CN108737501A - A kind of DNA date storage methods, equipment and system based on block chain - Google Patents
A kind of DNA date storage methods, equipment and system based on block chain Download PDFInfo
- Publication number
- CN108737501A CN108737501A CN201810366022.8A CN201810366022A CN108737501A CN 108737501 A CN108737501 A CN 108737501A CN 201810366022 A CN201810366022 A CN 201810366022A CN 108737501 A CN108737501 A CN 108737501A
- Authority
- CN
- China
- Prior art keywords
- block
- client
- dna
- cryptographic hash
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
- H04L67/5682—Policies or rules for updating, deleting or replacing the stored data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The DNA date storage methods that this application provides a kind of based on block chain, based on DNA data-storage systems, computing device and the computer readable storage medium of block chain, be related to technical field of data storage.The DNA data-storage systems based on block chain include a server and multiple client, and the client includes data acquisition module, for obtaining at least one DNA data;The server includes authentication module, for being verified to the client, output verification message;The client further includes data add module, for when the verification message show the client validation by when, the DNA data are added in block chain.Technical solution provided by the present application builds distributed data-storage system according to the principle of resource-sharing, and can not distorting and finally realizing that the whole network is consistent for data is realized using block chain technology.
Description
Technical field
The application belongs to technical field of data processing more particularly to a kind of DNA date storage methods, base based on block chain
In DNA data-storage systems, computing device and the computer readable storage medium of block chain.
Background technology
In recent years, the development of DNA DNA science and technology concerning criminal matters is swift and violent, in the energy that raising public security organ fights crime
Power and the horizontal aspect of raising law enforcement have played increasingly important role.National public security organ successively establishes " section of court
A series of important information systems such as DNA databases ", " DNA Design of Laboratory Management System (abbreviation DNA-LIMS) ", in order to which case is detectd
It is broken to provide strong support.
In order to cope with the real-time comparison request of national DNA sample data, alignment schemes in the prior art may be summarized to be
" data report step by step, and hierarchical compares, as a result priority feedback."
Data report comparison that data are reported to districts and cities by district step by step, districts and cities be reported to it is provincial, it is provincial to be reported to portion
Grade system.District compares inside local system first, shows comparing result in time.In provincial node, only compare inside the province
Data between laboratory issue than middle result and feed back to laboratory.In ministerial level node, data transprovincially are only compared, than in
As a result it issues and feeds back to laboratory.By the above flow, the comparison between whole nation DNA data " sample two-by-two " is realized.
DNA Database Systems are in portion, province, city, the deployment of district multistage, by series of standards data-interface, by data by
Various regions laboratory is reported to city-level, provincial, finally in ministerial level library, by the docking and examination of multiple dna Database Systems.Its
In, ministerial level system lays particular emphasis on high ratio pair and transprovincially than the publication of middle result and the management and data statistics of each provincial system;
Provincial system lay particular emphasis on ensure data relay (including data report and compare in result issue) smoothness it is each precisely to manage this province
City-level system and data statistics;Districts and cities, district grade system are main actual combat units, are acquired, are examined with data, locally compared to be
The core of system application, target are to ensure correctness, the reliability of gene data.
It according to above-mentioned alignment schemes, needs to be reported to data into supervisory " forensic DNA profiling database " step by step, for saving
Grade and ministerial level, which compare node, prodigious comparison pressure.For a sample, " homotype " should be compared, compares " three simultaneously again
It is conjuncted ", by taking ministerial level system as an example:Each sample will compare 2 times, be equivalent to 68,500,000 samples in ministerial level library one by one
Ministerial level will compare 1.37 hundred million times.Country library, which receives, daily reports sample data about 5~60,000 or so, is equivalent to daily in ministerial level
It compares more than 8,000,000,000,000 times.Generally, larger pressure is caused for the comparison of forensic DNA profiling database portion level data.In order to
It is notified in quick Real-time Feedback ratio, current " forensic DNA profiling database " ministerial level increases comparison engine support extending transversely, increases
Add the handling capacity compared, improves the performance of comparison, but also increase a large amount of hardware cost simultaneously, and due to transport layer
The grade factors such as more, unstable networks of node, comparison result issue and feedback still remains delay issue, there is no essence solution
Certainly.
Above-mentioned traditional approach has cracked many important cases, but needs to put into a large amount of manpower, material resources and financial resources, and because of multistage
Framework, feedback need some cycles.Various regions DNA data successively report so that ministerial level DNA database datas and various regions DNA data
It is asynchronous.If period, any Primary Transmit went wrong, may lead to not normally handle.If some cases, such as
Effective timely processing cannot be obtained by cracking down on the abduction, it would be possible to be missed and most preferably be solved a case period.Further, since comparing province Room DNALIMS
Database efficiency is relatively low and total data is not reported to the province Room by the whole province various regions, causes comparison result barely satisfactory, still need to
Laboratories at different levels send a large amount of inspections by hand and compare notification.
Therefore, a kind of new scheme how is provided, it is this field skill urgently to be resolved hurrily that can solve above-mentioned technical problem
Art problem.
Invention content
In view of this, this application provides a kind of DNA date storage methods based on block chain, the DNA based on block chain
Data-storage system, computing device and computer readable storage medium build distributed data according to the principle of resource-sharing
Storage system, using block chain technology realize data can not distort and finally realize the whole network it is consistent.
To achieve the above object, it is as follows to provide technical solution by the application:
According to the first aspect of the application, it is proposed that a kind of DNA date storage methods based on block chain, the method are answered
For the DNA data-storage systems based on block chain, the system comprises a server and multiple client, the method packets
It includes:
The client obtains at least one DNA data;
When the server export the client validation by message when, the client adds the DNA data
It adds in block chain.
Preferably, the method further includes:
The client sends logging request to the server, and it is corresponding that the logging request carries the client
IP address and/or certificate information;
The server obtains pre-stored multiple IP address and/or certificate information;
When the corresponding IP address of the client and/or certificate information are recorded in the pre-stored multiple IP of the server
When address and/or certificate information, the server export the client validation by message.
Preferably, the DNA data are added to block chain and include by the client:
The client forms a block according to the DNA data;
The corresponding block of the DNA data is sent to all clients by the client;
All clients respectively individually verify the block, output verification message;
When the number that display block is verified in the verification message of all clients output is more than a preset threshold
When value, the block is added in block chain by all clients, otherwise, deletes the block.
