CN109344635A - A kind of electronic evidence acquisition, preservation and verification method based on block chain - Google Patents

A kind of electronic evidence acquisition, preservation and verification method based on block chain Download PDF

Info

Publication number
CN109344635A
CN109344635A CN201811148619.1A CN201811148619A CN109344635A CN 109344635 A CN109344635 A CN 109344635A CN 201811148619 A CN201811148619 A CN 201811148619A CN 109344635 A CN109344635 A CN 109344635A
Authority
CN
China
Prior art keywords
evidence
block chain
acquisition
electronic
evidence obtaining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811148619.1A
Other languages
Chinese (zh)
Inventor
何道敬
李世豪
李旭如
邓智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
East China Normal University
Original Assignee
East China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by East China Normal University filed Critical East China Normal University
Priority to CN201811148619.1A priority Critical patent/CN109344635A/en
Publication of CN109344635A publication Critical patent/CN109344635A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The electronic evidence acquisition that the invention discloses a kind of based on block chain saves and verification method, comprising: acquires the electronic version of evidence, obtains time and position that acquisition occurs;It is signed using the private key of acquisition terminal and each related personnel that collects evidence, and sends Correlation block chain node for data and signature;Inspection receive the legitimacy signed in data, and selectively check other information validity, as effectively if will proof data, time and location information and signature be stored in block chain in;The evidence corresponding informance is read when verifying from block chain, is compared with the electronic evidence copy of application verifying, if consistent and additional information effectively if recognize that corresponding evidence copy is effective.The present invention the data that block chain technology is utilized can not tamper while; in conjunction with digital signature technology bring to the identification verification function of equipment and personnel; safeguard protection is provided with preservation for electronic evidence acquisition, including electronic evidence is prevented to be forged and be tampered.

