CN109918874B - Physical information storage method and device and physical information searching method and device - Google Patents

Physical information storage method and device and physical information searching method and device Download PDF

Info

Publication number
CN109918874B
CN109918874B CN201910193985.7A CN201910193985A CN109918874B CN 109918874 B CN109918874 B CN 109918874B CN 201910193985 A CN201910193985 A CN 201910193985A CN 109918874 B CN109918874 B CN 109918874B
Authority
CN
China
Prior art keywords
digital fingerprint
information
target
storage network
old
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910193985.7A
Other languages
Chinese (zh)
Other versions
CN109918874A (en
Inventor
张辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Du Xiaoman Technology Beijing Co Ltd
Original Assignee
Du Xiaoman Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Du Xiaoman Technology Beijing Co Ltd filed Critical Du Xiaoman Technology Beijing Co Ltd
Priority to CN201910193985.7A priority Critical patent/CN109918874B/en
Publication of CN109918874A publication Critical patent/CN109918874A/en
Application granted granted Critical
Publication of CN109918874B publication Critical patent/CN109918874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application discloses a real object information storage method and device and a real object information searching method and device, which are used for storing a current digital fingerprint verified by a user public key and validity verification of a block chain storage network to the block chain storage network so as to realize information storage of a target real object. Because the current digital fingerprint comprises the old digital fingerprint used for recording the historical information of the target real object, when the stored information in the block chain storage network is used for verifying whether the old digital fingerprint is valid, whether the current information change occurs on the stored information of the target real object can be confirmed, so that no information is left between the current digital fingerprint stored in the block chain storage network and the stored old digital fingerprint, the change information of the target real object is prevented from being left, the integrity of the information storage of the target real object is realized, a subsequent user can accurately find all the historical information of the target real object, the user is prevented from being cheated because the related information of the target real object cannot be known, and the user rights and interests are maintained.

Description

Physical information storage method and device and physical information searching method and device
Technical Field
The application relates to the technical field of internet, in particular to a physical information storage method and device and a physical information searching method and device.
Background
With the development of internet technology, network transactions are receiving increasing attention. However, during the network transaction, the merchant usually hides some bad information of the object to be transacted from the consumer for the benefit, so as to deceive the consumer to purchase the defective object to be transacted at a high price, and the rights and interests of the consumer are damaged.
For example, in the second-hand vehicle transaction process, in order to sell the target vehicle at a higher price, the seller hides a traffic accident of the target vehicle from the buyer, and the buyer cannot know that the traffic accident of the target vehicle has occurred once through the current information of the target vehicle, so that the buyer purchases the target vehicle at a higher price, thereby damaging the rights and interests of the buyer.
In the prior art, in order to avoid being deceived, a consumer usually selects a merchant with better reputation for network transaction. However, since the good-creditworthiness merchant pays attention to the interests, in some cases, the good-creditworthiness merchant may hide some bad information about the object to be traded from the consumer for the interest, and at this time, the consumer cannot obtain the bad information hidden by the merchant, and the consumer will purchase the defective object to be traded at a higher price, which impairs the interests of the consumer.
Disclosure of Invention
In order to solve the technical problems in the prior art, the application provides a method and a device for storing physical information, and a method and a device for searching physical information, which can accurately and quickly search all historical information of a physical object to be traded by using the stored physical information, so that a user can trade under the condition that all information of the physical object to be traded is known, cheating of the user due to the fact that the user does not know some information of the physical object to be traded is avoided, and rights and interests of consumers are maintained.
In order to achieve the above purpose, the technical solution provided by the present application is as follows:
the application provides a real object information storage method, which comprises the following steps:
acquiring the current digital fingerprint of a target real object according to the received information storage request;
when the information storage request is used for requesting to update the storage information of the target real object, verifying the ownership certificate acquired from the current digital fingerprint according to a user public key;
when the ownership certificate passes the verification, sending an old digital fingerprint verification request to a blockchain storage network so that the blockchain storage network can verify whether the old digital fingerprint is valid; wherein the old digital fingerprint authentication request comprises an old digital fingerprint obtained from the current digital fingerprint;
and when the old digital fingerprint is determined to be valid according to the feedback information of the block chain storage network, sending the current digital fingerprint and the ownership certificate to the block chain storage network so that the block chain storage network can carry out uplink storage.