Preferably, the client includes according to the DNA data one block of formation:
The client obtains the cryptographic Hash of the last one block in the block chain, referred to as the first cryptographic Hash;
It is based on hash algorithm according to first cryptographic Hash and the DNA data and exports the corresponding Kazakhstan of the DNA data
Uncommon value;
Block, the area are formed according to the corresponding cryptographic Hash of the DNA data, DNA data and first cryptographic Hash
Block is the corresponding block of the DNA data.
Preferably, all clients respectively individually verify the block, and output verification message includes:
All clients obtain out the first cryptographic Hash from the block;
All clients obtain out the cryptographic Hash of the last one block from the last one block of the block chain,
Referred to as the second cryptographic Hash;
When first cryptographic Hash is identical as second cryptographic Hash, the verification message that block is verified is exported;
When first cryptographic Hash and the second cryptographic Hash difference, output block verifies unsanctioned verification message.
Preferably, the method further includes:
The client receives at least one DNA comparings request, and at least one is carried in the DNA comparings request
A DNA data to be compared;
Obtain the DNA data stored in each block on the block chain;
The DNA data to be compared are compared with the DNA data stored in each block, output compares knot
Fruit.
According to the second aspect of the application, it is proposed that a kind of DNA data-storage systems based on block chain, the system packet
A server and multiple client are included,
The client includes data acquisition module, for obtaining at least one DNA data;
The server includes authentication module, for being verified to the client, output verification message;
The client further includes data add module, shows that the client validation passes through for working as the verification message
When, the DNA data are added in block chain.
Pre-selection, the client further includes:
Logging request sending module, for sending logging request to the server, the logging request carries described
The corresponding IP address of client and/or certificate information;
The server further includes:
Data obtaining module is stored, for obtaining pre-stored multiple IP address and/or certificate information;
The authentication module includes:
First authentication module is recorded in and prestores for working as the corresponding IP address of the client and/or certificate information
Multiple IP address and/or certificate information when, export the client validation by message;
Second authentication module is not recorded in and deposits in advance for working as the corresponding IP address of the client and/or certificate information
When the multiple IP address and/or certificate information of storage, the not verified message of the client is exported.
Preferably, the data add module includes:
Block forms module, for forming a block according to the DNA data;
Data transmission blocks, for the corresponding block of the DNA data to be sent to the client;
Block authentication module, for individually being verified to the block, output verification message;
Block add module, for when in the verification message number that is verified of display block be more than one to preset
Threshold value when, the block is added in block chain;
Block removing module, for when in the verification message the not verified number of display block be more than one to set in advance
When fixed threshold value, the block is deleted.
Preferably, the block formation module includes:
Cryptographic Hash acquisition module, the cryptographic Hash for obtaining the last one block in the block chain, referred to as the first Hash
Value;
Cryptographic Hash determining module, for being exported based on hash algorithm according to first cryptographic Hash and the DNA data
The corresponding cryptographic Hash of the DNA data;
Block determining module, for according to the corresponding cryptographic Hash of the DNA data, DNA data and first Hash
Value forms block, and the block is the corresponding block of the DNA data.
Preferably, the block authentication module includes:
First cryptographic Hash acquisition module, for obtaining out the first cryptographic Hash from the block;
Second cryptographic Hash acquisition module, for obtained out from the last one block of the block chain it is described the last one
The cryptographic Hash of block, referred to as the second cryptographic Hash;
First verification message output module, for when first cryptographic Hash is identical as second cryptographic Hash, exporting
The verification message that block is verified;
Second verification message output module, for when first cryptographic Hash is with the second cryptographic Hash difference, exporting
Block verifies unsanctioned verification message.
Preferably, the client further includes:
Request receiving module is compared, for receiving at least one DNA comparings request, the DNA comparings request
It is middle to carry at least one DNA data to be compared;
DNA data acquisition modules, for obtaining the DNA data stored in each block on the block chain;
DNA data comparing modules, the DNA numbers for will be stored in the DNA data to be compared and each block
According to being compared, comparison result is exported.
According to the third aspect of the application, it is proposed that a computing device, the computing device include:It is adapted for carrying out each instruction
Processor and storage device, the storage device be stored with a plurality of instruction, described instruction is suitable for being loaded and being held by processor
Row:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
According to the fourth aspect of the application, it is proposed that a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and the computer program is for executing:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
By above technical scheme as it can be seen that the application builds distributed data-storage system, profit according to the principle of resource-sharing
With block chain technology realize data can not distort and finally realize the whole network it is consistent, when client need carry out DNA comparings
When, it need to only be compared in local block chain, comparison result returns immediately, realizes quick, real-time comparing, shortens and compares
Period improves comparison efficiency.
For the above and other objects, features and advantages of the application can be clearer and more comprehensible, preferred embodiment cited below particularly,
And coordinate institute's accompanying drawings, it is described in detail below.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments described in application, for those of ordinary skill in the art, in the premise of not making the creative labor property
Under, other drawings may also be obtained based on these drawings.
Fig. 1 shows a kind of flow diagram of DNA date storage methods based on block chain provided by the present application;
Fig. 2 shows a kind of streams of the embodiment two of the DNA date storage methods based on block chain provided by the present application
Journey schematic diagram;
Fig. 3 shows the flow diagram of the step S205 in Fig. 2;
Fig. 4 shows the flow diagram of the step S301 in Fig. 3;
Fig. 5 shows the flow diagram of the step S303 in Fig. 3;
Fig. 6 shows a kind of stream of the embodiment three of DNA date storage methods based on block chain provided by the present application
Journey schematic diagram;
Fig. 7 shows a kind of structure diagram of DNA data-storage systems based on block chain provided by the present application;
Fig. 8 shows the embodiment party of client in a kind of DNA data-storage systems based on block chain provided by the present application
The structure diagram of formula one;
Fig. 9 shows the structural frames of server in a kind of DNA data-storage systems based on block chain provided by the present application
Figure;
Figure 10 shows the structure diagram of authentication module in server;
Figure 11 shows the structure diagram of data add module in client;
Figure 12 shows the structure diagram of block formation module in client;
Figure 13 shows the structure diagram of block authentication module in client;
Figure 14 shows the embodiment party of client in a kind of DNA data-storage systems based on block chain provided by the present application
The structure diagram of formula two;
Figure 15 shows the schematic diagram of adjacent block in block chain provided by the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
Below with reference to several representative embodiments of the application, the principle and spirit of the application are illustrated in detail.
