CN109118223A - For managing the method, apparatus and medium of electronic data in block chain - Google Patents

For managing the method, apparatus and medium of electronic data in block chain Download PDF

Info

Publication number
CN109118223A
CN109118223A CN201810956357.5A CN201810956357A CN109118223A CN 109118223 A CN109118223 A CN 109118223A CN 201810956357 A CN201810956357 A CN 201810956357A CN 109118223 A CN109118223 A CN 109118223A
Authority
CN
China
Prior art keywords
electronic data
electronic
digest value
data
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810956357.5A
Other languages
Chinese (zh)
Inventor
史锋锋
刘辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Point Information Technology Co Ltd
Original Assignee
Shanghai Point Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Point Information Technology Co Ltd filed Critical Shanghai Point Information Technology Co Ltd
Priority to CN201810956357.5A priority Critical patent/CN109118223A/en
Publication of CN109118223A publication Critical patent/CN109118223A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Embodiment of the disclosure discloses the method, apparatus and storage medium for managing electronic data in block chain.This method comprises: receiving the electronic data from terminal device, wherein, the electronic data includes electronic data original text, one or more electronic signatures and the one or more digital certificates of the electronic data, wherein one or more electronic signature includes the private key of the user based on the terminal device and the first electronic signature that the electronic data original text generates, which includes the first digital certificate associated with the user;One or more electronic signature is verified based on the one or more digital certificate;It, will be in electronic data storage to the account book of the block chain in the case where the verifying to each of one or more of electronic signatures electronic signature all passes through;And return to the Data Identification for being used to indicate the electronic data.

