CN109344635A - A kind of electronic evidence acquisition, preservation and verification method based on block chain - Google Patents
A kind of electronic evidence acquisition, preservation and verification method based on block chain Download PDFInfo
- Publication number
- CN109344635A CN109344635A CN201811148619.1A CN201811148619A CN109344635A CN 109344635 A CN109344635 A CN 109344635A CN 201811148619 A CN201811148619 A CN 201811148619A CN 109344635 A CN109344635 A CN 109344635A
- Authority
- CN
- China
- Prior art keywords
- evidence
- block chain
- acquisition
- electronic
- evidence obtaining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The electronic evidence acquisition that the invention discloses a kind of based on block chain saves and verification method, comprising: acquires the electronic version of evidence, obtains time and position that acquisition occurs;It is signed using the private key of acquisition terminal and each related personnel that collects evidence, and sends Correlation block chain node for data and signature;Inspection receive the legitimacy signed in data, and selectively check other information validity, as effectively if will proof data, time and location information and signature be stored in block chain in;The evidence corresponding informance is read when verifying from block chain, is compared with the electronic evidence copy of application verifying, if consistent and additional information effectively if recognize that corresponding evidence copy is effective.The present invention the data that block chain technology is utilized can not tamper while; in conjunction with digital signature technology bring to the identification verification function of equipment and personnel; safeguard protection is provided with preservation for electronic evidence acquisition, including electronic evidence is prevented to be forged and be tampered.
Description
Technical field
The present invention relates to field of information processing, in particular to a kind of electronic evidence acquisition based on block chain is saved and is tested
Card method.
Background technique
With the development of information technology, the various electronic products such as computer, mobile phone, digital camera have been dissolved into people's
In daily life, the electronic document generated has become transmitting and records the important carrier of information.Electronic evidence refers to by existing
For all evidences that information technology and electronic equipment are formed, or what is electronically showed be able to demonstrate that case facts
All evidences.People are in the information age, and electronic evidence plays more and more important during proving case facts
Effect.
However, the characteristics of due to electronic evidence itself, be easy to be forged and distort, which greatly limits electronic evidences
It is credible.Block chain is to concatenate and protect the series winding of content by cryptography to record.Each block contains previous block
Keyed hash, corresponding time stab and the data that need to be recorded, it is such design so that block content have be difficult to be tampered
Characteristic.Electronic evidence can be allowed effectively to be recorded with the distributed account book that block chain is concatenated, and respectively can permanently check this card
According to.However, the existing technology using block chain perpetuation of testimony often thinks to be stored in block chain by some trusted party application
Data are true evidence, ignore and acquire to electronic evidence and enter the inspection in chain process, so that being stored into block chain
The not necessarily true evident information of data.For example the node that responsible broadcast evidence enters chain request is controlled by hacker, hacker is complete
The information preservation that oneself is forged can be entered in block chain entirely, and make other each side all it is thought that true electronic evidence.Institute
With existing electronic evidence acquisition is solved with problems demand existing for store method.
Summary of the invention
The purpose of the present invention is to overcome the shortcomings of the existing technology and deficiency, provides a kind of electronic evidence based on block chain
Acquisition, save and verification method, be utilized block chain technology bring data can not tamper while, in conjunction with digital signature
Technology bring provides safeguard protection to the identification verification function of equipment and personnel for the acquisition and preservation of electronic evidence,
Including preventing electronic evidence to be forged and being distorted afterwards.
Realizing the specific technical solution of the object of the invention is:
It is a kind of based on block chain electronic evidence acquisition, save and verification method, this method comprising the following specific steps
Step S1, the electronic version of evidence obtaining terminal acquisition evidence, i.e. electronic evidence, and obtain time and position that acquisition occurs
Confidence breath;
Step S2, evidence obtaining terminal are handled to obtain proof data to collected electronic evidence, and to proof data with
And the time got and location information are signed using the private key of acquisition terminal and each counterpart personnel of this evidence obtaining, and
Corresponding block chain node is sent with location information and signature by proof data, time;
Step S3, corresponding block chain node inspection receive each right of the signature of the acquisition terminal in data and this evidence obtaining
The legitimacy for answering personnel to sign, and selectively checks the time of acquisition and the validity of location information, if effectively if by evidence
It is saved in data, time and location information and signature deposit block chain, otherwise disallows the validity of the secondary evidence obtaining;
Step S4 carries out following verifying when verifying the validity of a certain copy of the electronic evidence: reading from block chain
The evidence corresponding informance is taken, is compared with the electronic evidence copy of application verifying, if unanimously and including time location information
And the additional information including signature is effective, then recognizes that corresponding evidence copy is effective, otherwise disallow the evidence copy.