Although this application provides such as following embodiments or method operating procedure shown in the drawings or apparatus structure, it is based on
Conventional may include either more or less operating procedure or mould in the method or device without performing creative labour
Module unit.In the step of there is no necessary causalities in logicality or structure, the execution sequences of these steps or device
Modular structure is not limited to the embodiment of the present application or execution shown in the drawings sequence or modular structure.The method or modular structure
Device in practice or end product in application, can according to embodiment or method shown in the drawings or modular structure into
Row sequence executes or parallel execution.
Below with reference to several representative embodiments of the application, the principle and spirit of the application are illustrated in detail.
The system for the DNA data storage based on block chain that this application provides a kind of, Fig. 7 is the structural representation of the system
Figure, referring to Fig. 7, system provided by the present application includes a server 100 and multiple client 200.
Block chain in DNA data-storage systems provided by the present application has applied to P2P (peer-to-peer) principle, such as
Fruit block chain is only stored on a machine, and when the machine is offline, then other machines will be unable to obtain information.Therefore, block
The last state of chain needs to be synchronized on all machines, these machines are known as " node ".These nodes ensure data by P2P
It is latest edition.In this application, multiple client 200 is " node ".Specific to DNA field of data storage, client refers to
Be all laboratories DNA in the whole nation.
In order to ensure the node that each area data in the block of block chain may only be joined uses, it is provided with dedicated clothes
Business device, i.e., the server 100 in the application.
Fig. 8 shows the structure diagram of the embodiment one of client, referring to Fig. 8, in presently filed embodiment one
In, the client includes:
Logging request sending module 203, for sending logging request to the server, the logging request carries
State the corresponding IP address of client and/or certificate information.
Fig. 9 shows the structure diagram of server in the application, referring to Fig. 9, the server 100 includes:
Data obtaining module 102 is stored, for obtaining pre-stored multiple IP address and/or certificate information.In this Shen
Please in, which has recorded the IP address and/or certificate information of all nodes (i.e. client) joined.All sections joined
Point can there are one the mechanism of common recognition.Common recognition mechanism is exactly one group of rule, is reached an agreement by runs software by the node in network.This
A little rules ensure that network security works and keeps synchronous.
Authentication module 101, for being verified to the client, output verification message.
Figure 10 shows the structure diagram of authentication module 101 in server 100, referring to Fig. 10, the authentication module 101
Including:
First authentication module 1011 is recorded in advance for working as the corresponding IP address of the client and/or certificate information
Storage multiple IP address and/or certificate information when, export the client validation by message;
Second authentication module 1012, for work as the corresponding IP address of the client and/or certificate information be not recorded in it is pre-
When the multiple IP address and/or certificate information that first store, the not verified message of the client is exported.
That is, when server receives the logging request that at least one client is sent, solved from logging request first
The corresponding IP address of the client and/or certificate information is precipitated, then verifies the corresponding IP address of the client and/or certificate letter
Whether breath is recorded in pre-stored multiple IP address and/or certificate information.When verification is the result shows that the client is corresponding
When IP address and/or certificate information are recorded in pre-stored multiple IP address and/or certificate information, then it is assumed that current visitor
Family end belongs to the client joined, thus server export the client validation by message.The result shows that it should when verification
When the corresponding IP address of client and/or certificate information are not recorded in pre-stored multiple IP address and/or certificate information,
Then think the client that current client is not belonging to join, therefore server exports that the client is not verified to disappear
Breath.
Referring to Fig. 8, after verification of the client by server, in presently filed embodiment one, institute
Stating client further includes:
Data acquisition module 201, for obtaining at least one DNA data.
Data add module 202, for the DNA data to be added in block chain.Figure 11 shows that data add mould
The structure diagram of block 202, please refers to Fig.1 1, and the data add module 202 includes:
Block forms module 2021, for forming a block according to the DNA data;
Data transmission blocks 2022, for the corresponding block of the DNA data to be sent to the client.
Block authentication module 2023, for individually being verified to the block, output verification message;
Block add module 2024, for being more than one advance when the number that display block is verified in the verification message
When the threshold value of setting, the block is added in block chain;
Block removing module 2025, for being more than one pre- when the not verified number of display block in the verification message
When the threshold value first set, the block is deleted.
In a kind of embodiment of the application, the corresponding block of DNA data can be sent to described by data transmission blocks
Client, when client herein refers to getting other all clients except the client of the DNA data, that is,
In specific schematic diagram shown in Fig. 7, it is assumed that client is 10, wherein first client has got DNA data, then should
The block that the DNA data are formed is sent to other 9 clients by client.The block of other 9 clients verifies mould at this time
Block 2023 respectively individually verifies the block, output verification message, when server determines that the block of 9 clients is tested
When the number that the verification message display region block of card module output is verified is more than preset threshold value (such as 5), then recognize
To reach common understanding, current block is added in block chain by all clients, otherwise deletes the block.
In a kind of embodiment of the application, the corresponding block of DNA data can be sent to described by data transmission blocks
Client, when client herein refers to all clients of the system, that is, in specific schematic diagram shown in Fig. 7, it is assumed that
Client is 10, wherein first client has got DNA data, then the block that the client forms the DNA data
It is sent to 10 all clients.The block authentication module 2023 of all 10 clients respectively carries out the block at this time
Individually verification, output verification message, when server determines that the verification message of the block authentication module output of 10 clients is aobvious
When showing that the number that block is verified is more than preset threshold value (such as 6), then it is assumed that reach common understanding, all clients will
Current block may be added to that in block chain, otherwise delete the block.
Figure 12 shows the structure diagram of block formation module in client, please refers to Fig.1 2, the block forms module
2021 include:
Cryptographic Hash acquisition module 20211, the cryptographic Hash for obtaining the last one block in the block chain, referred to as first
Cryptographic Hash;
Cryptographic Hash determining module 20212, for being based on hash algorithm according to first cryptographic Hash and the DNA data
Export the corresponding cryptographic Hash of the DNA data;
Block determining module 20213, for according to the corresponding cryptographic Hash of the DNA data, DNA data and described first
Cryptographic Hash forms block, and the block is the corresponding block of the DNA data.
