CN108737501A - A kind of DNA date storage methods, equipment and system based on block chain - Google Patents

A kind of DNA date storage methods, equipment and system based on block chain Download PDF

Info

Publication number
CN108737501A
CN108737501A CN201810366022.8A CN201810366022A CN108737501A CN 108737501 A CN108737501 A CN 108737501A CN 201810366022 A CN201810366022 A CN 201810366022A CN 108737501 A CN108737501 A CN 108737501A
Authority
CN
China
Prior art keywords
block
client
dna
cryptographic hash
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810366022.8A
Other languages
Chinese (zh)
Inventor
张喆
李冬涛
李波
李涵欧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HAIHUA XINAN BIOLOGICAL INFORMATION TECHNOLOGY CO LTD
Original Assignee
BEIJING HAIHUA XINAN BIOLOGICAL INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HAIHUA XINAN BIOLOGICAL INFORMATION TECHNOLOGY CO LTD filed Critical BEIJING HAIHUA XINAN BIOLOGICAL INFORMATION TECHNOLOGY CO LTD
Priority to CN201810366022.8A priority Critical patent/CN108737501A/en
Publication of CN108737501A publication Critical patent/CN108737501A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5682Policies or rules for updating, deleting or replacing the stored data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The DNA date storage methods that this application provides a kind of based on block chain, based on DNA data-storage systems, computing device and the computer readable storage medium of block chain, be related to technical field of data storage.The DNA data-storage systems based on block chain include a server and multiple client, and the client includes data acquisition module, for obtaining at least one DNA data;The server includes authentication module, for being verified to the client, output verification message;The client further includes data add module, for when the verification message show the client validation by when, the DNA data are added in block chain.Technical solution provided by the present application builds distributed data-storage system according to the principle of resource-sharing, and can not distorting and finally realizing that the whole network is consistent for data is realized using block chain technology.

