth block data are represented if invalid Certain invalid, flow stops;Step 3.3.2:Owner A public key of the M-1 block numbers in is obtained, is signed with owner's A public key decryptions ownership A people Name SIGNATUR [m], whether obtain plaintext plaintext [m], checking plaintext [m] and the HASH [m] in mth block data Unanimously, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, and label information is fly-by-night, and flow stops;Step 3.3.3:The complete content of M-1 block number evidences is calculated into cryptographic Hash together with the information of mth block data, obtained Info_hash [m], whether checking info_hash [m] consistent with the HASH [m] in mth block data, if unanimously, information not by Distort, the signature of mth block data is effective, into next step;Otherwise information has been tampered, and label information is fly-by-night, stream Journey stops;Step 3.3.4:Modification information, including mechanism A public keys and modification content are inserted, with the mechanism A public key solutions in mth block data Close mechanism A signature SUB_SIGNATURE [m], obtains plaintext sub_plaintext [m], checking sub_plaintext [m] and the Whether SUB_HASH [n] of the M block numbers in be consistent, if unanimously, signature is effective, into next step;Otherwise it is invalid to sign, mark Information is fly-by-night, and flow stops;Step 3.3.5:The cryptographic Hash of modification information is calculated, obtains sub_info_hash [m], checking sub_info_hash [m] It is whether consistent with the SUB_HASH [n] in mth block data, if unanimously, then it represents that information is not tampered with, into next step;Otherwise Information has been tampered, and label information is fly-by-night, and flow stops;Step 3.3.6:Body release A public key, the mechanism A claimed in certifying organization A public key and information are obtained from trusted sources Public key it is whether consistent, if unanimously, then it represents that information be mechanism A modification, into next step;Otherwise represent that information is not mechanism A modifications, it has been tampered, label information is fly-by-night, and flow stops;Step 3.3.7:Mth block data content has integrality.The verification process of the step 4 includes following steps:Step 4.3.1:N-1 block number evidences are obtained from whole block chain, wherein, N-1 block numbers are authenticated according to lastblock progress is referred to Data, checking N-1 block numbers according to whether it is complete effectively, if effectively, entering in next step;Otherwise nth block data also one are illustrated Fixed invalid, label information is fly-by-night, and flow stops;Step 4.3.2:Nth block data are verified, obtain owner A public key of the N-1 block numbers in first, with all People's A public key decryptions owner signature is weighed, whether unanimously to obtain plaintext S [t], checking S [t] and the HASH [n] in data, if one Cause, then signature is effective, and into next step, it is invalid otherwise to sign, and label information is fly-by-night, and flow stops;Step 4.3.3:The complete content of lastblock data is calculated into cryptographic Hash together with the information of current block data, obtained Whether HASH [t], checking HASH [t] and the HASH [n] in data are consistent, if unanimously, showing that information is not tampered with, enter In next step, otherwise information is also tampered, and label information is fly-by-night, and flow stops;Step 4.3.4:Owner's B public keys in current block data marked new owner B, and owner has changed Into by nth block data storage in whole block chain.
- 4. the operation workflow of block chain according to claim 1, it is characterised in that including following steps:Step I:When once new modification produces, other nodes that can first be broadcast in block chain network;Step II:The cryptographic Hash of not verified modification can be collected into block by each node, each block may include 1 time or Repeatedly modification;Step III:Each node all carries out verifying the legitimacy of modification, and result is issued by the node for being initially completed checking;Step IV:The block of oneself is broadcast to other all nodes by the node that the node being initially completed obtains checking power;Step V:Each node verification simultaneously links new block, and whether the modification included in other node verification blocks is effective, really After recognizing effectively, this block is just put into block chain;Step VI:All nodes once receive new block, and the block do not verified also currently just to be invalid, verified by modification Into each node creates the checking calculating that a new block waits for next time.
