CN109118223A - For managing the method, apparatus and medium of electronic data in block chain - Google Patents
For managing the method, apparatus and medium of electronic data in block chain Download PDFInfo
- Publication number
- CN109118223A CN109118223A CN201810956357.5A CN201810956357A CN109118223A CN 109118223 A CN109118223 A CN 109118223A CN 201810956357 A CN201810956357 A CN 201810956357A CN 109118223 A CN109118223 A CN 109118223A
- Authority
- CN
- China
- Prior art keywords
- electronic data
- electronic
- digest value
- data
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Embodiment of the disclosure discloses the method, apparatus and storage medium for managing electronic data in block chain.This method comprises: receiving the electronic data from terminal device, wherein, the electronic data includes electronic data original text, one or more electronic signatures and the one or more digital certificates of the electronic data, wherein one or more electronic signature includes the private key of the user based on the terminal device and the first electronic signature that the electronic data original text generates, which includes the first digital certificate associated with the user;One or more electronic signature is verified based on the one or more digital certificate;It, will be in electronic data storage to the account book of the block chain in the case where the verifying to each of one or more of electronic signatures electronic signature all passes through;And return to the Data Identification for being used to indicate the electronic data.
Description
Technical field
Embodiment of the disclosure relates generally to block chain technical field, and relates more specifically to be used in block chain
Manage the method, apparatus and medium of electronic data.
Background technique
Block chain (Blockchain) is the intelligent peer-to-peer network with distributed data base identification, propagation and information-recording
Network, also referred to as value internet.So-called value internet, refer to allow users to it is convenient, fast by network, at low cost
Transmitting value.Block chain technology is verified including the use of block linked data structure is known together with storing data, using distributed node
Algorithm guarantees the safety of data transmission and access to generate, using by automation foot with more new data, in the way of cryptography
The intelligent contract of this code composition is programmed with operation data etc..
Intelligent contract is a kind of computer protocol for being intended to propagate, verify or execute in a manner of information-based contract, and intelligence is closed
It can be about the computer program of execution specific function in block chain node device.User carries out thing by using intelligent contract
Business, shared data are established and are trusted, and the storage, reading and the entire mistake of execution of data are ensured by the characteristic of block chain technology
Journey is transparent to be can be traced, can not distort.
Since the data in deposit block chain can not be tampered, thus block chain can also be obtained at the anti-tamper aspect of data
Guarantee.Moreover, because block chain can be generated by the way that encrypted data chunk to be superimposed sequentially in time it is lasting not revisable
Record, and by record storage in each node of block chain network, therefore can enable to decentralization in this way
Mode comes one authentic data library of Collective stewardship.In short, block chain is data are anti-tamper, have in terms of transparent and decentralization
There is technical advantage.
Summary of the invention
Embodiment of the disclosure provides in block chain network for managing the method, apparatus and medium of electronic data.
In the disclosure in a first aspect, providing a kind of method in block chain for managing electronic data, comprising: connect
Receive the electronic data from terminal device, wherein the electronic data includes the electronic data original text of the electronic data, one
Or multiple electronic signatures and one or more digital certificate, wherein one or more of electronic signatures include being based on the end
The first electronic signature that the private key of the user of end equipment and the electronic data original text generate, one or more of number cards
School bag includes the first digital certificate associated with the user;Based on one or more of digital certificates to one or more
A electronic signature is verified;All pass through in the verifying to each of one or more of electronic signatures electronic signature
In the case of, it will be in electronic data storage to the account book of the block chain;And it returns and is used to indicate the electronic data
Data Identification.
In the second aspect of the disclosure, a kind of device for being used to manage electronic data in block chain is provided, comprising: place
Manage device;Memory, the memory are coupled to the processor and are stored with instruction, make when described instruction executes described
Processor executes following movement: receiving the electronic data from terminal device, wherein the electronic data includes the electron number
According to electronic data original text, one or more electronic signature and one or more digital certificates, wherein one or more of
Electronic signature includes the private key of the user based on the terminal device and the first electronics label that the electronic data original text generates
Name, one or more of digital certificates include the first digital certificate associated with the user;Based on one or more
A digital certificate verifies one or more of electronic signatures;To each in one or more of electronic signatures
It, will be in electronic data storage to the account book of the block chain in the case that the verifying of a electronic signature all passes through;And it returns
It is back to the Data Identification for indicating the electronic data.
In the third aspect of the disclosure, a kind of computer readable storage medium is provided, there is the meter being stored thereon
Calculation machine executable instruction, the computer executable instructions execute the equipment according to the disclosure
Method described in first aspect.
Since embodiment of the disclosure just signs to it when electronic data generates, and by signed electron number
According to being stored on block chain, ensure that electronic data can not tamper and credibility, and then ensure that the electronic data can
It is effectively used as evidence.Moreover, the program can be used to collect by ordinary user believable digital evidence, and this method speech letter
It is single easy-to-use, it is easy to spread.
Detailed description of the invention
Fig. 1 instantiates the schematic diagram of the framework of the block chain network 100 for the example embodiment that can be used for implementing the disclosure.
Fig. 2 instantiates the process of the process 200 for managing credible electronic data according to an example embodiment of the present disclosure
Figure.
Fig. 3 instantiates the schematic diagram signed to electronic data according to an example embodiment of the present disclosure.
Fig. 4 instantiates the method 400 for being used to manage electronic data in block chain according to an example embodiment of the present disclosure
Flow chart.
Fig. 5 instantiates the device for being used to manage electronic data in block chain network according to an example embodiment of the present disclosure
500 schematic block diagram.
Specific embodiment
Each exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although in attached drawing flow chart and
Schematic diagram shows some embodiments of the present disclosure, it should be understood that, the disclosure can be realized by various forms, and
And should not be construed as limited to embodiments set forth here, providing these embodiments on the contrary is for more thorough and complete geography
Solve the disclosure.It should be understood that the being merely to illustrate property of accompanying drawings and embodiments of the disclosure acts on, it is not intended to limit the disclosure
Protection scope.