Description

A kind of electronic evidence acquisition, preservation and verification method based on block chain
Technical field
The present invention relates to field of information processing, in particular to a kind of electronic evidence acquisition based on block chain is saved and is tested Card method.
Background technique
With the development of information technology, the various electronic products such as computer, mobile phone, digital camera have been dissolved into people's In daily life, the electronic document generated has become transmitting and records the important carrier of information.Electronic evidence refers to by existing For all evidences that information technology and electronic equipment are formed, or what is electronically showed be able to demonstrate that case facts All evidences.People are in the information age, and electronic evidence plays more and more important during proving case facts Effect.
However, the characteristics of due to electronic evidence itself, be easy to be forged and distort, which greatly limits electronic evidences It is credible.Block chain is to concatenate and protect the series winding of content by cryptography to record.Each block contains previous block Keyed hash, corresponding time stab and the data that need to be recorded, it is such design so that block content have be difficult to be tampered Characteristic.Electronic evidence can be allowed effectively to be recorded with the distributed account book that block chain is concatenated, and respectively can permanently check this card According to.However, the existing technology using block chain perpetuation of testimony often thinks to be stored in block chain by some trusted party application Data are true evidence, ignore and acquire to electronic evidence and enter the inspection in chain process, so that being stored into block chain The not necessarily true evident information of data.For example the node that responsible broadcast evidence enters chain request is controlled by hacker, hacker is complete The information preservation that oneself is forged can be entered in block chain entirely, and make other each side all it is thought that true electronic evidence.Institute With existing electronic evidence acquisition is solved with problems demand existing for store method.
Summary of the invention
The purpose of the present invention is to overcome the shortcomings of the existing technology and deficiency, provides a kind of electronic evidence based on block chain Acquisition, save and verification method, be utilized block chain technology bring data can not tamper while, in conjunction with digital signature Technology bring provides safeguard protection to the identification verification function of equipment and personnel for the acquisition and preservation of electronic evidence, Including preventing electronic evidence to be forged and being distorted afterwards.
Realizing the specific technical solution of the object of the invention is:
It is a kind of based on block chain electronic evidence acquisition, save and verification method, this method comprising the following specific steps
Step S1, the electronic version of evidence obtaining terminal acquisition evidence, i.e. electronic evidence, and obtain time and position that acquisition occurs Confidence breath;
Step S2, evidence obtaining terminal are handled to obtain proof data to collected electronic evidence, and to proof data with And the time got and location information are signed using the private key of acquisition terminal and each counterpart personnel of this evidence obtaining, and Corresponding block chain node is sent with location information and signature by proof data, time;
Step S3, corresponding block chain node inspection receive each right of the signature of the acquisition terminal in data and this evidence obtaining The legitimacy for answering personnel to sign, and selectively checks the time of acquisition and the validity of location information, if effectively if by evidence It is saved in data, time and location information and signature deposit block chain, otherwise disallows the validity of the secondary evidence obtaining;
Step S4 carries out following verifying when verifying the validity of a certain copy of the electronic evidence: reading from block chain The evidence corresponding informance is taken, is compared with the electronic evidence copy of application verifying, if unanimously and including time location information And the additional information including signature is effective, then recognizes that corresponding evidence copy is effective, otherwise disallow the evidence copy.
In step S1 of the invention, the information source for obtaining time and location information that acquisition occurs is but not limited to Beidou Satellite system or GPS system;It is also not limited to simultaneously from satellite system acquisition time and location information, it is only necessary to the source of information It can guarantee that the time is genuine and believable with location information.
In step S2 of the invention and S3, the proof data is but not limited to the initial data, original to evidence of evidence The ciphertext that is generated after data encryption, the Hash generated after being made a summary to evidence initial data using one or more hash algorithms Diversified forms in value and the initial data, ciphertext and cryptographic Hash coexist.
In step S2 and S3 of the invention, each counterpart personnel of this evidence obtaining includes but is not limited to: evidence obtaining operator Member, evidence obtaining authorized person and evidence obtaining requestor;Wherein: the evidence obtaining operator is the work that operation evidence obtaining terminal is collected evidence Personnel;Evidence obtaining authorized person is audit and the staff for authorizing this time evidence obtaining operation;Evidence obtaining requestor is to initiate this time to take Demonstrate,prove people or the tissue of request.
In step S2 and S3 of the invention, the correspondence block chain node refers to needing to receive number in block chain node According to entering chain request and carry out the node of validity judgement to request, with specific reference to used block chain framework it is different without Together.
In step S2 of the invention, the private key using acquisition terminal and each counterpart personnel of this evidence obtaining is signed The concrete mode of name includes but is not limited to following several:
Its private key is manually entered evidence obtaining terminal by counterpart personnel, and evidence obtaining terminal is signed using the key of input;
Counterpart personnel carries out the storage medium insertion evidence obtaining terminal with its private key, evidence obtaining terminal using the key read Signature;