Optionally, before sending the current digital fingerprint and the ownership certificate to the blockchain storage network, the method further includes:
sending the current digital fingerprint and the ownership certificate to a notarization institution so that the notarization institution can judge whether a target user has legal ownership of the target object or not;
the sending the current digital fingerprint and the ownership certificate to the blockchain storage network specifically includes:
and when a confirmation signature fed back by the notarization institution is received, sending the current digital fingerprint, the ownership certificate and the confirmation signature to the block chain storage network.
Optionally, the obtaining a current digital fingerprint of the target real object according to the received information storage request specifically includes:
acquiring the current digital fingerprint of the target real object from the received information storage request; wherein the information storage request comprises a current digital fingerprint of the target real object;
and/or the presence of a gas in the gas,
and acquiring the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object according to the received information storage request, and generating the current digital fingerprint of the target real object according to the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object.
Optionally, when ownership of the target entity changes, before sending an old digital fingerprint verification request to the blockchain storage network, the method further includes:
verifying an old ownership certificate acquired from the old digital fingerprint according to an old user public key;
the sending the old digital fingerprint verification request to the blockchain storage network specifically includes:
when the old ownership certificate is verified, sending an old digital fingerprint verification request to the blockchain storage network.
Optionally, the method further comprises:
when the information storage request is used for requesting to newly build storage information of the target real object, verifying an ownership certificate acquired from the current digital fingerprint according to a user public key;
and when the ownership certificate is verified, sending the current digital fingerprint and the ownership certificate to the blockchain storage network so that the blockchain storage network can create a new chain for storage.
Optionally, the digital fingerprint is generated according to an old digital fingerprint, an ownership certificate and characteristic parameters by using a merkel tree;
the ownership certificate is generated according to the characteristic parameters and a user private key; the user private key corresponds to the user public key one by one.
The application also provides a method for searching the entity information, which comprises the following steps:
acquiring a temporary digital fingerprint of a target real object according to the received information searching request;
sending a temporary digital fingerprint searching request to a block chain storage network so that the block chain storage network can search according to the temporary digital fingerprint; the digital fingerprints stored in the block chain storage network are stored according to the provided real object information storage method;
and acquiring physical information according to the feedback information of the block chain storage network.
Optionally, if the temporary digital fingerprint search request is used to determine whether a target user has a request for ownership of the target physical object, the obtaining physical object information according to the feedback information of the blockchain storage network specifically includes:
acquiring target block information according to the feedback information of the block chain storage network;
and when the digital fingerprint stored in the target block is determined to be matched with the temporary digital fingerprint according to the target block information, and the target block is determined to be the latest block, determining that the target user has ownership of the target real object.
Optionally, if the temporary digital fingerprint search request is used to search all historical information requests of a target real object, the obtaining, according to the feedback information of the block chain storage network, information of the target real object specifically includes:
acquiring target chain information of a target block according to the feedback information of the block chain storage network;
and acquiring all historical information of the target object according to the target chain information.
The present application further provides a material object information storage device, including:
the first acquisition unit is used for acquiring the current digital fingerprint of the target real object according to the received information storage request;
the first verification unit is used for verifying the ownership certificate acquired from the current digital fingerprint according to a user public key when the information storage request is used for requesting to update the storage information of the target real object;
a second verification unit, configured to send an old digital fingerprint verification request to the blockchain storage network when the ownership certificate passes verification, so that the blockchain storage network verifies whether the old digital fingerprint is valid; wherein the old digital fingerprint authentication request comprises an old digital fingerprint obtained from the current digital fingerprint;
and the storage unit is used for sending the current digital fingerprint and the ownership certificate to the blockchain storage network when the old digital fingerprint is determined to be valid according to the feedback information of the blockchain storage network, so that the blockchain storage network can perform uplink storage.
The application also provides a device is seeked to information in kind, includes:
the second acquisition unit is used for acquiring the temporary digital fingerprint of the target object according to the received information searching request;
the searching unit is used for sending a temporary digital fingerprint searching request to the block chain storage network so that the block chain storage network can search according to the temporary digital fingerprint; the digital fingerprints stored in the blockchain storage network are stored according to the physical information storage method in any one of the above modes;
and the third acquisition unit is used for acquiring the real object information according to the feedback information of the block chain storage network.