For ease of description, some terms occurred in the disclosure are illustrated below, it should be understood that the application is made
Term, which should be interpreted that, to be had and it is in the context of present specification and in relation to the consistent meaning of meaning in field.
The terms "include", "comprise" and similar terms in present disclosure should be understood as being open term, i.e., " including but
It is not limited to ", expression can also include other content.
Term "based" in present disclosure is " being based at least partially on ".Term " one embodiment " expression is " at least
One embodiment ".
Term " another embodiment " expression " at least one other embodiment " in present disclosure, etc..
Term " electronic data original text " in present disclosure refers to the file being originally generated by electronic equipment, for example,
By camera etc video capturing device by video capture, by microphone etc audio capture equipment by audio capture, by
The multimedia file that scanner is obtained by modes such as scanning recognitions;The text formed by computer equipment by word processor
Word processing file;The figure obtained by computer equipment by the dedicated software systems Computer Aided Design of computer or aided manufacturing techniques
Shape handles file;The database file as composed by several original data records generated as computer equipment;As computer
Carry out the program file etc. of the tool of man-machine communication.
Term " electronic signature " in present disclosure refer in electronic data electronically it is contained, appended for identification
Signer's identity simultaneously shows that signer approves the data of wherein content.
Term " digital certificate " in present disclosure refers to a string of mark communication parties identity information in electronic communication
Number provides a kind of mode for verifying communication entity identity.
Term " user's signature (or first electronic signature) " in present disclosure refers to the user's based on terminal device
The electronic signature that private key and electronic data original text generate.
Term " user certificate (or first digital certificate) " in present disclosure, which refers to, can be used for carrying out user's signature
The digital certificate associated with the user of verifying.
Term " trusted timestamp " in present disclosure refers to be signed and issued by third party authority's trusted timestamp service organization
One can prove that relevant electronic data from the electronics that whether its content keeps complete, is not modified after application trusted timestamp
Voucher can uniquely identify and carry out time service and the punctual believable time ensured by authoritative temporal organization.
Term " trusted timestamp signature (or second electronic signature) " in present disclosure refers to when being used to indicate credible
Between the electronic signature stabbed.
Term " trusted timestamp certificate (or second digital certificate) ", which refers to, in present disclosure can be used for trusted time
The digital certificate associated with trusted timestamp that stamp signature is verified.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable
In the case of, the technology, method and apparatus should be considered as part of specification.For between each unit in attached drawing
Line, it is only for convenient for explanation, indicate that the unit at least line both ends is in communication with each other, it is not intended that limitation does not connect
It can not be communicated between the unit of line.
It should be appreciated that providing these exemplary embodiments merely to making those skilled in the art can better understand that simultaneously
It realizes the embodiment being disclosed, and does not in any way limit the scope of the invention.
Currently, electronic data has been cited as one of the category of evidence for being able to demonstrate that judicial case relevant fact.However, due to
The computer system that electronic data is relied on is (for example, mobile device, such as smart phone, tablet device, portable computer
Deng or fixed equipment, such as desktop computer) it is open to attack, distort and be not easy to be found, and electronic data itself is easy
In being forged, distort, splice and be difficult to be perceived as and find, therefore unless electronic data is by authoritative institution (for example, public security
System) obtain, otherwise the authenticity and credibility of this electronic data are difficult to be assert.Therefore, in order to enable it is common
User can also collect legally credible and be not easy the evidence being tampered, it is ensured that the electronic data of user from be generated to storage again to
The whole process of acquisition can not all be distorted very necessary by any personal or mechanism.However, not currently exist may be implemented with
Upper purpose, and means easy to use for ordinary user.
Embodiment of the disclosure provides a kind of method, apparatus and medium for being used to manage electronic data in block chain,
Its by (for example, by private key and trusted timestamp of user) signs to it when electronic data generates (for example,
User's signature and/or trusted timestamp signature), and signed electronic data is stored on block chain, ensure that electricity
Subdata it is legally credible and can not tamper, and ensure that the electronic data can be effectively used as electronic evidence in turn.
Fig. 1 instantiates (the hereafter simply referred to as block chain of block chain network 100 for the example embodiment that can be used for implementing the disclosure
100) schematic diagram of framework.Block chain 100 include by multiple block chain node devices of network connection (herein also by
Referred to as block chain node), such as block chain node 102,104 and 106.Although block chain network 100 shown in Fig. 1 includes
Three across chain nodes in area, but it should be appreciated that in practical applications, block chain network 100 may include more or fewer block chain links
Point.In one example, each block chain node may include operating system (not shown) and block chain service module.Block
Chain service module can provide the sequence of operations service based on block chain.Block chain service module can also be mentioned by intelligent contract
For the service of block chain (for example, accepting electronic data intelligence contract and electronic data the inquiry intelligence that hereafter will be described with are closed
About etc.).For example, each intelligent contract can be run by intelligent contract engine, by operation result write-in block sequence block (if intelligence
If energy contract has write operation), and return to block chain application.The intelligent contract of malice or mistake is to block chain in order to prevent
Node generates destruction, and each intelligent contract can be placed in sandbox (not shown) and run by intelligent contract engine, so that intelligence
Contract the resource and information not having permission to access outside sandbox.In embodiment of the disclosure, every in these block chain nodes
A node can be to calculate equipment, and calculating equipment can be for server or user equipment (for example, mobile device, such as intelligently
Mobile phone, tablet device, portable computer etc. or fixed equipment, such as desktop computer).These block chain node devices it
Between can be by network come synchrodata, it is thus possible to avoid security risk brought by centralization node and security risk.Net
Network can be any wired and or wireless network.Optionally, network can include but is not limited to, internet, wide area network, metropolitan area
Net, local area network, Virtual Private Network, cordless communication network etc..The terminal device 114 of user is (for example, mobile device, such as
Smart phone, tablet device, portable computer etc. or fixed equipment, such as desktop computer) it can be via network (for example, having
Gauze network or wireless network) it is connected to some block chain node of block chain network 100, by what is generated via the user terminal
Electronic data is uploaded on block chain 100 and is saved, or required electronic data is obtained from block chain 100, so that it is guaranteed that
Electronic data can not tamper and credibility, and guarantee that it can be used as evidence and is applied in turn.