Data signature module insertion evidence obtaining terminal with its private key, evidence obtaining terminal are intended to signed data biography by counterpart personnel It is defeated by signature blocks to sign, receives the signature result of signature blocks.
In step S3 of the invention, the corresponding block chain node includes but is not limited to following several to the inspection for receiving data Point:
It checks whether the various signatures in the data received are forged: the corresponding public key of each signer is obtained, to pair of signature Information is answered to be decrypted with the legitimacy of digital signature checked;
Check whether acquisition terminal is qualified evidence taking equipment: if evidence obtaining terminal is signed with legitimate digital, checking Whether the signature is what qualified evidence taking equipment was signed;
Check whether each related personnel of this evidence obtaining is qualified personnel: if evidence obtaining related personnel has legitimate digital Signature, then check whether the signatory of evidence obtaining operator's signature has corresponding evidence obtaining qualification, the signatory of authorized person's signature Whether can authorize whether the secondary evidence obtaining, and the signatory of evidence obtaining requestor's signature can initiate the secondary evidence obtaining;
Selectively, check whether the combination for the time and place and equipment and personnel that acquisition occurs is licensed, whether accords with Close the time and place etc. existing for evidence.
In step S4 of the invention, following verifying is carried out when verifying the validity of a certain copy of the electronic evidence:
If there are the plaintext of corresponding electronic evidence in block chain, whether the electronic evidence copy for checking submission is complete with it Unanimously;
The ciphertext that primary electron evidence generates after encryption if it exists checks its electronic evidence pair with submission after then decrypting Whether this consistent, or after the evidence copy of submission encrypt in the same way, whether inspection ciphertext is consistent;
The cryptographic Hash of primary electron evidence if it exists is then carried out the electronic evidence copy of submission using corresponding hash algorithm Abstract, checks whether all cryptographic Hash are consistent;
It, then can be according to being mentioned in step S3 if can confirm that the evidence copy is not distorted by above-mentioned inspection afterwards To method check again for additional information, i.e., inspection acquisition terminal signature, this evidence obtaining each counterpart personnel signature legitimacy, The time of acquisition and the validity of location information are held if through all check to check again for evidence obtaining validity Certification is effective according to copy, otherwise disallows the validity of the evidence copy.
The beneficial effects of the present invention are:
It can ensure the authenticity of the evidence collected: by verification to digital signature and signer identity etc. It checks, can be confirmed that evidence is acquired using qualified credible evidence taking equipment, the user of equipment is qualified Evidence obtaining personnel, evidence obtaining behavior have obtained the license of the relevant personnel, and the time for generation of collecting evidence, place meet the requirements.These information Can ensure electronic evidence not is artificially to fabricate, nor diverting from other time place, and collects evidence and meets corresponding rule Model is also audited for subsequent.Therefore the present invention can ensure the authenticity for collecting evidence.
It can ensure that electronic evidence is not modified afterwards: be protected by the way that true proof data and relevant information will be regarded as It is stored in block chain, the property that can not be distorted using the data that block chain provides properly is saved electronic evidence, if subsequent need pair Electronic evidence is confirmed, then reads relevant information from block chain and compare verifying, so that it is guaranteed that electronic evidence is not by thing After modify.
To sum up, present invention ensures that the authenticity of the evidence of deposit block chain, also utilizes block chain technical guarantee evidence After deposit can not tamper, for electronic evidence acquisition with preservation provide safeguard protection.
Detailed description of the invention
Fig. 1 is flow chart of the present invention.
Specific embodiment
Below with reference to following specific embodiments and attached drawing, the present invention is described in further detail.Implement of the invention Procedures, conditions, experimental methods etc. are among the general principles and common general knowledge in the art in addition to what is specifically mentioned below, There are no special restrictions to content by the present invention.
Embodiment
The meaning that related technical term represents in the present invention is as follows:
Sigk(M) expression signs to data item M with key k;
E (M) is represented to data item M and is encrypted;
D (M) is represented to ciphertext M and is decrypted;
The cryptographic Hash of H (M) expression data item M;
[M] indicates that M is optional;
{ S } indicates set S;
{ A, B, C } indicates the set being made of tri- elements of A, B, C;
(A, B, C) indicates a data item being made of tri- sub- data item of A, B, C.
As shown in Figure 1, the present invention the following steps are included:
Step S1, the original electron version Evi of evidence obtaining terminal acquisition evidenceRaw, i.e. electronic evidence, and from satellite system etc. Information source obtains the time T and location information P that acquisition occurs;
Step S2, terminal of collecting evidence is to collected electronic evidence EviRawIt is handled to obtain proof data set { Evi }, Then it to evidence data acquisition system { Evi } and the time T and position P that obtain, is collected evidence using acquisition terminal to this each related The private key of personnel is digitally signed operation, obtains each signature set { Sig }.And by proof data set { Evi }, time T with Position P and signature set { Sig } are sent to Correlation block chain node;
Step S3, Correlation block chain node inspection receive each related personnel label of acquisition terminal and this evidence obtaining in data The legitimacy of name set { Sig }, and the validity of the information such as time T and position P for selectively checking acquisition, the general if effective It is saved in proof data set { Evi }, time T and position P and signature set { Sig } deposit block chain, otherwise disallows this The validity of secondary evidence obtaining.