Description

For managing the method, apparatus and medium of electronic data in block chain
Technical field
Embodiment of the disclosure relates generally to block chain technical field, and relates more specifically to be used in block chain Manage the method, apparatus and medium of electronic data.
Background technique
Block chain (Blockchain) is the intelligent peer-to-peer network with distributed data base identification, propagation and information-recording Network, also referred to as value internet.So-called value internet, refer to allow users to it is convenient, fast by network, at low cost Transmitting value.Block chain technology is verified including the use of block linked data structure is known together with storing data, using distributed node Algorithm guarantees the safety of data transmission and access to generate, using by automation foot with more new data, in the way of cryptography The intelligent contract of this code composition is programmed with operation data etc..
Intelligent contract is a kind of computer protocol for being intended to propagate, verify or execute in a manner of information-based contract, and intelligence is closed It can be about the computer program of execution specific function in block chain node device.User carries out thing by using intelligent contract Business, shared data are established and are trusted, and the storage, reading and the entire mistake of execution of data are ensured by the characteristic of block chain technology Journey is transparent to be can be traced, can not distort.
Since the data in deposit block chain can not be tampered, thus block chain can also be obtained at the anti-tamper aspect of data Guarantee.Moreover, because block chain can be generated by the way that encrypted data chunk to be superimposed sequentially in time it is lasting not revisable Record, and by record storage in each node of block chain network, therefore can enable to decentralization in this way Mode comes one authentic data library of Collective stewardship.In short, block chain is data are anti-tamper, have in terms of transparent and decentralization There is technical advantage.
Summary of the invention
Embodiment of the disclosure provides in block chain network for managing the method, apparatus and medium of electronic data.
In the disclosure in a first aspect, providing a kind of method in block chain for managing electronic data, comprising: connect Receive the electronic data from terminal device, wherein the electronic data includes the electronic data original text of the electronic data, one Or multiple electronic signatures and one or more digital certificate, wherein one or more of electronic signatures include being based on the end The first electronic signature that the private key of the user of end equipment and the electronic data original text generate, one or more of number cards School bag includes the first digital certificate associated with the user;Based on one or more of digital certificates to one or more A electronic signature is verified;All pass through in the verifying to each of one or more of electronic signatures electronic signature In the case of, it will be in electronic data storage to the account book of the block chain;And it returns and is used to indicate the electronic data Data Identification.
In the second aspect of the disclosure, a kind of device for being used to manage electronic data in block chain is provided, comprising: place Manage device;Memory, the memory are coupled to the processor and are stored with instruction, make when described instruction executes described Processor executes following movement: receiving the electronic data from terminal device, wherein the electronic data includes the electron number According to electronic data original text, one or more electronic signature and one or more digital certificates, wherein one or more of Electronic signature includes the private key of the user based on the terminal device and the first electronics label that the electronic data original text generates Name, one or more of digital certificates include the first digital certificate associated with the user;Based on one or more A digital certificate verifies one or more of electronic signatures;To each in one or more of electronic signatures It, will be in electronic data storage to the account book of the block chain in the case that the verifying of a electronic signature all passes through;And it returns It is back to the Data Identification for indicating the electronic data.
In the third aspect of the disclosure, a kind of computer readable storage medium is provided, there is the meter being stored thereon Calculation machine executable instruction, the computer executable instructions execute the equipment according to the disclosure Method described in first aspect.
Since embodiment of the disclosure just signs to it when electronic data generates, and by signed electron number According to being stored on block chain, ensure that electronic data can not tamper and credibility, and then ensure that the electronic data can It is effectively used as evidence.Moreover, the program can be used to collect by ordinary user believable digital evidence, and this method speech letter It is single easy-to-use, it is easy to spread.
Detailed description of the invention
Fig. 1 instantiates the schematic diagram of the framework of the block chain network 100 for the example embodiment that can be used for implementing the disclosure.
Fig. 2 instantiates the process of the process 200 for managing credible electronic data according to an example embodiment of the present disclosure Figure.
Fig. 3 instantiates the schematic diagram signed to electronic data according to an example embodiment of the present disclosure.
Fig. 4 instantiates the method 400 for being used to manage electronic data in block chain according to an example embodiment of the present disclosure Flow chart.
Fig. 5 instantiates the device for being used to manage electronic data in block chain network according to an example embodiment of the present disclosure 500 schematic block diagram.
Specific embodiment
Each exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although in attached drawing flow chart and Schematic diagram shows some embodiments of the present disclosure, it should be understood that, the disclosure can be realized by various forms, and And should not be construed as limited to embodiments set forth here, providing these embodiments on the contrary is for more thorough and complete geography Solve the disclosure.It should be understood that the being merely to illustrate property of accompanying drawings and embodiments of the disclosure acts on, it is not intended to limit the disclosure Protection scope.
For ease of description, some terms occurred in the disclosure are illustrated below, it should be understood that the application is made Term, which should be interpreted that, to be had and it is in the context of present specification and in relation to the consistent meaning of meaning in field. The terms "include", "comprise" and similar terms in present disclosure should be understood as being open term, i.e., " including but It is not limited to ", expression can also include other content.
Term "based" in present disclosure is " being based at least partially on ".Term " one embodiment " expression is " at least One embodiment ".
Term " another embodiment " expression " at least one other embodiment " in present disclosure, etc..
Term " electronic data original text " in present disclosure refers to the file being originally generated by electronic equipment, for example, By camera etc video capturing device by video capture, by microphone etc audio capture equipment by audio capture, by The multimedia file that scanner is obtained by modes such as scanning recognitions;The text formed by computer equipment by word processor Word processing file;The figure obtained by computer equipment by the dedicated software systems Computer Aided Design of computer or aided manufacturing techniques Shape handles file;The database file as composed by several original data records generated as computer equipment;As computer Carry out the program file etc. of the tool of man-machine communication.
Term " electronic signature " in present disclosure refer in electronic data electronically it is contained, appended for identification Signer's identity simultaneously shows that signer approves the data of wherein content.
Term " digital certificate " in present disclosure refers to a string of mark communication parties identity information in electronic communication Number provides a kind of mode for verifying communication entity identity.
Term " user's signature (or first electronic signature) " in present disclosure refers to the user's based on terminal device The electronic signature that private key and electronic data original text generate.
Term " user certificate (or first digital certificate) " in present disclosure, which refers to, can be used for carrying out user's signature The digital certificate associated with the user of verifying.
Term " trusted timestamp " in present disclosure refers to be signed and issued by third party authority's trusted timestamp service organization One can prove that relevant electronic data from the electronics that whether its content keeps complete, is not modified after application trusted timestamp Voucher can uniquely identify and carry out time service and the punctual believable time ensured by authoritative temporal organization.