Compared with the prior art, the method has the advantages that:
according to the entity information storage method, the current digital fingerprint verified through the user public key and the validity of the block chain storage network is stored in the block chain storage network, and information storage of the target entity is achieved. In the method, the current digital fingerprint is used for recording the current information of the target real object, so that the current digital fingerprint stored in the block chain storage network can accurately store the current information of the target real object, and the accuracy of real object information storage is improved. In addition, because the current digital fingerprint also comprises the old digital fingerprint used for recording the historical information of the target object, when the old digital fingerprint is verified to be valid by using the stored information in the block chain storage network, whether the currently changed information occurs on the stored information of the target object can be confirmed, so that no information omission exists between the current digital fingerprint stored in the block chain storage network and the stored old digital fingerprint, the omission of the changed information of the target object is avoided, the information corresponding to the target object in each stage can be stored in the block chain storage network, the integrity of the information storage of the target object is realized, a subsequent user can accurately and quickly find all the historical information of the target object by using all the information of the target object stored in the block chain storage network, and the user can carry out transaction under the condition that all the information of the target object is known, the user is prevented from being cheated because the user does not know certain information of the target object, and the rights and interests of the user are maintained.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic view of an application scenario of a physical information storage method according to an embodiment of the present application;
fig. 2 is a flowchart of a physical object information storage method according to an embodiment of the present application;
FIG. 3 is a flow chart of a current digital fingerprint generation method provided by an embodiment of the present application;
FIG. 4 is a schematic structural diagram of a Merck tree according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of another Merckel tree according to an embodiment of the present application;
FIG. 6 is a flowchart of a method for verifying the validity of an old digital fingerprint according to an embodiment of the present application;
fig. 7 is a flowchart of a physical object information storage method according to a second embodiment of the present application;
fig. 8 is a flowchart of a physical object information searching method according to a third embodiment of the present application;
FIG. 9 is a schematic structural diagram of a physical information storage device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a physical object information searching apparatus according to a second embodiment of the present application.
Detailed Description
In order to solve the technical problem provided in the background art, an embodiment of the present application provides a method for storing object information, where a current digital fingerprint verified by a user public key and a validity of a blockchain storage network is stored in the blockchain storage network, so as to implement information storage of a target object.
For convenience of explanation and understanding of the physical information storage method, the following description will be made with reference to an application scenario shown in fig. 1.
Firstly, an application scene of the physical information storage method is introduced.
In the application scenario shown in fig. 1, the client 101 may communicate with the server 102, the server 102 may store data in any one of the first node 1031, the second node 1032 and the third node 1033 of the blockchain storage network 103, and the server 102 may also read data from any one of the first node 1031, the second node 1032 and the third node 1033 of the blockchain storage network 103.
In addition, when the server 102 stores the target data into any node in the blockchain storage network 103, the node broadcasts the target data to any node in the blockchain storage network 103 except the node, so that the target data is stored in any node in the blockchain storage network 103 except the node, and thus, the data stored in the first node 1031, the data stored in the second node 1032 and the data stored in the third node 1033 are the same.
It should be noted that the above is described by taking an application scenario including one client, one server, and three nodes as an example. However, in the embodiment of the present application, the number of the clients, the number of the servers, and the number of the nodes in the application scenario are not limited, so that the application scenario may include more than one client, more than one server, and more than one node, and the connection relationships among the clients, the servers, and the nodes may all adopt the connection relationship shown in fig. 1, and for the sake of brevity, no further description is provided here.
In the application scenario of the entity information storage method provided in the embodiment of the present application, a communication relationship between the client 101, the server 102, and the blockchain storage network 103 is described above.
Based on the application scenario, the execution process of the physical information storage method provided by the embodiment of the application is as follows:
firstly, a target user acquires current information of a target object by using a client 101, and sends an information storage request comprising the current information of the target object to a server 102 by using the client 101;
secondly, the server 102 acquires the current digital fingerprint of the target real object according to the received information storage request;
when the server 102 determines that the information storage request is used for requesting to update the storage information of the target real object, the server 102 verifies the ownership certificate acquired from the current digital fingerprint according to the user public key;
when the server determines that the ownership certificate passes the user public key verification, the server 102 sends an old digital fingerprint verification request to the first node 1031 of the blockchain storage network 103, so that the first node 1031 verifies whether the old digital fingerprint is valid, and sends feedback information to the server 102;
when the server 102 determines that the old digital fingerprint is valid according to the feedback information of the blockchain storage network 103, the current digital fingerprint and the ownership certificate of the server 102 are sent to the first node 1031 of the blockchain storage network 103, so that the first node 1031 performs uplink storage, and the first node 1031 broadcasts the current digital fingerprint and the ownership certificate to the second node 1032 and the third node 1033, so that the second node 1032 and the third node 1033 both perform uplink storage.