Step S4 when verifying the validity of certain part of electronic evidence copy afterwards, reads the corresponding letter of the evidence from block chain Breath, by the electronic evidence copy Evi ' of proof data set { Evi } therein and application verifyingRawCompare, if it is consistent and Temporal information T effectively then recognizes that corresponding evidence copy is effective to the additional informations such as location information P and signature set { Sig }, otherwise Disallow the evidence copy.
Step S1 in the present embodiment is described below in detail:
The evidence that evidence obtaining terminal in the present embodiment can be intended to acquire with save is converted into the electronics of electronic document form Copy.If evidence is originally used for electronic data, terminal of collecting evidence is copied, and saves as the copy of electronic document form.If evidence The forms such as the material object of non-electrical subdata are originally used for, then using the sensor in evidence obtaining terminal, are acquired as electronic data.Such as Evidence obtaining terminal takes pictures to exhibits such as paper documents using camera, saves as electronic document.The collected card of above-mentioned steps According to original electron version be denoted as EviRaw.Terminal of collecting evidence can also be as needed by EviRawIt is exported and is separately saved.
Evidence obtaining terminal in the present embodiment also needs to obtain the time and place that evidence obtaining occurs.For example, evidence obtaining terminal passes through Beidou satellite system obtains the time and location information that evidence obtaining occurs.Evidence obtaining terminal can also be from can guarantee time and location information Other genuine and believable data sources obtain these data.The temporal information that above-mentioned steps are got is denoted as T, the position got Information is denoted as P.
The sequence that above-mentioned two behavior occurs is depending on the concrete condition of evidence obtaining, when can obtain when evidence collection starts Between and position, can also when evidence collection is completed acquisition time and position, when can also repeatedly be obtained while evidence collection Between and position, but need to guarantee the operator conjunction card related specifications.
The carrier for terminal of collecting evidence can be computer software, or certain hardware, but need to ensure that it can be true The electronic copies of ground acquisition evidence.Evidence obtaining terminal can be manually performed the acquisition of evidence by evidence obtaining personnel, can also be by collecting evidence Personnel's setting is automatic to be executed.
Step S2 in the present embodiment is described below in detail:
Terminal of collecting evidence is first by the original electron version Evi of evidenceRawIt is handled to obtain for signing and being stored in block chain Version { Evi }.These processing include but is not limited to carry out encryption to evidence initial data to generate ciphertext E (EviRaw), to evidence Initial data carries out abstract using one or more hash algorithms and generates hash value collection { H (EviRaw), or without additional Processing directly uses EviRaw.Terminal of collecting evidence is to EviRawIncluding but not limited to above-mentioned one or more processing are carried out, and will place One or more results that reason obtains are incorporated as the proof data set { Evi } for signing and being stored in block chain, i.e., { Evi } ={ [EviRaw], [E (EviRaw)], [{ H (EviRaw)] ....
Then using the private key of evidence obtaining terminal and this evidence obtaining related personnel to evidence data acquisition system { Evi }, temporal information T, location information P carries out signature operation.Terminal of collecting evidence obtains Sig using the private key signature of oneselfDev({ Evi }, T, P);Evidence obtaining behaviour Make personnel confirm evidence obtaining it is errorless after, obtain Sig using the private key signature of oneselfOpt({ Evi }, T, P);Authorized person audits evidence obtaining After meeting the requirements, Sig is obtained using the private key signature of oneselfAth({ Evi }, T, P);The requestor that collects evidence confirms the electronics card obtained After meeting expection, Sig is obtained using the private key signature of oneselfReq({ Evi }, T, P).The above-mentioned precedence respectively signed is not added With limitation, can also carry out simultaneously.Above-mentioned all kinds of signatures can be increased and decreased according to the concrete condition of evidence obtaining, obtain final label Name set { Sig }={ [SigDev({ Evi }, T, P)], [SigOpt({ Evi }, T, P)], [SigAth({ Evi }, T, P)], [SigReq ({ Evi }, T, P)] ... }.
Evidence obtaining terminal may include but be not limited to following several using the specific implementation that the private key of related personnel is signed A method: its private key is manually entered evidence obtaining terminal by related personnel, and evidence obtaining terminal is signed using the key of input;Relevant people Member signs the storage medium insertion evidence obtaining terminal with its private key, evidence obtaining terminal using the key of reading;Related personnel By the data signature module insertion evidence obtaining terminal with its private key, evidence obtaining terminal is intended to signed data and is transferred to signature blocks progress Signature, receives the signature result of signature blocks.
Evidence obtaining operator above-mentioned refers to the staff that operation evidence obtaining terminal is collected evidence;Evidence obtaining authorized person refers to careful Core and the staff for authorizing this time evidence obtaining operation;Evidence obtaining requestor refers to the people for initiating this time evidence obtaining request or tissue.It takes The meaning that witness person signs is to ensure the correctness of evidence obtaining operation.The meaning that evidence obtaining authorized person signs is to ensure Evidence obtaining process is by license and supervision.The meaning of evidence obtaining requestor's signature is to add approval of the requestor to evidence, Ke Nengzeng Add the credibility of evidence.For example, both parties' request carries out evidence obtaining preservation to the status of a certain exhibit, requested as evidence obtaining Person, the digital signature of both sides show approval of the both sides to evidence obtaining result, more can prove that evidence and genuine in this way.If evidence obtaining It is related to other relevant personnel, above-mentioned signature step can also add the signature of these people.The signature of each related personnel is plus evidence obtaining The signature of terminal has ensured the authenticity for collecting evidence jointly.