In step S1 of the invention, the information source for obtaining time and location information that acquisition occurs is but not limited to Beidou
Satellite system or GPS system;It is also not limited to simultaneously from satellite system acquisition time and location information, it is only necessary to the source of information
It can guarantee that the time is genuine and believable with location information.
In step S2 of the invention and S3, the proof data is but not limited to the initial data, original to evidence of evidence
The ciphertext that is generated after data encryption, the Hash generated after being made a summary to evidence initial data using one or more hash algorithms
Diversified forms in value and the initial data, ciphertext and cryptographic Hash coexist.
In step S2 and S3 of the invention, each counterpart personnel of this evidence obtaining includes but is not limited to: evidence obtaining operator
Member, evidence obtaining authorized person and evidence obtaining requestor;Wherein: the evidence obtaining operator is the work that operation evidence obtaining terminal is collected evidence
Personnel;Evidence obtaining authorized person is audit and the staff for authorizing this time evidence obtaining operation;Evidence obtaining requestor is to initiate this time to take
Demonstrate,prove people or the tissue of request.
In step S2 and S3 of the invention, the correspondence block chain node refers to needing to receive number in block chain node
According to entering chain request and carry out the node of validity judgement to request, with specific reference to used block chain framework it is different without
Together.
In step S2 of the invention, the private key using acquisition terminal and each counterpart personnel of this evidence obtaining is signed
The concrete mode of name includes but is not limited to following several:
Its private key is manually entered evidence obtaining terminal by counterpart personnel, and evidence obtaining terminal is signed using the key of input;
Counterpart personnel carries out the storage medium insertion evidence obtaining terminal with its private key, evidence obtaining terminal using the key read
Signature;
Data signature module insertion evidence obtaining terminal with its private key, evidence obtaining terminal are intended to signed data biography by counterpart personnel
It is defeated by signature blocks to sign, receives the signature result of signature blocks.
In step S3 of the invention, the corresponding block chain node includes but is not limited to following several to the inspection for receiving data
Point:
It checks whether the various signatures in the data received are forged: the corresponding public key of each signer is obtained, to pair of signature
Information is answered to be decrypted with the legitimacy of digital signature checked;
Check whether acquisition terminal is qualified evidence taking equipment: if evidence obtaining terminal is signed with legitimate digital, checking
Whether the signature is what qualified evidence taking equipment was signed;
Check whether each related personnel of this evidence obtaining is qualified personnel: if evidence obtaining related personnel has legitimate digital
Signature, then check whether the signatory of evidence obtaining operator's signature has corresponding evidence obtaining qualification, the signatory of authorized person's signature
Whether can authorize whether the secondary evidence obtaining, and the signatory of evidence obtaining requestor's signature can initiate the secondary evidence obtaining;
Selectively, check whether the combination for the time and place and equipment and personnel that acquisition occurs is licensed, whether accords with
Close the time and place etc. existing for evidence.
In step S4 of the invention, following verifying is carried out when verifying the validity of a certain copy of the electronic evidence:
If there are the plaintext of corresponding electronic evidence in block chain, whether the electronic evidence copy for checking submission is complete with it
Unanimously;
The ciphertext that primary electron evidence generates after encryption if it exists checks its electronic evidence pair with submission after then decrypting
Whether this consistent, or after the evidence copy of submission encrypt in the same way, whether inspection ciphertext is consistent;
The cryptographic Hash of primary electron evidence if it exists is then carried out the electronic evidence copy of submission using corresponding hash algorithm
Abstract, checks whether all cryptographic Hash are consistent;
It, then can be according to being mentioned in step S3 if can confirm that the evidence copy is not distorted by above-mentioned inspection afterwards
To method check again for additional information, i.e., inspection acquisition terminal signature, this evidence obtaining each counterpart personnel signature legitimacy,
The time of acquisition and the validity of location information are held if through all check to check again for evidence obtaining validity
Certification is effective according to copy, otherwise disallows the validity of the evidence copy.
The beneficial effects of the present invention are:
It can ensure the authenticity of the evidence collected: by verification to digital signature and signer identity etc.
It checks, can be confirmed that evidence is acquired using qualified credible evidence taking equipment, the user of equipment is qualified
Evidence obtaining personnel, evidence obtaining behavior have obtained the license of the relevant personnel, and the time for generation of collecting evidence, place meet the requirements.These information
Can ensure electronic evidence not is artificially to fabricate, nor diverting from other time place, and collects evidence and meets corresponding rule
Model is also audited for subsequent.Therefore the present invention can ensure the authenticity for collecting evidence.