Figure 15 shows the schematic diagram of adjacent block in block chain provided by the present application, refers to Figure 15, every in block chain
A block includes cryptographic Hash, the data of current block, the cryptographic Hash of current block of a upper block.Specifically, such as Figure 15
Shown, the cryptographic Hash of a upper block is in 1Z8F, with Figure 15 marked as 1 area cryptographic Hash in the block in the block of label 2
1Z8F is identical.Marked as in 3 block, the cryptographic Hash of a upper block is 6BQ1, and marked as 2 area cryptographic Hash in the block
6BQ1 is identical.Therefore, the cryptographic Hash for the upper block that each block records on block chain needs and the Kazakhstan of a upper block
When uncommon value is coincide, two neighboring block can be just linked.
Therefore, block forms cryptographic Hash i.e. the first Hash that module 2021 obtains the last one block in block chain first
Then value determines that the corresponding cryptographic Hash of current block, the cryptographic Hash are stored with the first cryptographic Hash and current block needs
DNA data are related, and the corresponding cryptographic Hash of DNA data can be calculated according to hash algorithm in the first cryptographic Hash and DNA data,
Block is finally formed according to the corresponding cryptographic Hash of DNA data, DNA data and first cryptographic Hash, the block is institute
State the corresponding block of DNA data.Hash algorithm mentioned herein can realize according to hash algorithm in the prior art, the application
This is not construed as limiting.
Figure 13 shows the structure diagram of block authentication module in client, please refers to Fig.1 3, block authentication module 2023
Including:
First cryptographic Hash acquisition module 20231, for obtaining out the first cryptographic Hash from the block;
Second cryptographic Hash acquisition module 20232, for obtained out from the last one block of the block chain it is described most
The cryptographic Hash of the latter block, referred to as the second cryptographic Hash;
First verification message output module 20233, is used for when first cryptographic Hash is identical as second cryptographic Hash,
The verification message that output block is verified;
Second verification message output module 20234 is used for when first cryptographic Hash and the second cryptographic Hash difference,
It exports block and verifies unsanctioned verification message.
That is, by comparing the cryptographic Hash of the upper block stored in the block that block formation module generates and working as proparea
Whether the cryptographic Hash of the last one block is identical in block chain, you can determines whether current block passes through verification.When block is formed
When the cryptographic Hash of a upper block stored in the block that module generates is tampered, i.e., with the last one block in current block chain
Cryptographic Hash it is different, i.e. unsanctioned verification message is verified in output at this time.
As above it is a kind of DNA data-storage systems based on block chain provided by the present application, is protected in each client
Deposit newest block chain.The block chain that the application refers to is a kind of data structure in brief, it is that a record institute is busy
The daily record of business record.It is analogous to a daily record not write, every page has information, footer to write number of pages, therefore at once can
To know just in which page.As book, each " block " is exactly one page in block chain, records details.Do not have in " block "
Number of pages, but having time is stabbed.New block is always added to after newest piece after by verification.It is stored in DNA data and is
In system, the DNA data of all clients joined, the Hash of current block cryptographic Hash, a upper block are record in each block
Value, in addition to this may also include the information such as timestamp, user's signature.The amount of each area's DNA data in the block can according to demand into
Row is adjusted.According to the principle of resource-sharing, the distributed data-storage system of construction realizes that data can not using block chain technology
Distort, final the whole network it is consistent.
A kind of DNA data-storage systems based on block chain provided by the present application as introduced above, are described below for this
How the DNA data-storage systems based on block chain that application provides carry out the comparison of DNA data.
In this application, all laboratories DNA alternative is joined, and is issued in DNA data to other nodes of network.Its
His information alliance member only has the access right after permitting, without right of disposal, it is ensured that the safety of data.Such as lab A can
To upload, the DNA data of oneself are changed, but can only check the data of laboratory B, have no right to change it.The laboratory joined
Constantly update sharing data, it is ensured that possess latest edition, efficiently accomplish required comparison business.
Figure 14 shows the embodiment party of client in a kind of DNA data-storage systems based on block chain provided by the present application
The structure diagram of formula two, please refers to Fig.1 4, and client further includes in embodiment two:
Request receiving module 203 is compared, for receiving at least one DNA comparings request, the DNA comparings are asked
It asks middle and carries at least one DNA data to be compared;
DNA data acquisition modules 204, for obtaining the DNA data stored in each block on the block chain;
DNA data comparing modules 205, the DNA for will be stored in the DNA data to be compared and each block
Data are compared, and export comparison result.
Specifically, when DNA data to be compared are consistent with the DNA comparings stored in a block, then comparison is exported
Successful comparison result, the DNA data stored in the exportable block in the comparison result, identity information etc..
When the DNA comparings stored in DNA data to be compared and all blocks are inconsistent, then export comparison and lose
The comparison result lost.
Since DNA data-storage systems provided by the present application change existing technical architecture, using distributed P 2 P
Mode be compared with comparison result feed back, data are stored and transmitted using block chain technology.Therefore, all DNA in the whole nation
The DNA data that laboratory obtains, are entered into " the forensic DNA profiling database " and DNA laboratory room managings in each laboratories DNA at first
System (abbreviation DNA-LIMS), the data summation in each laboratories DNA and " forensic DNA profiling database " ministerial level equivalent, and when
Effect property is more preferable.When comparison task is initiated in a laboratory, it need to only be compared in local block chain link point library, than middle result
It returns immediately.Which is realized quickly, real-time comparing mode using the idle computing resources in the whole nation laboratories DNA,
Than traditional alignments step by step in the efficiency of feedback result, 1 order of magnitude or more is improved.
The present invention also provides a kind of computer equipments, including are adapted for carrying out the processor and storage device of each instruction,
The storage device is stored with a plurality of instruction, and described instruction is suitable for being loaded and being executed by processor:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
The present invention also provides a kind of computer readable storage mediums, are stored with computer program, the computer program
For executing:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
In addition, although being referred to several unit modules of system in above-detailed, it is this to divide only simultaneously
Non-imposed.In fact, according to the embodiment of the present invention, the feature and function of two or more above-described units can
To embody in a unit.Equally, the feature and function of an above-described unit can also be further divided by
Multiple units embody.Terms used above " module " and " unit ", can be realize predetermined function software and/or
Hardware.Although module described in following embodiment is preferably realized with software, the group of hardware or software and hardware
The realization of conjunction is also that may and be contemplated.
It is set in the system for the DNA data storage based on block chain for describing exemplary embodiment of the invention, computer
After standby, computer readable storage medium, next, refer to the attached drawing is situated between to the method for exemplary embodiment of the invention
It continues.The implementation of this method may refer to above-mentioned whole implementation, and overlaps will not be repeated.