Evidence obtaining terminal then sends proof data set { Evi }, time T to position P and signature set { Sig } related Block chain node, for proof data and other information to be saved into block chain.What the Correlation block chain node at this place referred to It is the node for needing to receive data in block chain node and entering chain request and carrying out validity judgement to request, with specific reference to being used The difference of block chain framework and it is different.For example, the block chain based on class bit coin framework, evidence obtaining terminal will broadcast these data To all nodes;Based on the block chain of Hyperledger Fabric framework, terminal of collecting evidence transmits data to endorsement node, with Other information is added afterwards and is sent to ordering joint, and all nodes are sent to by ordering joint;Other difference frameworks have different Characteristic.Specific implementation of the invention will carry out corresponding subtle adjustment according to the different of block chain bottom architecture.
Step S3 in the present embodiment is described below in detail:
Whether the information that Correlation block chain node inspection receives meets the requirements.Specifically carry out including but not limited to following inspection It looks into:
It checks whether the set { Sig } of the various signatures in broadcast data forges: obtaining the corresponding public key of each signer, it is right The legitimacy that the corresponding informance of signature is decrypted with digital signature checked.
Check whether acquisition terminal is qualified evidence taking equipment: if evidence obtaining terminal is signed with legitimate digital, checking Whether the signature is what qualified evidence taking equipment was signed.This step enters whether the data of chain are qualified for confirmation request Evidence taking equipment acquisition, to reduce the possibility that it is forged.
Check whether each related personnel of this evidence obtaining is qualified personnel: if evidence obtaining related personnel has legitimate digital Signature, then check whether the signatory of evidence obtaining operator's signature has corresponding evidence obtaining qualification, the signatory of authorized person's signature Whether can authorize whether the secondary evidence obtaining, and the signatory of evidence obtaining requestor's signature can initiate the secondary evidence obtaining.This step is used The approval of related personnel whether has been obtained in the data that confirmation request enters chain.
Selectively, check whether the combination for the time and place and equipment and personnel that acquisition occurs is licensed, whether accords with Close time and place existing for evidence.This step is for confirming whether the acquisition step of relevant evidence meets related rule for the last time It is fixed.Such as: the evidence obtaining operator for signing signature only allows to carry out evidence obtaining operation in the laboratory of its tenure, and taking in data Place is demonstrate,proved but in other positions, or the evidence obtaining terminal used should not appear in the laboratory, then it is assumed that this time evidence obtaining nothing Effect;The time or position that evidence obtaining occurs are not inconsistent with time existing for evidence or position, then it is assumed that this time evidence obtaining is invalid.
The sequence that above-mentioned inspection carries out does not require.If the data received have passed through including but not limited to above-mentioned inspection, Then think that the data received are true electronic evidences, at this time collects proof data set { Evi }, time T and position P and signature It closes in { Sig } deposit block chain.According to the difference of used block chain framework, the detail how to be stored is different. For example, the block chain based on class bit coin framework, some node that PoW mechanism determines is by data configuration Merkel tree, by tree root It is put into block head and broadcasts block, after other nodes receive the block, if approving all data in this this block, The corresponding calculating of PoW is then continued to run after the block;Based on the block chain of Hyperledger Fabric framework, sequence section The request for obtaining enough endorsements is ranked up by point, is sent to each node, is updated account book and world state after node inspection success state;Other difference frameworks have different characteristics.The present invention does not need the difference for being concerned about these block chain bottom layer realizations.
Step S4 in the present embodiment is described below in detail:
As the subsequent electronic evidence copy Evi ' needed to submissionRawWhen being verified, then the evidence is read from block chain Corresponding record, including proof data set { Evi }, time T and position P and signature set { Sig }.To Evi 'RawWith { Evi } Including but not limited to following several points can be carried out to check:
If there are the plaintexts of corresponding electronic evidence, i.e. Evi in block chainRaw∈ { Evi }, then check the electronic evidence of submission Whether copy is completely the same with it, i.e., whether has Evi 'Raw=EviRaw
The ciphertext that primary electron evidence generates after encryption if it exists, i.e. E (EviRaw) ∈ { Evi }, then decrypt after with submission Electronic evidence copy check whether unanimously whether there is Evi 'Raw=D (E (EviRaw));Or the evidence copy of submission is pressed After same way encryption, check whether ciphertext is consistent, i.e., whether has E (Evi 'Raw)=E (EviRaw)。
The cryptographic Hash of primary electron evidence if it exists, i.e. { H (EviRaw) ∈ { Evi }, then the electronic evidence copy of submission is made It is made a summary with corresponding hash algorithm, checks whether all cryptographic Hash are consistent, i.e., whether have { H (Evi 'Raw)={ H (EviRaw)};
It, then can be according to being mentioned in step S3 if can confirm that the evidence copy is not distorted by above-mentioned inspection afterwards To method check again for additional information, thus to evidence obtaining validity check again for, if by it is all check if recognize to demonstrate,prove It is effective according to copy, otherwise disallow the validity of the evidence copy.
Protection content of the invention is not limited to above embodiments.Without departing from the spirit and scope of the invention, originally Field technical staff it is conceivable that variation and advantage be all included in the present invention, and with appended claims be protect Protect range.