It can ensure that electronic evidence is not modified afterwards: be protected by the way that true proof data and relevant information will be regarded as
It is stored in block chain, the property that can not be distorted using the data that block chain provides properly is saved electronic evidence, if subsequent need pair
Electronic evidence is confirmed, then reads relevant information from block chain and compare verifying, so that it is guaranteed that electronic evidence is not by thing
After modify.
To sum up, present invention ensures that the authenticity of the evidence of deposit block chain, also utilizes block chain technical guarantee evidence
After deposit can not tamper, for electronic evidence acquisition with preservation provide safeguard protection.
Detailed description of the invention
Fig. 1 is flow chart of the present invention.
Specific embodiment
Below with reference to following specific embodiments and attached drawing, the present invention is described in further detail.Implement of the invention
Procedures, conditions, experimental methods etc. are among the general principles and common general knowledge in the art in addition to what is specifically mentioned below,
There are no special restrictions to content by the present invention.
Embodiment
The meaning that related technical term represents in the present invention is as follows:
Sigk(M) expression signs to data item M with key k;
E (M) is represented to data item M and is encrypted;
D (M) is represented to ciphertext M and is decrypted;
The cryptographic Hash of H (M) expression data item M;
[M] indicates that M is optional;
{ S } indicates set S;
{ A, B, C } indicates the set being made of tri- elements of A, B, C;
(A, B, C) indicates a data item being made of tri- sub- data item of A, B, C.
As shown in Figure 1, the present invention the following steps are included:
Step S1, the original electron version Evi of evidence obtaining terminal acquisition evidenceRaw, i.e. electronic evidence, and from satellite system etc.
Information source obtains the time T and location information P that acquisition occurs;
Step S2, terminal of collecting evidence is to collected electronic evidence EviRawIt is handled to obtain proof data set { Evi },
Then it to evidence data acquisition system { Evi } and the time T and position P that obtain, is collected evidence using acquisition terminal to this each related
The private key of personnel is digitally signed operation, obtains each signature set { Sig }.And by proof data set { Evi }, time T with
Position P and signature set { Sig } are sent to Correlation block chain node;
Step S3, Correlation block chain node inspection receive each related personnel label of acquisition terminal and this evidence obtaining in data
The legitimacy of name set { Sig }, and the validity of the information such as time T and position P for selectively checking acquisition, the general if effective
It is saved in proof data set { Evi }, time T and position P and signature set { Sig } deposit block chain, otherwise disallows this
The validity of secondary evidence obtaining.
Step S4 when verifying the validity of certain part of electronic evidence copy afterwards, reads the corresponding letter of the evidence from block chain
Breath, by the electronic evidence copy Evi ' of proof data set { Evi } therein and application verifyingRawCompare, if it is consistent and
Temporal information T effectively then recognizes that corresponding evidence copy is effective to the additional informations such as location information P and signature set { Sig }, otherwise
Disallow the evidence copy.
Step S1 in the present embodiment is described below in detail:
The evidence that evidence obtaining terminal in the present embodiment can be intended to acquire with save is converted into the electronics of electronic document form
Copy.If evidence is originally used for electronic data, terminal of collecting evidence is copied, and saves as the copy of electronic document form.If evidence
The forms such as the material object of non-electrical subdata are originally used for, then using the sensor in evidence obtaining terminal, are acquired as electronic data.Such as
Evidence obtaining terminal takes pictures to exhibits such as paper documents using camera, saves as electronic document.The collected card of above-mentioned steps
According to original electron version be denoted as EviRaw.Terminal of collecting evidence can also be as needed by EviRawIt is exported and is separately saved.
Evidence obtaining terminal in the present embodiment also needs to obtain the time and place that evidence obtaining occurs.For example, evidence obtaining terminal passes through
Beidou satellite system obtains the time and location information that evidence obtaining occurs.Evidence obtaining terminal can also be from can guarantee time and location information
Other genuine and believable data sources obtain these data.The temporal information that above-mentioned steps are got is denoted as T, the position got
Information is denoted as P.
The sequence that above-mentioned two behavior occurs is depending on the concrete condition of evidence obtaining, when can obtain when evidence collection starts
Between and position, can also when evidence collection is completed acquisition time and position, when can also repeatedly be obtained while evidence collection
Between and position, but need to guarantee the operator conjunction card related specifications.
The carrier for terminal of collecting evidence can be computer software, or certain hardware, but need to ensure that it can be true
The electronic copies of ground acquisition evidence.Evidence obtaining terminal can be manually performed the acquisition of evidence by evidence obtaining personnel, can also be by collecting evidence
Personnel's setting is automatic to be executed.