- It is 5. according to claim 1 or claim 2, it is characterised in that the step 1,3 and 4 be divided into generation data block process and Verification process, verification process progress common with the process for generating data block or verification process are individually carried out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710696827.4A CN107506661B (en) | 2017-08-15 | 2017-08-15 | Method for generating house historical record based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710696827.4A CN107506661B (en) | 2017-08-15 | 2017-08-15 | Method for generating house historical record based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107506661A true CN107506661A (en) | 2017-12-22 |
CN107506661B CN107506661B (en) | 2020-04-24 |
Family
ID=60691736
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710696827.4A Active CN107506661B (en) | 2017-08-15 | 2017-08-15 | Method for generating house historical record based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107506661B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108320160A (en) * | 2018-02-02 | 2018-07-24 | 张超 | Block catenary system, block common recognition method and apparatus |
CN108428168A (en) * | 2018-03-21 | 2018-08-21 | 王国良 | A kind of house lease method and system based on block chain technology |
CN108764901A (en) * | 2018-05-16 | 2018-11-06 | 深圳市咕噜科技有限公司 | Leasing method, system, equipment and storage medium based on block chain technology |
CN108898289A (en) * | 2018-06-13 | 2018-11-27 | 鹰投(上海)海洋科技发展有限公司 | Project completion management system and its implementation based on block chain |
CN108985908A (en) * | 2018-09-10 | 2018-12-11 | 湖南智慧政务区块链科技有限公司 | Real estate information sharing method, device, computer readable storage medium |
CN109164780A (en) * | 2018-11-22 | 2019-01-08 | 北京八分量信息科技有限公司 | A kind of industrial field device control method based on edge calculations, apparatus and system |
CN109408521A (en) * | 2018-09-28 | 2019-03-01 | 上海擎沣投资控股有限公司 | A kind of method and device thereof for more new block chain global data state |
CN109493196A (en) * | 2018-12-29 | 2019-03-19 | 杭州趣链科技有限公司 | A kind of real estate based on block chain deposits card and method of commerce |
CN109639625A (en) * | 2018-10-17 | 2019-04-16 | 深圳市圆世科技有限责任公司 | A kind of trusted content distributing network method based on block chain |
CN109918874A (en) * | 2019-03-14 | 2019-06-21 | 上海优扬新媒信息技术有限公司 | A kind of material object information storage means and device, information searching method in kind and device |
CN110311885A (en) * | 2018-03-27 | 2019-10-08 | 美商远景科技有限公司 | To online device and method with high safety |
CN110659967A (en) * | 2019-09-26 | 2020-01-07 | 腾讯科技(深圳)有限公司 | House management method and device based on block chain |
CN110826107A (en) * | 2018-08-14 | 2020-02-21 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN110896659A (en) * | 2018-08-02 | 2020-03-20 | 刘卓 | Data processing method, node, block chain network and virtual data carrier |
CN111784339A (en) * | 2020-05-19 | 2020-10-16 | 杭州亿房达科技有限公司 | Commodity room project license file anti-counterfeiting and storage method based on block chain |
CN112491551A (en) * | 2018-06-29 | 2021-03-12 | 创新先进技术有限公司 | Data verification method and device based on block chain and electronic equipment |
WO2022267185A1 (en) * | 2021-06-24 | 2022-12-29 | 安徽安时科技发展有限公司 | Blockchain network-based secure and efficient item transaction method and system, and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106100847A (en) * | 2016-06-14 | 2016-11-09 | 惠众商务顾问(北京)有限公司 | Asymmetric encryption block chain identity information verification method and device |
CN106485167A (en) * | 2016-09-22 | 2017-03-08 | 中金云金融(北京)大数据科技股份有限公司 | Credit record system and method based on block chain |
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
-
2017
- 2017-08-15 CN CN201710696827.4A patent/CN107506661B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106100847A (en) * | 2016-06-14 | 2016-11-09 | 惠众商务顾问(北京)有限公司 | Asymmetric encryption block chain identity information verification method and device |
CN106485167A (en) * | 2016-09-22 | 2017-03-08 | 中金云金融(北京)大数据科技股份有限公司 | Credit record system and method based on block chain |
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108320160A (en) * | 2018-02-02 | 2018-07-24 | 张超 | Block catenary system, block common recognition method and apparatus |
CN108428168A (en) * | 2018-03-21 | 2018-08-21 | 王国良 | A kind of house lease method and system based on block chain technology |
CN108428168B (en) * | 2018-03-21 | 2021-03-02 | 王国良 | House renting method and system based on block chain technology |
CN110311885A (en) * | 2018-03-27 | 2019-10-08 | 美商远景科技有限公司 | To online device and method with high safety |
CN110311885B (en) * | 2018-03-27 | 2021-10-01 | 美商远景科技有限公司 | Device and method for implementing safety connection |
CN108764901A (en) * | 2018-05-16 | 2018-11-06 | 深圳市咕噜科技有限公司 | Leasing method, system, equipment and storage medium based on block chain technology |
CN108898289A (en) * | 2018-06-13 | 2018-11-27 | 鹰投(上海)海洋科技发展有限公司 | Project completion management system and its implementation based on block chain |