Description

A kind of DNA date storage methods, equipment and system based on block chain
Technical field
The application belongs to technical field of data processing more particularly to a kind of DNA date storage methods, base based on block chain In DNA data-storage systems, computing device and the computer readable storage medium of block chain.
Background technology
In recent years, the development of DNA DNA science and technology concerning criminal matters is swift and violent, in the energy that raising public security organ fights crime Power and the horizontal aspect of raising law enforcement have played increasingly important role.National public security organ successively establishes " section of court A series of important information systems such as DNA databases ", " DNA Design of Laboratory Management System (abbreviation DNA-LIMS) ", in order to which case is detectd It is broken to provide strong support.
In order to cope with the real-time comparison request of national DNA sample data, alignment schemes in the prior art may be summarized to be " data report step by step, and hierarchical compares, as a result priority feedback."
Data report comparison that data are reported to districts and cities by district step by step, districts and cities be reported to it is provincial, it is provincial to be reported to portion Grade system.District compares inside local system first, shows comparing result in time.In provincial node, only compare inside the province Data between laboratory issue than middle result and feed back to laboratory.In ministerial level node, data transprovincially are only compared, than in As a result it issues and feeds back to laboratory.By the above flow, the comparison between whole nation DNA data " sample two-by-two " is realized.
DNA Database Systems are in portion, province, city, the deployment of district multistage, by series of standards data-interface, by data by Various regions laboratory is reported to city-level, provincial, finally in ministerial level library, by the docking and examination of multiple dna Database Systems.Its In, ministerial level system lays particular emphasis on high ratio pair and transprovincially than the publication of middle result and the management and data statistics of each provincial system; Provincial system lay particular emphasis on ensure data relay (including data report and compare in result issue) smoothness it is each precisely to manage this province City-level system and data statistics;Districts and cities, district grade system are main actual combat units, are acquired, are examined with data, locally compared to be The core of system application, target are to ensure correctness, the reliability of gene data.
It according to above-mentioned alignment schemes, needs to be reported to data into supervisory " forensic DNA profiling database " step by step, for saving Grade and ministerial level, which compare node, prodigious comparison pressure.For a sample, " homotype " should be compared, compares " three simultaneously again It is conjuncted ", by taking ministerial level system as an example:Each sample will compare 2 times, be equivalent to 68,500,000 samples in ministerial level library one by one Ministerial level will compare 1.37 hundred million times.Country library, which receives, daily reports sample data about 5~60,000 or so, is equivalent to daily in ministerial level It compares more than 8,000,000,000,000 times.Generally, larger pressure is caused for the comparison of forensic DNA profiling database portion level data.In order to It is notified in quick Real-time Feedback ratio, current " forensic DNA profiling database " ministerial level increases comparison engine support extending transversely, increases Add the handling capacity compared, improves the performance of comparison, but also increase a large amount of hardware cost simultaneously, and due to transport layer The grade factors such as more, unstable networks of node, comparison result issue and feedback still remains delay issue, there is no essence solution Certainly.
Above-mentioned traditional approach has cracked many important cases, but needs to put into a large amount of manpower, material resources and financial resources, and because of multistage Framework, feedback need some cycles.Various regions DNA data successively report so that ministerial level DNA database datas and various regions DNA data It is asynchronous.If period, any Primary Transmit went wrong, may lead to not normally handle.If some cases, such as Effective timely processing cannot be obtained by cracking down on the abduction, it would be possible to be missed and most preferably be solved a case period.Further, since comparing province Room DNALIMS Database efficiency is relatively low and total data is not reported to the province Room by the whole province various regions, causes comparison result barely satisfactory, still need to Laboratories at different levels send a large amount of inspections by hand and compare notification.
Therefore, a kind of new scheme how is provided, it is this field skill urgently to be resolved hurrily that can solve above-mentioned technical problem Art problem.
Invention content
In view of this, this application provides a kind of DNA date storage methods based on block chain, the DNA based on block chain Data-storage system, computing device and computer readable storage medium build distributed data according to the principle of resource-sharing Storage system, using block chain technology realize data can not distort and finally realize the whole network it is consistent.
To achieve the above object, it is as follows to provide technical solution by the application:
According to the first aspect of the application, it is proposed that a kind of DNA date storage methods based on block chain, the method are answered For the DNA data-storage systems based on block chain, the system comprises a server and multiple client, the method packets It includes:
The client obtains at least one DNA data;
When the server export the client validation by message when, the client adds the DNA data It adds in block chain.
Preferably, the method further includes:
The client sends logging request to the server, and it is corresponding that the logging request carries the client IP address and/or certificate information;
The server obtains pre-stored multiple IP address and/or certificate information;
When the corresponding IP address of the client and/or certificate information are recorded in the pre-stored multiple IP of the server When address and/or certificate information, the server export the client validation by message.
Preferably, the DNA data are added to block chain and include by the client:
The client forms a block according to the DNA data;
The corresponding block of the DNA data is sent to all clients by the client;
All clients respectively individually verify the block, output verification message;
When the number that display block is verified in the verification message of all clients output is more than a preset threshold When value, the block is added in block chain by all clients, otherwise, deletes the block.
Preferably, the client includes according to the DNA data one block of formation:
The client obtains the cryptographic Hash of the last one block in the block chain, referred to as the first cryptographic Hash;
It is based on hash algorithm according to first cryptographic Hash and the DNA data and exports the corresponding Kazakhstan of the DNA data Uncommon value;
Block, the area are formed according to the corresponding cryptographic Hash of the DNA data, DNA data and first cryptographic Hash Block is the corresponding block of the DNA data.
Preferably, all clients respectively individually verify the block, and output verification message includes:
All clients obtain out the first cryptographic Hash from the block;
All clients obtain out the cryptographic Hash of the last one block from the last one block of the block chain, Referred to as the second cryptographic Hash;
When first cryptographic Hash is identical as second cryptographic Hash, the verification message that block is verified is exported;
When first cryptographic Hash and the second cryptographic Hash difference, output block verifies unsanctioned verification message.
Preferably, the method further includes:
The client receives at least one DNA comparings request, and at least one is carried in the DNA comparings request A DNA data to be compared;
Obtain the DNA data stored in each block on the block chain;
The DNA data to be compared are compared with the DNA data stored in each block, output compares knot Fruit.
According to the second aspect of the application, it is proposed that a kind of DNA data-storage systems based on block chain, the system packet A server and multiple client are included,
The client includes data acquisition module, for obtaining at least one DNA data;
The server includes authentication module, for being verified to the client, output verification message;
The client further includes data add module, shows that the client validation passes through for working as the verification message When, the DNA data are added in block chain.
Pre-selection, the client further includes:
Logging request sending module, for sending logging request to the server, the logging request carries described The corresponding IP address of client and/or certificate information;
The server further includes:
Data obtaining module is stored, for obtaining pre-stored multiple IP address and/or certificate information;
The authentication module includes:
First authentication module is recorded in and prestores for working as the corresponding IP address of the client and/or certificate information Multiple IP address and/or certificate information when, export the client validation by message;
Second authentication module is not recorded in and deposits in advance for working as the corresponding IP address of the client and/or certificate information When the multiple IP address and/or certificate information of storage, the not verified message of the client is exported.
Preferably, the data add module includes:
Block forms module, for forming a block according to the DNA data;
Data transmission blocks, for the corresponding block of the DNA data to be sent to the client;
Block authentication module, for individually being verified to the block, output verification message;