Therefore, through the execution steps of the real object information storage method, the current information of the target real object is stored in the block chain storage network.
In the object information storage method provided by the embodiment of the application, because the current digital fingerprint is used for recording the current information of the target object, the current digital fingerprint stored in the block chain storage network can accurately store the current information of the target object, so that the accuracy of object information storage is improved. In addition, because the current digital fingerprint also comprises the old digital fingerprint used for recording the historical information of the target object, when the old digital fingerprint is verified to be valid by using the stored information in the block chain storage network, whether the currently changed information occurs on the stored information of the target object can be confirmed, so that no information omission exists between the current digital fingerprint stored in the block chain storage network and the stored old digital fingerprint, the omission of the changed information of the target object is avoided, the information corresponding to the target object in each stage can be stored in the block chain storage network, the integrity of the information storage of the target object is realized, a subsequent user can accurately and quickly find all the historical information of the target object by using all the information of the target object stored in the block chain storage network, and the user can carry out transaction under the condition that all the information of the target object is known, the user is prevented from being cheated because the user does not know certain information of the target object, and the rights and interests of the user are maintained.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Method embodiment one
Referring to fig. 2, this figure is a flowchart of a physical information storage method provided in an embodiment of the present application.
The entity information storage method provided by the embodiment of the application comprises the following steps:
s201: and acquiring the current digital fingerprint of the target real object according to the received information storage request.
The specific implementation of this step will be described in detail below.
S202: and when the information storage request is used for requesting to update the storage information of the target real object, verifying the ownership certificate acquired from the current digital fingerprint according to the user public key.
The specific implementation of this step will be described in detail below.
S203: when the ownership certificate passes the verification, sending an old digital fingerprint verification request to the blockchain storage network so that the blockchain storage network can verify whether the old digital fingerprint is valid; wherein the old digital fingerprint authentication request comprises an old digital fingerprint obtained from the current digital fingerprint.
The specific implementation of this step will be described in detail below.
S204: and when the old digital fingerprint is determined to be valid according to the feedback information of the block chain storage network, sending the current digital fingerprint and the ownership certificate to the block chain storage network so that the block chain storage network can carry out uplink storage.
The specific implementation of this step will be described in detail below.
For the above specific implementation steps of the object information storage method provided in the embodiment of the present application, to facilitate understanding and explanation of the object information storage method provided in the embodiment of the present application, specific implementations of S201, S202, S203, and S204 will be described in sequence below.
First, a specific embodiment of S201 will be described.
In S201, the current digital fingerprint is used to record information of the target object in the current state, and the current digital fingerprint includes: characteristic parameters, ownership certificates, and old digital fingerprints.
For ease of explanation and understanding of the current digital fingerprint, the characteristic parameters, the ownership certificate, and the old digital fingerprint will be described in turn below.
The characteristic parameters are used for recording specific characteristic information of the target object such as structure, shape, components, form, color, material and the like in the current state. As an example, when the target real object is a car, the characteristic parameters of the target real object may include characteristic information such as a car body color, a shape and a material of each part of the car, and a type of the car in a current state.
The ownership certificate is used for recording ownership information of the target real object, and the ownership certificate needs to be generated according to the user identification. As an example, when the user identification is the user private key, then the ownership certificate is generated from the user private key. In addition, in order to accurately express ownership of the target real object by the user, the ownership certificate can be generated according to the private key of the user and the characteristic parameters of the target real object.
It should be noted that the user private key and the user public key correspond to each other one to one, and the user public key can be used to verify the ownership certificate generated by the user private key. In addition, the user public key can be calculated according to the user private key, but the user private key cannot be calculated according to the user public key, so that the ownership certificate generated by the user private key not only can verify the ownership of the target real object, but also can ensure the safety of the user private key.