Step S2 in the present embodiment is described below in detail:
Terminal of collecting evidence is first by the original electron version Evi of evidenceRawIt is handled to obtain for signing and being stored in block chain
Version { Evi }.These processing include but is not limited to carry out encryption to evidence initial data to generate ciphertext E (EviRaw), to evidence
Initial data carries out abstract using one or more hash algorithms and generates hash value collection { H (EviRaw), or without additional
Processing directly uses EviRaw.Terminal of collecting evidence is to EviRawIncluding but not limited to above-mentioned one or more processing are carried out, and will place
One or more results that reason obtains are incorporated as the proof data set { Evi } for signing and being stored in block chain, i.e., { Evi }
={ [EviRaw], [E (EviRaw)], [{ H (EviRaw)] ....
Then using the private key of evidence obtaining terminal and this evidence obtaining related personnel to evidence data acquisition system { Evi }, temporal information
T, location information P carries out signature operation.Terminal of collecting evidence obtains Sig using the private key signature of oneselfDev({ Evi }, T, P);Evidence obtaining behaviour
Make personnel confirm evidence obtaining it is errorless after, obtain Sig using the private key signature of oneselfOpt({ Evi }, T, P);Authorized person audits evidence obtaining
After meeting the requirements, Sig is obtained using the private key signature of oneselfAth({ Evi }, T, P);The requestor that collects evidence confirms the electronics card obtained
After meeting expection, Sig is obtained using the private key signature of oneselfReq({ Evi }, T, P).The above-mentioned precedence respectively signed is not added
With limitation, can also carry out simultaneously.Above-mentioned all kinds of signatures can be increased and decreased according to the concrete condition of evidence obtaining, obtain final label
Name set { Sig }={ [SigDev({ Evi }, T, P)], [SigOpt({ Evi }, T, P)], [SigAth({ Evi }, T, P)], [SigReq
({ Evi }, T, P)] ... }.
Evidence obtaining terminal may include but be not limited to following several using the specific implementation that the private key of related personnel is signed
A method: its private key is manually entered evidence obtaining terminal by related personnel, and evidence obtaining terminal is signed using the key of input;Relevant people
Member signs the storage medium insertion evidence obtaining terminal with its private key, evidence obtaining terminal using the key of reading;Related personnel
By the data signature module insertion evidence obtaining terminal with its private key, evidence obtaining terminal is intended to signed data and is transferred to signature blocks progress
Signature, receives the signature result of signature blocks.
Evidence obtaining operator above-mentioned refers to the staff that operation evidence obtaining terminal is collected evidence;Evidence obtaining authorized person refers to careful
Core and the staff for authorizing this time evidence obtaining operation;Evidence obtaining requestor refers to the people for initiating this time evidence obtaining request or tissue.It takes
The meaning that witness person signs is to ensure the correctness of evidence obtaining operation.The meaning that evidence obtaining authorized person signs is to ensure
Evidence obtaining process is by license and supervision.The meaning of evidence obtaining requestor's signature is to add approval of the requestor to evidence, Ke Nengzeng
Add the credibility of evidence.For example, both parties' request carries out evidence obtaining preservation to the status of a certain exhibit, requested as evidence obtaining
Person, the digital signature of both sides show approval of the both sides to evidence obtaining result, more can prove that evidence and genuine in this way.If evidence obtaining
It is related to other relevant personnel, above-mentioned signature step can also add the signature of these people.The signature of each related personnel is plus evidence obtaining
The signature of terminal has ensured the authenticity for collecting evidence jointly.
Evidence obtaining terminal then sends proof data set { Evi }, time T to position P and signature set { Sig } related
Block chain node, for proof data and other information to be saved into block chain.What the Correlation block chain node at this place referred to
It is the node for needing to receive data in block chain node and entering chain request and carrying out validity judgement to request, with specific reference to being used
The difference of block chain framework and it is different.For example, the block chain based on class bit coin framework, evidence obtaining terminal will broadcast these data
To all nodes;Based on the block chain of Hyperledger Fabric framework, terminal of collecting evidence transmits data to endorsement node, with
Other information is added afterwards and is sent to ordering joint, and all nodes are sent to by ordering joint;Other difference frameworks have different
Characteristic.Specific implementation of the invention will carry out corresponding subtle adjustment according to the different of block chain bottom architecture.
Step S3 in the present embodiment is described below in detail:
Whether the information that Correlation block chain node inspection receives meets the requirements.Specifically carry out including but not limited to following inspection
It looks into:
It checks whether the set { Sig } of the various signatures in broadcast data forges: obtaining the corresponding public key of each signer, it is right
The legitimacy that the corresponding informance of signature is decrypted with digital signature checked.