It should be appreciated that in some cases, each block chain node and being run thereon due to the equity of block chain
Intelligent contract be of virtually identical data and execute identical function.But for simplicity of illustration, at this
In disclosed embodiment, some movements and operation are executed as executing subject using some block chain node, but actually this
A little movements and operation can also be executed by other any block chain nodes on the block chain, the protection without exceeding the application
Range.
Fig. 2 instantiates the flow chart of the process 200 for managing electronic data according to an example embodiment of the present disclosure.
In step 201, user generates electronic data original text (before the electronic data original text can be via its terminal device
Multimedia file, word-processing document, graphics process file, database file and program file that face is mentioned etc.) (referring to Fig. 3
In appended drawing reference 301).In one example, which may include the life for being used to indicate the electronic data original text
At the time temporal information and be used to indicate the electronic data original text generation position location information.These times it is novel and
Location information can be automatically added in the electronic data original text by terminal device.The temporal information is the current system of terminal device
Time is used to indicate the generation time of the electronic data, and the location information is by the global location on the terminal device
The location information that system (GPS) obtains, is used to indicate the generation position of the electronic data.
In step 202, signed using the private key of user to electronic data original text via the terminal device, and by its
The electronic data through user's signature is packaged into together with the associated user certificate of the user (referring to the appended drawing reference in Fig. 3
302).The electronic data through user's signature includes user's signature (i.e. the first electronics of electronic data original text, the user as a result,
Signature) and user certificate associated with the user (i.e. the first digital certificate).User's signature is based on the private key and electronics
Data original texts generates.It in one example, can be by being encoded using Hash (Hash) function to electronic data original text
Encryption forms digest value (digest), is then encrypted to the digest value using private key to generate user's signature.It is to be appreciated that logical
Crossing with the digest value that upper type obtains is safe, not modifiable on network.In one example, user certificate is by third party
Authoritative certificate authorized organization (for example, certificate authority (Certificate Authority, abbreviation CA)) signs and issues to the user
(that is, the user certificate is crossed through real-name authentication).For example, the user certificate can be by third party's authoritative certificate authorized organization at least
It is generated based on public key provided by user and is signed and issued to user.In another example, user certificate is general certificate, without
It is the certificate signed and issued by third party's authoritative certificate authorized organization.At this moment, the purpose of user's signature and user certificate is merely to reality
To the calling of electronic data on present block chain, rather than in order to which the user to electronic data is tracked, therefore electronic data
It itself is the equal of anonymous.
In step 203, it is weighed from the terminal device via network (for example, cable network or wireless network) to by third party
Prestige trusted timestamp service organization (for example, China joint trust time-stamping service center (Time Stamp Authority,
Abbreviation TSA)) provide trusted timestamp service (such as, Digital Time-stamp service (Digital Time Stamp, referred to as
DTS trusted timestamp and trusted timestamp certificate)) are requested.Trusted timestamp is the data generated using digital signature technology,
Usually a string of character strings can uniquely identify and carry out time service and the punctual believable time ensured by authoritative temporal organization,
And it can be used for proving whether relevant electronic data keeps complete from its content after application trusted timestamp, is not modified.One
In a example, trusted timestamp can generate in the following manner: generate electronic data original text using hash function by user
Digest value, then the digest value is sent to trusted timestamp service (in the present embodiment, which can be used as above by user
A part of request is sent to trusted timestamp service), trusted timestamp service will receive after receiving the digest value
Trusted time information (coming from trusted time source) when the digest value is encoded together with the digest value by specific format, is then used
The private key of the trusted timestamp service is digitally signed it, to generate trusted timestamp.It is generated in the trusted timestamp
After, third party authority's trusted timestamp service organization can sign and issue the trusted time to user via the trusted timestamp service
Stamp.Trusted timestamp certificate is associated with the trusted timestamp, can be used for verifying the validity of trusted timestamp,
And can the trusted timestamp as provided by third party authority's trusted timestamp service organization service for example, at least be based on its public key
To generate and be signed and issued to user.
Although it is worth noting that, in this example embodiment, in addition to electronic data original text carried out user's signature with
Outside, trusted timestamp signature also has been carried out to electronic data original text, but it should it will be appreciated that in actual use, only to electronics
Data original text carries out user's signature, or can also additionally to electronic data original text carry out except user's signature or trusted timestamp with
Other outer signatures, as long as the signature advantageously ensures that the integrality, validity and credibility of electronic data.
In step 204, authoritative from third party by network (for example, cable network or wireless network) by the terminal device
Trusted timestamp service organization receives requested trusted timestamp and trusted timestamp certificate.
In step 205, by received trusted timestamp and trusted timestamp certificate addition in the electricity through user's signature
In subdata, generate the electronic data signed through trusted timestamp (referring to the appended drawing reference 303 in Fig. 3).This is through credible as a result,
The electronic data of timestamp signature is in addition to including the user's signature (the first electronic signature) of electronic data original text, the user and using
Other than family certificate (the first digital certificate), should also include be used to indicate trusted timestamp signature (second electronic signature) and with
The associated trusted timestamp certificate of the trusted timestamp (the second digital certificate).
In step 206, the electronics that terminal device (for example, cable network or wireless network) will be signed through trusted timestamp
Data are sent to the block chain node in block chain network.
In step 207, block chain node, can to the warp after receiving the electronic data through trusted timestamp signature
Electronic signature in the electronic data of letter timestamp signature is verified.In one example, block chain node is receiving this
It, can be for example by utilizing its intelligent engine-operated accepting electronic data intelligence of contract after the electronic data of trusted timestamp signature
Contract to the electronic signature in the electronic data through trusted timestamp signature (user's signature and is used to indicate trusted timestamp
Signature) verified.