Fig. 1 shows a kind of flow diagram of DNA date storage methods based on block chain provided by the present application, please join
Fig. 1 is read, this method includes:
S101:Client obtains at least one DNA data.
Block chain in DNA data-storage systems provided by the present application has applied to P2P (peer-to-peer) principle, such as
Fruit block chain is only stored on a machine, and when the machine is offline, then other machines will be unable to obtain information.Therefore, block
The last state of chain needs to be synchronized on all machines, these machines are known as " node ".These nodes ensure data by P2P
It is latest edition.In this application, multiple client 200 is " node ".Specific to DNA field of data storage, client refers to
Be all laboratories DNA in the whole nation, all laboratories DNA alternative is joined.
In order to ensure the node that each area data in the block of block chain may only be joined uses, it is provided with dedicated clothes
Business device, i.e., the server 100 in the application.
S102:When the server export the client validation by message when, the client is by the DNA numbers
According to being added in block chain.
Fig. 2 shows a kind of streams of the embodiment two of the DNA date storage methods based on block chain provided by the present application
Journey schematic diagram, referring to Fig. 2, this method includes in embodiment two:
S201:Client sends logging request to the server, and the logging request carries the client and corresponds to
IP address and/or certificate information;
S202:Server obtains pre-stored multiple IP address and/or certificate information.In this application, the server
Have recorded the IP address and/or certificate information of all nodes (i.e. client) joined.All nodes joined can there are one altogether
Knowledge mechanism.Common recognition mechanism is exactly one group of rule, is reached an agreement by runs software by the node in network.These rules ensure net
Network trouble free service simultaneously keeps synchronous.
S203:When the corresponding IP address of the client and/or certificate information are recorded in pre-stored multiple IP address
And/or when certificate information, server export the client validation by message.
That is, when server receives the logging request that at least one client is sent, solved from logging request first
The corresponding IP address of the client and/or certificate information is precipitated, then verifies the corresponding IP address of the client and/or certificate letter
Whether breath is recorded in pre-stored multiple IP address and/or certificate information.When verification is the result shows that the client is corresponding
When IP address and/or certificate information are recorded in pre-stored multiple IP address and/or certificate information, then it is assumed that current visitor
Family end belongs to the client joined, thus server export the client validation by message.The result shows that it should when verification
When the corresponding IP address of client and/or certificate information are not recorded in pre-stored multiple IP address and/or certificate information,
Then think the client that current client is not belonging to join, therefore server exports that the client is not verified to disappear
Breath.
S204:Client obtains at least one DNA data.
S205:The DNA data are added in block chain by client.
Fig. 3 shows the flow diagram of step S205, referring to Fig. 3, the step includes:
S301:Client forms a block according to the DNA data;
S302:The corresponding block of the DNA data is sent to the client.
S303:The block is individually verified, output verification message;
S304:It, will when the number that display block is verified in the verification message is more than a preset threshold value
The block is added in block chain;Otherwise, the block is deleted.
In a kind of embodiment of the application, the corresponding block of DNA data can be sent to the client by step S302
End, when client herein refers to getting other all clients except the client of the DNA data, that is, in Fig. 7
Shown in specific schematic diagram, it is assumed that client is 10, wherein first client has got DNA data, then the client
The block that the DNA data are formed is sent to other 9 clients by end.The block authentication module of other 9 clients at this time
2023 respectively individually verify the block, output verification message, when server determines the block verification of 9 clients
When the number that the verification message display region block of module output is verified is more than preset threshold value (such as 5), then it is assumed that
Reach common understanding, current block is added in block chain by all clients, otherwise deletes the block.
In a kind of embodiment of the application, the corresponding block of DNA data can be sent to the client by step S302
End, when client herein refers to all clients of the system, that is, in specific schematic diagram shown in Fig. 7, it is assumed that client
End is 10, wherein first client has got DNA data, then the block that the client forms the DNA data is sent
To 10 all clients.The block authentication module 2023 of all 10 clients respectively carries out the block independent at this time
Verification, output verification message, when server determines the verification message display region of the block authentication module output of 10 clients
When the number that block is verified is more than preset threshold value (such as 6), then it is assumed that reach common understanding, all clients will be current
Block may be added to that in block chain, otherwise delete the block.
Fig. 4 shows the flow diagram of step S301, referring to Fig. 4, the step includes:
S401:Client obtains the cryptographic Hash of the last one block in the block chain, referred to as the first cryptographic Hash;
S402:It is based on hash algorithm according to first cryptographic Hash and the DNA data and exports the DNA data correspondence
Cryptographic Hash.
S403:Block, institute are formed according to the corresponding cryptographic Hash of the DNA data, DNA data and first cryptographic Hash
It is the corresponding block of the DNA data to state block.
Figure 15 shows the schematic diagram of adjacent block in block chain provided by the present application, refers to Figure 15, every in block chain
A block includes cryptographic Hash, the data of current block, the cryptographic Hash of current block of a upper block.Specifically, such as Figure 15
Shown, the cryptographic Hash of a upper block is in 1Z8F, with Figure 15 marked as 1 area cryptographic Hash in the block in the block of label 2
1Z8F is identical.Marked as in 3 block, the cryptographic Hash of a upper block is 6BQ1, and marked as 2 area cryptographic Hash in the block
6BQ1 is identical.Therefore, the cryptographic Hash for the upper block that each block records on block chain needs and the Kazakhstan of a upper block
When uncommon value is coincide, two neighboring block can be just linked.
Therefore, step S301 obtains cryptographic Hash i.e. the first cryptographic Hash of the last one block in block chain first, then really
The corresponding cryptographic Hash of current block is made, which needs the DNA data phases stored with the first cryptographic Hash and current block
It closes, the corresponding cryptographic Hash of DNA data, last basis can be calculated according to hash algorithm in the first cryptographic Hash and DNA data
The corresponding cryptographic Hash of DNA data, DNA data and first cryptographic Hash form block, and the block is the DNA data
Corresponding block.Hash algorithm mentioned herein can realize that the application does not make this according to hash algorithm in the prior art
It limits.
Fig. 5 shows the flow diagram of step S303, referring to Fig. 5, the step includes:
S501:Client obtains out the first cryptographic Hash from the block;
S502:The cryptographic Hash of the last one block is obtained out from the last one block of the block chain, referred to as
Second cryptographic Hash.
S503:When first cryptographic Hash is identical as second cryptographic Hash, the verification that output block is verified disappears
Breath;
S504:When first cryptographic Hash and the second cryptographic Hash difference, output block verifies unsanctioned verification
Message.