Check whether acquisition terminal is qualified evidence taking equipment: if evidence obtaining terminal is signed with legitimate digital, checking
Whether the signature is what qualified evidence taking equipment was signed.This step enters whether the data of chain are qualified for confirmation request
Evidence taking equipment acquisition, to reduce the possibility that it is forged.
Check whether each related personnel of this evidence obtaining is qualified personnel: if evidence obtaining related personnel has legitimate digital
Signature, then check whether the signatory of evidence obtaining operator's signature has corresponding evidence obtaining qualification, the signatory of authorized person's signature
Whether can authorize whether the secondary evidence obtaining, and the signatory of evidence obtaining requestor's signature can initiate the secondary evidence obtaining.This step is used
The approval of related personnel whether has been obtained in the data that confirmation request enters chain.
Selectively, check whether the combination for the time and place and equipment and personnel that acquisition occurs is licensed, whether accords with
Close time and place existing for evidence.This step is for confirming whether the acquisition step of relevant evidence meets related rule for the last time
It is fixed.Such as: the evidence obtaining operator for signing signature only allows to carry out evidence obtaining operation in the laboratory of its tenure, and taking in data
Place is demonstrate,proved but in other positions, or the evidence obtaining terminal used should not appear in the laboratory, then it is assumed that this time evidence obtaining nothing
Effect;The time or position that evidence obtaining occurs are not inconsistent with time existing for evidence or position, then it is assumed that this time evidence obtaining is invalid.
The sequence that above-mentioned inspection carries out does not require.If the data received have passed through including but not limited to above-mentioned inspection,
Then think that the data received are true electronic evidences, at this time collects proof data set { Evi }, time T and position P and signature
It closes in { Sig } deposit block chain.According to the difference of used block chain framework, the detail how to be stored is different.
For example, the block chain based on class bit coin framework, some node that PoW mechanism determines is by data configuration Merkel tree, by tree root
It is put into block head and broadcasts block, after other nodes receive the block, if approving all data in this this block,
The corresponding calculating of PoW is then continued to run after the block;Based on the block chain of Hyperledger Fabric framework, sequence section
The request for obtaining enough endorsements is ranked up by point, is sent to each node, is updated account book and world state after node inspection success
state;Other difference frameworks have different characteristics.The present invention does not need the difference for being concerned about these block chain bottom layer realizations.
Step S4 in the present embodiment is described below in detail:
As the subsequent electronic evidence copy Evi ' needed to submissionRawWhen being verified, then the evidence is read from block chain
Corresponding record, including proof data set { Evi }, time T and position P and signature set { Sig }.To Evi 'RawWith { Evi }
Including but not limited to following several points can be carried out to check:
If there are the plaintexts of corresponding electronic evidence, i.e. Evi in block chainRaw∈ { Evi }, then check the electronic evidence of submission
Whether copy is completely the same with it, i.e., whether has Evi 'Raw=EviRaw。
The ciphertext that primary electron evidence generates after encryption if it exists, i.e. E (EviRaw) ∈ { Evi }, then decrypt after with submission
Electronic evidence copy check whether unanimously whether there is Evi 'Raw=D (E (EviRaw));Or the evidence copy of submission is pressed
After same way encryption, check whether ciphertext is consistent, i.e., whether has E (Evi 'Raw)=E (EviRaw)。
The cryptographic Hash of primary electron evidence if it exists, i.e. { H (EviRaw) ∈ { Evi }, then the electronic evidence copy of submission is made
It is made a summary with corresponding hash algorithm, checks whether all cryptographic Hash are consistent, i.e., whether have { H (Evi 'Raw)={ H
(EviRaw)};
It, then can be according to being mentioned in step S3 if can confirm that the evidence copy is not distorted by above-mentioned inspection afterwards
To method check again for additional information, thus to evidence obtaining validity check again for, if by it is all check if recognize to demonstrate,prove
It is effective according to copy, otherwise disallow the validity of the evidence copy.
Protection content of the invention is not limited to above embodiments.Without departing from the spirit and scope of the invention, originally
Field technical staff it is conceivable that variation and advantage be all included in the present invention, and with appended claims be protect
Protect range.