Block add module, for when in the verification message number that is verified of display block be more than one to preset Threshold value when, the block is added in block chain;
Block removing module, for when in the verification message the not verified number of display block be more than one to set in advance When fixed threshold value, the block is deleted.
Preferably, the block formation module includes:
Cryptographic Hash acquisition module, the cryptographic Hash for obtaining the last one block in the block chain, referred to as the first Hash Value;
Cryptographic Hash determining module, for being exported based on hash algorithm according to first cryptographic Hash and the DNA data The corresponding cryptographic Hash of the DNA data;
Block determining module, for according to the corresponding cryptographic Hash of the DNA data, DNA data and first Hash Value forms block, and the block is the corresponding block of the DNA data.
Preferably, the block authentication module includes:
First cryptographic Hash acquisition module, for obtaining out the first cryptographic Hash from the block;
Second cryptographic Hash acquisition module, for obtained out from the last one block of the block chain it is described the last one The cryptographic Hash of block, referred to as the second cryptographic Hash;
First verification message output module, for when first cryptographic Hash is identical as second cryptographic Hash, exporting The verification message that block is verified;
Second verification message output module, for when first cryptographic Hash is with the second cryptographic Hash difference, exporting Block verifies unsanctioned verification message.
Preferably, the client further includes:
Request receiving module is compared, for receiving at least one DNA comparings request, the DNA comparings request It is middle to carry at least one DNA data to be compared;
DNA data acquisition modules, for obtaining the DNA data stored in each block on the block chain;
DNA data comparing modules, the DNA numbers for will be stored in the DNA data to be compared and each block According to being compared, comparison result is exported.
According to the third aspect of the application, it is proposed that a computing device, the computing device include:It is adapted for carrying out each instruction Processor and storage device, the storage device be stored with a plurality of instruction, described instruction is suitable for being loaded and being held by processor Row:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
According to the fourth aspect of the application, it is proposed that a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the computer program is for executing:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
By above technical scheme as it can be seen that the application builds distributed data-storage system, profit according to the principle of resource-sharing With block chain technology realize data can not distort and finally realize the whole network it is consistent, when client need carry out DNA comparings When, it need to only be compared in local block chain, comparison result returns immediately, realizes quick, real-time comparing, shortens and compares Period improves comparison efficiency.
For the above and other objects, features and advantages of the application can be clearer and more comprehensible, preferred embodiment cited below particularly, And coordinate institute's accompanying drawings, it is described in detail below.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments described in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, other drawings may also be obtained based on these drawings.
Fig. 1 shows a kind of flow diagram of DNA date storage methods based on block chain provided by the present application;
Fig. 2 shows a kind of streams of the embodiment two of the DNA date storage methods based on block chain provided by the present application Journey schematic diagram;
Fig. 3 shows the flow diagram of the step S205 in Fig. 2;
Fig. 4 shows the flow diagram of the step S301 in Fig. 3;
Fig. 5 shows the flow diagram of the step S303 in Fig. 3;
Fig. 6 shows a kind of stream of the embodiment three of DNA date storage methods based on block chain provided by the present application Journey schematic diagram;
Fig. 7 shows a kind of structure diagram of DNA data-storage systems based on block chain provided by the present application;
Fig. 8 shows the embodiment party of client in a kind of DNA data-storage systems based on block chain provided by the present application The structure diagram of formula one;
Fig. 9 shows the structural frames of server in a kind of DNA data-storage systems based on block chain provided by the present application Figure;
Figure 10 shows the structure diagram of authentication module in server;
Figure 11 shows the structure diagram of data add module in client;
Figure 12 shows the structure diagram of block formation module in client;
Figure 13 shows the structure diagram of block authentication module in client;
Figure 14 shows the embodiment party of client in a kind of DNA data-storage systems based on block chain provided by the present application The structure diagram of formula two;
Figure 15 shows the schematic diagram of adjacent block in block chain provided by the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
Below with reference to several representative embodiments of the application, the principle and spirit of the application are illustrated in detail.
Although this application provides such as following embodiments or method operating procedure shown in the drawings or apparatus structure, it is based on Conventional may include either more or less operating procedure or mould in the method or device without performing creative labour Module unit.In the step of there is no necessary causalities in logicality or structure, the execution sequences of these steps or device Modular structure is not limited to the embodiment of the present application or execution shown in the drawings sequence or modular structure.The method or modular structure Device in practice or end product in application, can according to embodiment or method shown in the drawings or modular structure into Row sequence executes or parallel execution.
Below with reference to several representative embodiments of the application, the principle and spirit of the application are illustrated in detail.
The system for the DNA data storage based on block chain that this application provides a kind of, Fig. 7 is the structural representation of the system Figure, referring to Fig. 7, system provided by the present application includes a server 100 and multiple client 200.
Block chain in DNA data-storage systems provided by the present application has applied to P2P (peer-to-peer) principle, such as Fruit block chain is only stored on a machine, and when the machine is offline, then other machines will be unable to obtain information.Therefore, block The last state of chain needs to be synchronized on all machines, these machines are known as " node ".These nodes ensure data by P2P It is latest edition.In this application, multiple client 200 is " node ".Specific to DNA field of data storage, client refers to Be all laboratories DNA in the whole nation.
In order to ensure the node that each area data in the block of block chain may only be joined uses, it is provided with dedicated clothes Business device, i.e., the server 100 in the application.
Fig. 8 shows the structure diagram of the embodiment one of client, referring to Fig. 8, in presently filed embodiment one In, the client includes:
Logging request sending module 203, for sending logging request to the server, the logging request carries State the corresponding IP address of client and/or certificate information.
Fig. 9 shows the structure diagram of server in the application, referring to Fig. 9, the server 100 includes:
Data obtaining module 102 is stored, for obtaining pre-stored multiple IP address and/or certificate information.In this Shen Please in, which has recorded the IP address and/or certificate information of all nodes (i.e. client) joined.All sections joined Point can there are one the mechanism of common recognition.Common recognition mechanism is exactly one group of rule, is reached an agreement by runs software by the node in network.This A little rules ensure that network security works and keeps synchronous.
Authentication module 101, for being verified to the client, output verification message.
Figure 10 shows the structure diagram of authentication module 101 in server 100, referring to Fig. 10, the authentication module 101 Including:
First authentication module 1011 is recorded in advance for working as the corresponding IP address of the client and/or certificate information Storage multiple IP address and/or certificate information when, export the client validation by message;
Second authentication module 1012, for work as the corresponding IP address of the client and/or certificate information be not recorded in it is pre- When the multiple IP address and/or certificate information that first store, the not verified message of the client is exported.
That is, when server receives the logging request that at least one client is sent, solved from logging request first The corresponding IP address of the client and/or certificate information is precipitated, then verifies the corresponding IP address of the client and/or certificate letter Whether breath is recorded in pre-stored multiple IP address and/or certificate information.When verification is the result shows that the client is corresponding When IP address and/or certificate information are recorded in pre-stored multiple IP address and/or certificate information, then it is assumed that current visitor Family end belongs to the client joined, thus server export the client validation by message.The result shows that it should when verification When the corresponding IP address of client and/or certificate information are not recorded in pre-stored multiple IP address and/or certificate information, Then think the client that current client is not belonging to join, therefore server exports that the client is not verified to disappear Breath.
Referring to Fig. 8, after verification of the client by server, in presently filed embodiment one, institute Stating client further includes:
Data acquisition module 201, for obtaining at least one DNA data.
Data add module 202, for the DNA data to be added in block chain.Figure 11 shows that data add mould The structure diagram of block 202, please refers to Fig.1 1, and the data add module 202 includes:
Block forms module 2021, for forming a block according to the DNA data;
Data transmission blocks 2022, for the corresponding block of the DNA data to be sent to the client.
Block authentication module 2023, for individually being verified to the block, output verification message;
Block add module 2024, for being more than one advance when the number that display block is verified in the verification message When the threshold value of setting, the block is added in block chain;
Block removing module 2025, for being more than one pre- when the not verified number of display block in the verification message When the threshold value first set, the block is deleted.
In a kind of embodiment of the application, the corresponding block of DNA data can be sent to described by data transmission blocks Client, when client herein refers to getting other all clients except the client of the DNA data, that is, In specific schematic diagram shown in Fig. 7, it is assumed that client is 10, wherein first client has got DNA data, then should The block that the DNA data are formed is sent to other 9 clients by client.The block of other 9 clients verifies mould at this time Block 2023 respectively individually verifies the block, output verification message, when server determines that the block of 9 clients is tested When the number that the verification message display region block of card module output is verified is more than preset threshold value (such as 5), then recognize To reach common understanding, current block is added in block chain by all clients, otherwise deletes the block.
In a kind of embodiment of the application, the corresponding block of DNA data can be sent to described by data transmission blocks Client, when client herein refers to all clients of the system, that is, in specific schematic diagram shown in Fig. 7, it is assumed that Client is 10, wherein first client has got DNA data, then the block that the client forms the DNA data It is sent to 10 all clients.The block authentication module 2023 of all 10 clients respectively carries out the block at this time Individually verification, output verification message, when server determines that the verification message of the block authentication module output of 10 clients is aobvious When showing that the number that block is verified is more than preset threshold value (such as 6), then it is assumed that reach common understanding, all clients will Current block may be added to that in block chain, otherwise delete the block.
Figure 12 shows the structure diagram of block formation module in client, please refers to Fig.1 2, the block forms module 2021 include:
Cryptographic Hash acquisition module 20211, the cryptographic Hash for obtaining the last one block in the block chain, referred to as first Cryptographic Hash;
Cryptographic Hash determining module 20212, for being based on hash algorithm according to first cryptographic Hash and the DNA data Export the corresponding cryptographic Hash of the DNA data;
Block determining module 20213, for according to the corresponding cryptographic Hash of the DNA data, DNA data and described first Cryptographic Hash forms block, and the block is the corresponding block of the DNA data.
Figure 15 shows the schematic diagram of adjacent block in block chain provided by the present application, refers to Figure 15, every in block chain A block includes cryptographic Hash, the data of current block, the cryptographic Hash of current block of a upper block.Specifically, such as Figure 15 Shown, the cryptographic Hash of a upper block is in 1Z8F, with Figure 15 marked as 1 area cryptographic Hash in the block in the block of label 2 1Z8F is identical.Marked as in 3 block, the cryptographic Hash of a upper block is 6BQ1, and marked as 2 area cryptographic Hash in the block 6BQ1 is identical.Therefore, the cryptographic Hash for the upper block that each block records on block chain needs and the Kazakhstan of a upper block When uncommon value is coincide, two neighboring block can be just linked.
Therefore, block forms cryptographic Hash i.e. the first Hash that module 2021 obtains the last one block in block chain first Then value determines that the corresponding cryptographic Hash of current block, the cryptographic Hash are stored with the first cryptographic Hash and current block needs DNA data are related, and the corresponding cryptographic Hash of DNA data can be calculated according to hash algorithm in the first cryptographic Hash and DNA data, Block is finally formed according to the corresponding cryptographic Hash of DNA data, DNA data and first cryptographic Hash, the block is institute State the corresponding block of DNA data.Hash algorithm mentioned herein can realize according to hash algorithm in the prior art, the application This is not construed as limiting.
Figure 13 shows the structure diagram of block authentication module in client, please refers to Fig.1 3, block authentication module 2023 Including:
First cryptographic Hash acquisition module 20231, for obtaining out the first cryptographic Hash from the block;
Second cryptographic Hash acquisition module 20232, for obtained out from the last one block of the block chain it is described most The cryptographic Hash of the latter block, referred to as the second cryptographic Hash;
First verification message output module 20233, is used for when first cryptographic Hash is identical as second cryptographic Hash, The verification message that output block is verified;
Second verification message output module 20234 is used for when first cryptographic Hash and the second cryptographic Hash difference, It exports block and verifies unsanctioned verification message.
That is, by comparing the cryptographic Hash of the upper block stored in the block that block formation module generates and working as proparea Whether the cryptographic Hash of the last one block is identical in block chain, you can determines whether current block passes through verification.When block is formed When the cryptographic Hash of a upper block stored in the block that module generates is tampered, i.e., with the last one block in current block chain Cryptographic Hash it is different, i.e. unsanctioned verification message is verified in output at this time.
As above it is a kind of DNA data-storage systems based on block chain provided by the present application, is protected in each client Deposit newest block chain.The block chain that the application refers to is a kind of data structure in brief, it is that a record institute is busy The daily record of business record.It is analogous to a daily record not write, every page has information, footer to write number of pages, therefore at once can To know just in which page.As book, each " block " is exactly one page in block chain, records details.Do not have in " block " Number of pages, but having time is stabbed.New block is always added to after newest piece after by verification.It is stored in DNA data and is In system, the DNA data of all clients joined, the Hash of current block cryptographic Hash, a upper block are record in each block Value, in addition to this may also include the information such as timestamp, user's signature.The amount of each area's DNA data in the block can according to demand into Row is adjusted.According to the principle of resource-sharing, the distributed data-storage system of construction realizes that data can not using block chain technology Distort, final the whole network it is consistent.
A kind of DNA data-storage systems based on block chain provided by the present application as introduced above, are described below for this How the DNA data-storage systems based on block chain that application provides carry out the comparison of DNA data.
In this application, all laboratories DNA alternative is joined, and is issued in DNA data to other nodes of network.Its His information alliance member only has the access right after permitting, without right of disposal, it is ensured that the safety of data.Such as lab A can To upload, the DNA data of oneself are changed, but can only check the data of laboratory B, have no right to change it.The laboratory joined Constantly update sharing data, it is ensured that possess latest edition, efficiently accomplish required comparison business.
Figure 14 shows the embodiment party of client in a kind of DNA data-storage systems based on block chain provided by the present application The structure diagram of formula two, please refers to Fig.1 4, and client further includes in embodiment two:
Request receiving module 203 is compared, for receiving at least one DNA comparings request, the DNA comparings are asked It asks middle and carries at least one DNA data to be compared;
DNA data acquisition modules 204, for obtaining the DNA data stored in each block on the block chain;
DNA data comparing modules 205, the DNA for will be stored in the DNA data to be compared and each block Data are compared, and export comparison result.
Specifically, when DNA data to be compared are consistent with the DNA comparings stored in a block, then comparison is exported Successful comparison result, the DNA data stored in the exportable block in the comparison result, identity information etc..
When the DNA comparings stored in DNA data to be compared and all blocks are inconsistent, then export comparison and lose The comparison result lost.
Since DNA data-storage systems provided by the present application change existing technical architecture, using distributed P 2 P Mode be compared with comparison result feed back, data are stored and transmitted using block chain technology.Therefore, all DNA in the whole nation The DNA data that laboratory obtains, are entered into " the forensic DNA profiling database " and DNA laboratory room managings in each laboratories DNA at first System (abbreviation DNA-LIMS), the data summation in each laboratories DNA and " forensic DNA profiling database " ministerial level equivalent, and when Effect property is more preferable.When comparison task is initiated in a laboratory, it need to only be compared in local block chain link point library, than middle result It returns immediately.Which is realized quickly, real-time comparing mode using the idle computing resources in the whole nation laboratories DNA, Than traditional alignments step by step in the efficiency of feedback result, 1 order of magnitude or more is improved.