Claims (6)

1. a kind of electronic evidence acquisition, preservation and verification method based on block chain, which is characterized in that this method includes following tool Body step:
Step S1, the electronic version of terminal of collecting evidence acquisition evidence, i.e. electronic evidence, and obtain time and position letter that acquisition occurs Breath;
Step S2, evidence obtaining terminal handles collected electronic evidence to obtain proof data, and to proof data and obtains The time got and location information are signed using the private key of acquisition terminal and each counterpart personnel of this evidence obtaining, and will card Corresponding block chain node is sent to location information and signature according to data, time;
Step S3, corresponding block chain node inspection receive the signature of the acquisition terminal in data and each corresponding people of this evidence obtaining The legitimacy of member's signature, and selectively checks the time of acquisition and the validity of location information, if effectively if by proof data, It is saved in time and location information and signature deposit block chain, otherwise disallows the validity of the secondary evidence obtaining;
Step S4 carries out following verifying when verifying the validity of a certain copy of the electronic evidence: reading from block chain should Evidence corresponding informance is compared with the electronic evidence copy of application verifying, if it is consistent and including time location information and Additional information including signature is effective, then recognizes that corresponding evidence copy is effective, otherwise disallow the evidence copy.
2. the method according to claim 1, wherein obtaining the time and position that acquisition occurs in the step S1 The information source of confidence breath is but not limited to Beidou satellite system or GPS system.
3. the method according to claim 1, wherein in the step S2 and S3, proof data is but unlimited The ciphertext that is generated after the initial data of evidence, to the encryption of evidence initial data, to evidence initial data using one or more The diversified forms in cryptographic Hash and the initial data, ciphertext and cryptographic Hash that hash algorithm generates after being made a summary It coexists.
4. the method according to claim 1, wherein in the step S2 and S3, each correspondence of this evidence obtaining Personnel include but is not limited to: evidence obtaining operator, evidence obtaining authorized person and evidence obtaining requestor;Wherein: the evidence obtaining operator The staff to collect evidence for operation evidence obtaining terminal;Evidence obtaining authorized person is audit and the work for authorizing this time evidence obtaining operation Personnel;Evidence obtaining requestor is people or the tissue for initiating this time evidence obtaining request.
5. the method according to claim 1, wherein in the step S3, corresponding block chain node is to receiving The inspection of data includes but is not limited to check whether various signatures are forged, and whether acquisition terminal is qualified evidence taking equipment, is taken Whether card operation and authorized person are qualified evidence obtaining personnel, and whether evidence obtaining requestor can initiate the secondary evidence obtaining, and Selectively check whether the combination for the time and place and equipment and personnel that acquisition occurs is licensed, whether meets evidence presence Time and place.
6. the method according to claim 1, wherein verifying described in step S4 includes but is not limited to: if area There are the plaintexts of corresponding electronic evidence in block chain, then whether the electronic evidence copy for checking submission is completely the same with it;If it exists Encrypted ciphertext, then whether inspection and the electronic evidence copy submitted are consistent after decrypting, or the evidence copy of submission is pressed After same way encryption, check whether ciphertext is consistent;Cryptographic Hash if it exists is then breathed out the electronic evidence copy of submission using corresponding Uncommon algorithm is made a summary, and checks whether all abstract results are consistent;If being checked again for by above-mentioned all inspections from block The additional information read in chain, i.e. inspection acquisition terminal signature, the legitimacy of each counterpart personnel signature of this evidence obtaining, acquisition Time and location information validity, if pass through if recognize that the evidence copy is effective, otherwise disallow the evidence copy Validity.
CN201811148619.1A 2018-09-29 2018-09-29 A kind of electronic evidence acquisition, preservation and verification method based on block chain Pending CN109344635A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811148619.1A CN109344635A (en) 2018-09-29 2018-09-29 A kind of electronic evidence acquisition, preservation and verification method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811148619.1A CN109344635A (en) 2018-09-29 2018-09-29 A kind of electronic evidence acquisition, preservation and verification method based on block chain