Claims (6)
1. a kind of electronic evidence acquisition, preservation and verification method based on block chain, which is characterized in that this method includes following tool
Body step:
Step S1, the electronic version of terminal of collecting evidence acquisition evidence, i.e. electronic evidence, and obtain time and position letter that acquisition occurs
Breath;
Step S2, evidence obtaining terminal handles collected electronic evidence to obtain proof data, and to proof data and obtains
The time got and location information are signed using the private key of acquisition terminal and each counterpart personnel of this evidence obtaining, and will card
Corresponding block chain node is sent to location information and signature according to data, time;
Step S3, corresponding block chain node inspection receive the signature of the acquisition terminal in data and each corresponding people of this evidence obtaining
The legitimacy of member's signature, and selectively checks the time of acquisition and the validity of location information, if effectively if by proof data,
It is saved in time and location information and signature deposit block chain, otherwise disallows the validity of the secondary evidence obtaining;
Step S4 carries out following verifying when verifying the validity of a certain copy of the electronic evidence: reading from block chain should
Evidence corresponding informance is compared with the electronic evidence copy of application verifying, if it is consistent and including time location information and
Additional information including signature is effective, then recognizes that corresponding evidence copy is effective, otherwise disallow the evidence copy.
2. the method according to claim 1, wherein obtaining the time and position that acquisition occurs in the step S1
The information source of confidence breath is but not limited to Beidou satellite system or GPS system.
3. the method according to claim 1, wherein in the step S2 and S3, proof data is but unlimited
The ciphertext that is generated after the initial data of evidence, to the encryption of evidence initial data, to evidence initial data using one or more
The diversified forms in cryptographic Hash and the initial data, ciphertext and cryptographic Hash that hash algorithm generates after being made a summary
It coexists.
4. the method according to claim 1, wherein in the step S2 and S3, each correspondence of this evidence obtaining
Personnel include but is not limited to: evidence obtaining operator, evidence obtaining authorized person and evidence obtaining requestor;Wherein: the evidence obtaining operator
The staff to collect evidence for operation evidence obtaining terminal;Evidence obtaining authorized person is audit and the work for authorizing this time evidence obtaining operation
Personnel;Evidence obtaining requestor is people or the tissue for initiating this time evidence obtaining request.
5. the method according to claim 1, wherein in the step S3, corresponding block chain node is to receiving
The inspection of data includes but is not limited to check whether various signatures are forged, and whether acquisition terminal is qualified evidence taking equipment, is taken
Whether card operation and authorized person are qualified evidence obtaining personnel, and whether evidence obtaining requestor can initiate the secondary evidence obtaining, and
Selectively check whether the combination for the time and place and equipment and personnel that acquisition occurs is licensed, whether meets evidence presence
Time and place.
6. the method according to claim 1, wherein verifying described in step S4 includes but is not limited to: if area
There are the plaintexts of corresponding electronic evidence in block chain, then whether the electronic evidence copy for checking submission is completely the same with it;If it exists
Encrypted ciphertext, then whether inspection and the electronic evidence copy submitted are consistent after decrypting, or the evidence copy of submission is pressed
After same way encryption, check whether ciphertext is consistent;Cryptographic Hash if it exists is then breathed out the electronic evidence copy of submission using corresponding
Uncommon algorithm is made a summary, and checks whether all abstract results are consistent;If being checked again for by above-mentioned all inspections from block
The additional information read in chain, i.e. inspection acquisition terminal signature, the legitimacy of each counterpart personnel signature of this evidence obtaining, acquisition
Time and location information validity, if pass through if recognize that the evidence copy is effective, otherwise disallow the evidence copy
Validity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811148619.1A CN109344635A (en) | 2018-09-29 | 2018-09-29 | A kind of electronic evidence acquisition, preservation and verification method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811148619.1A CN109344635A (en) | 2018-09-29 | 2018-09-29 | A kind of electronic evidence acquisition, preservation and verification method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109344635A true CN109344635A (en) | 2019-02-15 |