That is, in the cryptographic Hash of the upper block stored in the block generated by step S301 and current block chain most
Whether the cryptographic Hash of the latter block is identical, you can determines whether current block passes through verification.When the area that step S301 is generated
When the cryptographic Hash of the upper block stored in block is tampered, i.e., not with the cryptographic Hash of the last one block in current block chain
Together, i.e. unsanctioned verification message is verified in output at this time.
As above it is a kind of DNA date storage methods based on block chain provided by the present application, is protected in each client
Deposit newest block chain.The block chain that the application refers to is a kind of data structure in brief, it is that a record institute is busy
The daily record of business record.It is analogous to a daily record not write, every page has information, footer to write number of pages, therefore at once can
To know just in which page.As book, each " block " is exactly one page in block chain, records details.Do not have in " block "
Number of pages, but having time is stabbed.New block is always added to after newest piece after by verification.It is stored in DNA data and is
In system, the DNA data of all clients joined, the Hash of current block cryptographic Hash, a upper block are record in each block
Value, in addition to this may also include the information such as timestamp, user's signature.The amount of each area's DNA data in the block can according to demand into
Row is adjusted.According to the principle of resource-sharing, the distributed data-storage system of construction realizes that data can not using block chain technology
Distort, final the whole network it is consistent.
A kind of DNA date storage methods based on block chain provided by the present application as introduced above, are described below for this
How the DNA date storage methods based on block chain that application provides carry out the comparison of DNA data.
In this application, all laboratories DNA alternative is joined, and is issued in DNA data to other nodes of network.Its
His information alliance member only has the access right after permitting, without right of disposal, it is ensured that the safety of data.Such as lab A can
To upload, the DNA data of oneself are changed, but can only check the data of laboratory B, have no right to change it.The laboratory joined
Constantly update sharing data, it is ensured that possess latest edition, efficiently accomplish required comparison business.
Fig. 6 shows a kind of stream of the embodiment three of DNA date storage methods based on block chain provided by the present application
Journey schematic diagram, referring to Fig. 6, this method includes in embodiment three:
S601:Client obtains at least one DNA data;
S602:When server export client validation by message when, the DNA data are added to block by client
In chain;
S603:At least one DNA comparings request is received, at least one wait for is carried in the DNA comparings request
The DNA data of comparison;
S604:Obtain the DNA data stored in each block on the block chain;
S605:The DNA data to be compared are compared with the DNA data stored in each block, are exported
Comparison result.
Specifically, when DNA data to be compared are consistent with the DNA comparings stored in a block, then comparison is exported
Successful comparison result, the DNA data stored in the exportable block in the comparison result, identity information etc..
When the DNA comparings stored in DNA data to be compared and all blocks are inconsistent, then export comparison and lose
The comparison result lost.
Since DNA date storage methods provided by the present application change existing technical architecture, using distributed P 2 P
Mode be compared with comparison result feed back, data are stored and transmitted using block chain technology.Therefore, all DNA in the whole nation
The DNA data that laboratory obtains, are entered into " the forensic DNA profiling database " and DNA laboratory room managings in each laboratories DNA at first
System (abbreviation DNA-LIMS), the data summation in each laboratories DNA and " forensic DNA profiling database " ministerial level equivalent, and when
Effect property is more preferable.When comparison task is initiated in a laboratory, it need to only be compared in local block chain link point library, than middle result
It returns immediately.Which is realized quickly, real-time comparing mode using the idle computing resources in the whole nation laboratories DNA,
Than traditional alignments step by step in the efficiency of feedback result, 1 order of magnitude or more is improved.
Technical solution provided by the present application, creative proposition distribution DNA compare pattern, solve existing DNA countries
The defect that library systemic hierarchial compares, significantly improves the efficiency that base's case is investigated and prosecuted, powerful support is provided for cracking of cases.
Beneficial effects of the present invention include:
It is at different levels without being successively reported to, improve whole nation DNA Inter-laboratory comparisons working efficiencies.
In many places, storage ensures that Information Security, integrality prevent server is offline from can not access to distributed data.
It should be noted that although describing the operation of the method for the present invention with particular order in the accompanying drawings, this is not required that
Or imply and must execute these operations according to the particular order, it could the realization phase or have to carry out operation shown in whole
The result of prestige.Additionally or alternatively, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/or will
One step is decomposed into execution of multiple steps.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or noninvasive
The means for the property made may include more or less operating procedure.The step of being enumerated in embodiment sequence is only numerous steps
A kind of mode in execution sequence does not represent and unique executes sequence.It, can when device or client production in practice executes
With according to embodiment, either method shown in the drawings sequence is executed or parallel executed (such as at parallel processor or multithreading
The environment of reason, even distributed data processing environment).The terms "include", "comprise" or its any other variant are intended to contain
Lid non-exclusive inclusion, so that process, method, product or equipment including a series of elements are not only wanted including those
Element, but also include other elements that are not explicitly listed, or further include for this process, method, product or equipment
Intrinsic element.In the absence of more restrictions, be not precluded including the element process, method, product or
There is also other identical or equivalent elements in person's equipment.
Unit, device or module that above-described embodiment illustrates etc. can specifically realize by computer chip or entity, or
It is realized by the product with certain function.For convenience of description, various modules point are divided into function when describing apparatus above
It does not describe.It certainly, when implementing the application can the function of each module is real in the same or multiple software and or hardware
It is existing, the module for realizing same function can also be realized by the combination of multiple submodule or subelement etc..Dress described above
Set that embodiment is only schematical, for example, the division of the unit, only a kind of division of logic function, in actual implementation
There may be another division manner, such as multiple units or component can be combined or can be integrated into another system or one
A little features can be ignored, or not execute.Another point, shown or discussed mutual coupling or direct-coupling or communication link
It can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit to connect, and can be electrical, machinery or other shapes
Formula.
It is also known in the art that other than realizing controller in a manner of pure computer readable program code, it is complete
Entirely can by by method and step carry out programming in logic come so that controller with logic gate, switch, application-specific integrated circuit, programmable
The form of logic controller and embedded microcontroller etc. realizes identical function.Therefore this controller is considered one kind
Hardware component, and the structure that the device for realizing various functions that its inside includes can also be considered as in hardware component.Or
Person even, can will be considered as either the software module of implementation method can be hardware again for realizing the device of various functions
Structure in component.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Usually, program module includes routines performing specific tasks or implementing specific abstract data types, program, object, group
Part, data structure, class etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environments,
By executing task by the connected remote processing devices of communication network.In a distributed computing environment, program module can
With in the local and remote computer storage media including storage device.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can
It is realized by the mode of software plus required general hardware platform.Based on this understanding, the technical solution essence of the application
On in other words the part that contributes to existing technology can be expressed in the form of software products, the computer software product
It can be stored in a storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are used so that a computer equipment
(can be personal computer, mobile terminal, server either network equipment etc.) executes each embodiment of the application or implementation
Method described in certain parts of example.