In one example, in the case where having carried out user's signature to electronic data original text, to this through trusted timestamp
It may include based on including in the electronic data signed through trusted timestamp that electronic signature in the electronic data of signature, which carries out verifying,
User certificate user's signature (that is, identity of user) is verified, specifically can include: to this through trusted timestamp signature
Included electronic data original text application hash function, obtains the first digest value in electronic data;Based on this through trusted timestamp
The user certificate for including in the electronic data of signature calculates the public key (the first public key) of user, and with the public key of the user to this
The user's signature for including in electronic data is decrypted, and obtains the second digest value;First digest value and the second digest value are carried out
Compare.Wherein, under the first digest value and the identical situation of the second digest value, user's signature is verified.
It in another example, can to the warp in the case where also having carried out trusted timestamp signature to electronic data original text
Letter timestamp signature electronic data in electronic signature carry out verify may also include it is credible based on signing through trusted timestamp
Timestamp certificate verifies trusted timestamp signature (that is, validity of trusted timestamp), specifically can include: can to the warp
The validity for the trusted timestamp certificate for including in the electronic data of letter timestamp signature is verified;Determining the trusted time
It stabs in the effective situation of certificate, to the electronic data original text application Hash for including in the electronic data through trusted timestamp signature
Function obtains third digest value;Based on the trusted timestamp certificate for including in the electronic data through trusted timestamp signature
It calculates corresponding public key (the second public key), and the trusted timestamp signature for including in the electronic data is solved with the public key
It is close, obtain the 4th digest value;Third digest value is compared with the 4th digest value.Wherein, it is plucked in third digest value with the 4th
It is worth in identical situation, trusted timestamp signature is verified.
In the disclosure, for example, in the case where only having carried out user's signature to electronic data original text, when the first digest value
When identical as the second digest value, it is verified.In the case where also having carried out trusted timestamp signature to electronic data original text, then
Under third digest value and the 4th digest value also identical situation, verifying just passes through.It is to be appreciated that if also to electronic data original
Text has carried out other signatures, then also needing the verifying to these other signatures, verifying just passes through in the case where.
In a step 208, in the case where the verifying to sign electronically to each passes through (for example, being tested in electronic data
The verification result that intelligent contract is returned is demonstrate,proved to sign in effective situation), block chain node stores the electronic data to area
On the account book of block chain.In one example, in the case where being verified, block chain node can send the electronic data to company
The block chain node of account book is connected to be stored.Since the data in deposit block chain can not be tampered, it is thus ensured that should
Electronic data will not be distorted during its storage by any personal and mechanism so that the electronic data can not tamper with
And the credibility as evidence can be guaranteed.
In step 209, block chain node returns to the Data Identification for being used to indicate the electronic data to terminal device.As
Example, the Data Identification may be, for example, the Hash character string of the electronic data or can ensure Data Identification uniqueness it is any its
His character string.
In step 210, verifying not in the case where (that is, to the verifying of any electronic signature not over
In the case where), illustrate that the electronic data may receive forgery or distort, therefore block chain node will return to error message.
In step 211, in the case where user needs to inquire electronic data, by terminal device to the block of block chain
Chain node sends electronic data inquiry request, with the electronic data for requesting inquiry required, can wrap in the electronic data inquiry request
Include one or more Data Identifications.
In the step 212, it after block chain node receives the electronic data inquiry request, is obtained from the account book of block chain
Take electronic data indicated by thus one or more Data Identifications.In one example, block chain node can be by utilizing intelligence
The engine-operated electronic data of energy contract inquires intelligent contract to inquire corresponding electronic data on block chain.
In step 213, the electronic data inquired is returned to terminal device by block chain node.
In conjunction with Fig. 2 embodiment illustrated it is found that in the disclosure, due to when electronic data generates just (for example, by
The private key and trusted timestamp of user) just signed to it, and signed electronic data is stored on block chain,
Ensure that electronic data can not tamper and credibility, and ensure that the electronic data can be effectively used as electronics in turn
Evidence.
Fig. 4 instantiates the method 400 for being used to manage electronic data in block chain according to an example embodiment of the present disclosure
Flow chart.It is to be appreciated that method 400 for example can by any one of block chain block chain node (such as pass through call intelligence
Can contract) it executes.
In step 401, the electronic data from terminal device is received, wherein the electronic data includes the electronic data
Electronic data original text, one or more electronic signatures and one or more digital certificates, wherein one or more of electronics
Signature includes the private key of the user based on the terminal device and the first electronic signature that the electronic data original text generates, institute
Stating one or more digital certificates includes the first digital certificate associated with the user.In step 402, based on this or
Multiple digital certificates verify one or more electronic signature.In step 403, to one or more of electronics label
In the case that the verifying of each of each electronic signature in name electronic signature all passes through, by electronic data storage to block
On the account book of chain.In step 404, the Data Identification for being used to indicate electronic data is returned.
Fig. 5 instantiates the device 500 for being used to manage electronic data in block chain according to an example embodiment of the present disclosure
Schematic block diagram, wherein device 500 may include processor 510 and memory 520, and memory 520 is coupled to processor 510 simultaneously
And it is stored with instruction, make processor 510 execute one or more of method as described above 400 when these instruction executions
Movement or step.
Specifically, processor 510 is made to execute following movement when the instruction execution stored in memory 520: receiving
Electronic data from terminal device, the electronic data include the electronic data original text of the electronic data, one or more
Electronic signature and one or more digital certificates, wherein one or more of electronic signatures include being based on the terminal device
User private key and the first electronic signature for generating of the electronic data original text, one or more of digital certificates include
First digital certificate associated with the user;Based on one or more of digital certificates to one or more of electronics
Signature is verified;It, will be in electronic data storage to the account book of the block chain in the case where being verified;And it returns
It is back to the Data Identification for indicating the electronic data.
In one embodiment, the electronic data original text includes the generation time for being used to indicate the electronic data original text
Temporal information and be used to indicate the electronic data original text generation position location information.