Term " trusted timestamp signature (or second electronic signature) " in present disclosure refers to when being used to indicate credible Between the electronic signature stabbed.
Term " trusted timestamp certificate (or second digital certificate) ", which refers to, in present disclosure can be used for trusted time The digital certificate associated with trusted timestamp that stamp signature is verified.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as part of specification.For between each unit in attached drawing Line, it is only for convenient for explanation, indicate that the unit at least line both ends is in communication with each other, it is not intended that limitation does not connect It can not be communicated between the unit of line.
It should be appreciated that providing these exemplary embodiments merely to making those skilled in the art can better understand that simultaneously It realizes the embodiment being disclosed, and does not in any way limit the scope of the invention.
Currently, electronic data has been cited as one of the category of evidence for being able to demonstrate that judicial case relevant fact.However, due to The computer system that electronic data is relied on is (for example, mobile device, such as smart phone, tablet device, portable computer Deng or fixed equipment, such as desktop computer) it is open to attack, distort and be not easy to be found, and electronic data itself is easy In being forged, distort, splice and be difficult to be perceived as and find, therefore unless electronic data is by authoritative institution (for example, public security System) obtain, otherwise the authenticity and credibility of this electronic data are difficult to be assert.Therefore, in order to enable it is common User can also collect legally credible and be not easy the evidence being tampered, it is ensured that the electronic data of user from be generated to storage again to The whole process of acquisition can not all be distorted very necessary by any personal or mechanism.However, not currently exist may be implemented with Upper purpose, and means easy to use for ordinary user.
Embodiment of the disclosure provides a kind of method, apparatus and medium for being used to manage electronic data in block chain, Its by (for example, by private key and trusted timestamp of user) signs to it when electronic data generates (for example, User's signature and/or trusted timestamp signature), and signed electronic data is stored on block chain, ensure that electricity Subdata it is legally credible and can not tamper, and ensure that the electronic data can be effectively used as electronic evidence in turn.
Fig. 1 instantiates (the hereafter simply referred to as block chain of block chain network 100 for the example embodiment that can be used for implementing the disclosure 100) schematic diagram of framework.Block chain 100 include by multiple block chain node devices of network connection (herein also by Referred to as block chain node), such as block chain node 102,104 and 106.Although block chain network 100 shown in Fig. 1 includes Three across chain nodes in area, but it should be appreciated that in practical applications, block chain network 100 may include more or fewer block chain links Point.In one example, each block chain node may include operating system (not shown) and block chain service module.Block Chain service module can provide the sequence of operations service based on block chain.Block chain service module can also be mentioned by intelligent contract For the service of block chain (for example, accepting electronic data intelligence contract and electronic data the inquiry intelligence that hereafter will be described with are closed About etc.).For example, each intelligent contract can be run by intelligent contract engine, by operation result write-in block sequence block (if intelligence If energy contract has write operation), and return to block chain application.The intelligent contract of malice or mistake is to block chain in order to prevent Node generates destruction, and each intelligent contract can be placed in sandbox (not shown) and run by intelligent contract engine, so that intelligence Contract the resource and information not having permission to access outside sandbox.In embodiment of the disclosure, every in these block chain nodes A node can be to calculate equipment, and calculating equipment can be for server or user equipment (for example, mobile device, such as intelligently Mobile phone, tablet device, portable computer etc. or fixed equipment, such as desktop computer).These block chain node devices it Between can be by network come synchrodata, it is thus possible to avoid security risk brought by centralization node and security risk.Net Network can be any wired and or wireless network.Optionally, network can include but is not limited to, internet, wide area network, metropolitan area Net, local area network, Virtual Private Network, cordless communication network etc..The terminal device 114 of user is (for example, mobile device, such as Smart phone, tablet device, portable computer etc. or fixed equipment, such as desktop computer) it can be via network (for example, having Gauze network or wireless network) it is connected to some block chain node of block chain network 100, by what is generated via the user terminal Electronic data is uploaded on block chain 100 and is saved, or required electronic data is obtained from block chain 100, so that it is guaranteed that Electronic data can not tamper and credibility, and guarantee that it can be used as evidence and is applied in turn.
It should be appreciated that in some cases, each block chain node and being run thereon due to the equity of block chain Intelligent contract be of virtually identical data and execute identical function.But for simplicity of illustration, at this In disclosed embodiment, some movements and operation are executed as executing subject using some block chain node, but actually this A little movements and operation can also be executed by other any block chain nodes on the block chain, the protection without exceeding the application Range.
Fig. 2 instantiates the flow chart of the process 200 for managing electronic data according to an example embodiment of the present disclosure.
In step 201, user generates electronic data original text (before the electronic data original text can be via its terminal device Multimedia file, word-processing document, graphics process file, database file and program file that face is mentioned etc.) (referring to Fig. 3 In appended drawing reference 301).In one example, which may include the life for being used to indicate the electronic data original text At the time temporal information and be used to indicate the electronic data original text generation position location information.These times it is novel and Location information can be automatically added in the electronic data original text by terminal device.The temporal information is the current system of terminal device Time is used to indicate the generation time of the electronic data, and the location information is by the global location on the terminal device The location information that system (GPS) obtains, is used to indicate the generation position of the electronic data.
In step 202, signed using the private key of user to electronic data original text via the terminal device, and by its The electronic data through user's signature is packaged into together with the associated user certificate of the user (referring to the appended drawing reference in Fig. 3 302).The electronic data through user's signature includes user's signature (i.e. the first electronics of electronic data original text, the user as a result, Signature) and user certificate associated with the user (i.e. the first digital certificate).User's signature is based on the private key and electronics Data original texts generates.It in one example, can be by being encoded using Hash (Hash) function to electronic data original text Encryption forms digest value (digest), is then encrypted to the digest value using private key to generate user's signature.It is to be appreciated that logical Crossing with the digest value that upper type obtains is safe, not modifiable on network.In one example, user certificate is by third party Authoritative certificate authorized organization (for example, certificate authority (Certificate Authority, abbreviation CA)) signs and issues to the user (that is, the user certificate is crossed through real-name authentication).For example, the user certificate can be by third party's authoritative certificate authorized organization at least It is generated based on public key provided by user and is signed and issued to user.In another example, user certificate is general certificate, without It is the certificate signed and issued by third party's authoritative certificate authorized organization.At this moment, the purpose of user's signature and user certificate is merely to reality To the calling of electronic data on present block chain, rather than in order to which the user to electronic data is tracked, therefore electronic data It itself is the equal of anonymous.