Each embodiment in this specification is described by the way of progressive, same or analogous portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.The application can be used for crowd
In mostly general or special purpose computing system environments or configuration.Such as:Personal computer, server computer, handheld device or
Portable device, laptop device, multicomputer system, microprocessor-based system, set top box, programmable electronics set
Standby, network PC, minicomputer, mainframe computer include the distributed computing environment etc. of any of the above system or equipment.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application there are many deformation and
Variation is without departing from spirit herein, it is desirable to which the attached claims include these deformations and change without departing from the application's
Spirit.
Claims (14)
1. a kind of DNA date storage methods based on block chain, which is characterized in that the method is applied to based on block chain
DNA data-storage systems, the system comprises a server and multiple client, the method includes:
The client obtains at least one DNA data;
When the server export the client validation by message when, the DNA data are added to by the client
In block chain.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
The client sends logging request to the server, and the logging request is with carrying the corresponding IP of the client
Location and/or certificate information;
The server obtains pre-stored multiple IP address and/or certificate information;
When the corresponding IP address of the client and/or certificate information are recorded in the pre-stored multiple IP address of the server
And/or when certificate information, the server export the client validation by message.
3. method according to claim 1 or 2, which is characterized in that the DNA data are added to block by the client
Chain includes:
The client forms a block according to the DNA data;
The corresponding block of the DNA data is sent to all clients by the client;
All clients respectively individually verify the block, output verification message;
When the number that display block is verified in the verification message of all clients output is more than a preset threshold value,
The block is added in block chain by all clients, otherwise, deletes the block.
4. according to the method described in claim 3, it is characterized in that, the client forms a block according to the DNA data
Including:
The client obtains the cryptographic Hash of the last one block in the block chain, referred to as the first cryptographic Hash;
It is based on hash algorithm according to first cryptographic Hash and the DNA data and exports the corresponding cryptographic Hash of the DNA data;
Block is formed according to the corresponding cryptographic Hash of the DNA data, DNA data and first cryptographic Hash, the block is
For the corresponding block of the DNA data.
5. according to the method described in claim 4, it is characterized in that, all clients respectively individually test the block
Card, output verification message include:
All clients obtain out the first cryptographic Hash from the block;
All clients obtain out the cryptographic Hash of the last one block from the last one block of the block chain, referred to as
Second cryptographic Hash;
When first cryptographic Hash is identical as second cryptographic Hash, the verification message that block is verified is exported;
When first cryptographic Hash and the second cryptographic Hash difference, output block verifies unsanctioned verification message.
6. according to the method described in claim 1, it is characterized in that, the method further includes:
The client receives at least one DNA comparings request, and at least one wait for is carried in the DNA comparings request
The DNA data of comparison;
Obtain the DNA data stored in each block on the block chain;
The DNA data to be compared are compared with the DNA data stored in each block, export comparison result.
7. a kind of DNA data-storage systems based on block chain, which is characterized in that the system comprises a servers and multiple
Client,
The server includes authentication module, for being verified to the client, output verification message;
The client includes data acquisition module, for obtaining at least one DNA data;
Data add module, for when the verification message show the client validation by when, by the DNA data addition
Into block chain.
8. system according to claim 7, which is characterized in that the client further includes:
Logging request sending module, for sending logging request to the server, the logging request carries the client
Hold corresponding IP address and/or certificate information;
The server further includes:
Data obtaining module is stored, for obtaining pre-stored multiple IP address and/or certificate information;
The authentication module includes:
First authentication module, for work as the corresponding IP address of the client and/or certificate information be recorded in it is pre-stored more
When a IP address and/or certificate information, export the client validation by message;
Second authentication module, for work as the corresponding IP address of the client and/or certificate information be not recorded in it is pre-stored
When multiple IP address and/or certificate information, the not verified message of the client is exported.
9. system according to claim 7 or 8, which is characterized in that the data add module includes:
Block forms module, for forming a block according to the DNA data;
Data transmission blocks, for the corresponding block of the DNA data to be sent to the client;
Block authentication module, for individually being verified to the block, output verification message;
Block add module, for being more than a preset threshold when the number that display block is verified in the verification message
When value, the block is added in block chain;
Block removing module, for being more than one preset when the not verified number of display block in the verification message
When threshold value, the block is deleted.
10. system according to claim 9, which is characterized in that the block forms module and includes:
Cryptographic Hash acquisition module, the cryptographic Hash for obtaining the last one block in the block chain, referred to as the first cryptographic Hash;
Cryptographic Hash determining module, for being based on described in hash algorithm output according to first cryptographic Hash and the DNA data
The corresponding cryptographic Hash of DNA data;
Block determining module, for according to the corresponding cryptographic Hash of the DNA data, DNA data and the first cryptographic Hash shape
At block, the block is the corresponding block of the DNA data.
11. system according to claim 9, which is characterized in that the block authentication module includes:
First cryptographic Hash acquisition module, for obtaining out the first cryptographic Hash from the block;
Second cryptographic Hash acquisition module, for obtaining out the last one described block from the last one block of the block chain
Cryptographic Hash, referred to as the second cryptographic Hash;
First verification message output module, for when first cryptographic Hash is identical as second cryptographic Hash, exporting block
The verification message being verified;
Second verification message output module, for when first cryptographic Hash is with the second cryptographic Hash difference, exporting block
Verify unsanctioned verification message.
12. system according to claim 7, which is characterized in that the client further includes:
Request receiving module is compared, for receiving at least one DNA comparings request, is taken in the DNA comparings request
With at least one DNA data to be compared;
DNA data acquisition modules, for obtaining the DNA data stored in each block on the block chain;
DNA data comparing modules, DNA data for that will store in the DNA data to be compared and each block into
Row compares, and exports comparison result.