The present invention also provides a kind of computer equipments, including are adapted for carrying out the processor and storage device of each instruction, The storage device is stored with a plurality of instruction, and described instruction is suitable for being loaded and being executed by processor:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
The present invention also provides a kind of computer readable storage mediums, are stored with computer program, the computer program For executing:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
In addition, although being referred to several unit modules of system in above-detailed, it is this to divide only simultaneously Non-imposed.In fact, according to the embodiment of the present invention, the feature and function of two or more above-described units can To embody in a unit.Equally, the feature and function of an above-described unit can also be further divided by Multiple units embody.Terms used above " module " and " unit ", can be realize predetermined function software and/or Hardware.Although module described in following embodiment is preferably realized with software, the group of hardware or software and hardware The realization of conjunction is also that may and be contemplated.
It is set in the system for the DNA data storage based on block chain for describing exemplary embodiment of the invention, computer After standby, computer readable storage medium, next, refer to the attached drawing is situated between to the method for exemplary embodiment of the invention It continues.The implementation of this method may refer to above-mentioned whole implementation, and overlaps will not be repeated.
Fig. 1 shows a kind of flow diagram of DNA date storage methods based on block chain provided by the present application, please join Fig. 1 is read, this method includes:
S101:Client obtains at least one DNA data.
Block chain in DNA data-storage systems provided by the present application has applied to P2P (peer-to-peer) principle, such as Fruit block chain is only stored on a machine, and when the machine is offline, then other machines will be unable to obtain information.Therefore, block The last state of chain needs to be synchronized on all machines, these machines are known as " node ".These nodes ensure data by P2P It is latest edition.In this application, multiple client 200 is " node ".Specific to DNA field of data storage, client refers to Be all laboratories DNA in the whole nation, all laboratories DNA alternative is joined.
In order to ensure the node that each area data in the block of block chain may only be joined uses, it is provided with dedicated clothes Business device, i.e., the server 100 in the application.
S102:When the server export the client validation by message when, the client is by the DNA numbers According to being added in block chain.
Fig. 2 shows a kind of streams of the embodiment two of the DNA date storage methods based on block chain provided by the present application Journey schematic diagram, referring to Fig. 2, this method includes in embodiment two:
S201:Client sends logging request to the server, and the logging request carries the client and corresponds to IP address and/or certificate information;
S202:Server obtains pre-stored multiple IP address and/or certificate information.In this application, the server Have recorded the IP address and/or certificate information of all nodes (i.e. client) joined.All nodes joined can there are one altogether Knowledge mechanism.Common recognition mechanism is exactly one group of rule, is reached an agreement by runs software by the node in network.These rules ensure net Network trouble free service simultaneously keeps synchronous.
S203:When the corresponding IP address of the client and/or certificate information are recorded in pre-stored multiple IP address And/or when certificate information, server export the client validation by message.
That is, when server receives the logging request that at least one client is sent, solved from logging request first The corresponding IP address of the client and/or certificate information is precipitated, then verifies the corresponding IP address of the client and/or certificate letter Whether breath is recorded in pre-stored multiple IP address and/or certificate information.When verification is the result shows that the client is corresponding When IP address and/or certificate information are recorded in pre-stored multiple IP address and/or certificate information, then it is assumed that current visitor Family end belongs to the client joined, thus server export the client validation by message.The result shows that it should when verification When the corresponding IP address of client and/or certificate information are not recorded in pre-stored multiple IP address and/or certificate information, Then think the client that current client is not belonging to join, therefore server exports that the client is not verified to disappear Breath.
S204:Client obtains at least one DNA data.
S205:The DNA data are added in block chain by client.
Fig. 3 shows the flow diagram of step S205, referring to Fig. 3, the step includes:
S301:Client forms a block according to the DNA data;
S302:The corresponding block of the DNA data is sent to the client.
S303:The block is individually verified, output verification message;
S304:It, will when the number that display block is verified in the verification message is more than a preset threshold value The block is added in block chain;Otherwise, the block is deleted.
In a kind of embodiment of the application, the corresponding block of DNA data can be sent to the client by step S302 End, when client herein refers to getting other all clients except the client of the DNA data, that is, in Fig. 7 Shown in specific schematic diagram, it is assumed that client is 10, wherein first client has got DNA data, then the client The block that the DNA data are formed is sent to other 9 clients by end.The block authentication module of other 9 clients at this time 2023 respectively individually verify the block, output verification message, when server determines the block verification of 9 clients When the number that the verification message display region block of module output is verified is more than preset threshold value (such as 5), then it is assumed that Reach common understanding, current block is added in block chain by all clients, otherwise deletes the block.
In a kind of embodiment of the application, the corresponding block of DNA data can be sent to the client by step S302 End, when client herein refers to all clients of the system, that is, in specific schematic diagram shown in Fig. 7, it is assumed that client End is 10, wherein first client has got DNA data, then the block that the client forms the DNA data is sent To 10 all clients.The block authentication module 2023 of all 10 clients respectively carries out the block independent at this time Verification, output verification message, when server determines the verification message display region of the block authentication module output of 10 clients When the number that block is verified is more than preset threshold value (such as 6), then it is assumed that reach common understanding, all clients will be current Block may be added to that in block chain, otherwise delete the block.
Fig. 4 shows the flow diagram of step S301, referring to Fig. 4, the step includes:
S401:Client obtains the cryptographic Hash of the last one block in the block chain, referred to as the first cryptographic Hash;
S402:It is based on hash algorithm according to first cryptographic Hash and the DNA data and exports the DNA data correspondence Cryptographic Hash.
S403:Block, institute are formed according to the corresponding cryptographic Hash of the DNA data, DNA data and first cryptographic Hash It is the corresponding block of the DNA data to state block.
Figure 15 shows the schematic diagram of adjacent block in block chain provided by the present application, refers to Figure 15, every in block chain A block includes cryptographic Hash, the data of current block, the cryptographic Hash of current block of a upper block.Specifically, such as Figure 15 Shown, the cryptographic Hash of a upper block is in 1Z8F, with Figure 15 marked as 1 area cryptographic Hash in the block in the block of label 2 1Z8F is identical.Marked as in 3 block, the cryptographic Hash of a upper block is 6BQ1, and marked as 2 area cryptographic Hash in the block 6BQ1 is identical.Therefore, the cryptographic Hash for the upper block that each block records on block chain needs and the Kazakhstan of a upper block When uncommon value is coincide, two neighboring block can be just linked.
Therefore, step S301 obtains cryptographic Hash i.e. the first cryptographic Hash of the last one block in block chain first, then really The corresponding cryptographic Hash of current block is made, which needs the DNA data phases stored with the first cryptographic Hash and current block It closes, the corresponding cryptographic Hash of DNA data, last basis can be calculated according to hash algorithm in the first cryptographic Hash and DNA data The corresponding cryptographic Hash of DNA data, DNA data and first cryptographic Hash form block, and the block is the DNA data Corresponding block.Hash algorithm mentioned herein can realize that the application does not make this according to hash algorithm in the prior art It limits.
Fig. 5 shows the flow diagram of step S303, referring to Fig. 5, the step includes:
S501:Client obtains out the first cryptographic Hash from the block;
S502:The cryptographic Hash of the last one block is obtained out from the last one block of the block chain, referred to as Second cryptographic Hash.
S503:When first cryptographic Hash is identical as second cryptographic Hash, the verification that output block is verified disappears Breath;
S504:When first cryptographic Hash and the second cryptographic Hash difference, output block verifies unsanctioned verification Message.
That is, in the cryptographic Hash of the upper block stored in the block generated by step S301 and current block chain most Whether the cryptographic Hash of the latter block is identical, you can determines whether current block passes through verification.When the area that step S301 is generated When the cryptographic Hash of the upper block stored in block is tampered, i.e., not with the cryptographic Hash of the last one block in current block chain Together, i.e. unsanctioned verification message is verified in output at this time.