In step 203, it is weighed from the terminal device via network (for example, cable network or wireless network) to by third party Prestige trusted timestamp service organization (for example, China joint trust time-stamping service center (Time Stamp Authority, Abbreviation TSA)) provide trusted timestamp service (such as, Digital Time-stamp service (Digital Time Stamp, referred to as DTS trusted timestamp and trusted timestamp certificate)) are requested.Trusted timestamp is the data generated using digital signature technology, Usually a string of character strings can uniquely identify and carry out time service and the punctual believable time ensured by authoritative temporal organization, And it can be used for proving whether relevant electronic data keeps complete from its content after application trusted timestamp, is not modified.One In a example, trusted timestamp can generate in the following manner: generate electronic data original text using hash function by user Digest value, then the digest value is sent to trusted timestamp service (in the present embodiment, which can be used as above by user A part of request is sent to trusted timestamp service), trusted timestamp service will receive after receiving the digest value Trusted time information (coming from trusted time source) when the digest value is encoded together with the digest value by specific format, is then used The private key of the trusted timestamp service is digitally signed it, to generate trusted timestamp.It is generated in the trusted timestamp After, third party authority's trusted timestamp service organization can sign and issue the trusted time to user via the trusted timestamp service Stamp.Trusted timestamp certificate is associated with the trusted timestamp, can be used for verifying the validity of trusted timestamp, And can the trusted timestamp as provided by third party authority's trusted timestamp service organization service for example, at least be based on its public key To generate and be signed and issued to user.
Although it is worth noting that, in this example embodiment, in addition to electronic data original text carried out user's signature with Outside, trusted timestamp signature also has been carried out to electronic data original text, but it should it will be appreciated that in actual use, only to electronics Data original text carries out user's signature, or can also additionally to electronic data original text carry out except user's signature or trusted timestamp with Other outer signatures, as long as the signature advantageously ensures that the integrality, validity and credibility of electronic data.
In step 204, authoritative from third party by network (for example, cable network or wireless network) by the terminal device Trusted timestamp service organization receives requested trusted timestamp and trusted timestamp certificate.
In step 205, by received trusted timestamp and trusted timestamp certificate addition in the electricity through user's signature In subdata, generate the electronic data signed through trusted timestamp (referring to the appended drawing reference 303 in Fig. 3).This is through credible as a result, The electronic data of timestamp signature is in addition to including the user's signature (the first electronic signature) of electronic data original text, the user and using Other than family certificate (the first digital certificate), should also include be used to indicate trusted timestamp signature (second electronic signature) and with The associated trusted timestamp certificate of the trusted timestamp (the second digital certificate).
In step 206, the electronics that terminal device (for example, cable network or wireless network) will be signed through trusted timestamp Data are sent to the block chain node in block chain network.
In step 207, block chain node, can to the warp after receiving the electronic data through trusted timestamp signature Electronic signature in the electronic data of letter timestamp signature is verified.In one example, block chain node is receiving this It, can be for example by utilizing its intelligent engine-operated accepting electronic data intelligence of contract after the electronic data of trusted timestamp signature Contract to the electronic signature in the electronic data through trusted timestamp signature (user's signature and is used to indicate trusted timestamp Signature) verified.
In one example, in the case where having carried out user's signature to electronic data original text, to this through trusted timestamp It may include based on including in the electronic data signed through trusted timestamp that electronic signature in the electronic data of signature, which carries out verifying, User certificate user's signature (that is, identity of user) is verified, specifically can include: to this through trusted timestamp signature Included electronic data original text application hash function, obtains the first digest value in electronic data;Based on this through trusted timestamp The user certificate for including in the electronic data of signature calculates the public key (the first public key) of user, and with the public key of the user to this The user's signature for including in electronic data is decrypted, and obtains the second digest value;First digest value and the second digest value are carried out Compare.Wherein, under the first digest value and the identical situation of the second digest value, user's signature is verified.
It in another example, can to the warp in the case where also having carried out trusted timestamp signature to electronic data original text Letter timestamp signature electronic data in electronic signature carry out verify may also include it is credible based on signing through trusted timestamp Timestamp certificate verifies trusted timestamp signature (that is, validity of trusted timestamp), specifically can include: can to the warp The validity for the trusted timestamp certificate for including in the electronic data of letter timestamp signature is verified;Determining the trusted time It stabs in the effective situation of certificate, to the electronic data original text application Hash for including in the electronic data through trusted timestamp signature Function obtains third digest value;Based on the trusted timestamp certificate for including in the electronic data through trusted timestamp signature It calculates corresponding public key (the second public key), and the trusted timestamp signature for including in the electronic data is solved with the public key It is close, obtain the 4th digest value;Third digest value is compared with the 4th digest value.Wherein, it is plucked in third digest value with the 4th It is worth in identical situation, trusted timestamp signature is verified.
In the disclosure, for example, in the case where only having carried out user's signature to electronic data original text, when the first digest value When identical as the second digest value, it is verified.In the case where also having carried out trusted timestamp signature to electronic data original text, then Under third digest value and the 4th digest value also identical situation, verifying just passes through.It is to be appreciated that if also to electronic data original Text has carried out other signatures, then also needing the verifying to these other signatures, verifying just passes through in the case where.
In a step 208, in the case where the verifying to sign electronically to each passes through (for example, being tested in electronic data The verification result that intelligent contract is returned is demonstrate,proved to sign in effective situation), block chain node stores the electronic data to area On the account book of block chain.In one example, in the case where being verified, block chain node can send the electronic data to company The block chain node of account book is connected to be stored.Since the data in deposit block chain can not be tampered, it is thus ensured that should Electronic data will not be distorted during its storage by any personal and mechanism so that the electronic data can not tamper with And the credibility as evidence can be guaranteed.
In step 209, block chain node returns to the Data Identification for being used to indicate the electronic data to terminal device.As Example, the Data Identification may be, for example, the Hash character string of the electronic data or can ensure Data Identification uniqueness it is any its His character string.
In step 210, verifying not in the case where (that is, to the verifying of any electronic signature not over In the case where), illustrate that the electronic data may receive forgery or distort, therefore block chain node will return to error message.
In step 211, in the case where user needs to inquire electronic data, by terminal device to the block of block chain Chain node sends electronic data inquiry request, with the electronic data for requesting inquiry required, can wrap in the electronic data inquiry request Include one or more Data Identifications.
In the step 212, it after block chain node receives the electronic data inquiry request, is obtained from the account book of block chain Take electronic data indicated by thus one or more Data Identifications.In one example, block chain node can be by utilizing intelligence The engine-operated electronic data of energy contract inquires intelligent contract to inquire corresponding electronic data on block chain.
In step 213, the electronic data inquired is returned to terminal device by block chain node.
In conjunction with Fig. 2 embodiment illustrated it is found that in the disclosure, due to when electronic data generates just (for example, by The private key and trusted timestamp of user) just signed to it, and signed electronic data is stored on block chain, Ensure that electronic data can not tamper and credibility, and ensure that the electronic data can be effectively used as electronics in turn Evidence.