In one embodiment, first digital certificate is signed and issued by third party's authoritative certificate authorized organization.And wherein,
Carrying out verifying to one or more of electronic signatures based on one or more of digital certificates includes: to the electronic data
Original text application hash function, obtains the first digest value;The first public key is calculated based on first digital certificate;With described first
First electronic signature is decrypted in public key, obtains the second digest value;And by the first digest value and the second digest value into
Row compares;Wherein, in first digest value situation identical with second digest value, to first electronic signature
It is verified.
In another embodiment, one or more of electronic signatures further comprise be used to indicate trusted timestamp the
Two electronic signatures, and one or more of digital certificates further comprise the second number associated with the trusted timestamp
Word certificate, wherein the trusted timestamp and second digital certificate are signed by third party authority's trusted timestamp service organization
Hair.And wherein, one or more of electronic signatures verify further based on one or more of digital certificates
It include: to be verified to the validity of second digital certificate;It is right in the case where determining the effective situation of the second digital certificate
The electronic data original text application hash function, obtains third digest value;The second public affairs are calculated based on second digital certificate
Key;Second electronic signature is decrypted with second public key, obtains the 4th digest value;And by third digest value
It is compared with the 4th digest value;Wherein, in third digest value situation identical with the 4th digest value, to described
Second electronic signature is verified.
Make processor 510 execute following movement when the instruction execution stored in memory 520: receiving electron number it is investigated that
Request is ask, includes one or more Data Identifications in the electronic data inquiry request;It is obtained from the account book of the block chain
The electronic data as indicated by one or more of Data Identifications, and return to the electronic data.
The disclosure can be embodied in methods that a kind of method, apparatus for being used to manage electronic data in block chain network
And/or computer program product.Computer program product may include computer readable storage medium, containing for executing
The computer-readable program instructions of various aspects of the disclosure.
Method described in the disclosure and function can at least partly be held by one or more hardware logic components
Row.Such as, but not limited to, the exemplary types for the hardware logic component that can be used include field programmable gate array (FPGA),
Specific integrated circuit (ASIC), Application Specific Standard Product (ASSP), system on chip (SOC), Complex Programmable Logic Devices (CPLD)
Deng.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment
Equipment.Computer readable storage medium for example can be-- but it is not limited to-- storage device electric, magnetic storage apparatus, optical storage
Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium
More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits
It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable
Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon
It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above
Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, such as electromagnetic wave of radio wave or other Free propagations lead to
It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire
Electric signal.
Computer-readable program instructions described herein can be downloaded to from computer readable storage medium it is each calculate/
Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network
Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway
Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted
Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment
In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing disclosure operation can be assembly instruction, instruction set architecture (ISA) instructs,
Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages
The source code or object code that any combination is write, the programming language include the programming language-of object-oriented such as
Smalltalk, C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer
Readable program instructions can be executed fully on the user computer, partly execute on the user computer, be only as one
Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part
Or it is executed on server.In situations involving remote computers, remote computer can pass through network-packet of any kind
It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit
It is connected with ISP by internet).In some embodiments, by utilizing computer-readable program instructions
Status information carry out personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or can
Programmed logic array (PLA) (PLA), the electronic circuit can execute computer-readable program instructions, to realize each side of the disclosure
Face.
The flow chart and block diagram in the drawings show method, block chain node and the meters according to multiple embodiments of the disclosure
The architecture, function and operation in the cards of calculation machine program product.In this regard, each side in flow chart or schematic diagram
Frame can represent a module, program segment or a part of instruction, and the module, program segment or a part of instruction include one
Or multiple executable instructions for implementing the specified logical function.In some implementations as replacements, it is marked in box
Function can also occur in a different order than that indicated in the drawings.
For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by opposite suitable
Sequence executes, and this depends on the function involved.It is also noted that each box and block diagram in block diagram and or flow chart
And/or the combination of the box in flow chart, can function or movement as defined in executing dedicated hardware based system come
It realizes, or can realize using a combination of dedicated hardware and computer instructions.
Although this should be understood as requiring operating in this way with shown in addition, depicting each operation using certain order
Certain order out executes in sequential order, or requires the operation of all diagrams that should be performed to obtain desired result.
Under certain environment, multitask and parallel processing be may be advantageous.Similarly, although containing several tools in being discussed above
Body realizes details, but these are not construed as the limitation to the scope of the present disclosure.In the context individually realized
Certain features of description can also be realized in combination in single realize.On the contrary, described in the context individually realized
Various features can also be realized individually or in any suitable subcombination in multiple realizations.
Pass through the introduction gone out given in above description and relevant drawings, many modifications of the disclosure described herein
It will be recognized by disclosure those skilled in the relevant art with other embodiment.Therefore, it should be understood that, the disclosure
Embodiment is not limited to disclosed specific embodiment, and modification and other embodiment are intended to be included in this
Within scope of disclosure.In addition, although above description and relevant drawings are in certain example combination forms of component and/or function
Example embodiment is described under background, it will be appreciated that, component can be provided by alternate embodiment
And/or the different combinations of function are without departing from the scope of the present disclosure.On this point, for example, with explicitly described above
Other combining forms of different component and/or function be also expected within the scope of the present disclosure.Although here
Using concrete term, but they are only used with general and descriptive meaning and are not intended to and are limited.
Claims (15)
1. a kind of method for managing electronic data in block chain, comprising:
Receive the electronic data from terminal device, wherein the electronic data includes that the electronic data of the electronic data is former
Text, one or more electronic signatures and one or more digital certificates, wherein one or more of electronic signatures include base
It is one or more in the first electronic signature that the private key of the user of the terminal device and the electronic data original text generate
A digital certificate includes the first digital certificate associated with the user;
One or more of electronic signatures are verified based on one or more of digital certificates;
In the case where the verifying to each of one or more of electronic signatures electronic signature all passes through, by the electricity
In subdata storage to the account book of the block chain;And
Return to the Data Identification for being used to indicate the electronic data.