Family
ID=65307899
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811148619.1A Pending CN109344635A (en) | 2018-09-29 | 2018-09-29 | A kind of electronic evidence acquisition, preservation and verification method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109344635A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110232645A (en) * | 2019-06-14 | 2019-09-13 | 山东省计算中心(国家超级计算济南中心) | The electronic evidence of evidence obtaining and block chain is fixed and network forensics method and system based on memory |
CN110309197A (en) * | 2019-05-24 | 2019-10-08 | 平安科技(深圳)有限公司 | Project data verification method and its device |
CN110445771A (en) * | 2019-07-19 | 2019-11-12 | 平安科技(深圳)有限公司 | Intersection record evidence collecting method, device, medium and server based on block chain |
CN110460444A (en) * | 2019-06-28 | 2019-11-15 | 安徽四创电子股份有限公司 | A kind of believable block chain generation method of space-time and equipment |
CN110675150A (en) * | 2019-09-24 | 2020-01-10 | 支付宝(杭州)信息技术有限公司 | Federation chain-based compliance management and supervision method and device |
CN111031475A (en) * | 2019-12-19 | 2020-04-17 | 达闼科技成都有限公司 | Method for collecting terminal position information, terminal, position collecting terminal and storage medium |
CN111339204A (en) * | 2020-02-29 | 2020-06-26 | 重庆百事得大牛机器人有限公司 | Electronic evidence collecting and recording system for legal consultation robot |
CN111368080A (en) * | 2020-02-29 | 2020-07-03 | 重庆百事得大牛机器人有限公司 | Electronic evidence collecting and recording method for legal consultation robot |
CN111652720A (en) * | 2020-05-22 | 2020-09-11 | 深圳市网安计算机安全检测技术有限公司 | Cloud evidence obtaining method and device, computer equipment and storage medium |
CN112134864A (en) * | 2020-09-14 | 2020-12-25 | 广州大学 | Evidence chain platform based on double-block chain structure and implementation method thereof |
CN112950416A (en) * | 2021-03-11 | 2021-06-11 | 全链通有限公司 | Block chain-based electronic evidence processing method and device and readable medium |
CN113078998A (en) * | 2021-04-08 | 2021-07-06 | 太原理工大学 | Block chain storage verification method for providing address information |
US11063761B2 (en) | 2019-08-12 | 2021-07-13 | Advanced New Technologies Co., Ltd. | Blockchain-based paperless documentation |
CN113672998A (en) * | 2021-10-25 | 2021-11-19 | 广州智建云信息技术有限公司 | Anti-counterfeiting method and system for data in construction process of constructional engineering |
US11900493B2 (en) | 2019-08-12 | 2024-02-13 | Advanced New Technologies Co., Ltd. | Blockchain-based dispute resolution |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101939948A (en) * | 2008-01-07 | 2011-01-05 | 特拉斯特锡德公司 | Signature method and device |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
CN108471350A (en) * | 2018-03-28 | 2018-08-31 | 电子科技大学成都研究院 | Trust data computational methods based on block chain |
CN108512653A (en) * | 2018-04-18 | 2018-09-07 | 成都零光量子科技有限公司 | A kind of electronic evidence acquisition and method of servicing based on block chain |
-
2018
- 2018-09-29 CN CN201811148619.1A patent/CN109344635A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101939948A (en) * | 2008-01-07 | 2011-01-05 | 特拉斯特锡德公司 | Signature method and device |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
CN108471350A (en) * | 2018-03-28 | 2018-08-31 | 电子科技大学成都研究院 | Trust data computational methods based on block chain |
CN108512653A (en) * | 2018-04-18 | 2018-09-07 | 成都零光量子科技有限公司 | A kind of electronic evidence acquisition and method of servicing based on block chain |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110309197B (en) * | 2019-05-24 | 2023-04-18 | 平安科技(深圳)有限公司 | Project data verification method and device |
CN110309197A (en) * | 2019-05-24 | 2019-10-08 | 平安科技(深圳)有限公司 | Project data verification method and its device |
WO2020237874A1 (en) * | 2019-05-24 | 2020-12-03 | 平安科技(深圳)有限公司 | Project data verification method, device, computer apparatus and storage medium |
CN110232645A (en) * | 2019-06-14 | 2019-09-13 | 山东省计算中心(国家超级计算济南中心) | The electronic evidence of evidence obtaining and block chain is fixed and network forensics method and system based on memory |
WO2020249112A1 (en) * | 2019-06-14 | 2020-12-17 | 山东省计算中心(国家超级计算济南中心) | Method and system for digital evidence fixing and network forensics on basis of memory forensics and blockchain |
CN110460444A (en) * | 2019-06-28 | 2019-11-15 | 安徽四创电子股份有限公司 | A kind of believable block chain generation method of space-time and equipment |
CN110460444B (en) * | 2019-06-28 | 2022-02-08 | 安徽四创电子股份有限公司 | Space-time credible block chain generation method and device |
CN110445771A (en) * | 2019-07-19 | 2019-11-12 | 平安科技(深圳)有限公司 | Intersection record evidence collecting method, device, medium and server based on block chain |
CN110445771B (en) * | 2019-07-19 | 2022-07-08 | 平安科技(深圳)有限公司 | Block chain-based interactive record evidence obtaining method, device, medium and server |