Publications (1)

Publication Number Publication Date
CN109344635A true CN109344635A (en) 2019-02-15

Family

ID=65307899

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811148619.1A Pending CN109344635A (en) 2018-09-29 2018-09-29 A kind of electronic evidence acquisition, preservation and verification method based on block chain

Country Status (1)

Country Link
CN (1) CN109344635A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110232645A (en) * 2019-06-14 2019-09-13 山东省计算中心(国家超级计算济南中心) The electronic evidence of evidence obtaining and block chain is fixed and network forensics method and system based on memory
CN110309197A (en) * 2019-05-24 2019-10-08 平安科技(深圳)有限公司 Project data verification method and its device
CN110445771A (en) * 2019-07-19 2019-11-12 平安科技(深圳)有限公司 Intersection record evidence collecting method, device, medium and server based on block chain
CN110460444A (en) * 2019-06-28 2019-11-15 安徽四创电子股份有限公司 A kind of believable block chain generation method of space-time and equipment
CN110675150A (en) * 2019-09-24 2020-01-10 支付宝(杭州)信息技术有限公司 Federation chain-based compliance management and supervision method and device
CN111031475A (en) * 2019-12-19 2020-04-17 达闼科技成都有限公司 Method for collecting terminal position information, terminal, position collecting terminal and storage medium
CN111339204A (en) * 2020-02-29 2020-06-26 重庆百事得大牛机器人有限公司 Electronic evidence collecting and recording system for legal consultation robot
CN111368080A (en) * 2020-02-29 2020-07-03 重庆百事得大牛机器人有限公司 Electronic evidence collecting and recording method for legal consultation robot
CN111652720A (en) * 2020-05-22 2020-09-11 深圳市网安计算机安全检测技术有限公司 Cloud evidence obtaining method and device, computer equipment and storage medium
CN112134864A (en) * 2020-09-14 2020-12-25 广州大学 Evidence chain platform based on double-block chain structure and implementation method thereof
CN112950416A (en) * 2021-03-11 2021-06-11 全链通有限公司 Block chain-based electronic evidence processing method and device and readable medium
CN113078998A (en) * 2021-04-08 2021-07-06 太原理工大学 Block chain storage verification method for providing address information
US11063761B2 (en) 2019-08-12 2021-07-13 Advanced New Technologies Co., Ltd. Blockchain-based paperless documentation
CN113672998A (en) * 2021-10-25 2021-11-19 广州智建云信息技术有限公司 Anti-counterfeiting method and system for data in construction process of constructional engineering
US11900493B2 (en) 2019-08-12 2024-02-13 Advanced New Technologies Co., Ltd. Blockchain-based dispute resolution

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101939948A (en) * 2008-01-07 2011-01-05 特拉斯特锡德公司 Signature method and device
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN108471350A (en) * 2018-03-28 2018-08-31 电子科技大学成都研究院 Trust data computational methods based on block chain
CN108512653A (en) * 2018-04-18 2018-09-07 成都零光量子科技有限公司 A kind of electronic evidence acquisition and method of servicing based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101939948A (en) * 2008-01-07 2011-01-05 特拉斯特锡德公司 Signature method and device
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN108471350A (en) * 2018-03-28 2018-08-31 电子科技大学成都研究院 Trust data computational methods based on block chain
CN108512653A (en) * 2018-04-18 2018-09-07 成都零光量子科技有限公司 A kind of electronic evidence acquisition and method of servicing based on block chain