As above it is a kind of DNA date storage methods based on block chain provided by the present application, is protected in each client Deposit newest block chain.The block chain that the application refers to is a kind of data structure in brief, it is that a record institute is busy The daily record of business record.It is analogous to a daily record not write, every page has information, footer to write number of pages, therefore at once can To know just in which page.As book, each " block " is exactly one page in block chain, records details.Do not have in " block " Number of pages, but having time is stabbed.New block is always added to after newest piece after by verification.It is stored in DNA data and is In system, the DNA data of all clients joined, the Hash of current block cryptographic Hash, a upper block are record in each block Value, in addition to this may also include the information such as timestamp, user's signature.The amount of each area's DNA data in the block can according to demand into Row is adjusted.According to the principle of resource-sharing, the distributed data-storage system of construction realizes that data can not using block chain technology Distort, final the whole network it is consistent.
A kind of DNA date storage methods based on block chain provided by the present application as introduced above, are described below for this How the DNA date storage methods based on block chain that application provides carry out the comparison of DNA data.
In this application, all laboratories DNA alternative is joined, and is issued in DNA data to other nodes of network.Its His information alliance member only has the access right after permitting, without right of disposal, it is ensured that the safety of data.Such as lab A can To upload, the DNA data of oneself are changed, but can only check the data of laboratory B, have no right to change it.The laboratory joined Constantly update sharing data, it is ensured that possess latest edition, efficiently accomplish required comparison business.
Fig. 6 shows a kind of stream of the embodiment three of DNA date storage methods based on block chain provided by the present application Journey schematic diagram, referring to Fig. 6, this method includes in embodiment three:
S601:Client obtains at least one DNA data;
S602:When server export client validation by message when, the DNA data are added to block by client In chain;
S603:At least one DNA comparings request is received, at least one wait for is carried in the DNA comparings request The DNA data of comparison;
S604:Obtain the DNA data stored in each block on the block chain;
S605:The DNA data to be compared are compared with the DNA data stored in each block, are exported Comparison result.
Specifically, when DNA data to be compared are consistent with the DNA comparings stored in a block, then comparison is exported Successful comparison result, the DNA data stored in the exportable block in the comparison result, identity information etc..
When the DNA comparings stored in DNA data to be compared and all blocks are inconsistent, then export comparison and lose The comparison result lost.
Since DNA date storage methods provided by the present application change existing technical architecture, using distributed P 2 P Mode be compared with comparison result feed back, data are stored and transmitted using block chain technology.Therefore, all DNA in the whole nation The DNA data that laboratory obtains, are entered into " the forensic DNA profiling database " and DNA laboratory room managings in each laboratories DNA at first System (abbreviation DNA-LIMS), the data summation in each laboratories DNA and " forensic DNA profiling database " ministerial level equivalent, and when Effect property is more preferable.When comparison task is initiated in a laboratory, it need to only be compared in local block chain link point library, than middle result It returns immediately.Which is realized quickly, real-time comparing mode using the idle computing resources in the whole nation laboratories DNA, Than traditional alignments step by step in the efficiency of feedback result, 1 order of magnitude or more is improved.
Technical solution provided by the present application, creative proposition distribution DNA compare pattern, solve existing DNA countries The defect that library systemic hierarchial compares, significantly improves the efficiency that base's case is investigated and prosecuted, powerful support is provided for cracking of cases.
Beneficial effects of the present invention include:
It is at different levels without being successively reported to, improve whole nation DNA Inter-laboratory comparisons working efficiencies.
In many places, storage ensures that Information Security, integrality prevent server is offline from can not access to distributed data.
It should be noted that although describing the operation of the method for the present invention with particular order in the accompanying drawings, this is not required that Or imply and must execute these operations according to the particular order, it could the realization phase or have to carry out operation shown in whole The result of prestige.Additionally or alternatively, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/or will One step is decomposed into execution of multiple steps.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or noninvasive The means for the property made may include more or less operating procedure.The step of being enumerated in embodiment sequence is only numerous steps A kind of mode in execution sequence does not represent and unique executes sequence.It, can when device or client production in practice executes With according to embodiment, either method shown in the drawings sequence is executed or parallel executed (such as at parallel processor or multithreading The environment of reason, even distributed data processing environment).The terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that process, method, product or equipment including a series of elements are not only wanted including those Element, but also include other elements that are not explicitly listed, or further include for this process, method, product or equipment Intrinsic element.In the absence of more restrictions, be not precluded including the element process, method, product or There is also other identical or equivalent elements in person's equipment.
Unit, device or module that above-described embodiment illustrates etc. can specifically realize by computer chip or entity, or It is realized by the product with certain function.For convenience of description, various modules point are divided into function when describing apparatus above It does not describe.It certainly, when implementing the application can the function of each module is real in the same or multiple software and or hardware It is existing, the module for realizing same function can also be realized by the combination of multiple submodule or subelement etc..Dress described above Set that embodiment is only schematical, for example, the division of the unit, only a kind of division of logic function, in actual implementation There may be another division manner, such as multiple units or component can be combined or can be integrated into another system or one A little features can be ignored, or not execute.Another point, shown or discussed mutual coupling or direct-coupling or communication link It can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit to connect, and can be electrical, machinery or other shapes Formula.
It is also known in the art that other than realizing controller in a manner of pure computer readable program code, it is complete Entirely can by by method and step carry out programming in logic come so that controller with logic gate, switch, application-specific integrated circuit, programmable The form of logic controller and embedded microcontroller etc. realizes identical function.Therefore this controller is considered one kind Hardware component, and the structure that the device for realizing various functions that its inside includes can also be considered as in hardware component.Or Person even, can will be considered as either the software module of implementation method can be hardware again for realizing the device of various functions Structure in component.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Usually, program module includes routines performing specific tasks or implementing specific abstract data types, program, object, group Part, data structure, class etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environments, By executing task by the connected remote processing devices of communication network.In a distributed computing environment, program module can With in the local and remote computer storage media including storage device.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It is realized by the mode of software plus required general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be expressed in the form of software products, the computer software product It can be stored in a storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are used so that a computer equipment (can be personal computer, mobile terminal, server either network equipment etc.) executes each embodiment of the application or implementation Method described in certain parts of example.
Each embodiment in this specification is described by the way of progressive, same or analogous portion between each embodiment Point just to refer each other, and each embodiment focuses on the differences from other embodiments.The application can be used for crowd In mostly general or special purpose computing system environments or configuration.Such as:Personal computer, server computer, handheld device or Portable device, laptop device, multicomputer system, microprocessor-based system, set top box, programmable electronics set Standby, network PC, minicomputer, mainframe computer include the distributed computing environment etc. of any of the above system or equipment.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application there are many deformation and Variation is without departing from spirit herein, it is desirable to which the attached claims include these deformations and change without departing from the application's Spirit.