2. the method according to claim 1, wherein the electronic data original text includes being used to indicate the electronics
The temporal information of the generation time of data original text and the location information for generating position for being used to indicate the electronic data original text.
3. the method according to claim 1, wherein first digital certificate is by third party's authoritative certificate authorization
Mechanism is signed and issued.
4. the method according to claim 1, wherein based on one or more of digital certificates to one
Or multiple electronic signatures verify and include:
To the electronic data original text application hash function, the first digest value is obtained;
The first public key is calculated based on first digital certificate;
First electronic signature is decrypted with first public key, obtains the second digest value;And
First digest value is compared with the second digest value;
Wherein, in first digest value situation identical with second digest value, first electronic signature is tested
Card passes through.
5. method according to claim 1 or 4, which is characterized in that one or more of signatures further comprise being used for
Indicate trusted timestamp second electronic signature, and one or more of digital certificates further comprise with it is described credible when
Between stab associated second digital certificate, wherein the trusted timestamp and second digital certificate can by third party authority
Letter time-stamping service mechanism is signed and issued.
6. according to the method described in claim 5, it is characterized in that, based on one or more of digital certificates to one
Or multiple electronic signatures verify and further comprise:
The validity of second digital certificate is verified;
In the case where determining the effective situation of the second digital certificate, to the electronic data original text application hash function, is obtained
Three digest value;
To the electronic data original text application hash function, third digest value is obtained;
The second public key is calculated based on second digital certificate;
Second electronic signature is decrypted with second public key, obtains the 4th digest value;And
Third digest value is compared with the 4th digest value;
Wherein, in third digest value situation identical with the 4th digest value, second electronic signature is tested
Card passes through.
7. method according to claim 1 or 2, which is characterized in that further include:
Receive electronic data inquiry request, wherein include one or more Data Identifications in the electronic data inquiry request;
The electronic data as indicated by one or more of Data Identifications is obtained from the account book of the block chain;And
Return to the electronic data.
8. a kind of for managing the device of electronic data in block chain, comprising:
Processor;
Memory, the memory are coupled to the processor and are stored with instruction, make when described instruction executes described
Processor executes following movement:
The electronic data from terminal device is received, the electronic data includes the electronic data original text of the electronic data, one
A or multiple electronic signatures and one or more digital certificates, wherein one or more of electronic signatures include based on described
The first electronic signature that the private key of the user of terminal device and the electronic data original text generate, one or more of numbers
Certificate includes the first digital certificate associated with the user;
One or more of electronic signatures are verified based on one or more of digital certificates;
In the case where the verifying to each of one or more of electronic signatures electronic signature all passes through, by the electricity
In subdata storage to the account book of the block chain;And
Return to the Data Identification for being used to indicate the electronic data.
9. device according to claim 8, which is characterized in that the electronic data original text includes being used to indicate the electronics
The temporal information of the generation time of data original text and the location information for generating position for being used to indicate the electronic data original text.
10. device according to claim 8, which is characterized in that first digital certificate is awarded by third party's authoritative certificate
Power mechanism is signed and issued.
11. device according to claim 8, which is characterized in that based on one or more of digital certificates to described one
A or multiple electronic signatures carry out verifying
To the electronic data original text application hash function, the first digest value is obtained;
The first public key is calculated based on first digital certificate;
First electronic signature is decrypted with first public key, obtains the second digest value;And
First digest value is compared with the second digest value;
Wherein, in first digest value situation identical with second digest value, first electronic signature is tested
Card passes through.
12. the device according to claim 8 or 11, which is characterized in that one or more of electronic signatures are further wrapped
Include be used to indicate trusted timestamp second electronic signature, and one or more of digital certificates further comprise with it is described
Associated second digital certificate of trusted timestamp, wherein the trusted timestamp and second digital certificate are by third party
Authoritative trusted timestamp service organization signs and issues.
13. device according to claim 12, which is characterized in that based on one or more of digital certificates to described one
A or multiple electronic signatures carry out verifying:
The validity of second digital certificate is verified;
In the case where determining the effective situation of the second digital certificate, to the electronic data original text application hash function, is obtained
Three digest value;
The second public key is calculated based on second digital certificate;
Second electronic signature is decrypted with second public key, obtains the 4th digest value;And
Third digest value is compared with the 4th digest value;
Wherein, in third digest value situation identical with the 4th digest value, second electronic signature is tested
Card passes through.
14. device according to claim 8 or claim 9, which is characterized in that further include following movement:
Receive electronic data inquiry request, wherein include one or more Data Identifications in the electronic data inquiry request;
The electronic data as indicated by one or more of Data Identifications is obtained from the account book of the block chain;And
Return to the electronic data.