Fig. 4 instantiates the method 400 for being used to manage electronic data in block chain according to an example embodiment of the present disclosure Flow chart.It is to be appreciated that method 400 for example can by any one of block chain block chain node (such as pass through call intelligence Can contract) it executes.
In step 401, the electronic data from terminal device is received, wherein the electronic data includes the electronic data Electronic data original text, one or more electronic signatures and one or more digital certificates, wherein one or more of electronics Signature includes the private key of the user based on the terminal device and the first electronic signature that the electronic data original text generates, institute Stating one or more digital certificates includes the first digital certificate associated with the user.In step 402, based on this or Multiple digital certificates verify one or more electronic signature.In step 403, to one or more of electronics label In the case that the verifying of each of each electronic signature in name electronic signature all passes through, by electronic data storage to block On the account book of chain.In step 404, the Data Identification for being used to indicate electronic data is returned.
Fig. 5 instantiates the device 500 for being used to manage electronic data in block chain according to an example embodiment of the present disclosure Schematic block diagram, wherein device 500 may include processor 510 and memory 520, and memory 520 is coupled to processor 510 simultaneously And it is stored with instruction, make processor 510 execute one or more of method as described above 400 when these instruction executions Movement or step.
Specifically, processor 510 is made to execute following movement when the instruction execution stored in memory 520: receiving Electronic data from terminal device, the electronic data include the electronic data original text of the electronic data, one or more Electronic signature and one or more digital certificates, wherein one or more of electronic signatures include being based on the terminal device User private key and the first electronic signature for generating of the electronic data original text, one or more of digital certificates include First digital certificate associated with the user;Based on one or more of digital certificates to one or more of electronics Signature is verified;It, will be in electronic data storage to the account book of the block chain in the case where being verified;And it returns It is back to the Data Identification for indicating the electronic data.
In one embodiment, the electronic data original text includes the generation time for being used to indicate the electronic data original text Temporal information and be used to indicate the electronic data original text generation position location information.
In one embodiment, first digital certificate is signed and issued by third party's authoritative certificate authorized organization.And wherein, Carrying out verifying to one or more of electronic signatures based on one or more of digital certificates includes: to the electronic data Original text application hash function, obtains the first digest value;The first public key is calculated based on first digital certificate;With described first First electronic signature is decrypted in public key, obtains the second digest value;And by the first digest value and the second digest value into Row compares;Wherein, in first digest value situation identical with second digest value, to first electronic signature It is verified.
In another embodiment, one or more of electronic signatures further comprise be used to indicate trusted timestamp the Two electronic signatures, and one or more of digital certificates further comprise the second number associated with the trusted timestamp Word certificate, wherein the trusted timestamp and second digital certificate are signed by third party authority's trusted timestamp service organization Hair.And wherein, one or more of electronic signatures verify further based on one or more of digital certificates It include: to be verified to the validity of second digital certificate;It is right in the case where determining the effective situation of the second digital certificate The electronic data original text application hash function, obtains third digest value;The second public affairs are calculated based on second digital certificate Key;Second electronic signature is decrypted with second public key, obtains the 4th digest value;And by third digest value It is compared with the 4th digest value;Wherein, in third digest value situation identical with the 4th digest value, to described Second electronic signature is verified.
Make processor 510 execute following movement when the instruction execution stored in memory 520: receiving electron number it is investigated that Request is ask, includes one or more Data Identifications in the electronic data inquiry request;It is obtained from the account book of the block chain The electronic data as indicated by one or more of Data Identifications, and return to the electronic data.
The disclosure can be embodied in methods that a kind of method, apparatus for being used to manage electronic data in block chain network And/or computer program product.Computer program product may include computer readable storage medium, containing for executing The computer-readable program instructions of various aspects of the disclosure.
Method described in the disclosure and function can at least partly be held by one or more hardware logic components Row.Such as, but not limited to, the exemplary types for the hardware logic component that can be used include field programmable gate array (FPGA), Specific integrated circuit (ASIC), Application Specific Standard Product (ASSP), system on chip (SOC), Complex Programmable Logic Devices (CPLD) Deng.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment Equipment.Computer readable storage medium for example can be-- but it is not limited to-- storage device electric, magnetic storage apparatus, optical storage Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, such as electromagnetic wave of radio wave or other Free propagations lead to It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire Electric signal.
Computer-readable program instructions described herein can be downloaded to from computer readable storage medium it is each calculate/ Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing disclosure operation can be assembly instruction, instruction set architecture (ISA) instructs, Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the disclosure Face.
The flow chart and block diagram in the drawings show method, block chain node and the meters according to multiple embodiments of the disclosure The architecture, function and operation in the cards of calculation machine program product.In this regard, each side in flow chart or schematic diagram Frame can represent a module, program segment or a part of instruction, and the module, program segment or a part of instruction include one Or multiple executable instructions for implementing the specified logical function.In some implementations as replacements, it is marked in box Function can also occur in a different order than that indicated in the drawings.
For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by opposite suitable Sequence executes, and this depends on the function involved.It is also noted that each box and block diagram in block diagram and or flow chart And/or the combination of the box in flow chart, can function or movement as defined in executing dedicated hardware based system come It realizes, or can realize using a combination of dedicated hardware and computer instructions.
Although this should be understood as requiring operating in this way with shown in addition, depicting each operation using certain order Certain order out executes in sequential order, or requires the operation of all diagrams that should be performed to obtain desired result. Under certain environment, multitask and parallel processing be may be advantageous.Similarly, although containing several tools in being discussed above Body realizes details, but these are not construed as the limitation to the scope of the present disclosure.In the context individually realized Certain features of description can also be realized in combination in single realize.On the contrary, described in the context individually realized Various features can also be realized individually or in any suitable subcombination in multiple realizations.
Pass through the introduction gone out given in above description and relevant drawings, many modifications of the disclosure described herein It will be recognized by disclosure those skilled in the relevant art with other embodiment.Therefore, it should be understood that, the disclosure Embodiment is not limited to disclosed specific embodiment, and modification and other embodiment are intended to be included in this Within scope of disclosure.In addition, although above description and relevant drawings are in certain example combination forms of component and/or function Example embodiment is described under background, it will be appreciated that, component can be provided by alternate embodiment And/or the different combinations of function are without departing from the scope of the present disclosure.On this point, for example, with explicitly described above Other combining forms of different component and/or function be also expected within the scope of the present disclosure.Although here Using concrete term, but they are only used with general and descriptive meaning and are not intended to and are limited.