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309197B (en) * 2019-05-24 2023-04-18 平安科技(深圳)有限公司 Project data verification method and device
CN110309197A (en) * 2019-05-24 2019-10-08 平安科技(深圳)有限公司 Project data verification method and its device
WO2020237874A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Project data verification method, device, computer apparatus and storage medium
CN110232645A (en) * 2019-06-14 2019-09-13 山东省计算中心(国家超级计算济南中心) The electronic evidence of evidence obtaining and block chain is fixed and network forensics method and system based on memory
WO2020249112A1 (en) * 2019-06-14 2020-12-17 山东省计算中心(国家超级计算济南中心) Method and system for digital evidence fixing and network forensics on basis of memory forensics and blockchain
CN110460444A (en) * 2019-06-28 2019-11-15 安徽四创电子股份有限公司 A kind of believable block chain generation method of space-time and equipment
CN110460444B (en) * 2019-06-28 2022-02-08 安徽四创电子股份有限公司 Space-time credible block chain generation method and device
CN110445771A (en) * 2019-07-19 2019-11-12 平安科技(深圳)有限公司 Intersection record evidence collecting method, device, medium and server based on block chain
CN110445771B (en) * 2019-07-19 2022-07-08 平安科技(深圳)有限公司 Block chain-based interactive record evidence obtaining method, device, medium and server
US11063761B2 (en) 2019-08-12 2021-07-13 Advanced New Technologies Co., Ltd. Blockchain-based paperless documentation
US11900493B2 (en) 2019-08-12 2024-02-13 Advanced New Technologies Co., Ltd. Blockchain-based dispute resolution
US11271740B2 (en) 2019-08-12 2022-03-08 Advanced New Technologies Co., Ltd. Blockchain-based paperless documentation
CN110675150A (en) * 2019-09-24 2020-01-10 支付宝(杭州)信息技术有限公司 Federation chain-based compliance management and supervision method and device
CN111031475A (en) * 2019-12-19 2020-04-17 达闼科技成都有限公司 Method for collecting terminal position information, terminal, position collecting terminal and storage medium
CN111339204A (en) * 2020-02-29 2020-06-26 重庆百事得大牛机器人有限公司 Electronic evidence collecting and recording system for legal consultation robot
CN111368080A (en) * 2020-02-29 2020-07-03 重庆百事得大牛机器人有限公司 Electronic evidence collecting and recording method for legal consultation robot
CN111652720A (en) * 2020-05-22 2020-09-11 深圳市网安计算机安全检测技术有限公司 Cloud evidence obtaining method and device, computer equipment and storage medium
CN111652720B (en) * 2020-05-22 2023-09-05 深圳市网安计算机安全检测技术有限公司 Cloud evidence obtaining method and device, computer equipment and storage medium
CN112134864A (en) * 2020-09-14 2020-12-25 广州大学 Evidence chain platform based on double-block chain structure and implementation method thereof
CN112134864B (en) * 2020-09-14 2023-02-03 广州大学 Evidence chain platform based on double-block chain structure and implementation method thereof
CN112950416A (en) * 2021-03-11 2021-06-11 全链通有限公司 Block chain-based electronic evidence processing method and device and readable medium
CN112950416B (en) * 2021-03-11 2023-11-17 全链通有限公司 Electronic evidence processing method and device based on blockchain and readable medium
CN113078998A (en) * 2021-04-08 2021-07-06 太原理工大学 Block chain storage verification method for providing address information
CN113672998A (en) * 2021-10-25 2021-11-19 广州智建云信息技术有限公司 Anti-counterfeiting method and system for data in construction process of constructional engineering
CN113672998B (en) * 2021-10-25 2022-02-18 广州智建云信息技术有限公司 Anti-counterfeiting method and system for data in construction process of constructional engineering

Similar Documents

Publication Publication Date Title
CN109344635A (en) A kind of electronic evidence acquisition, preservation and verification method based on block chain
US6269446B1 (en) Authenticating images from digital cameras
US7512398B2 (en) Authenticating data units of a mobile communications device
US5499294A (en) Digital camera with apparatus for authentication of images produced from an image file
US5748738A (en) System and method for electronic transmission, storage and retrieval of authenticated documents
US6530023B1 (en) Method and device that validates time of an internal source using an external source
CN108092779A (en) A kind of method and device for realizing electronic signature
US20120260098A1 (en) Storage and Authentication of Data Transactions
PL176458B1 (en) Method of and system for encoding with deposition of encoding keys
US11531746B2 (en) Method for electronic signing of a document by a plurality of signatories
US8230216B2 (en) Information processing apparatus, control method therefor, information processing system, and program
US11606201B2 (en) Cryptographic systems and methods using distributed ledgers
JP2005513641A (en) Method and apparatus for secretly transmitting and authenticating biometric data over a network
KR20060049245A (en) Method and system for electronic voting over a high-security network
CN110995673A (en) Case evidence management method and device based on block chain, terminal and storage medium
US20070050626A1 (en) Document management system, document processing computer, signature generating computer, storage medium storing program for document management, and document management method
US20140321640A1 (en) Apparatus and Method for Generating Digital Images
US20230259899A1 (en) Method, participant unit, transaction register and payment system for managing transaction data sets
CN105490814A (en) Ticket real name authentication method and system based on three-dimensional code
CN108400874A (en) The method that the digital signature function of terminal is authenticated printed text is verified using seal
CN108322311B (en) Method and device for generating digital certificate
CN103973456A (en) Small district management system and method based on digital certificates
CN108737095B (en) Method for carrying out credible operation by using digital current survey record credible model system
EP1119133B1 (en) Method and apparatus for secure data transmission via network
Grinberg End-to-End Authentication: A First Amendment Hook to the Encryption Debate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190215

WD01 Invention patent application deemed withdrawn after publication