The old digital fingerprint is used for recording the information of the target real object in the previous state, and the old digital fingerprint is stored in the storage space of the client in advance. As an example, when the target real object changes from the first state to the second state, the old digital fingerprint is used to record the information of the target real object in the first state, and the current digital fingerprint is used to record the information of the target real object in the second state.
The above are the relevant content of the characteristic parameters, the ownership certificate, and the old digital fingerprint.
In addition, the current digital fingerprint may be generated by different methods, for example, the current digital fingerprint may be generated from the old digital fingerprint, the ownership certificate, and the feature parameters by using the mercker tree.
As an embodiment, as shown in fig. 3, the current digital fingerprint generation method may specifically include:
s301: and respectively calculating the hash value corresponding to the old digital fingerprint, the hash value corresponding to the ownership certificate and the hash value corresponding to each characteristic parameter by using a hash value calculation method.
As an embodiment, as shown in fig. 4, when the characteristic parameters include: when the characteristic parameter 1 is to the characteristic parameter nth, S301 may specifically include: calculating the hash value corresponding to the old digital fingerprint, the hash value corresponding to the ownership certificate, and the hash values corresponding to the 1 st to the Nth characteristic parameters by using a hash value calculation method to respectively obtain the hash values H of the old digital fingerprint 1 Ownership hash value H 2 1 st characteristic hash value H 3 Characteristic hash value H to Nth N+2
S302: and establishing the Merck tree according to the hash value corresponding to the old digital fingerprint, the hash value corresponding to the ownership certificate and the hash value corresponding to each characteristic parameter.
As an embodiment, S302 may specifically be:
s302a 1: and respectively taking the hash value corresponding to the old digital fingerprint, the hash value corresponding to the ownership certificate and the hash value corresponding to each characteristic parameter as the hash value of one leaf node of the Mercker tree.
In one embodiment, as shown in fig. 4, when the hash value corresponding to the old digital fingerprint is the old fingerprint hash value H 1 The hash value corresponding to the ownership certificate is an ownership hash value H 2 The hash value corresponding to the characteristic parameter is the 1 st characteristic hash value H 3 Characteristic hash value H to Nth N+2 In this case, S302a1 may specifically be: hash value H of old fingerprint 1 Ownership hash value H 2 1 st featureHash value H 3 Characteristic hash value H to Nth N+2 As hash values of the 1 st leaf node to the N +2 th leaf node of the mercker tree, respectively.
S302a 2: and obtaining the hash value of the root node of the Merck tree according to the hash value of each leaf node.
As an example, as shown in FIG. 4, when the Mercker tree includes (N +2) leaf nodes, the hash values of the 1 st leaf node to the N +2 th leaf node are H 1 To H N+2 If so, then S302a2 may specifically be: according to H 1 To H N+2 Obtaining the hash value H of the root node of the Mercker tree R
S302a 3: and establishing a two-layer Merck tree according to the hash values of the leaf nodes and the root node.
As an example, as shown in FIG. 4, when the Mercker tree includes (N +2) leaf nodes and 1 root node, and the hash values of the 1 st leaf node to the N +2 th leaf node are H 1 To H N+2 And the hash value of the root node is H R Then the Merck tree T is obtained 1
The above is a specific implementation manner of S302, in this implementation manner, the hash value corresponding to the old digital fingerprint of the target entity, the hash value corresponding to the ownership certificate, and the hash value corresponding to each feature parameter are respectively used as leaf nodes of the mercker tree, and the root node of the mercker tree is obtained according to the leaf nodes, so as to establish a two-layer mercker tree according to the leaf nodes and the root node.
In addition, since the target real object may be a single real object (for example, a screw or a wood board) that cannot be physically decomposed, or may be a complex real object (for example, a vehicle or a computer) that can be physically decomposed into a plurality of components, in order to enable the feature information of a certain component in the complex real object to be independently found subsequently, a sub-tree corresponding to each component may be established in the mercker tree corresponding to the complex real object. Thus, the present application also provides another embodiment of S302, in which S302 specifically may be:
S302B 1: and decomposing the target real object step by step according to a preset decomposition rule until the target real object is decomposed into parts which cannot be physically decomposed, and acquiring characteristic information of each part as characteristic parameters of the target real object.
The preset decomposition rule may be preset, for example, the preset decomposition rule may be preset according to a specific structure of the target object.