Claims (15)

1. a kind of method for managing electronic data in block chain, comprising:
Receive the electronic data from terminal device, wherein the electronic data includes that the electronic data of the electronic data is former Text, one or more electronic signatures and one or more digital certificates, wherein one or more of electronic signatures include base It is one or more in the first electronic signature that the private key of the user of the terminal device and the electronic data original text generate A digital certificate includes the first digital certificate associated with the user;
One or more of electronic signatures are verified based on one or more of digital certificates;
In the case where the verifying to each of one or more of electronic signatures electronic signature all passes through, by the electricity In subdata storage to the account book of the block chain;And
Return to the Data Identification for being used to indicate the electronic data.
2. the method according to claim 1, wherein the electronic data original text includes being used to indicate the electronics The temporal information of the generation time of data original text and the location information for generating position for being used to indicate the electronic data original text.
3. the method according to claim 1, wherein first digital certificate is by third party's authoritative certificate authorization Mechanism is signed and issued.
4. the method according to claim 1, wherein based on one or more of digital certificates to one Or multiple electronic signatures verify and include:
To the electronic data original text application hash function, the first digest value is obtained;
The first public key is calculated based on first digital certificate;
First electronic signature is decrypted with first public key, obtains the second digest value;And
First digest value is compared with the second digest value;
Wherein, in first digest value situation identical with second digest value, first electronic signature is tested Card passes through.
5. method according to claim 1 or 4, which is characterized in that one or more of signatures further comprise being used for Indicate trusted timestamp second electronic signature, and one or more of digital certificates further comprise with it is described credible when Between stab associated second digital certificate, wherein the trusted timestamp and second digital certificate can by third party authority Letter time-stamping service mechanism is signed and issued.
6. according to the method described in claim 5, it is characterized in that, based on one or more of digital certificates to one Or multiple electronic signatures verify and further comprise:
The validity of second digital certificate is verified;
In the case where determining the effective situation of the second digital certificate, to the electronic data original text application hash function, is obtained Three digest value;
To the electronic data original text application hash function, third digest value is obtained;
The second public key is calculated based on second digital certificate;
Second electronic signature is decrypted with second public key, obtains the 4th digest value;And
Third digest value is compared with the 4th digest value;
Wherein, in third digest value situation identical with the 4th digest value, second electronic signature is tested Card passes through.
7. method according to claim 1 or 2, which is characterized in that further include:
Receive electronic data inquiry request, wherein include one or more Data Identifications in the electronic data inquiry request;
The electronic data as indicated by one or more of Data Identifications is obtained from the account book of the block chain;And
Return to the electronic data.
8. a kind of for managing the device of electronic data in block chain, comprising:
Processor;
Memory, the memory are coupled to the processor and are stored with instruction, make when described instruction executes described Processor executes following movement:
The electronic data from terminal device is received, the electronic data includes the electronic data original text of the electronic data, one A or multiple electronic signatures and one or more digital certificates, wherein one or more of electronic signatures include based on described The first electronic signature that the private key of the user of terminal device and the electronic data original text generate, one or more of numbers Certificate includes the first digital certificate associated with the user;
One or more of electronic signatures are verified based on one or more of digital certificates;
In the case where the verifying to each of one or more of electronic signatures electronic signature all passes through, by the electricity In subdata storage to the account book of the block chain;And
Return to the Data Identification for being used to indicate the electronic data.
9. device according to claim 8, which is characterized in that the electronic data original text includes being used to indicate the electronics The temporal information of the generation time of data original text and the location information for generating position for being used to indicate the electronic data original text.
10. device according to claim 8, which is characterized in that first digital certificate is awarded by third party's authoritative certificate Power mechanism is signed and issued.
11. device according to claim 8, which is characterized in that based on one or more of digital certificates to described one A or multiple electronic signatures carry out verifying
To the electronic data original text application hash function, the first digest value is obtained;
The first public key is calculated based on first digital certificate;
First electronic signature is decrypted with first public key, obtains the second digest value;And
First digest value is compared with the second digest value;
Wherein, in first digest value situation identical with second digest value, first electronic signature is tested Card passes through.
12. the device according to claim 8 or 11, which is characterized in that one or more of electronic signatures are further wrapped Include be used to indicate trusted timestamp second electronic signature, and one or more of digital certificates further comprise with it is described Associated second digital certificate of trusted timestamp, wherein the trusted timestamp and second digital certificate are by third party Authoritative trusted timestamp service organization signs and issues.
13. device according to claim 12, which is characterized in that based on one or more of digital certificates to described one A or multiple electronic signatures carry out verifying:
The validity of second digital certificate is verified;
In the case where determining the effective situation of the second digital certificate, to the electronic data original text application hash function, is obtained Three digest value;
The second public key is calculated based on second digital certificate;
Second electronic signature is decrypted with second public key, obtains the 4th digest value;And
Third digest value is compared with the 4th digest value;
Wherein, in third digest value situation identical with the 4th digest value, second electronic signature is tested Card passes through.
14. device according to claim 8 or claim 9, which is characterized in that further include following movement:
Receive electronic data inquiry request, wherein include one or more Data Identifications in the electronic data inquiry request;
The electronic data as indicated by one or more of Data Identifications is obtained from the account book of the block chain;And
Return to the electronic data.
15. a kind of computer readable storage medium has the computer executable instructions being stored thereon, the computer can The equipment is made to execute method described in any one of -7 according to claim 1 when executing instruction operation in a device.
CN201810956357.5A 2018-08-21 2018-08-21 For managing the method, apparatus and medium of electronic data in block chain Pending CN109118223A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810956357.5A CN109118223A (en) 2018-08-21 2018-08-21 For managing the method, apparatus and medium of electronic data in block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810956357.5A CN109118223A (en) 2018-08-21 2018-08-21 For managing the method, apparatus and medium of electronic data in block chain