Claims (14)

1. a kind of DNA date storage methods based on block chain, which is characterized in that the method is applied to based on block chain DNA data-storage systems, the system comprises a server and multiple client, the method includes:
The client obtains at least one DNA data;
When the server export the client validation by message when, the DNA data are added to by the client In block chain.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
The client sends logging request to the server, and the logging request is with carrying the corresponding IP of the client Location and/or certificate information;
The server obtains pre-stored multiple IP address and/or certificate information;
When the corresponding IP address of the client and/or certificate information are recorded in the pre-stored multiple IP address of the server And/or when certificate information, the server export the client validation by message.
3. method according to claim 1 or 2, which is characterized in that the DNA data are added to block by the client Chain includes:
The client forms a block according to the DNA data;
The corresponding block of the DNA data is sent to all clients by the client;
All clients respectively individually verify the block, output verification message;
When the number that display block is verified in the verification message of all clients output is more than a preset threshold value, The block is added in block chain by all clients, otherwise, deletes the block.
4. according to the method described in claim 3, it is characterized in that, the client forms a block according to the DNA data Including:
The client obtains the cryptographic Hash of the last one block in the block chain, referred to as the first cryptographic Hash;
It is based on hash algorithm according to first cryptographic Hash and the DNA data and exports the corresponding cryptographic Hash of the DNA data;
Block is formed according to the corresponding cryptographic Hash of the DNA data, DNA data and first cryptographic Hash, the block is For the corresponding block of the DNA data.
5. according to the method described in claim 4, it is characterized in that, all clients respectively individually test the block Card, output verification message include:
All clients obtain out the first cryptographic Hash from the block;
All clients obtain out the cryptographic Hash of the last one block from the last one block of the block chain, referred to as Second cryptographic Hash;
When first cryptographic Hash is identical as second cryptographic Hash, the verification message that block is verified is exported;
When first cryptographic Hash and the second cryptographic Hash difference, output block verifies unsanctioned verification message.
6. according to the method described in claim 1, it is characterized in that, the method further includes:
The client receives at least one DNA comparings request, and at least one wait for is carried in the DNA comparings request The DNA data of comparison;
Obtain the DNA data stored in each block on the block chain;
The DNA data to be compared are compared with the DNA data stored in each block, export comparison result.
7. a kind of DNA data-storage systems based on block chain, which is characterized in that the system comprises a servers and multiple Client,
The server includes authentication module, for being verified to the client, output verification message;
The client includes data acquisition module, for obtaining at least one DNA data;
Data add module, for when the verification message show the client validation by when, by the DNA data addition Into block chain.
8. system according to claim 7, which is characterized in that the client further includes:
Logging request sending module, for sending logging request to the server, the logging request carries the client Hold corresponding IP address and/or certificate information;
The server further includes:
Data obtaining module is stored, for obtaining pre-stored multiple IP address and/or certificate information;
The authentication module includes:
First authentication module, for work as the corresponding IP address of the client and/or certificate information be recorded in it is pre-stored more When a IP address and/or certificate information, export the client validation by message;
Second authentication module, for work as the corresponding IP address of the client and/or certificate information be not recorded in it is pre-stored When multiple IP address and/or certificate information, the not verified message of the client is exported.
9. system according to claim 7 or 8, which is characterized in that the data add module includes:
Block forms module, for forming a block according to the DNA data;
Data transmission blocks, for the corresponding block of the DNA data to be sent to the client;
Block authentication module, for individually being verified to the block, output verification message;
Block add module, for being more than a preset threshold when the number that display block is verified in the verification message When value, the block is added in block chain;
Block removing module, for being more than one preset when the not verified number of display block in the verification message When threshold value, the block is deleted.
10. system according to claim 9, which is characterized in that the block forms module and includes:
Cryptographic Hash acquisition module, the cryptographic Hash for obtaining the last one block in the block chain, referred to as the first cryptographic Hash;
Cryptographic Hash determining module, for being based on described in hash algorithm output according to first cryptographic Hash and the DNA data The corresponding cryptographic Hash of DNA data;
Block determining module, for according to the corresponding cryptographic Hash of the DNA data, DNA data and the first cryptographic Hash shape At block, the block is the corresponding block of the DNA data.
11. system according to claim 9, which is characterized in that the block authentication module includes:
First cryptographic Hash acquisition module, for obtaining out the first cryptographic Hash from the block;
Second cryptographic Hash acquisition module, for obtaining out the last one described block from the last one block of the block chain Cryptographic Hash, referred to as the second cryptographic Hash;
First verification message output module, for when first cryptographic Hash is identical as second cryptographic Hash, exporting block The verification message being verified;
Second verification message output module, for when first cryptographic Hash is with the second cryptographic Hash difference, exporting block Verify unsanctioned verification message.
12. system according to claim 7, which is characterized in that the client further includes:
Request receiving module is compared, for receiving at least one DNA comparings request, is taken in the DNA comparings request With at least one DNA data to be compared;
DNA data acquisition modules, for obtaining the DNA data stored in each block on the block chain;
DNA data comparing modules, DNA data for that will store in the DNA data to be compared and each block into Row compares, and exports comparison result.
13. a kind of computing device, which is characterized in that the computing device includes:It is adapted for carrying out the processor of each instruction and deposits Equipment is stored up, the storage device is stored with a plurality of instruction, and described instruction is suitable for being loaded and being executed by processor:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
14. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program is for executing:
Obtain at least one DNA data;
When being verified, the DNA data are added in block chain.
CN201810366022.8A 2018-04-23 2018-04-23 A kind of DNA date storage methods, equipment and system based on block chain Withdrawn CN108737501A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810366022.8A CN108737501A (en) 2018-04-23 2018-04-23 A kind of DNA date storage methods, equipment and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810366022.8A CN108737501A (en) 2018-04-23 2018-04-23 A kind of DNA date storage methods, equipment and system based on block chain