As an embodiment, when the target object includes an M-level part, S302B1 may specifically be: according to a preset decomposition rule, firstly decomposing the target real object into at least one 1 st-level part, then decomposing each 1 st-level part into at least one 2 nd-level part, then decomposing the 2 nd-level part into at least one 3 rd-level part, … … (repeating the process of decomposing the previous-level part into the next-level part), until the M-1 st-level part is decomposed into at least one M-level part; and collecting the characteristic information of each M-level part as the characteristic parameters of the target object.
For ease of explanation and illustration, S302B1 will be described below in connection with two examples.
As a specific embodiment, as shown in fig. 5, when the target object includes a first part, the first part includes a first part and a second part, where neither the first part nor the second part can be decomposed, the first part includes a first characteristic parameter and a second characteristic parameter, and the second part includes a third characteristic parameter and a fourth characteristic parameter, S302B1 may specifically be: firstly, decomposing a target object into a first part according to a preset decomposition rule, and then decomposing the first part into a first part and a second part; secondly, acquiring characteristic information of the first part to obtain a first characteristic parameter and a second characteristic parameter, and acquiring characteristic information of the second part to obtain a third characteristic parameter and a fourth characteristic parameter; and then, taking the fourth characteristic parameter of the first characteristic parameter value as the characteristic parameter of the target real object.
S302B 2: and respectively taking the hash value corresponding to the old digital fingerprint, the hash value corresponding to the ownership certificate and the hash value corresponding to each characteristic parameter as the hash value of one leaf node of the Mercker tree.
As an example, as shown in FIG. 5, when the characteristic parameter includes a first parameterThe characteristic parameters to the fourth characteristic parameters, and the hash value corresponding to the old digital fingerprint is H 1 Hash value H corresponding to ownership certificate 2 The first characteristic parameter to the fourth characteristic parameter respectively correspond to a Hash value H 3 To H 6 If so, then S302B2 may specifically be: taking the hash value corresponding to the old digital fingerprint as H 1 Hash value H corresponding to ownership certificate 2 The first characteristic parameter to the fourth characteristic parameter respectively correspond to a Hash value H 3 To H 6 As hash values of the 1 st leaf node to the 6 th leaf node of the mercker tree, respectively.
S302B 3: and establishing a subtree corresponding to each part according to the hash value of each leaf node and the characteristic parameters of each part.
As an example, as shown in fig. 5, when the first part includes a first feature parameter and a second feature parameter, the second part includes a third feature parameter and a fourth feature parameter, and the first feature parameter to the fourth feature parameter respectively correspond to leaf nodes 3 to 6, then S302B3 may specifically be: obtaining a hash value H of a root node of a first sub-tree according to hash values of a3 rd leaf node and a 4 th leaf node CT1 And according to the 3 rd leaf node, the 4 th leaf node and the first sub-tree T C1 The root node of the first part establishes a first subtree T corresponding to the first part C1 (ii) a Obtaining a second sub-tree T according to the hash values of the 5 th leaf node and the 6 th leaf node C2 Hash value H of root node of CT1 And establishing a second sub-tree T corresponding to the second part according to the 5 th leaf node, the 6 th leaf node and the second sub-tree root node C2
S302B 4: and according to the leaf nodes corresponding to the old digital fingerprints and the ownership certificates, the subtrees corresponding to the parts and a preset decomposition rule, establishing the subtrees corresponding to the parts at each stage from bottom to top step by step until establishing the Merck tree corresponding to the target real object.
As an example, as shown in fig. 5, when the target object includes a first part, the first part includes a first part and a second part, and the first part corresponds to the first subtree T C1 The second part corresponds to the second subtree T C2 (ii) a Old digital fingerprint corresponding to the 1 st leaf node and ownership certificate corresponding to the 2 nd leafNode, S302B4 may specifically be: according to the first sub-tree T C1 Hash value H of root node of CT1 And a second subtree T C2 Hash value H of root node of CT1 To obtain the third subtree T C3 Hash value H of root node of CT3 And according to the first subtree T C1 And a second subtree T C2 Obtaining a third subtree T corresponding to the first part C3 (ii) a According to the hash value H1 of the 1 st leaf node, the hash value H2 of the 2 nd leaf node and the third subtree T C3 Hash value H of root node of CT3 Obtaining the hash value H of the root node of the target real object R (ii) a According to the 1 st leaf node, the 2 nd leaf node and the third sub-tree T C3 Establishing a Merck tree T corresponding to the target object 2
It should be noted that, the foregoing embodiment is described by taking an example that a target real object includes two stages of parts, however, the digital fingerprint generation method provided in the embodiment of the present application may be applied to a target real object including at least one stage of parts, and a generation method of a mercker tree corresponding to the target real object including at least one stage of parts is the same as that provided in the foregoing embodiment, and is not described herein again for brevity.