Publications (1)

Publication Number Publication Date
CN109118223A true CN109118223A (en) 2019-01-01

Family

ID=64852574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810956357.5A Pending CN109118223A (en) 2018-08-21 2018-08-21 For managing the method, apparatus and medium of electronic data in block chain

Country Status (1)

Country Link
CN (1) CN109118223A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547219A (en) * 2019-01-18 2019-03-29 杭州秘猿科技有限公司 Information collection and the method and apparatus for being submitted to block chain network
CN109741063A (en) * 2019-01-10 2019-05-10 众安信息技术服务有限公司 Digital signature method and device based on block chain
CN109978693A (en) * 2019-03-29 2019-07-05 上海点融信息科技有限责任公司 For carrying out the method, apparatus and medium of distributed signature in block chain network
CN110188570A (en) * 2019-05-31 2019-08-30 杭州复杂美科技有限公司 Data mask method, equipment and storage medium
CN110266494A (en) * 2019-05-23 2019-09-20 阿里巴巴集团控股有限公司 Time service authentication method, device and equipment in a kind of piece of chain type account book
CN110310119A (en) * 2019-07-06 2019-10-08 辽宁大学 Extendible capacity storage method towards the transaction of transregional piece of chain
CN110321730A (en) * 2019-03-28 2019-10-11 平安科技(深圳)有限公司 A kind of method, block chain node and the storage medium of operation data processing
CN110324150A (en) * 2019-06-12 2019-10-11 东软集团股份有限公司 Date storage method, device, computer readable storage medium and electronic equipment
CN110445771A (en) * 2019-07-19 2019-11-12 平安科技(深圳)有限公司 Intersection record evidence collecting method, device, medium and server based on block chain
CN111291115A (en) * 2020-01-16 2020-06-16 上海旺链信息科技有限公司 Block chain-based operator environment data acquisition method and system
US10771241B2 (en) 2019-05-23 2020-09-08 Alibaba Group Holding Limited Time authentication method, apparatus and device in blockchain-type ledger
JP2020166732A (en) * 2019-03-29 2020-10-08 株式会社オージス総研 Information processing device, information processing method, and computer program
WO2020211496A1 (en) * 2019-04-18 2020-10-22 创新先进技术有限公司 Method, system and apparatus for verifying signature in blockchain ledger, and device
CN111884810A (en) * 2020-07-20 2020-11-03 上海信联信息发展股份有限公司 Transaction signature method, device, mobile terminal and system
CN112215608A (en) * 2019-01-18 2021-01-12 创新先进技术有限公司 Data processing method and device
WO2021017350A1 (en) * 2019-07-26 2021-02-04 深圳壹账通智能科技有限公司 Bidding document management method and system, and computer readable storage medium
CN112380573A (en) * 2019-07-29 2021-02-19 创新先进技术有限公司 Digital signature method, device and equipment in block chain type account book
US11057220B2 (en) 2019-04-18 2021-07-06 Advanced New Technologies Co., Ltd. Signature verification for a blockchain ledger
US20210272108A1 (en) * 2020-07-22 2021-09-02 Baidu Online Network Technology (Beijing ) Co., Ltd. Method and apparatus of processing deposit, and storage medium
CN113986990A (en) * 2021-10-26 2022-01-28 北京市科学技术情报研究所 Data resource acquisition and labeling method and device based on block chain data mining
CN114157435A (en) * 2021-12-02 2022-03-08 贵州黔驰信息股份有限公司 Document processing method and device based on block chain technology and client
CN114567444A (en) * 2022-02-24 2022-05-31 广东电网有限责任公司 Digital signature verification method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017112469A1 (en) * 2015-12-21 2017-06-29 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
CN107508680A (en) * 2017-07-26 2017-12-22 阿里巴巴集团控股有限公司 Digital certificate management method, device and electronic equipment
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN108111314A (en) * 2018-01-19 2018-06-01 中链科技有限公司 The generation of digital certificate and method of calibration and equipment
CN108305072A (en) * 2018-01-04 2018-07-20 上海点融信息科技有限责任公司 Dispose method, equipment and the computer storage media of block chain network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017112469A1 (en) * 2015-12-21 2017-06-29 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
CN107508680A (en) * 2017-07-26 2017-12-22 阿里巴巴集团控股有限公司 Digital certificate management method, device and electronic equipment
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN108305072A (en) * 2018-01-04 2018-07-20 上海点融信息科技有限责任公司 Dispose method, equipment and the computer storage media of block chain network
CN108111314A (en) * 2018-01-19 2018-06-01 中链科技有限公司 The generation of digital certificate and method of calibration and equipment