US11063761B2 (en) | 2019-08-12 | 2021-07-13 | Advanced New Technologies Co., Ltd. | Blockchain-based paperless documentation |
US11900493B2 (en) | 2019-08-12 | 2024-02-13 | Advanced New Technologies Co., Ltd. | Blockchain-based dispute resolution |
US11271740B2 (en) | 2019-08-12 | 2022-03-08 | Advanced New Technologies Co., Ltd. | Blockchain-based paperless documentation |
CN110675150A (en) * | 2019-09-24 | 2020-01-10 | 支付宝(杭州)信息技术有限公司 | Federation chain-based compliance management and supervision method and device |
CN111031475A (en) * | 2019-12-19 | 2020-04-17 | 达闼科技成都有限公司 | Method for collecting terminal position information, terminal, position collecting terminal and storage medium |
CN111339204A (en) * | 2020-02-29 | 2020-06-26 | 重庆百事得大牛机器人有限公司 | Electronic evidence collecting and recording system for legal consultation robot |
CN111368080A (en) * | 2020-02-29 | 2020-07-03 | 重庆百事得大牛机器人有限公司 | Electronic evidence collecting and recording method for legal consultation robot |
CN111652720A (en) * | 2020-05-22 | 2020-09-11 | 深圳市网安计算机安全检测技术有限公司 | Cloud evidence obtaining method and device, computer equipment and storage medium |
CN111652720B (en) * | 2020-05-22 | 2023-09-05 | 深圳市网安计算机安全检测技术有限公司 | Cloud evidence obtaining method and device, computer equipment and storage medium |
CN112134864A (en) * | 2020-09-14 | 2020-12-25 | 广州大学 | Evidence chain platform based on double-block chain structure and implementation method thereof |
CN112134864B (en) * | 2020-09-14 | 2023-02-03 | 广州大学 | Evidence chain platform based on double-block chain structure and implementation method thereof |
CN112950416A (en) * | 2021-03-11 | 2021-06-11 | 全链通有限公司 | Block chain-based electronic evidence processing method and device and readable medium |
CN112950416B (en) * | 2021-03-11 | 2023-11-17 | 全链通有限公司 | Electronic evidence processing method and device based on blockchain and readable medium |
CN113078998A (en) * | 2021-04-08 | 2021-07-06 | 太原理工大学 | Block chain storage verification method for providing address information |
CN113672998A (en) * | 2021-10-25 | 2021-11-19 | 广州智建云信息技术有限公司 | Anti-counterfeiting method and system for data in construction process of constructional engineering |
CN113672998B (en) * | 2021-10-25 | 2022-02-18 | 广州智建云信息技术有限公司 | Anti-counterfeiting method and system for data in construction process of constructional engineering |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109344635A (en) | A kind of electronic evidence acquisition, preservation and verification method based on block chain | |
US6269446B1 (en) | Authenticating images from digital cameras | |
US7512398B2 (en) | Authenticating data units of a mobile communications device | |
US5499294A (en) | Digital camera with apparatus for authentication of images produced from an image file | |
US5748738A (en) | System and method for electronic transmission, storage and retrieval of authenticated documents | |
US6530023B1 (en) | Method and device that validates time of an internal source using an external source | |
CN108092779A (en) | A kind of method and device for realizing electronic signature | |
US20120260098A1 (en) | Storage and Authentication of Data Transactions | |
PL176458B1 (en) | Method of and system for encoding with deposition of encoding keys | |
US11531746B2 (en) | Method for electronic signing of a document by a plurality of signatories | |
US8230216B2 (en) | Information processing apparatus, control method therefor, information processing system, and program | |
US11606201B2 (en) | Cryptographic systems and methods using distributed ledgers | |
JP2005513641A (en) | Method and apparatus for secretly transmitting and authenticating biometric data over a network | |
KR20060049245A (en) | Method and system for electronic voting over a high-security network | |
CN110995673A (en) | Case evidence management method and device based on block chain, terminal and storage medium | |
US20070050626A1 (en) | Document management system, document processing computer, signature generating computer, storage medium storing program for document management, and document management method | |
US20140321640A1 (en) | Apparatus and Method for Generating Digital Images | |
US20230259899A1 (en) | Method, participant unit, transaction register and payment system for managing transaction data sets | |
CN105490814A (en) | Ticket real name authentication method and system based on three-dimensional code | |
CN108400874A (en) | The method that the digital signature function of terminal is authenticated printed text is verified using seal | |
CN108322311B (en) | Method and device for generating digital certificate | |
CN103973456A (en) | Small district management system and method based on digital certificates | |
CN108737095B (en) | Method for carrying out credible operation by using digital current survey record credible model system | |
EP1119133B1 (en) | Method and apparatus for secure data transmission via network | |
Grinberg | End-to-End Authentication: A First Amendment Hook to the Encryption Debate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190215 |
|
WD01 | Invention patent application deemed withdrawn after publication |