Publications (1)

Publication Number Publication Date
CN108737501A true CN108737501A (en) 2018-11-02

Family

ID=63939705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810366022.8A Withdrawn CN108737501A (en) 2018-04-23 2018-04-23 A kind of DNA date storage methods, equipment and system based on block chain

Country Status (1)

Country Link
CN (1) CN108737501A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287724A (en) * 2019-05-23 2019-09-27 顺丰科技有限公司 Data storage and verification method and device
CN110601815A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Block chain data processing method and equipment
CN112989404A (en) * 2019-12-18 2021-06-18 中移雄安信息通信科技有限公司 Log management method based on block chain and related equipment
CN113343249A (en) * 2020-02-18 2021-09-03 中芯未来(北京)科技有限公司 Fabric-based DNA sequence safe storage and sharing method
CN114039739A (en) * 2020-11-30 2022-02-11 北京八分量信息科技有限公司 Method for rapidly searching for failure by optimizing node communication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096444A (en) * 2016-06-12 2016-11-09 杨鹏 A kind of identification based on bio information and social information's recording method and system
CN106130976A (en) * 2016-06-28 2016-11-16 惠众商务顾问(北京)有限公司 Based on local node stochastic instruction distributed authentication method, system and device
US20170286717A1 (en) * 2016-04-05 2017-10-05 Vchain Technology Limited Method and system for managing personal information within independent computer systems and digital networks
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN107846282A (en) * 2017-11-03 2018-03-27 法信公证云(厦门)科技有限公司 A kind of electronic data distribution keeping method and system based on block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170286717A1 (en) * 2016-04-05 2017-10-05 Vchain Technology Limited Method and system for managing personal information within independent computer systems and digital networks
CN106096444A (en) * 2016-06-12 2016-11-09 杨鹏 A kind of identification based on bio information and social information's recording method and system
CN106130976A (en) * 2016-06-28 2016-11-16 惠众商务顾问(北京)有限公司 Based on local node stochastic instruction distributed authentication method, system and device
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN107846282A (en) * 2017-11-03 2018-03-27 法信公证云(厦门)科技有限公司 A kind of electronic data distribution keeping method and system based on block chain technology

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287724A (en) * 2019-05-23 2019-09-27 顺丰科技有限公司 Data storage and verification method and device
CN110287724B (en) * 2019-05-23 2021-06-04 顺丰科技有限公司 Data storage and verification method and device
CN110601815A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Block chain data processing method and equipment
CN110601815B (en) * 2019-09-17 2021-09-10 腾讯科技(深圳)有限公司 Block chain data processing method and equipment
CN112989404A (en) * 2019-12-18 2021-06-18 中移雄安信息通信科技有限公司 Log management method based on block chain and related equipment
CN113343249A (en) * 2020-02-18 2021-09-03 中芯未来(北京)科技有限公司 Fabric-based DNA sequence safe storage and sharing method
CN114039739A (en) * 2020-11-30 2022-02-11 北京八分量信息科技有限公司 Method for rapidly searching for failure by optimizing node communication
CN114039739B (en) * 2020-11-30 2024-04-16 北京八分量信息科技有限公司 Method for fast failure by optimizing node communication

Similar Documents

Publication Publication Date Title
CN108737501A (en) A kind of DNA date storage methods, equipment and system based on block chain
Wang et al. Chainsplitter: Towards blockchain-based industrial iot architecture for supporting hierarchical storage
CN107193490B (en) Distributed data storage system and method based on block chain
Van der Aalst et al. Process mining and security: Detecting anomalous process executions and checking process conformance
CN107800565A (en) Method for inspecting, device, system, computer equipment and storage medium
CN107465656A (en) A kind of safety monitoring big data processing method and system based on cloud computing
CN107104816A (en) A kind of information change monitoring method and device
CN109981279B (en) Block chain system, communication method, device, equipment and medium
CN111556120A (en) Data processing method and device based on block chain, storage medium and equipment
CN111405074B (en) Data center network fault diagnosis and automatic configuration method based on hybrid chain
US20170171097A1 (en) System and user interface for coordinating distributed workflow between multiple computing systems
KR20190055666A (en) Method for storing smart grid heterogeneous data security using block chain
CN114780301B (en) Disaster recovery method and system supporting multi-cloud production environment
CN113570479B (en) Block chain transmission method, system and storage medium for real estate transaction data
CN109543459A (en) A kind of data deposit card method and apparatus
WO2023093638A1 (en) Abnormal data identification method and apparatus, and device and storage medium
CN115859362A (en) Data storage system, method, device and medium based on block chain side chain
CN112508733A (en) Big data intelligence service system in electric wire netting space-time based on big dipper
CN109525645A (en) A kind of method and system for collecting the log of distributed storage cluster
CN113765675A (en) Transaction data processing method, device, equipment and medium
WO2020149177A1 (en) Document management system
CN115858322A (en) Log data processing method and device and computer equipment
CN110674534A (en) Remote quality detection technology based on Internet of things electronic evidence chain
CN117853135A (en) Supply chain tracing method and device based on alliance block chain
KR102294569B1 (en) Block Chain Management System To Build Block Chain Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20181102

WW01 Invention patent application withdrawn after publication