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741063A (en) * 2019-01-10 2019-05-10 众安信息技术服务有限公司 Digital signature method and device based on block chain
CN109547219A (en) * 2019-01-18 2019-03-29 杭州秘猿科技有限公司 Information collection and the method and apparatus for being submitted to block chain network
CN112215608A (en) * 2019-01-18 2021-01-12 创新先进技术有限公司 Data processing method and device
CN110321730A (en) * 2019-03-28 2019-10-11 平安科技(深圳)有限公司 A kind of method, block chain node and the storage medium of operation data processing
JP2020166732A (en) * 2019-03-29 2020-10-08 株式会社オージス総研 Information processing device, information processing method, and computer program
CN109978693A (en) * 2019-03-29 2019-07-05 上海点融信息科技有限责任公司 For carrying out the method, apparatus and medium of distributed signature in block chain network
US11057220B2 (en) 2019-04-18 2021-07-06 Advanced New Technologies Co., Ltd. Signature verification for a blockchain ledger
TWI727594B (en) * 2019-04-18 2021-05-11 開曼群島商創新先進技術有限公司 Signature verification method, system, device and equipment in block chain ledger
US11070379B2 (en) 2019-04-18 2021-07-20 Advanced New Technologies Co., Ltd. Signature verification for a blockchain ledger
US11283622B2 (en) 2019-04-18 2022-03-22 Advanced New Technologies Co., Ltd. Signature verification for a blockchain ledger
WO2020211496A1 (en) * 2019-04-18 2020-10-22 创新先进技术有限公司 Method, system and apparatus for verifying signature in blockchain ledger, and device
CN110266494A (en) * 2019-05-23 2019-09-20 阿里巴巴集团控股有限公司 Time service authentication method, device and equipment in a kind of piece of chain type account book
US10771241B2 (en) 2019-05-23 2020-09-08 Alibaba Group Holding Limited Time authentication method, apparatus and device in blockchain-type ledger
CN110266494B (en) * 2019-05-23 2020-08-04 阿里巴巴集团控股有限公司 Time service authentication method, device and equipment in block chain type account book
CN110188570A (en) * 2019-05-31 2019-08-30 杭州复杂美科技有限公司 Data mask method, equipment and storage medium
CN110324150B (en) * 2019-06-12 2022-03-22 东软集团股份有限公司 Data storage method and device, computer readable storage medium and electronic equipment
CN110324150A (en) * 2019-06-12 2019-10-11 东软集团股份有限公司 Date storage method, device, computer readable storage medium and electronic equipment
CN110310119B (en) * 2019-07-06 2023-05-02 辽宁大学 Capacity-expandable storage method oriented to cross-blockchain transaction
CN110310119A (en) * 2019-07-06 2019-10-08 辽宁大学 Extendible capacity storage method towards the transaction of transregional piece of chain
WO2021012530A1 (en) * 2019-07-19 2021-01-28 平安科技(深圳)有限公司 Blockchain-based interaction record evidence collecting method and apparatus, and medium and server
CN110445771A (en) * 2019-07-19 2019-11-12 平安科技(深圳)有限公司 Intersection record evidence collecting method, device, medium and server based on block chain
CN110445771B (en) * 2019-07-19 2022-07-08 平安科技(深圳)有限公司 Block chain-based interactive record evidence obtaining method, device, medium and server
WO2021017350A1 (en) * 2019-07-26 2021-02-04 深圳壹账通智能科技有限公司 Bidding document management method and system, and computer readable storage medium
CN112380573A (en) * 2019-07-29 2021-02-19 创新先进技术有限公司 Digital signature method, device and equipment in block chain type account book
CN112380573B (en) * 2019-07-29 2024-05-14 创新先进技术有限公司 Digital signature method, device and equipment in block chain type account book
CN111291115A (en) * 2020-01-16 2020-06-16 上海旺链信息科技有限公司 Block chain-based operator environment data acquisition method and system
CN111884810A (en) * 2020-07-20 2020-11-03 上海信联信息发展股份有限公司 Transaction signature method, device, mobile terminal and system
US20210272108A1 (en) * 2020-07-22 2021-09-02 Baidu Online Network Technology (Beijing ) Co., Ltd. Method and apparatus of processing deposit, and storage medium
CN113986990B (en) * 2021-10-26 2022-05-10 北京市科学技术情报研究所 Data resource acquisition and labeling method and device based on block chain data mining
CN113986990A (en) * 2021-10-26 2022-01-28 北京市科学技术情报研究所 Data resource acquisition and labeling method and device based on block chain data mining
CN114157435A (en) * 2021-12-02 2022-03-08 贵州黔驰信息股份有限公司 Document processing method and device based on block chain technology and client
CN114157435B (en) * 2021-12-02 2024-05-17 贵州黔驰信息股份有限公司 Document processing method and device based on blockchain technology and client
CN114567444A (en) * 2022-02-24 2022-05-31 广东电网有限责任公司 Digital signature verification method and device, computer equipment and storage medium
CN114567444B (en) * 2022-02-24 2023-09-05 广东电网有限责任公司 Digital signature verification method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109118223A (en) For managing the method, apparatus and medium of electronic data in block chain
CN107392040B (en) A kind of method and device of common recognition verifying
US11811912B1 (en) Cryptographic algorithm status transition
US10559049B2 (en) Digital passport country entry stamp
CN109741063A (en) Digital signature method and device based on block chain
WO2019237570A1 (en) Electronic contract signing method, device and server
CN109064120A (en) Tourism electric contract number deposit system based on region chain and deposit card method
CN109978688A (en) The access control method and its contract generator and server of distributed common recognition system
CN106778343A (en) It is a kind of that the data sharing method of private data is related to based on block chain
CN108092779A (en) A kind of method and device for realizing electronic signature
CN110138733A (en) Object storage system based on block chain is credible to deposit card and access right control method
CN109753817A (en) Medical information secure storage scheme based on block chain
CN105335667B (en) Innovate creative data processing method, device, system and deposit card equipment
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
CN111461917B (en) Power system material contract management system based on block chain
CN109255210A (en) The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN105933315A (en) Network service security communication method, device and system
CN108022194A (en) Law-enforcing recorder and its data safety processing method, server and system
CN109213501A (en) The method, apparatus and storage medium of intelligent contract are installed in block chain network
CN105765941A (en) Illegal access server prevention method and device
CN109358859A (en) The method, apparatus and storage medium of intelligent contract are installed in block chain network
CN109982150A (en) The trust chain method for building up and Intelligent television terminal of Intelligent television terminal
CN114500093A (en) Safe interaction method and system for message information
CN108900472B (en) Information transmission method and device
CN114331437A (en) Block chain-based digital seal using method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190101

WD01 Invention patent application deemed withdrawn after publication