13. a kind of computing device, which is characterized in that the computing device includes:It is adapted for carrying out the processor of each instruction and deposits
Equipment is stored up, the storage device is stored with a plurality of instruction, and described instruction is suitable for being loaded and being executed by processor:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
14. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program is for executing:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810366022.8A CN108737501A (en) | 2018-04-23 | 2018-04-23 | A kind of DNA date storage methods, equipment and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810366022.8A CN108737501A (en) | 2018-04-23 | 2018-04-23 | A kind of DNA date storage methods, equipment and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108737501A true CN108737501A (en) | 2018-11-02 |
Family
ID=63939705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810366022.8A Withdrawn CN108737501A (en) | 2018-04-23 | 2018-04-23 | A kind of DNA date storage methods, equipment and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108737501A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287724A (en) * | 2019-05-23 | 2019-09-27 | 顺丰科技有限公司 | Data storage and verification method and device |
CN110601815A (en) * | 2019-09-17 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain data processing method and equipment |
CN112989404A (en) * | 2019-12-18 | 2021-06-18 | 中移雄安信息通信科技有限公司 | Log management method based on block chain and related equipment |
CN113343249A (en) * | 2020-02-18 | 2021-09-03 | 中芯未来(北京)科技有限公司 | Fabric-based DNA sequence safe storage and sharing method |
CN114039739A (en) * | 2020-11-30 | 2022-02-11 | 北京八分量信息科技有限公司 | Method for rapidly searching for failure by optimizing node communication |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106096444A (en) * | 2016-06-12 | 2016-11-09 | 杨鹏 | A kind of identification based on bio information and social information's recording method and system |
CN106130976A (en) * | 2016-06-28 | 2016-11-16 | 惠众商务顾问(北京)有限公司 | Based on local node stochastic instruction distributed authentication method, system and device |
US20170286717A1 (en) * | 2016-04-05 | 2017-10-05 | Vchain Technology Limited | Method and system for managing personal information within independent computer systems and digital networks |
CN107786547A (en) * | 2017-09-30 | 2018-03-09 | 厦门快商通信息技术有限公司 | A kind of auth method based on block chain, device and computer-readable recording medium |
CN107846282A (en) * | 2017-11-03 | 2018-03-27 | 法信公证云(厦门)科技有限公司 | A kind of electronic data distribution keeping method and system based on block chain technology |
-
2018
- 2018-04-23 CN CN201810366022.8A patent/CN108737501A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170286717A1 (en) * | 2016-04-05 | 2017-10-05 | Vchain Technology Limited | Method and system for managing personal information within independent computer systems and digital networks |
CN106096444A (en) * | 2016-06-12 | 2016-11-09 | 杨鹏 | A kind of identification based on bio information and social information's recording method and system |
CN106130976A (en) * | 2016-06-28 | 2016-11-16 | 惠众商务顾问(北京)有限公司 | Based on local node stochastic instruction distributed authentication method, system and device |
CN107786547A (en) * | 2017-09-30 | 2018-03-09 | 厦门快商通信息技术有限公司 | A kind of auth method based on block chain, device and computer-readable recording medium |
CN107846282A (en) * | 2017-11-03 | 2018-03-27 | 法信公证云(厦门)科技有限公司 | A kind of electronic data distribution keeping method and system based on block chain technology |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110287724A (en) * | 2019-05-23 | 2019-09-27 | 顺丰科技有限公司 | Data storage and verification method and device |
CN110287724B (en) * | 2019-05-23 | 2021-06-04 | 顺丰科技有限公司 | Data storage and verification method and device |
CN110601815A (en) * | 2019-09-17 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain data processing method and equipment |
CN110601815B (en) * | 2019-09-17 | 2021-09-10 | 腾讯科技(深圳)有限公司 | Block chain data processing method and equipment |
CN112989404A (en) * | 2019-12-18 | 2021-06-18 | 中移雄安信息通信科技有限公司 | Log management method based on block chain and related equipment |
CN113343249A (en) * | 2020-02-18 | 2021-09-03 | 中芯未来(北京)科技有限公司 | Fabric-based DNA sequence safe storage and sharing method |
CN114039739A (en) * | 2020-11-30 | 2022-02-11 | 北京八分量信息科技有限公司 | Method for rapidly searching for failure by optimizing node communication |
CN114039739B (en) * | 2020-11-30 | 2024-04-16 | 北京八分量信息科技有限公司 | Method for fast failure by optimizing node communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108737501A (en) | A kind of DNA date storage methods, equipment and system based on block chain | |
Wang et al. | Chainsplitter: Towards blockchain-based industrial iot architecture for supporting hierarchical storage | |
CN107193490B (en) | Distributed data storage system and method based on block chain | |
Van der Aalst et al. | Process mining and security: Detecting anomalous process executions and checking process conformance | |
CN107800565A (en) | Method for inspecting, device, system, computer equipment and storage medium | |
CN107465656A (en) | A kind of safety monitoring big data processing method and system based on cloud computing | |
CN107104816A (en) | A kind of information change monitoring method and device | |
CN109981279B (en) | Block chain system, communication method, device, equipment and medium | |
CN111556120A (en) | Data processing method and device based on block chain, storage medium and equipment | |
CN111405074B (en) | Data center network fault diagnosis and automatic configuration method based on hybrid chain | |
US20170171097A1 (en) | System and user interface for coordinating distributed workflow between multiple computing systems | |
KR20190055666A (en) | Method for storing smart grid heterogeneous data security using block chain | |
CN114780301B (en) | Disaster recovery method and system supporting multi-cloud production environment | |
CN113570479B (en) | Block chain transmission method, system and storage medium for real estate transaction data | |
CN109543459A (en) | A kind of data deposit card method and apparatus | |
WO2023093638A1 (en) | Abnormal data identification method and apparatus, and device and storage medium | |
CN115859362A (en) | Data storage system, method, device and medium based on block chain side chain | |
CN112508733A (en) | Big data intelligence service system in electric wire netting space-time based on big dipper | |
CN109525645A (en) | A kind of method and system for collecting the log of distributed storage cluster | |
CN113765675A (en) | Transaction data processing method, device, equipment and medium | |
WO2020149177A1 (en) | Document management system | |
CN115858322A (en) | Log data processing method and device and computer equipment | |
CN110674534A (en) | Remote quality detection technology based on Internet of things electronic evidence chain | |
CN117853135A (en) | Supply chain tracing method and device based on alliance block chain | |
KR102294569B1 (en) | Block Chain Management System To Build Block Chain Network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181102 |
|
WW01 | Invention patent application withdrawn after publication |