CN112491551B (en) * | 2018-06-29 | 2023-01-20 | 创新先进技术有限公司 | Data verification method and device based on block chain and electronic equipment |
CN112491551A (en) * | 2018-06-29 | 2021-03-12 | 创新先进技术有限公司 | Data verification method and device based on block chain and electronic equipment |
CN110896659A (en) * | 2018-08-02 | 2020-03-20 | 刘卓 | Data processing method, node, block chain network and virtual data carrier |
CN110896659B (en) * | 2018-08-02 | 2024-02-09 | 刘卓 | Data processing method, node, blockchain network and virtual data carrier |
CN110826107A (en) * | 2018-08-14 | 2020-02-21 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN110826107B (en) * | 2018-08-14 | 2021-11-19 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN108985908A (en) * | 2018-09-10 | 2018-12-11 | 湖南智慧政务区块链科技有限公司 | Real estate information sharing method, device, computer readable storage medium |
CN109408521A (en) * | 2018-09-28 | 2019-03-01 | 上海擎沣投资控股有限公司 | A kind of method and device thereof for more new block chain global data state |
CN109639625A (en) * | 2018-10-17 | 2019-04-16 | 深圳市圆世科技有限责任公司 | A kind of trusted content distributing network method based on block chain |
CN109164780A (en) * | 2018-11-22 | 2019-01-08 | 北京八分量信息科技有限公司 | A kind of industrial field device control method based on edge calculations, apparatus and system |
CN109493196A (en) * | 2018-12-29 | 2019-03-19 | 杭州趣链科技有限公司 | A kind of real estate based on block chain deposits card and method of commerce |
CN109918874A (en) * | 2019-03-14 | 2019-06-21 | 上海优扬新媒信息技术有限公司 | A kind of material object information storage means and device, information searching method in kind and device |
CN110659967A (en) * | 2019-09-26 | 2020-01-07 | 腾讯科技(深圳)有限公司 | House management method and device based on block chain |
CN110659967B (en) * | 2019-09-26 | 2023-06-23 | 腾讯科技(深圳)有限公司 | House management method and device based on block chain |
CN111784339A (en) * | 2020-05-19 | 2020-10-16 | 杭州亿房达科技有限公司 | Commodity room project license file anti-counterfeiting and storage method based on block chain |
WO2022267185A1 (en) * | 2021-06-24 | 2022-12-29 | 安徽安时科技发展有限公司 | Blockchain network-based secure and efficient item transaction method and system, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107506661B (en) | 2020-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107506661A (en) | A kind of method of the generation house historical record based on block chain | |
CN109657450B (en) | Method, device, medium, and electronic device for evaluation based on block chain | |
CN102484638B (en) | Layered protection and validation of identity data delivered online via multiple intermediate clients | |
CN106031086B (en) | Method and system for generating device certificate and the validity for examining device certificate | |
AU755577B2 (en) | Method for securing safety of electronic information | |
JP4061270B2 (en) | Secure method and system for determining pricing and ensuring privacy | |
CN110400410A (en) | A kind of electronic voting system | |
US6622247B1 (en) | Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority | |
CN110224993A (en) | Anonymous Electronic Voting method and system of calling to account based on block chain | |
WO2002069557A1 (en) | Information processing apparatus and method, and storage medium | |
CN108197891A (en) | A kind of electronic signature device and method based on block chain | |
CN104537293A (en) | Authentication device and system | |
JP2012114907A (en) | Method for generating barcode symbols for printing on passport, method for verifying authenticity and data integrity of passport, computer system for generating barcode symbols for printing on passport, and computer program for verifying authenticity and data integrity of passport | |
CN110113334B (en) | Contract processing method and device based on block chain and storage medium | |
JP2007072608A (en) | Device information transmission program, service control program, device information transmission apparatus, service control device, and method for transmitting device information | |
CN109858911A (en) | Qualification verification method, device, system, equipment and readable storage medium storing program for executing | |
CN110493268A (en) | A kind of data processing method and device based on block chain network | |
CN112035896B (en) | Electronic contract evidence-storing system based on transaction mode | |
NL1032340C2 (en) | System and method for digitally signing data files. | |
CN103281180B (en) | User is protected to access the bill generation method of privacy in a kind of network service | |
CN111612457A (en) | Electronic voting method, device and storage medium based on block chain | |
CN110502931A (en) | A kind of internet arbitration and method for secret protection based on block chain | |
JP5278495B2 (en) | Device information transmission method, device information transmission device, device information transmission program | |
US20140245017A1 (en) | Digital Tachograph | |
CN112583826A (en) | Remote measurement method, monitoring method, device and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |