CN108920965A - A kind of block chain deposits card method and device - Google Patents

A kind of block chain deposits card method and device Download PDF

Info

Publication number
CN108920965A
CN108920965A CN201810664333.2A CN201810664333A CN108920965A CN 108920965 A CN108920965 A CN 108920965A CN 201810664333 A CN201810664333 A CN 201810664333A CN 108920965 A CN108920965 A CN 108920965A
Authority
CN
China
Prior art keywords
evidence
instrument
node
block chain
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810664333.2A
Other languages
Chinese (zh)
Inventor
孟之杰
梁超
许坚
张安
柏盼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201810664333.2A priority Critical patent/CN108920965A/en
Publication of CN108920965A publication Critical patent/CN108920965A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of block chains to deposit card method and device, is applied to management node, the method includes:It obtains from the source instrument of evidence for depositing card node, deposits card node and management node access in same block chain;The processing source instrument of evidence, to generate the cochain file fingerprint of the source instrument of evidence;On the preservation source instrument of evidence to the storage region docked with management node;Block chain is written into cochain file fingerprint, cochain file fingerprint is used to veritify the target instrument of evidence corresponding with the source instrument of evidence obtained from storage region.Solves the technical issues of primitiveness that not can guarantee the extracted instrument of evidence.

Description

A kind of block chain deposits card method and device
Technical field
The present invention relates to block chain technical fields more particularly to a kind of block chain to deposit card method and device.
Background technique
Commonly depositing card is stored in electronic data in the form backed up on the server of oneself mechanism or lease, due to electricity Subdata is very easy to be destroyed, the failures such as easily cause flaw, breakpoint, evidence imperfect during transmission.This Singly technically to have high request to third party Cun Zheng mechanism, also to generate, solidify in electronic data, deposit card, storage and after Continuous evidence is using the middle number for reducing transfer, changing hands, if these electronic data are stored on the server of lease, necessarily Increase data relay number, the risk that data are tampered also will increase, and integrality can be also destroyed.Moreover, third party deposits card Mechanism is also enterprise, it is most likely that will appear and services the various unexpected situations such as unstable.
With the development of block chain technology, block chain, which is deposited card and become, deposits card mode better than commonly deposit card.Block chain is deposited Card takes the technological means for depositing card in many ways, ensure that the integrality for depositing card, authenticity, still, current block chain deposits card technology In, the source instrument of evidence still may be tampered, and not can guarantee the primitiveness of the extracted instrument of evidence.
Summary of the invention
The embodiment of the present invention deposits card method and device by providing a kind of block chain, solves and not can guarantee extracted evidence The technical issues of primitiveness of file.
In a first aspect, the embodiment of the present invention, which provides a kind of block chain, deposits card method, it is applied to management node, the method packet It includes:
It obtains from the source instrument of evidence for depositing card node, the card node and management node access deposited is in same block Chain;
The source instrument of evidence is handled, to generate the cochain file fingerprint of the source instrument of evidence;
It saves on the source instrument of evidence to the storage region docked with the management node;
The block chain is written into the cochain file fingerprint, the cochain file fingerprint is for veritifying from the memory block The target instrument of evidence corresponding with the source instrument of evidence that domain obtains.
Optionally, after the block chain by cochain file fingerprint write-in, further include:
The cochain file fingerprint is obtained from the block chain;
The target instrument of evidence is veritified based on the cochain file fingerprint, is obtained to the target instrument of evidence Veritification result.
Optionally, described that the target instrument of evidence is veritified based on the cochain file fingerprint, including:
The target instrument of evidence is handled, to generate file fingerprint to be verified;
It compares the file fingerprint to be verified and whether the cochain file fingerprint is consistent;
If consistent, determine that the target instrument of evidence is the source instrument of evidence being not tampered with, otherwise, it determines the target The instrument of evidence is the file after being distorted based on the source instrument of evidence.
Optionally, it is described the cochain file fingerprint is obtained from the block chain before, the method also includes:
The target instrument of evidence is extracted from the storage region;Or
The veritification request from evidence obtaining node is received, and extracts the target instrument of evidence, institute from veritification request Evidence obtaining node access is stated in the block chain.
Optionally, the veritification request from the evidence obtaining node is received, and extracts the target from veritification request Before the instrument of evidence, the method also includes:
Obtain the first evidence obtaining authority for extracting the target instrument of evidence from the evidence obtaining node;
The target instrument of evidence is extracted from the storage region according to the first evidence obtaining authority;
The target instrument of evidence is issued to the evidence obtaining node.
Optionally, after described save on the source instrument of evidence to the storage region docked with the management node, Further include:
Obtain the second evidence obtaining authority for extracting the target instrument of evidence from the evidence obtaining node, the evidence obtaining Node is accessed in the block chain;
The target instrument of evidence is extracted from the storage region according to the second evidence obtaining authority;
File fingerprint to be verified is generated according to the target instrument of evidence;
The file fingerprint to be verified and the target instrument of evidence are issued to the evidence obtaining node, so that the evidence obtaining saves Point veritifies the target instrument of evidence according to the file fingerprint to be verified and the cochain file fingerprint, the cochain File fingerprint is obtained by the evidence obtaining node from the block chain.
Optionally, the card node of depositing is directly accessed the block chain;Or the card node of depositing is saved by the management The external service interface that point provides accesses the block chain.
Optionally, described to obtain from the source instrument of evidence for depositing card node, including:
The source instrument of evidence that card node is submitted by webpage is deposited described in reception, or is deposited card node described in reception and passed through application The source instrument of evidence that Program Interfaces API is submitted.
Optionally, described to save on the source instrument of evidence to the storage region docked with the management node, including:
The external service interface provided by the management node, save the source instrument of evidence to the external service In the server cluster of interface connection.
Optionally, the external service interface provided by the management node, save the source instrument of evidence to In the server cluster of the external service interface connection, including:
The source instrument of evidence is encrypted, the instrument of evidence after being encrypted;
The instrument of evidence after the encryption is sent to the server cluster by the external service interface to save.
Optionally, the source instrument of evidence is specially:The initial instrument of evidence and/or the initial instrument of evidence are corresponding Probation report file.
Optionally, after the block chain by cochain file fingerprint write-in, further include:
Judge whether the cochain time point of the cochain file fingerprint meets default anchoring time interval;
If the cochain time point of the cochain file fingerprint meets the default anchoring time interval, by the cochain text Part fingerprint is anchored into target public affairs chain.
Optionally, the target public affairs chain is specially:It is specified by the card node of depositing, or is referred in advance by the management node It is fixed.
Optionally, after described save on the source instrument of evidence to the storage region docked with the management node, Further include:
The essential elements of evaluation within the scope of preset duration to the source instrument of evidence is obtained, the essential elements of evaluation is described for evaluating The file content of the source instrument of evidence;
It counts to the essential elements of evaluation of the source instrument of evidence within the scope of the preset duration, to obtain to the source evidence text The evaluation result of part;
Judge whether the evaluation result meets default evaluation condition, if it is satisfied, issuing reward to the card node of depositing.
Second aspect, the embodiment of the present invention provide a kind of block chain and deposit card device, are applied to management node, described device packet It includes:
File acquisition module, it is described to deposit card node and the management for obtaining from the source instrument of evidence for depositing card node Node is accessed in same block chain;
First fingerprint generation module, for handling the source instrument of evidence, to generate the cochain text of the source instrument of evidence Part fingerprint;
File preserving module, for saving the source instrument of evidence to the storage region docked with the management node;
Fingerprint writing module, for the block chain to be written in the cochain file fingerprint, the cochain file fingerprint is used In the target instrument of evidence corresponding with the source instrument of evidence that veritification is obtained from the storage region.
Optionally, described device further includes:
Fingerprint obtains module, for obtaining the cochain file fingerprint from the block chain;
File veritifies module, for being veritified based on the cochain file fingerprint to the target instrument of evidence, obtains To the veritification result of the target instrument of evidence.
Optionally, the file veritifies module, including:
Fingerprint generation unit, for handling the target instrument of evidence, to generate file fingerprint to be verified;
Fingerprint comparison unit, it is whether consistent for comparing the file fingerprint to be verified and the cochain file fingerprint;If Unanimously, determine that the target instrument of evidence is the source instrument of evidence being not tampered with, otherwise, it determines the target instrument of evidence is File after being distorted based on the source instrument of evidence.
Optionally, described device further includes verifying file extraction module, is used for:
The target instrument of evidence is extracted from the storage region;Or
The veritification request from evidence obtaining node is received, and extracts the target instrument of evidence, institute from veritification request Evidence obtaining node access is stated in the block chain.
Optionally, described device further includes:
First authority obtains module, for obtaining from the evidence obtaining node for extracting the target instrument of evidence First evidence obtaining authority;
First extraction module, for extracting the target evidence from the storage region according to the first evidence obtaining authority File;
First issues module, for issuing the target instrument of evidence to the evidence obtaining node.
Optionally, described device further includes:
Second authority obtains module, for obtaining from the evidence obtaining node for extracting the target instrument of evidence Second evidence obtaining authority, the evidence obtaining node access is in the block chain;
Second extraction module, for extracting the target evidence from the storage region according to the second evidence obtaining authority File;
Second fingerprint generation module, for generating file fingerprint to be verified according to the target instrument of evidence;
Second issues module, for issuing the file fingerprint to be verified and target evidence text to the evidence obtaining node Part, so that the evidence obtaining node is according to the file fingerprint to be verified and the cochain file fingerprint to the target instrument of evidence It is veritified, the cochain file fingerprint is obtained by the evidence obtaining node from the block chain.
Optionally, the card node of depositing is directly accessed the block chain;Or the card node of depositing is saved by the management The external service interface that point provides accesses the block chain.
Optionally, the file acquisition module, is specifically used for:
The source instrument of evidence that card node is submitted by webpage is deposited described in reception, or is deposited card node described in reception and passed through application The source instrument of evidence that Program Interfaces API is submitted.
Optionally, the file preserving module, is specifically used for:
The external service interface provided by the management node, save the source instrument of evidence to the external service In the server cluster of interface connection.
Optionally, the file preserving module, including:
Encryption unit, for being encrypted to the source instrument of evidence, the instrument of evidence after being encrypted;
Transmission unit, for the instrument of evidence after the encryption to be sent to the server by the external service interface Cluster is saved.
Optionally, the source instrument of evidence is specially:
The initial instrument of evidence, and/or
The corresponding probation report file of the initial instrument of evidence.
Optionally, described device further includes:
Time judgment module, for judging whether the cochain time point of the cochain file fingerprint meets the default anchoring time Interval;
Anchoring system, if the cochain time point for the cochain file fingerprint met between the default anchoring time Every the cochain file fingerprint is anchored into target public affairs chain.
Optionally, the target public affairs chain is specially:
It is specified by the card node of depositing, or
It is preassigned by the management node.
Optionally, described device further includes:
Element obtains module, for obtaining within the scope of preset duration to the essential elements of evaluation of the source instrument of evidence, institute's commentary Valence element is used to evaluate the file content of the source instrument of evidence;
Element statistical module, for counting within the scope of the preset duration to the essential elements of evaluation of the source instrument of evidence, with Obtain the evaluation result to the source instrument of evidence;
Reward issues module, for judging whether the evaluation result meets default evaluation condition, if it is satisfied, to described It deposits card node and issues reward.
The third aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence realizes step described in any possible implementation of first aspect when the program is executed by processor.
Fourth aspect, the embodiment of the present invention also provide a kind of management node, including memory, processor and are stored in storage On device and the computer program that can run on a processor, the processor realize any of first aspect when executing described program Step described in possible implementation.
5th aspect, the embodiment of the present invention provide one kind and deposit card cloud system, including accessing the management section in same block chain Point, more than one deposit demonstrate,prove node and more than one evidence obtaining node, and the storage region docked with the management node, institute Management node is stated for executing described in any possible implementation of first aspect.
The one or more technical solutions provided in the embodiment of the present invention, have at least the following technical effects or advantages:
Block chain provided in an embodiment of the present invention deposits card method and device, is accessed with management node same by depositing card node One block chain, management node obtain from the source instrument of evidence for depositing card node and handle the source instrument of evidence, to generate source evidence text The cochain file fingerprint of part;On the preservation source instrument of evidence to the storage region docked with management node;Cochain file fingerprint is write Enter block chain, cochain file fingerprint is used to veritify the target instrument of evidence corresponding with the source instrument of evidence obtained from storage region. Storage region storage is docked with management node to realize the instrument of evidence and be stored in, rather than the position that can not arbitrarily determine, it protects The safety of the instrument of evidence is demonstrate,proved, and since the file fingerprint of the instrument of evidence is written in block chain, so that file fingerprint is can not It distorts, therefore, the instrument of evidence obtained from storage region is veritified based on the file fingerprint on block chain, can be defined Whether the content of the acquired target instrument of evidence and the content of the source instrument of evidence identical, avoid instrument of evidence content be tampered and The case where being unaware of, so the primitiveness of the instrument of evidence is thoroughly ensured in conjunction with these two aspects.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for this For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others Attached drawing.
Fig. 1 shows the structure chart provided in an embodiment of the present invention for depositing card cloud system;
Fig. 2 shows the flow charts that block chain provided in an embodiment of the present invention deposits card method;
Fig. 3 shows the structure chart that block chain provided in an embodiment of the present invention deposits card device;
Fig. 4 shows the structural schematic diagram of the management node of inventive embodiments offer.
Specific embodiment
The embodiment of the present invention deposits card method and device by providing a kind of block chain, solves and not can guarantee extracted evidence The technical issues of primitiveness of file.
In order to solve the technical issues of not can guarantee the primitiveness of the extracted instrument of evidence, area provided in an embodiment of the present invention Block chain deposits card method and device, and general thought is as follows:
By depositing card node and management node access in same block chain, management node is obtained to be demonstrate,proved from the source for depositing card node According to file, the source instrument of evidence is handled, to generate the cochain file fingerprint of the source instrument of evidence;The preservation source instrument of evidence is saved to management In the storage region of point docking;Block chain is written into cochain file fingerprint, cochain file fingerprint is obtained for veritifying from storage region The target instrument of evidence corresponding with the source instrument of evidence taken.
Storage region storage is docked with management node through the above technical solutions, realizing the instrument of evidence and being stored in, without It is the position that can not arbitrarily determine, ensure that the safety of the instrument of evidence, and since the file fingerprint of the instrument of evidence is written in block Chain, so that file fingerprint can not be distorted, therefore, based on the file fingerprint on block chain to the evidence obtained from storage region File is veritified, and whether the content that can define the acquired target instrument of evidence is identical as the content of the source instrument of evidence, is kept away Exempt from the case where instrument of evidence content is tampered and is unaware of, so the original of the instrument of evidence is thoroughly ensured in conjunction with these two aspects Property.
The embodiment of the invention provides one kind be applied to deposit card cloud system, refering to what is shown in Fig. 1, this deposit card cloud system include: Management node, multiple user nodes, server cluster.Management node and the access of each user node are in same block chain.It needs The management node of explanation is trusted node, is connect for monitoring, the data backup to card cloud system is entirely deposited, and deployment and management Enter the user node of block chain.For example, accessing license, the record etc. of block chain request to user node.Specifically, server Cluster includes multiple storage servers, for example including multiple S3 servers, constitutes a big data pond.
Specifically, access can be the node with O&M ability in the user node of block chain, for example, as shown in Figure 1 User node A, user node B, user node C, directly accessed on block chain in the form of block chain node, the user section Point provides internal service interface, provides service for multiple internal users.In specific implementation implementation process, access on block chain The user node with O&M ability be specifically as follows some appraisal organizations, regulatory agency, judiciary, ordinary enterprises meter Calculate machine equipment.
Specifically, access can be the user node for not having O&M ability in the user node of block chain, as shown in Figure 1 User A, user B, user C block chain accessed to by the external service interface that management node provides.Do not have on block chain The user node of O&M ability can be the computer equipment of personal user.
Specifically, user node is evidence obtaining node when for collecting evidence for depositing card node when depositing card.Therefore, specific In implementation process, deposits card node and evidence obtaining node can be same user node, be also possible to different user nodes.Specific In implementation process, the card of depositing carried out after demonstrate,proving the source instrument of evidence that node reception internal user provides to the source instrument of evidence, management are deposited Node is handed down to evidence obtaining node after extracting file destination corresponding with the source instrument of evidence from storage server.It is inside by evidence obtaining node Portion user sends the target instrument of evidence.
The each node accessed in block chain is based on intelligent contract shared data, and the award machine based on logical card token It makes each node payment to access in block chain and calculates power expense.
In embodiments of the present invention, the source instrument of evidence that internal user provides is sent to management node by user node, pipe Reason node saves on the source instrument of evidence to the storage region docked with management node;Management node handles the source instrument of evidence, with life At the cochain file fingerprint of the source instrument of evidence;Block chain is written in cochain file fingerprint by management node, and cochain file fingerprint is used for Veritify the target instrument of evidence corresponding with the source instrument of evidence obtained from storage region.It is same on each node of access block chain The cochain file fingerprint is walked, to generate the corresponding data block of cochain file fingerprint on each node on block chain.
It should be noted that access the management node of same block chain and each user node can be deployed in it is same In local area network, for example, be deployed in single company, single department, it is single in the school.It accesses in the management node of same block chain and each A user node, which can also be, to be deployed in Different LANs, for example, distribution is between the different mechanisms.
Based on the same inventive concept, the embodiment of the invention provides a kind of block chains to deposit card method, refering to what is shown in Fig. 2, should Block chain is deposited card method and is included the following steps:
Step S1, card node is deposited to the management node transmission source instrument of evidence, is deposited card node and is accessed with management node same Block chain.
Block chain is directly accessed specifically, depositing card node and can be.Card node is deposited to be also possible to externally mention with management node The external service interface docking supplied accesses block chain by the external service interface that management node provides so that depositing card node.It needs It is noted that the block chain can be alliance's chain or private chain.
Specifically, the source instrument of evidence is to deposit the corresponding user of card node to upload to card node input, user is deposited by webpage The source instrument of evidence.In the specific implementation process, it deposits card node and the source instrument of evidence that user is uploaded by webpage is sent to management Node.The source instrument of evidence may be deposit card node directly pass through API (Application Programming Interface, Application programming interface) to the management node transmission source instrument of evidence.
In the specific implementation process, the source instrument of evidence is specially that the initial instrument of evidence and/or the initial instrument of evidence are corresponding Probation report file.
Specifically, the initial instrument of evidence can be deposit card node generated according to collected evidence.For example, depositing card node For on-site law-enforcing equipment, then the initial instrument of evidence can be the on-site law-enforcing video of on-site law-enforcing equipment shooting.It is being embodied In the process, the initial instrument of evidence can also be:Electronic contract, document, video screenshotss etc..Probation report file is to initial evidence File, which is identified, to be generated, and the card node of depositing for sending probation report file is exemplary and determines the computer equipment of mechanism.
In the specific implementation process, the source instrument of evidence can also include additional information, and additional information may include as follows One or more kinds of combinations:It deposits card type (electronic contract, document, video screenshotss), obtain card channel (in webpage upload, API Pass), obtain that the card time, this deposits the IP address of card node, the user identifier for depositing card user, deposits card time etc..
It should be noted that depositing card node transport protocol according to as defined in management node to management node transmission source evidence text Part.
After step S1, step S2 is then executed:Management node is obtained from the source instrument of evidence for depositing card node.
Management node, which receives, deposits the source instrument of evidence that card node is submitted by webpage, or reception deposits card node and passes through API The source instrument of evidence of submission.Specifically, the source instrument of evidence, which can be, deposits card section active upload.
Upon step s 2, step S3 is then executed:Management node handles the source instrument of evidence, to generate the source instrument of evidence Cochain file fingerprint.
Specifically, unique corresponding between cochain file fingerprint and the source instrument of evidence, the file content of the instrument of evidence is once It changes, the cochain file fingerprint generated according to the source instrument of evidence is not also identical.In the specific implementation process, upper chained file refers to Line can the file content of the source instrument of evidence generates according to hash value, implementation is specially:By the text of the source instrument of evidence Part content is input to target hash algorithm and obtains hash value.The type of used hash algorithm is not limited herein.
After step s 3, step S4 is also executed:Management node saves the source instrument of evidence and deposits to what is docked with management node On storage area domain.
Specifically, the storage region is specially the server cluster docked with management node, server cluster includes one Server or multiple servers, for example, the server cluster can be S3 (Simple StorageService, simple storage Service) server cluster, S3 server cluster is the big data pond for including multiple S3 servers, is provided by management node External service interface is docked with management node.
Specifically, the external service interface provided by management node saves the source instrument of evidence and connects to external service In the server cluster of mouth connection.
After step s 3, step S5 is executed:Block chain is written into cochain file fingerprint, cochain file fingerprint is for veritifying The target instrument of evidence corresponding with the source instrument of evidence obtained from storage region.
It should be noted that the corresponding target instrument of evidence of the source instrument of evidence, in particular to:The source instrument of evidence and target are demonstrate,proved According to documentary evidence number, identical but file content may be different.The target instrument of evidence is veritified, is exactly:Veritify the target instrument of evidence File content it is whether identical as the file content of the source instrument of evidence.
Specifically, block chain is written into cochain file fingerprint, can be:It is generated according to cochain file fingerprint for connecing Enter the data block in each node storage of block chain, the data block generated for each node is different, by each data field Block is written in the corresponding node of block chain.More specifically, current data block is created according to the cochain file fingerprint, according to working as Preceding data block generates latter data block, and so on, until generating the data for access in each node of block chain Block, it is shared between each node on block chain to complete cochain file fingerprint.
Specifically, access uses common recognition mechanism in the management node of block chain and each user node, carry out in block chain Upper creation data block realizes data sharing.In the specific implementation process, a variety of common recognition mechanism can be set, for example can set It is equipped with Pow (Proof of Work-PoW, proof of work mechanism), (Proof of Stake-PoS, equity prove machine to pos System), three kinds of common recognition machines of dpos (Practical Byzantine Fault Tolerance-PBFT, Byzantium know together algorithm) System, switches in three kinds of common recognition mechanism as above, determines a kind of as currently used common recognition mechanism.
It should be noted that step S4 and step S5 are executed after step S3 has been executed, also, step S4 and step S5 may be performed simultaneously, can also execute according to any sequencing.
After completing step S4 and step S5, if access needs the target instrument of evidence in the evidence obtaining node of block chain, Evidence obtaining node sends the first evidence obtaining authority for extracting the target instrument of evidence to management node, then after step s 5 by such as Lower process obtains:
Execute step S6:Management node obtain from evidence obtaining node for extract the target instrument of evidence first evidence obtaining with According to.
The first evidence obtaining authority can identify for the evidence of the source instrument of evidence.In the specific implementation process, evidence mark can To be evidence number, evidence, which is numbered, which can demonstrate,prove the time based on depositing for the card node upload source instrument of evidence is deposited, deposit card is sequentially generated, It can be sequentially generated according only to the card of depositing of the source instrument of evidence.For example, the card time of depositing of the source instrument of evidence is 2018-04-04 18:55:40, depositing card sequence is 496266, then the evidence coding of the source instrument of evidence can be 20180404-185540-496266.
In order to guarantee to be stored in the safety of the source instrument of evidence in server cluster, management node adds the source instrument of evidence It is close, the instrument of evidence after being encrypted;The instrument of evidence after encryption is sent to server set by external service interface by management node Group is saved.
In the specific implementation process, management node can encrypt the source instrument of evidence based on symmetry Encryption Algorithm, Key used is encrypted to be grasped by management node.More specifically, for the difference of key used in each source instrument of evidence, management section Point can generate the key for the encrypted source instrument of evidence at random.
After step S6, step S7 is executed:Management node extracts target according to the first evidence obtaining authority from storage region The instrument of evidence.
After step s 7, step S8 is executed:Management node issues the target extracted from storage region to evidence obtaining node The instrument of evidence.
Specifically, by it, externally service connects management node if the instrument of evidence after being encryption saved in storage region Mouth extracts the instrument of evidence after encryption from storage region, and then, management node utilizes symmetry decipherment algorithm and management node certainly The instrument of evidence is decrypted after the key pair encryption that body saves, and obtains the target instrument of evidence issued to evidence obtaining node.
Further, it in order to veritify the target instrument of evidence that management node is extracted from storage region, can be:From block Cochain file fingerprint is obtained on chain;The target instrument of evidence is veritified based on cochain file fingerprint, is obtained to target evidence text The veritification result of part.
It in the specific implementation process, can there are many embodiments to carry out to the target instrument of evidence that extracts from storage region It veritifies, is illustrated respectively below:
Embodiment one:
After step S8, after management node issues the target instrument of evidence extracted from storage region to evidence obtaining node, It determines the need for being veritified by evidence obtaining node, if the corresponding user of evidence obtaining node wishes to management node from storage region The target instrument of evidence of upper extraction is veritified, then initiates to veritify request to management node, is veritified and is carried management section in request The target instrument of evidence that point issues, so that management node veritifies the target instrument of evidence from evidence obtaining node by following process:
Step 1, management node receive the veritification request from evidence obtaining node, and target evidence text is extracted in request from veritifying Part, evidence obtaining node access is in block chain.
According to the target instrument of evidence that user uploads at the veritification interface of evidence obtaining node to management node, then node of collecting evidence hair It gives the management node target instrument of evidence to management node, management node is requested to veritify it.
Step 2, management node obtain cochain file fingerprint from block chain.
Specifically, management node obtains source evidence text according to the first evidence obtaining authority from evidence obtaining node from block chain The cochain file fingerprint of part.In the specific implementation process, the first evidence obtaining authority can carry in veritifying request.
Step 3 veritifies the target instrument of evidence from evidence obtaining node based on cochain file fingerprint, obtains to target The veritification result of the instrument of evidence.
Specifically, the target instrument of evidence from evidence obtaining node is the target instrument of evidence extracted from veritification request.Pipe Reason node veritifies the target instrument of evidence from evidence obtaining node based on cochain file fingerprint, and specific embodiment can be with It is:The target instrument of evidence of the management node processing from evidence obtaining node, to generate the file fingerprint to be verified of the target instrument of evidence; Whether management node compares file fingerprint and cochain file fingerprint to be verified consistent;If consistent, management node is determined from evidence obtaining The target instrument of evidence of node is the source instrument of evidence being not tampered with, and otherwise, management node determines the mesh from evidence obtaining node The mark instrument of evidence is the file after being distorted based on the source instrument of evidence.
Hash value with the file content that file fingerprint to be verified and cochain file fingerprint are the corresponding respective instrument of evidence is Example, if the hash value of the target instrument of evidence from evidence obtaining node is identical as the hash value of the source instrument of evidence, characterization is come from The file content of the target instrument of evidence of evidence obtaining node is identical as the file content of the source instrument of evidence, i.e., the target instrument of evidence is The source instrument of evidence being not tampered with.Otherwise, the file content and source evidence of the target instrument of evidence from evidence obtaining node are characterized The file content of file is not identical, that is, illustrates that the target instrument of evidence is the file after distorting based on the source instrument of evidence.
Specifically, the generating mode of file fingerprint to be verified is identical as the generating mode of cochain file fingerprint, text to be verified Part fingerprint is:Based on the same hash function for generating cochain file fingerprint, the hash that the file content of the target instrument of evidence is taken Value.
Step 4, management node issue veritification result to evidence obtaining node.
It, can be when node of collecting evidence needs to veritify the instrument of evidence extracted by this embodiment of step 1~step 4 Just by management node, it is veritified, and reduces the calculation amount of management node.
Embodiment two:It can be issued before the instrument of evidence that storage region is extracted in management node to evidence obtaining node, The instrument of evidence extracted from storage region is veritified by management node, specific implementation process is as follows:
Step 1 ':Management node obtains the first evidence obtaining authority for extracting the target instrument of evidence from evidence obtaining node, Node access collect evidence in block chain;
Step 2 ':Management node extracts the instrument of evidence according to the first evidence obtaining authority from storage region, and according to first Evidence obtaining authority obtains the cochain file fingerprint of the source instrument of evidence from block chain;
Step 3 ':Management node veritifies the target instrument of evidence according to cochain file fingerprint, obtains to target evidence The veritification result of file;
Step 4 ':Management node issues the instrument of evidence extracted from management node storage region and to mesh to evidence obtaining node Mark the veritification result of the instrument of evidence.
Specifically, in step 3 ' in, management node veritifies the target instrument of evidence according to cochain file fingerprint, obtains Veritification to the target instrument of evidence is as a result, be specially:
The management node processing target instrument of evidence, to generate file fingerprint to be verified.Management node compares file to be verified Whether fingerprint is consistent with cochain file fingerprint;If consistent, management node determines that the target instrument of evidence is the source card being not tampered with According to file, otherwise, management node determines that the target instrument of evidence is the file after distorting based on the source instrument of evidence.
By taking the hash value for the file content that file fingerprint to be verified and cochain file fingerprint are the corresponding instrument of evidence as an example, such as The hash value of the fruit target instrument of evidence and the hash value of the source instrument of evidence are identical, then characterize the file content of the target instrument of evidence with The file content of the source instrument of evidence is identical, i.e., the target instrument of evidence is the source instrument of evidence being not tampered with.Otherwise, target is characterized The file content of the instrument of evidence is not identical as the file content of the source instrument of evidence, illustrates that the target instrument of evidence is based on source evidence text Part distort after file.
In conjunction with aforementioned veritification as a result, step 4 ' it can also be:If it is not usurped that veritification result, which is the target instrument of evidence, The source instrument of evidence changed, then management node issues the target instrument of evidence to evidence obtaining node, and otherwise management node is refused to evidence obtaining Node issues the target instrument of evidence.
Specifically, the generating mode of file fingerprint to be verified is identical as the generating mode of cochain file fingerprint, text to be verified Part fingerprint is:Based on the same hash function for generating cochain file fingerprint, the file content of the target instrument of evidence is taken Hash value.
This embodiment of '~step 4 ' by step 1 enables to evidence obtaining node that can know institute in evidence obtaining Whether the instrument of evidence of extraction is tampered, and reduces the complexity of evidence obtaining process.
Embodiment three can veritify management node from the instrument of evidence that storage region is extracted by evidence obtaining node, Realization process is as follows:
Step 1 ":Management node obtains the second evidence obtaining authority for extracting the target instrument of evidence from evidence obtaining node. Specifically, the first evidence obtaining authority can be identical as the first evidence obtaining authority, for example, the evidence of the target instrument of evidence is numbered.
Step 2 ":Management node extracts the target instrument of evidence according to the second evidence obtaining authority from storage region.
Step 3 ":Management node generates file fingerprint to be verified according to the target instrument of evidence.Specifically, file to be verified refers to The generating mode of line is identical as the generating mode of cochain file fingerprint, and file fingerprint to be verified is:Referred to based on upper chained file is generated The same hash function of line, the hash value that the file content of the target instrument of evidence is taken.
Step 4 ":Management node issues file fingerprint to be verified and the target instrument of evidence to evidence obtaining node, node root of collecting evidence According to file fingerprint to be verified and cochain file fingerprint, the target instrument of evidence is veritified, cochain file fingerprint is by evidence obtaining node It is obtained from block chain.
Specifically, evidence obtaining node carries out core according to file fingerprint to be verified and cochain file fingerprint, to the target instrument of evidence It tests, specific implementation process is:
Node collect evidence after block chain acquisition cochain file fingerprint, compares file fingerprint to be verified and evidence obtaining node from area Whether the cochain file fingerprint for the source instrument of evidence that block chain obtains is consistent;If consistent, evidence obtaining node determines that the target instrument of evidence is The source instrument of evidence being not tampered with, otherwise, evidence obtaining node determine that the target instrument of evidence is after distorting based on the source instrument of evidence File.
By taking the hash value for the file content that file fingerprint to be verified and cochain file fingerprint are the corresponding instrument of evidence as an example, such as The hash value that fruit management node issues is identical as the hash value that evidence obtaining node is obtained from block chain, then characterizes the target instrument of evidence File content is identical as the file content of the source instrument of evidence, i.e.,:The target instrument of evidence is the source instrument of evidence being not tampered with;It is no Then, the file content for characterizing the target instrument of evidence is not identical as the file content of the source instrument of evidence, i.e.,:The target instrument of evidence is base File after the instrument of evidence is distorted in source.
By step 1 "~step 4 " this embodiment, can be realized by evidence obtaining node itself complete to extract card According to veritification, reduce the operand of management node.
In order to improve the public credibility of block chain, the embodiment of the present invention also provides and process is implemented as follows:
After block chain is written in cochain file fingerprint, it is pre- to judge whether the cochain time point of cochain file fingerprint meets If being anchored time interval;If the cochain time point of cochain file fingerprint meets default anchoring time interval, by the source evidence text The cochain file fingerprint of part is anchored into target public affairs chain.
Specifically, storing the cochain of the cochain file fingerprint on block chain when block chain is written in cochain file fingerprint Time point.
In the specific implementation process, block chain is written in cochain file fingerprint, then can generate the data block of corresponding node, number According to the generation time in block including data block, as:The cochain time point of the cochain file fingerprint.Then judge upper chained file Whether the cochain time point of fingerprint meets default anchoring time interval, i.e.,:Judge whether current time meets the default anchoring time Interval, if it is satisfied, the hash value in the block body of the corresponding data block of current time is anchored into target public affairs chain, when current Between corresponding data block block body in hash value be the source instrument of evidence cochain file fingerprint.If conditions are not met, Hash value is not anchored in the block body of the corresponding data block of current time then to target public affairs chain.Refer to realize chained file Line can be found on public chain, and then it is traceable to realize uplink data.
It should be noted that the corresponding data block of current time refers to that the generation time of data block is current.Having In body implementation process, judge whether the cochain time point of cochain file fingerprint meets default anchoring time interval, specially:Judgement Cochain file fingerprint on the cochain time point of the cochain file fingerprint of presently written block chain and last anchoring block chain is extremely Whether default anchoring time interval is met between the time point of public chain.
Default anchoring time interval is determined according to the Privacy requirement for depositing card cloud system.In the specific implementation process, anchor is preset The number of minutes magnitude is divided between fixing time, for example, default anchoring time interval can be set to 5 minutes, if current time with it is upper Cochain file fingerprint on primary anchoring block chain is separated by 5 minutes between the time point of target public affairs chain, then by current time pair Hash value in the block body of data block is answered to be anchored into target public affairs chain.Otherwise, not by the block of current time corresponding data block Hash value is anchored into target public affairs chain in body.
Specifically, target public affairs chain can be ether mill, bit coin, EOS (Enterprise Operation System, quotient Block chain operating system is counted with distribution).In the specific implementation process, target public affairs chain can be default specified for management node, Can be provide the corresponding source instrument of evidence of the cochain file fingerprint to deposit card node specified.If target public affairs chain is to deposit card node It is specified, then it can be to deposit when card node uploads the source instrument of evidence and specify target public affairs chain, be also possible to determining current time satisfaction When default anchoring time interval, instruction deposits card node and specifies target public affairs chain.
For data to the mode of public chain, realizing periodically will be in some block on the anchoring chain provided through the embodiment of the present invention Hash value is anchored to public chain, and each evidence is not anchored to public chain, relatively flexibly, when block chain itself is trusted, nothing Public chain is needed, can be proved by public chain when being under suspicion.Therefore not fully dependent on public chain.
The embodiment of the present invention also provides and process is implemented as follows:
Specifically, management node obtains the essential elements of evaluation within the scope of preset duration to the source instrument of evidence, and essential elements of evaluation is used In the file content of evaluation original evidence file;The evaluation of the source instrument of evidence is wanted within the scope of management node statistics preset duration Element, to obtain the evaluation result to the source instrument of evidence;Management node judges whether evaluation result meets default evaluation condition, if Meet, management node issues reward to card node is deposited.If conditions are not met, management node does not then deposit card to the upload source instrument of evidence Node issues reward.
Specifically, can also be when evaluation result is unsatisfactory for default evaluation condition, management node is to uploading the source instrument of evidence Deposit card node issue evaluation result.It is mentioned from reception from local storage region it should be noted that essential elements of evaluation can be The evidence obtaining node of the instrument of evidence taken.Specifically, can be there are many embodiment:
Embodiment one:Each evidence obtaining node obtain the instrument of evidence that is extracted from local storage region of management node it Afterwards, can report to the received instrument of evidence essential elements of evaluation, be also possible to veritify the acquired instrument of evidence be not by The essential elements of evaluation to the source instrument of evidence is reported after the source instrument of evidence distorted.
Embodiment two:Management node deposits card node in each of block chain to access and discloses the source instrument of evidence, so that connecing Enter to deposit card node in each of block chain and report essential elements of evaluation to the source instrument of evidence.
In the specific implementation process, essential elements of evaluation can be illustrated separately below there are many form:
Form one:Essential elements of evaluation is the marking value to the source instrument of evidence, specifically, can be set and beats score range, take Card node gives a mark to the acquired source instrument of evidence beating in score range, so that management node obtains each evidence obtaining node To the marking value of the source instrument of evidence.For example, beating score range can be set to 0~5, may be set to be 0~10, may be used also To be set as 0~100.Certainly, other ranges can also be set as according to actual needs by beating score range.It is corresponding, it is default to comment Valence condition is beat point threshold, adds up within the scope of preset duration each node of collecting evidence to the marking value of the same source instrument of evidence, with Obtain the marking value accumulated result to the same source instrument of evidence;Judge whether marking value accumulated result reaches and beat point threshold, such as Fruit is that management node issues reward to card node is deposited, and otherwise, management node does not issue reward.
Form two, essential elements of evaluation are to vote the multiselect one of the source instrument of evidence.For example, can be:Alternative ballot or One-out-three ballot.It is voted and is illustrated with alternative, polling option has:" praising " polling option and " stepping on " polling option.When accumulative default To the polling option of the same source instrument of evidence in long range, to obtain to " praising " ballot quantity of the same source instrument of evidence and " stepping on " Ballot quantity.Later, can determine whether to issue reward for a kind of mode as follows:
Then it can be:Whether judgement " praising " ballot quantity is greater than " praising " amount threshold, and judgement " stepping on " ballot quantity is No to be less than " stepping on " amount threshold, if " praising " ballot quantity is greater than " praising " amount threshold, and " stepping on " ballot quantity is less than " stepping on " number Threshold value is measured, then management node issues reward to the card node of depositing for uploading the source instrument of evidence, and otherwise, management node should not to upload The card node of depositing of the source instrument of evidence issues reward.
It can also be:Whether judgement " praising " ballot quantity is greater than " stepping on " ballot quantity, if it is, management node is to upload The source instrument of evidence deposit card node issue reward, otherwise, management node not to upload the source instrument of evidence depositing demonstrate,prove node under It awards prizes and encourages.
It can also be:Whether judgement " praising " ballot quantity is greater than " praising " amount threshold, and judges that " praising " ballot quantity is big In " stepping on " ballot quantity, if met simultaneously, " praising " ballot quantity is greater than " praising " amount threshold, " praising " ballot quantity is greater than " stepping on " Ballot quantity, then management node issues reward to the card node of depositing for uploading the source instrument of evidence, and otherwise, management node is not to upload The card node of depositing of the source instrument of evidence issues reward.
By this embodiment, it can be avoided user and upload the meaningless instrument of evidence.
Further, can also be when evaluation result be unsatisfactory for default evaluation condition, management node, which is sent, deletes instruction, from It deposits and deletes the source instrument of evidence in the local storage region of card node.
It should be noted that preset duration range is arranged according to actual needs, for example, can be set to one day or one Week or one month.
Based on the same inventive concept, the embodiment of the present invention provides a kind of block chain and deposits card device, is applied to management node, ginseng It examines shown in Fig. 3, including:
File acquisition module 201 deposits card node and the management saves for obtaining from the source instrument of evidence for depositing card node Point access is in same block chain;
First fingerprint generation module 202 is referred to for handling the source instrument of evidence with generating the upper chained file of the source instrument of evidence Line;
File preserving module 203, for saving the source instrument of evidence to the storage region docked with management node;
Fingerprint writing module 204, for block chain to be written in cochain file fingerprint, cochain file fingerprint is for veritifying from depositing The target instrument of evidence corresponding with the source instrument of evidence that storage area domain obtains.
In an optional embodiment of the invention, device further includes:
Fingerprint obtains module, for obtaining cochain file fingerprint from block chain;
File veritifies module, for being veritified based on cochain file fingerprint to the target instrument of evidence, obtains and demonstrate,proves target According to the veritification result of file.
In an optional embodiment of the invention, file veritifies module, including:
Fingerprint generation unit is used for the processing target instrument of evidence, to generate file fingerprint to be verified;
Fingerprint comparison unit, it is whether consistent with cochain file fingerprint for comparing file fingerprint to be verified;If consistent, determine The target instrument of evidence is the source instrument of evidence being not tampered with, otherwise, it determines from the target instrument of evidence for based on the source instrument of evidence File after distorting.
In an optional embodiment of the invention, device further includes verifying file extraction module, is used for:
The target instrument of evidence is extracted from storage region;Or
The veritification request from evidence obtaining node is received, and extracts the target instrument of evidence in request from veritifying, evidence obtaining node connects Enter in block chain.
In an optional embodiment of the invention, device further includes:
First authority obtains module, for obtaining the first evidence obtaining for extracting the target instrument of evidence from evidence obtaining node Authority;
First extraction module, for extracting the target instrument of evidence from storage region according to the first evidence obtaining authority;
First issues module, for issuing the target instrument of evidence to evidence obtaining node.
In an optional embodiment of the invention, device further includes:
Second authority obtains module, for obtaining the second evidence obtaining for extracting the target instrument of evidence from evidence obtaining node Authority, evidence obtaining node access is in block chain;
Second extraction module, for extracting the target instrument of evidence from storage region according to the second evidence obtaining authority;
Second fingerprint generation module, for generating file fingerprint to be verified according to the target instrument of evidence;
Second issues module, for issuing file fingerprint to be verified and the target instrument of evidence to evidence obtaining node, so that evidence obtaining Node veritifies the target instrument of evidence according to file fingerprint to be verified and cochain file fingerprint, and cochain file fingerprint is by collecting evidence Node is obtained from block chain.
In an optional embodiment of the invention, deposits card node and be directly accessed block chain;Or it deposits card node and passes through pipe It manages the external service interface that node provides and accesses block chain.
In an optional embodiment of the invention, file acquisition module 201 is specifically used for:
It receives and deposits the source instrument of evidence that card node is submitted by webpage, or reception deposits card node and passes through application programming The source instrument of evidence that interface API is submitted.
In an optional embodiment of the invention, file preserving module 203 is specifically used for:
The external service interface provided by management node saves the source instrument of evidence to the clothes connecting with external service interface It is engaged in device cluster.
In an optional embodiment of the invention, file preserving module 203, including:
Encryption unit, for being encrypted to the source instrument of evidence, the instrument of evidence after being encrypted;
Transmission unit is sent to server cluster by external service interface for the instrument of evidence after encrypting and protects It deposits.
In an optional embodiment of the invention, the source instrument of evidence is specially:
The initial instrument of evidence, and/or
The corresponding probation report file of the initial instrument of evidence.
In an optional embodiment of the invention, device further includes:
Time judgment module, between judging whether the cochain time point of cochain file fingerprint meets the default anchoring time Every;
Anchoring system, if the cochain time point for cochain file fingerprint meets default anchoring time interval, by cochain File fingerprint is anchored into target public affairs chain.
In an optional embodiment of the invention, target public affairs chain is specially:
It is specified by depositing card node, or
It is preassigned by management node.
In an optional embodiment of the invention, device further includes:
Element obtains module, and for obtaining to the essential elements of evaluation of the source instrument of evidence within the scope of preset duration, essential elements of evaluation is used In the file content of the evaluation source instrument of evidence;
Element statistical module, for counting to the essential elements of evaluation of the source instrument of evidence within the scope of preset duration, to obtain to source The evaluation result of the instrument of evidence;
Reward issues module, for judging whether evaluation result meets default evaluation condition, if it is satisfied, to card node is deposited Issue reward.
Based on the same inventive concept, the embodiment of the present invention provides a kind of management node 40, refering to what is shown in Fig. 4, including storage Device 401, processor 402 and it is stored in the computer program 403 that can be run on memory 401 and on the processor 402, processor Realize that aforementioned block chain deposits method and step described in any embodiment in card embodiment of the method when 402 execution program 403.
Based on the same inventive concept, the embodiment of the present invention provides a kind of computer storage medium, is stored thereon with computer Program, above-metioned instruction can the processor 402 of management node 40 as shown in Figure 4 execute that deposit card method real to complete aforementioned block chain Apply method and step described in any embodiment in example.Computer storage medium is specially the computer-readable storage of non-transitory Medium specifically can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Above-described embodiment provided by the invention at least realizes following technical effect or advantage:
Block chain provided in an embodiment of the present invention deposits card method and device, is accessed with management node same by depositing card node One block chain, management node obtain from the source instrument of evidence for depositing card node and handle the source instrument of evidence, to generate source evidence text The cochain file fingerprint of part;On the preservation source instrument of evidence to the storage region docked with management node;Cochain file fingerprint is write Enter block chain, cochain file fingerprint is used to veritify the target instrument of evidence corresponding with the source instrument of evidence obtained from storage region. Storage region storage is docked with management node to realize the instrument of evidence and be stored in, rather than the position that can not arbitrarily determine, it protects The safety of the instrument of evidence is demonstrate,proved, and since the file fingerprint of the instrument of evidence is written in block chain, so that file fingerprint is can not It distorts, therefore, the instrument of evidence obtained from storage region is veritified based on the file fingerprint on block chain, can be defined Whether the content of the acquired target instrument of evidence and the content of the source instrument of evidence identical, avoid instrument of evidence content be tampered and The case where being unaware of, so the primitiveness of the instrument of evidence is thoroughly ensured in conjunction with these two aspects.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.According to each description above, constructs this kind of system and wanted The structure asked is obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use each Kind programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this The preferred forms of invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention:It is i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize that intelligent camera system and network according to an embodiment of the present invention are taken the photograph As some or all functions of some or all components in head.The present invention is also implemented as being retouched here for executing The some or all equipment or system program (such as computer program and computer program product) for the method stated.In this way Realization program of the invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other shape Formula provides.
It should be noted that illustrate the present invention rather than limit it for the various embodiments described above, and Those skilled in the art can be designed alternative embodiment without departing from the scope of the appended claims.In claim In, any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" is not excluded for There are elements or steps not listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of more A such element.The present invention can be by means of including the hardware of several different elements and by means of properly programmed calculating Machine is realized.If several in these systems can be by same in the unit claim for listing dry systems Hardware branch embodies.The use of word first, second and third etc. does not indicate any sequence.These words can be explained For title.
The present invention discloses A1, a kind of block chain deposits card method, is applied to management node, the method includes:
It obtains from the source instrument of evidence for depositing card node, the card node and management node access deposited is in same block Chain;
The source instrument of evidence is handled, to generate the cochain file fingerprint of the source instrument of evidence;
It saves on the source instrument of evidence to the storage region docked with the management node;
The block chain is written into the cochain file fingerprint, the cochain file fingerprint is for veritifying from the memory block The target instrument of evidence corresponding with the source instrument of evidence that domain obtains.
A2, block chain as described in a1 deposit card method, it is described by the cochain file fingerprint be written the block chain it Afterwards, further include:
The cochain file fingerprint is obtained from the block chain;
The target instrument of evidence is veritified based on the cochain file fingerprint, is obtained to the target instrument of evidence Veritification result.
A3, as described in A2 block chain deposit card method, described literary to the target evidence based on the cochain file fingerprint Part is veritified, including:
The target instrument of evidence is handled, to generate file fingerprint to be verified;
It compares the file fingerprint to be verified and whether the cochain file fingerprint is consistent;
If consistent, determine that the target instrument of evidence is the source instrument of evidence being not tampered with, otherwise, it determines the target The instrument of evidence is the file after being distorted based on the source instrument of evidence.
A4, as described in A2 block chain deposit card method, it is described obtained from the block chain cochain file fingerprint it Before, the method also includes:
The target instrument of evidence is extracted from the storage region;Or
The veritification request from evidence obtaining node is received, and extracts the target instrument of evidence, institute from veritification request Evidence obtaining node access is stated in the block chain.
A5, the block chain as described in A4 deposit card method, receive the veritification request from the evidence obtaining node, and from the core It tests in request before extracting the target instrument of evidence, the method also includes:
Obtain the first evidence obtaining authority for extracting the target instrument of evidence from the evidence obtaining node;
The target instrument of evidence is extracted from the storage region according to the first evidence obtaining authority;
The target instrument of evidence is issued to the evidence obtaining node.
A6, block chain as described in a1 deposit card method, it is described save the source instrument of evidence to the management node After in the storage region of docking, further include:
Obtain the second evidence obtaining authority for extracting the target instrument of evidence from the evidence obtaining node, the evidence obtaining Node is accessed in the block chain;
The target instrument of evidence is extracted from the storage region according to the second evidence obtaining authority;
File fingerprint to be verified is generated according to the target instrument of evidence;
The file fingerprint to be verified and the target instrument of evidence are issued to the evidence obtaining node, so that the evidence obtaining saves Point veritifies the target instrument of evidence according to the file fingerprint to be verified and the cochain file fingerprint, the cochain File fingerprint is obtained by the evidence obtaining node from the block chain.
A7, block chain as described in a1 deposit card method:
The card node of depositing is directly accessed the block chain;Or
The external service interface access block chain depositing card node and being provided by the management node.
A8, the block chain as described in any one of A1-A7 deposit card method, described to obtain from the source evidence text for depositing card node Part, including:
The source instrument of evidence that card node is submitted by webpage is deposited described in reception, or is deposited card node described in reception and passed through application The source instrument of evidence that Program Interfaces API is submitted.
A9, the block chain as described in A8 deposit card method, it is described save the source instrument of evidence to the management node pair In the storage region connect, including:
The external service interface provided by the management node, save the source instrument of evidence to the external service In the server cluster of interface connection.
A10, the block chain as described in A9 deposit card method, the external service interface provided by the management node, The source instrument of evidence is saved into the server cluster connecting with the external service interface, including:
The source instrument of evidence is encrypted, the instrument of evidence after being encrypted;
The instrument of evidence after the encryption is sent to the server cluster by the external service interface to save.
A11, the block chain as described in any one of A1-A7 deposit card method, and the source instrument of evidence is specially:
The initial instrument of evidence, and/or
The corresponding probation report file of the initial instrument of evidence.
A12, block chain as described in a1 deposit card method, it is described by the cochain file fingerprint be written the block chain it Afterwards, further include:
Judge whether the cochain time point of the cochain file fingerprint meets default anchoring time interval;
If the cochain time point of the cochain file fingerprint meets the default anchoring time interval, by the cochain text Part fingerprint is anchored into target public affairs chain.
A13, the block chain as described in A12 deposit card method, and the target public affairs chain is specially:
It is specified by the card node of depositing, or
It is preassigned by the management node.
A14, block chain as described in a1 deposit card method, it is described save the source instrument of evidence to the management node After in the storage region of docking, further include:
The essential elements of evaluation within the scope of preset duration to the source instrument of evidence is obtained, the essential elements of evaluation is described for evaluating The file content of the source instrument of evidence;
It counts to the essential elements of evaluation of the source instrument of evidence within the scope of the preset duration, to obtain to the source evidence text The evaluation result of part;
Judge whether the evaluation result meets default evaluation condition, if it is satisfied, issuing reward to the card node of depositing.
The present invention discloses B15, a kind of block chain deposits card device, is applied to management node, and described device includes:
File acquisition module, it is described to deposit card node and the management for obtaining from the source instrument of evidence for depositing card node Node is accessed in same block chain;
First fingerprint generation module, for handling the source instrument of evidence, to generate the cochain text of the source instrument of evidence Part fingerprint;
File preserving module, for saving the source instrument of evidence to the storage region docked with the management node;
Fingerprint writing module, for the block chain to be written in the cochain file fingerprint, the cochain file fingerprint is used In the target instrument of evidence corresponding with the source instrument of evidence that veritification is obtained from the storage region.
B16, the block chain as described in B15 deposit card device, further include:
Fingerprint obtains module, for obtaining the cochain file fingerprint from the block chain;
File veritifies module, for being veritified based on the cochain file fingerprint to the target instrument of evidence, obtains To the veritification result of the target instrument of evidence.
B17, the block chain as described in B16 deposit card device, and the file veritifies module, including:
Fingerprint generation unit, for handling the target instrument of evidence, to generate file fingerprint to be verified;
Fingerprint comparison unit, it is whether consistent for comparing the file fingerprint to be verified and the cochain file fingerprint;If Unanimously, determine that the target instrument of evidence is the source instrument of evidence being not tampered with, otherwise, it determines the target instrument of evidence is File after being distorted based on the source instrument of evidence.
B18, the block chain as described in B16 deposit card device, further include verifying file extraction module, are used for:
The target instrument of evidence is extracted from the storage region;Or
The veritification request from evidence obtaining node is received, and extracts the target instrument of evidence, institute from veritification request Evidence obtaining node access is stated in the block chain.
B19, the block chain as described in B18 deposit card device, further include:
First authority obtains module, for obtaining from the evidence obtaining node for extracting the target instrument of evidence First evidence obtaining authority;
First extraction module, for extracting the target evidence from the storage region according to the first evidence obtaining authority File;
First issues module, for issuing the target instrument of evidence to the evidence obtaining node.
B20, the block chain as described in B15 deposit card device, further include:
Second authority obtains module, for obtaining from the evidence obtaining node for extracting the target instrument of evidence Second evidence obtaining authority, the evidence obtaining node access is in the block chain;
Second extraction module, for extracting the target evidence from the storage region according to the second evidence obtaining authority File;
Second fingerprint generation module, for generating file fingerprint to be verified according to the target instrument of evidence;
Second issues module, for issuing the file fingerprint to be verified and target evidence text to the evidence obtaining node Part, so that the evidence obtaining node is according to the file fingerprint to be verified and the cochain file fingerprint to the target instrument of evidence It is veritified, the cochain file fingerprint is obtained by the evidence obtaining node from the block chain.
B21, the block chain as described in B15 deposit card device:
The card node of depositing is directly accessed the block chain;Or
The external service interface access block chain depositing card node and being provided by the management node.
B22, the block chain as described in any one of B15-B21 deposit card device, and the file acquisition module is specifically used for:
The source instrument of evidence that card node is submitted by webpage is deposited described in reception, or is deposited card node described in reception and passed through application The source instrument of evidence that Program Interfaces API is submitted.
B23, the block chain as described in B8 deposit card device, and the file preserving module is specifically used for:
The external service interface provided by the management node, save the source instrument of evidence to the external service In the server cluster of interface connection.
B24, the block chain as described in B23 deposit card device, the file preserving module, including:
Encryption unit, for being encrypted to the source instrument of evidence, the instrument of evidence after being encrypted;
Transmission unit, for the instrument of evidence after the encryption to be sent to the server by the external service interface Cluster is saved.
B25, the block chain as described in any one of B15-B21 deposit card device, and the source instrument of evidence is specially:
The initial instrument of evidence, and/or
The corresponding probation report file of the initial instrument of evidence.
B26, the block chain as described in B15 deposit card device, further include:
Time judgment module, for judging whether the cochain time point of the cochain file fingerprint meets the default anchoring time Interval;
Anchoring system, if the cochain time point for the cochain file fingerprint met between the default anchoring time Every the cochain file fingerprint is anchored into target public affairs chain.
B27, the block chain as described in B26 deposit card device, and the target public affairs chain is specially:
It is specified by the card node of depositing, or
It is preassigned by the management node.
B28, the block chain as described in B15 deposit card device, further include:
Element obtains module, for obtaining within the scope of preset duration to the essential elements of evaluation of the source instrument of evidence, institute's commentary Valence element is used to evaluate the file content of the source instrument of evidence;
Element statistical module, for counting within the scope of the preset duration to the essential elements of evaluation of the source instrument of evidence, with Obtain the evaluation result to the source instrument of evidence;
Reward issues module, for judging whether the evaluation result meets default evaluation condition, if it is satisfied, to described It deposits card node and issues reward.
The present invention discloses C29, a kind of computer readable storage medium, is stored thereon with computer program, which is located It manages and realizes step described in any one of A1-A14 when device executes.
The present invention discloses D30, a kind of management node, including memory, processor and storage on a memory and can located The computer program run on reason device, the processor realize step described in any one of A1-A14 when executing described program.
The present invention discloses E31, one kind deposits card cloud system, including access same block chain management node, more than one Deposit card node and more than one evidence obtaining node, and the storage region docked with the management node, the management node For executing step described in any one of A1-A14.

Claims (10)

1. a kind of block chain deposits card method, it is applied to management node, which is characterized in that the method includes:
It obtains from the source instrument of evidence for depositing card node, the card node and management node access deposited is in same block chain;
The source instrument of evidence is handled, to generate the cochain file fingerprint of the source instrument of evidence;
It saves on the source instrument of evidence to the storage region docked with the management node;
The block chain is written into the cochain file fingerprint, the cochain file fingerprint is obtained for veritifying from the storage region The target instrument of evidence corresponding with the source instrument of evidence taken.
2. block chain as described in claim 1 deposits card method, which is characterized in that the cochain file fingerprint is written described After the block chain, further include:
The cochain file fingerprint is obtained from the block chain;
The target instrument of evidence is veritified based on the cochain file fingerprint, obtains the core to the target instrument of evidence Test result.
3. block chain as claimed in claim 2 deposits card method, which is characterized in that described to be based on the cochain file fingerprint to institute The target instrument of evidence is stated to be veritified, including:
The target instrument of evidence is handled, to generate file fingerprint to be verified;
It compares the file fingerprint to be verified and whether the cochain file fingerprint is consistent;
If consistent, determine that the target instrument of evidence is the source instrument of evidence being not tampered with, otherwise, it determines the target evidence File is the file after being distorted based on the source instrument of evidence.
4. block chain as claimed in claim 2 deposits card method, which is characterized in that described to be obtained on described from the block chain Before chained file fingerprint, the method also includes:
The target instrument of evidence is extracted from the storage region;Or
The veritification request from evidence obtaining node is received, and extracts the target instrument of evidence from veritification request, it is described to take Node access is demonstrate,proved in the block chain.
5. block chain as claimed in claim 4 deposits card method, which is characterized in that receive the veritification from the evidence obtaining node and ask It asks, and before extracting the target instrument of evidence in veritification request, the method also includes:
Obtain the first evidence obtaining authority for extracting the target instrument of evidence from the evidence obtaining node;
The target instrument of evidence is extracted from the storage region according to the first evidence obtaining authority;
The target instrument of evidence is issued to the evidence obtaining node.
6. block chain as described in claim 1 deposits card method, which is characterized in that it is described save the source instrument of evidence to After in the storage region of the management node docking, further include:
Obtain the second evidence obtaining authority for extracting the target instrument of evidence from the evidence obtaining node, the evidence obtaining node Access is in the block chain;
The target instrument of evidence is extracted from the storage region according to the second evidence obtaining authority;
File fingerprint to be verified is generated according to the target instrument of evidence;
The file fingerprint to be verified and the target instrument of evidence are issued to the evidence obtaining node, so that the evidence obtaining node root The target instrument of evidence is veritified according to the file fingerprint to be verified and the cochain file fingerprint, the upper chained file Fingerprint is obtained by the evidence obtaining node from the block chain.
7. a kind of block chain deposits card device, it is applied to management node, which is characterized in that described device includes:
File acquisition module, it is described to deposit card node and the management node for obtaining from the source instrument of evidence for depositing card node Access is in same block chain;
First fingerprint generation module is referred to for handling the source instrument of evidence with generating the upper chained file of the source instrument of evidence Line;
File preserving module, for saving the source instrument of evidence to the storage region docked with the management node;
Fingerprint writing module, for the block chain to be written in the cochain file fingerprint, the cochain file fingerprint is used for core Test the target instrument of evidence corresponding with the source instrument of evidence obtained from the storage region.
8. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor Step of any of claims 1-6 is realized when row.
9. a kind of management node including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes step of any of claims 1-6 when executing described program.
10. one kind deposits card cloud system, which is characterized in that including access same block chain management node, more than one deposit Node and more than one evidence obtaining node are demonstrate,proved, and the storage region docked with the management node, the management node are used for Perform claim requires step described in any one of 1-6.
CN201810664333.2A 2018-06-25 2018-06-25 A kind of block chain deposits card method and device Pending CN108920965A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810664333.2A CN108920965A (en) 2018-06-25 2018-06-25 A kind of block chain deposits card method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810664333.2A CN108920965A (en) 2018-06-25 2018-06-25 A kind of block chain deposits card method and device

Publications (1)

Publication Number Publication Date
CN108920965A true CN108920965A (en) 2018-11-30

Family

ID=64422458

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810664333.2A Pending CN108920965A (en) 2018-06-25 2018-06-25 A kind of block chain deposits card method and device

Country Status (1)

Country Link
CN (1) CN108920965A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110070361A (en) * 2019-05-05 2019-07-30 江苏全链通信息科技有限公司 Contract based on block chain deposits card method, equipment and storage medium
CN110111105A (en) * 2019-05-05 2019-08-09 江苏全链通信息科技有限公司 Contract based on block chain deposits card method, equipment and storage medium
CN110210243A (en) * 2019-04-30 2019-09-06 江苏亿鸿信息工程有限公司 A kind of monitor video evidence-obtaining system and its evidence collecting method based on block chain
CN110363527A (en) * 2019-06-26 2019-10-22 阿里巴巴集团控股有限公司 Card, monitoring and managing method and device are deposited based on block chain
CN110493174A (en) * 2019-07-01 2019-11-22 黄智康 System and method are investigated using the universal electric file of block chain
CN110535660A (en) * 2019-09-03 2019-12-03 杭州趣链科技有限公司 A kind of evidence obtaining service system based on block chain
CN110781523A (en) * 2019-10-29 2020-02-11 北京海益同展信息科技有限公司 Method and apparatus for processing information
CN111083122A (en) * 2019-11-29 2020-04-28 武汉烽火信息集成技术有限公司 Block chain-based electronic evidence processing method and system and storage medium
CN112036834A (en) * 2020-09-02 2020-12-04 深圳市网安计算机安全检测技术有限公司 Electronic evidence transfer method and device, computer equipment and storage medium
CN112685795A (en) * 2020-12-31 2021-04-20 树根互联技术有限公司 Digital deposit certificate creating method, digital deposit certificate verifying method and digital deposit certificate system
TWI779231B (en) * 2019-01-16 2022-10-01 開曼群島商創新先進技術有限公司 Blockchain-based certificate storage method and device
CN117614739A (en) * 2024-01-16 2024-02-27 支付宝(杭州)信息技术有限公司 Evidence data storage method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106372533A (en) * 2016-09-14 2017-02-01 中国银联股份有限公司 Block chain technology-based content storage method
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106372533A (en) * 2016-09-14 2017-02-01 中国银联股份有限公司 Block chain technology-based content storage method
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI779231B (en) * 2019-01-16 2022-10-01 開曼群島商創新先進技術有限公司 Blockchain-based certificate storage method and device
CN110210243A (en) * 2019-04-30 2019-09-06 江苏亿鸿信息工程有限公司 A kind of monitor video evidence-obtaining system and its evidence collecting method based on block chain
CN110111105A (en) * 2019-05-05 2019-08-09 江苏全链通信息科技有限公司 Contract based on block chain deposits card method, equipment and storage medium
CN110070361A (en) * 2019-05-05 2019-07-30 江苏全链通信息科技有限公司 Contract based on block chain deposits card method, equipment and storage medium
CN110363527A (en) * 2019-06-26 2019-10-22 阿里巴巴集团控股有限公司 Card, monitoring and managing method and device are deposited based on block chain
CN110493174A (en) * 2019-07-01 2019-11-22 黄智康 System and method are investigated using the universal electric file of block chain
CN110535660A (en) * 2019-09-03 2019-12-03 杭州趣链科技有限公司 A kind of evidence obtaining service system based on block chain
CN110781523A (en) * 2019-10-29 2020-02-11 北京海益同展信息科技有限公司 Method and apparatus for processing information
CN111083122A (en) * 2019-11-29 2020-04-28 武汉烽火信息集成技术有限公司 Block chain-based electronic evidence processing method and system and storage medium
CN112036834A (en) * 2020-09-02 2020-12-04 深圳市网安计算机安全检测技术有限公司 Electronic evidence transfer method and device, computer equipment and storage medium
CN112036834B (en) * 2020-09-02 2023-09-05 深圳市网安计算机安全检测技术有限公司 Method and device for regulating and verifying electronic evidence, computer equipment and storage medium
CN112685795A (en) * 2020-12-31 2021-04-20 树根互联技术有限公司 Digital deposit certificate creating method, digital deposit certificate verifying method and digital deposit certificate system
CN112685795B (en) * 2020-12-31 2023-09-05 树根互联股份有限公司 Digital certificate creation method, digital certificate verification method and digital certificate system
CN117614739A (en) * 2024-01-16 2024-02-27 支付宝(杭州)信息技术有限公司 Evidence data storage method and device

Similar Documents

Publication Publication Date Title
CN108920965A (en) A kind of block chain deposits card method and device
CN108920966A (en) A kind of block chain deposits card, evidence collecting method and device
US12032554B2 (en) Utilizing independently stored validation keys to enable auditing of instrument measurement data maintained in a blockchain
US8954546B2 (en) Tracing with a workload distributor
US20140025572A1 (en) Tracing as a Service
CN107967416A (en) The methods, devices and systems of copyright right-safeguarding detection
CN108833514A (en) Audit log processing method, device and Log Audit System based on block chain
US20140019985A1 (en) Parallel Tracing for Performance and Detail
Thethi et al. Digital forensics investigations in the cloud
CN108924114A (en) Data are anchored method and device on a kind of chain
Scholz A look at Intel’s dataplane development kit
US20180278582A1 (en) Digital media content distribution blocking
CN109643269A (en) The monitoring of network operation application program
CN109150550A (en) A kind of electronic data dynamic hash chain common recognition storage system and method
Oppermann et al. Secure cloud computing: Reference architecture for measuring instrument under legal control
Fotiou et al. A privacy-preserving statistics marketplace using local differential privacy and blockchain: An application to smart-grid measurements sharing
CN107194009A (en) Determine the unique visitor of network site
Alboghdady et al. C'mon: Monitoring the compliance of cloud services to contracted properties
US11545007B2 (en) Method, system, and device for selecting a winner of a raffle based on content from raffle tickets
Reardon Improving Tor using a TCP-over-DTLS tunnel
WO2019224932A1 (en) Security handling ability measurement system, method, and program
Brügner Holt-Winters Traffic Prediction on Aggregated Flow Data
Loch et al. A novel blockchain protocol for selecting microservices providers and auditing contracts
Oppermann et al. Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology.
CN114826727A (en) Flow data acquisition method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181130

RJ01 Rejection of invention patent application after publication