15. a kind of computer readable storage medium has the computer executable instructions being stored thereon, the computer can
The equipment is made to execute method described in any one of -7 according to claim 1 when executing instruction operation in a device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810956357.5A CN109118223A (en) | 2018-08-21 | 2018-08-21 | For managing the method, apparatus and medium of electronic data in block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810956357.5A CN109118223A (en) | 2018-08-21 | 2018-08-21 | For managing the method, apparatus and medium of electronic data in block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109118223A true CN109118223A (en) | 2019-01-01 |
Family
ID=64852574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810956357.5A Pending CN109118223A (en) | 2018-08-21 | 2018-08-21 | For managing the method, apparatus and medium of electronic data in block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109118223A (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547219A (en) * | 2019-01-18 | 2019-03-29 | 杭州秘猿科技有限公司 | Information collection and the method and apparatus for being submitted to block chain network |
CN109741063A (en) * | 2019-01-10 | 2019-05-10 | 众安信息技术服务有限公司 | Digital signature method and device based on block chain |
CN109978693A (en) * | 2019-03-29 | 2019-07-05 | 上海点融信息科技有限责任公司 | For carrying out the method, apparatus and medium of distributed signature in block chain network |
CN110188570A (en) * | 2019-05-31 | 2019-08-30 | 杭州复杂美科技有限公司 | Data mask method, equipment and storage medium |
CN110266494A (en) * | 2019-05-23 | 2019-09-20 | 阿里巴巴集团控股有限公司 | Time service authentication method, device and equipment in a kind of piece of chain type account book |
CN110310119A (en) * | 2019-07-06 | 2019-10-08 | 辽宁大学 | Extendible capacity storage method towards the transaction of transregional piece of chain |
CN110321730A (en) * | 2019-03-28 | 2019-10-11 | 平安科技(深圳)有限公司 | A kind of method, block chain node and the storage medium of operation data processing |
CN110324150A (en) * | 2019-06-12 | 2019-10-11 | 东软集团股份有限公司 | Date storage method, device, computer readable storage medium and electronic equipment |
CN110445771A (en) * | 2019-07-19 | 2019-11-12 | 平安科技(深圳)有限公司 | Intersection record evidence collecting method, device, medium and server based on block chain |
CN111291115A (en) * | 2020-01-16 | 2020-06-16 | 上海旺链信息科技有限公司 | Block chain-based operator environment data acquisition method and system |
US10771241B2 (en) | 2019-05-23 | 2020-09-08 | Alibaba Group Holding Limited | Time authentication method, apparatus and device in blockchain-type ledger |
JP2020166732A (en) * | 2019-03-29 | 2020-10-08 | 株式会社オージス総研 | Information processing device, information processing method, and computer program |
WO2020211496A1 (en) * | 2019-04-18 | 2020-10-22 | 创新先进技术有限公司 | Method, system and apparatus for verifying signature in blockchain ledger, and device |
CN111884810A (en) * | 2020-07-20 | 2020-11-03 | 上海信联信息发展股份有限公司 | Transaction signature method, device, mobile terminal and system |
CN112215608A (en) * | 2019-01-18 | 2021-01-12 | 创新先进技术有限公司 | Data processing method and device |
WO2021017350A1 (en) * | 2019-07-26 | 2021-02-04 | 深圳壹账通智能科技有限公司 | Bidding document management method and system, and computer readable storage medium |
CN112380573A (en) * | 2019-07-29 | 2021-02-19 | 创新先进技术有限公司 | Digital signature method, device and equipment in block chain type account book |
US11057220B2 (en) | 2019-04-18 | 2021-07-06 | Advanced New Technologies Co., Ltd. | Signature verification for a blockchain ledger |
US20210272108A1 (en) * | 2020-07-22 | 2021-09-02 | Baidu Online Network Technology (Beijing ) Co., Ltd. | Method and apparatus of processing deposit, and storage medium |
CN113986990A (en) * | 2021-10-26 | 2022-01-28 | 北京市科学技术情报研究所 | Data resource acquisition and labeling method and device based on block chain data mining |
CN114157435A (en) * | 2021-12-02 | 2022-03-08 | 贵州黔驰信息股份有限公司 | Document processing method and device based on block chain technology and client |
CN114567444A (en) * | 2022-02-24 | 2022-05-31 | 广东电网有限责任公司 | Digital signature verification method and device, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017112469A1 (en) * | 2015-12-21 | 2017-06-29 | Mastercard International Incorporated | Method and system for blockchain variant using digital signatures |
CN107508680A (en) * | 2017-07-26 | 2017-12-22 | 阿里巴巴集团控股有限公司 | Digital certificate management method, device and electronic equipment |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108111314A (en) * | 2018-01-19 | 2018-06-01 | 中链科技有限公司 | The generation of digital certificate and method of calibration and equipment |
CN108305072A (en) * | 2018-01-04 | 2018-07-20 | 上海点融信息科技有限责任公司 | Dispose method, equipment and the computer storage media of block chain network |
-
2018
- 2018-08-21 CN CN201810956357.5A patent/CN109118223A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017112469A1 (en) * | 2015-12-21 | 2017-06-29 | Mastercard International Incorporated | Method and system for blockchain variant using digital signatures |
CN107508680A (en) * | 2017-07-26 | 2017-12-22 | 阿里巴巴集团控股有限公司 | Digital certificate management method, device and electronic equipment |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108305072A (en) * | 2018-01-04 | 2018-07-20 | 上海点融信息科技有限责任公司 | Dispose method, equipment and the computer storage media of block chain network |
CN108111314A (en) * | 2018-01-19 | 2018-06-01 | 中链科技有限公司 | The generation of digital certificate and method of calibration and equipment |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109741063A (en) * | 2019-01-10 | 2019-05-10 | 众安信息技术服务有限公司 | Digital signature method and device based on block chain |
CN109547219A (en) * | 2019-01-18 | 2019-03-29 | 杭州秘猿科技有限公司 | Information collection and the method and apparatus for being submitted to block chain network |
CN112215608A (en) * | 2019-01-18 | 2021-01-12 | 创新先进技术有限公司 | Data processing method and device |
CN110321730A (en) * | 2019-03-28 | 2019-10-11 | 平安科技(深圳)有限公司 | A kind of method, block chain node and the storage medium of operation data processing |
JP2020166732A (en) * | 2019-03-29 | 2020-10-08 | 株式会社オージス総研 | Information processing device, information processing method, and computer program |
CN109978693A (en) * | 2019-03-29 | 2019-07-05 | 上海点融信息科技有限责任公司 | For carrying out the method, apparatus and medium of distributed signature in block chain network |
US11057220B2 (en) | 2019-04-18 | 2021-07-06 | Advanced New Technologies Co., Ltd. | Signature verification for a blockchain ledger |
TWI727594B (en) * | 2019-04-18 | 2021-05-11 | 開曼群島商創新先進技術有限公司 | Signature verification method, system, device and equipment in block chain ledger |
US11070379B2 (en) | 2019-04-18 | 2021-07-20 | Advanced New Technologies Co., Ltd. | Signature verification for a blockchain ledger |
US11283622B2 (en) | 2019-04-18 | 2022-03-22 | Advanced New Technologies Co., Ltd. | Signature verification for a blockchain ledger |
WO2020211496A1 (en) * | 2019-04-18 | 2020-10-22 | 创新先进技术有限公司 | Method, system and apparatus for verifying signature in blockchain ledger, and device |
CN110266494A (en) * | 2019-05-23 | 2019-09-20 | 阿里巴巴集团控股有限公司 | Time service authentication method, device and equipment in a kind of piece of chain type account book |
US10771241B2 (en) | 2019-05-23 | 2020-09-08 | Alibaba Group Holding Limited | Time authentication method, apparatus and device in blockchain-type ledger |
CN110266494B (en) * | 2019-05-23 | 2020-08-04 | 阿里巴巴集团控股有限公司 | Time service authentication method, device and equipment in block chain type account book |
CN110188570A (en) * | 2019-05-31 | 2019-08-30 | 杭州复杂美科技有限公司 | Data mask method, equipment and storage medium |
CN110324150B (en) * | 2019-06-12 | 2022-03-22 | 东软集团股份有限公司 | Data storage method and device, computer readable storage medium and electronic equipment |
CN110324150A (en) * | 2019-06-12 | 2019-10-11 | 东软集团股份有限公司 | Date storage method, device, computer readable storage medium and electronic equipment |
CN110310119B (en) * | 2019-07-06 | 2023-05-02 | 辽宁大学 | Capacity-expandable storage method oriented to cross-blockchain transaction |
CN110310119A (en) * | 2019-07-06 | 2019-10-08 | 辽宁大学 | Extendible capacity storage method towards the transaction of transregional piece of chain |
WO2021012530A1 (en) * | 2019-07-19 | 2021-01-28 | 平安科技(深圳)有限公司 | Blockchain-based interaction record evidence collecting method and apparatus, and medium and server |
CN110445771A (en) * | 2019-07-19 | 2019-11-12 | 平安科技(深圳)有限公司 | Intersection record evidence collecting method, device, medium and server based on block chain |
CN110445771B (en) * | 2019-07-19 | 2022-07-08 | 平安科技(深圳)有限公司 | Block chain-based interactive record evidence obtaining method, device, medium and server |
WO2021017350A1 (en) * | 2019-07-26 | 2021-02-04 | 深圳壹账通智能科技有限公司 | Bidding document management method and system, and computer readable storage medium |
CN112380573A (en) * | 2019-07-29 | 2021-02-19 | 创新先进技术有限公司 | Digital signature method, device and equipment in block chain type account book |
CN112380573B (en) * | 2019-07-29 | 2024-05-14 | 创新先进技术有限公司 | Digital signature method, device and equipment in block chain type account book |
CN111291115A (en) * | 2020-01-16 | 2020-06-16 | 上海旺链信息科技有限公司 | Block chain-based operator environment data acquisition method and system |
CN111884810A (en) * | 2020-07-20 | 2020-11-03 | 上海信联信息发展股份有限公司 | Transaction signature method, device, mobile terminal and system |
US20210272108A1 (en) * | 2020-07-22 | 2021-09-02 | Baidu Online Network Technology (Beijing ) Co., Ltd. | Method and apparatus of processing deposit, and storage medium |
CN113986990B (en) * | 2021-10-26 | 2022-05-10 | 北京市科学技术情报研究所 | Data resource acquisition and labeling method and device based on block chain data mining |
CN113986990A (en) * | 2021-10-26 | 2022-01-28 | 北京市科学技术情报研究所 | Data resource acquisition and labeling method and device based on block chain data mining |
CN114157435A (en) * | 2021-12-02 | 2022-03-08 | 贵州黔驰信息股份有限公司 | Document processing method and device based on block chain technology and client |
CN114157435B (en) * | 2021-12-02 | 2024-05-17 | 贵州黔驰信息股份有限公司 | Document processing method and device based on blockchain technology and client |
CN114567444A (en) * | 2022-02-24 | 2022-05-31 | 广东电网有限责任公司 | Digital signature verification method and device, computer equipment and storage medium |
CN114567444B (en) * | 2022-02-24 | 2023-09-05 | 广东电网有限责任公司 | Digital signature verification method, device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109118223A (en) | For managing the method, apparatus and medium of electronic data in block chain | |
CN107392040B (en) | A kind of method and device of common recognition verifying | |
US11811912B1 (en) | Cryptographic algorithm status transition | |
US10559049B2 (en) | Digital passport country entry stamp | |
CN109741063A (en) | Digital signature method and device based on block chain | |
WO2019237570A1 (en) | Electronic contract signing method, device and server | |
CN109064120A (en) | Tourism electric contract number deposit system based on region chain and deposit card method | |
CN109978688A (en) | The access control method and its contract generator and server of distributed common recognition system | |
CN106778343A (en) | It is a kind of that the data sharing method of private data is related to based on block chain | |
CN108092779A (en) | A kind of method and device for realizing electronic signature | |
CN110138733A (en) | Object storage system based on block chain is credible to deposit card and access right control method | |
CN109753817A (en) | Medical information secure storage scheme based on block chain | |
CN105335667B (en) | Innovate creative data processing method, device, system and deposit card equipment | |
CN109491965A (en) | The storage method and its network and electronic equipment of purchase sale of electricity contract | |
CN111461917B (en) | Power system material contract management system based on block chain | |
CN109255210A (en) | The method, apparatus and storage medium of intelligent contract are provided in block chain network | |
CN105933315A (en) | Network service security communication method, device and system | |
CN108022194A (en) | Law-enforcing recorder and its data safety processing method, server and system | |
CN109213501A (en) | The method, apparatus and storage medium of intelligent contract are installed in block chain network | |
CN105765941A (en) | Illegal access server prevention method and device | |
CN109358859A (en) | The method, apparatus and storage medium of intelligent contract are installed in block chain network | |
CN109982150A (en) | The trust chain method for building up and Intelligent television terminal of Intelligent television terminal | |
CN114500093A (en) | Safe interaction method and system for message information | |
CN108900472B (en) | Information transmission method and device | |
CN114331437A (en) | Block chain-based digital seal using method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190101 |
|
WD01 | Invention patent application deemed withdrawn after publication |