The above is another embodiment of S302, in this embodiment, not only the mercker tree of the target entity but also subtrees corresponding to different parts are established, so that in the subsequent information search process, not only the overall feature information of the target entity can be obtained, but also the feature information of each part of the target entity can be independently obtained, which is beneficial for the target user to obtain the actual state of each part of the target entity.
S303: and taking the hash value of the root node of the Mercker tree as the current digital fingerprint.
The foregoing provides a specific embodiment of the current digital fingerprint generation method, in which the current digital fingerprint may be determined according to a merkel tree established based on an old digital fingerprint, an ownership certificate, and characteristic parameters, so that the current digital fingerprint can record not only current information of the target real object, but also information before the state of the target real object is updated. In addition, in this embodiment, the current digital fingerprint may also be determined based on the old digital fingerprint, the ownership certificate, the feature parameters, and the mercker tree established by the structure of the target real object, so that the current digital fingerprint may also record feature information corresponding to different parts in the target real object, so as to subsequently and independently find the feature information of a certain part in the target real object.
In addition, since the current digital fingerprint generation method provided above can be executed at both the client and the server, for the two cases, S201 can adopt two different embodiments, which will be described in turn below.
As an implementation manner, when the client generates a current digital fingerprint according to the old digital fingerprint, the ownership certificate, and the characteristic parameters, and sends an information storage request including the current digital fingerprint to the server, then S201 may specifically be: and the server acquires the current digital fingerprint of the target real object from the received information storage request.
As another embodiment, when the client sends the old digital fingerprint, the ownership certificate, and the characteristic parameters of the target entity to the server, S201 may specifically be: the server acquires the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object according to the received information storage request; and the server generates the current digital fingerprint of the target real object according to the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object.
The foregoing provides a specific implementation manner of S201, in which when the information storage request sent by the client to the server includes the current digital fingerprint of the target real object, the server may obtain the current digital fingerprint of the target real object from the received information storage request; when the information storage request sent by the client to the server comprises the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object but does not comprise the current digital fingerprint of the target real object, the server acquires the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object according to the received information storage request; and the server generates the current digital fingerprint of the target real object according to the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object. Therefore, the current digital fingerprint can be generated not only in the client side but also in the server, and the flexibility of the current digital fingerprint generation is improved.
A specific embodiment of S202 is described below.
In S202, the user public key and the user private key correspond to each other one by one, and the user public key is stored in the server.
In addition, the user public key may be used to verify an ownership certificate generated according to the user private key, and the user public key may be used to verify the ownership certificate in various embodiments, which will be described below by taking an embodiment as an example.
As a specific implementation manner, S202 may specifically be:
s2021: and when the information storage request is used for requesting to update the storage information of the target real object, acquiring the ownership certificate according to the current digital fingerprint.
S2022: and acquiring the target characteristic parameters according to the ownership certificate and the user public key.
S2023: judging whether the target characteristic parameters are matched with the characteristic parameters acquired from the current digital fingerprint, if so, executing S2024; if not, go to S2025.
S2024: and determining that the ownership certificate passes the verification of the user public key.
S2025: it is determined that the ownership certificate does not pass the verification of the user's public key.
In this embodiment, the target feature parameter is obtained according to the user public key and the ownership certificate, and then it is determined whether the ownership certificate passes the verification of the user public key by determining whether the target feature parameter matches the feature parameter obtained from the current digital fingerprint. Therefore, in the embodiment, whether the target user has ownership over the target real object can be preliminarily determined by using the verification of the user public key, and if the target user has ownership over the target real object, the target user is allowed to update the information of the target real object, so that the safety and the reasonability of the update of the information of the target real object are ensured, the malicious modification of the information of the target real object by an illegal user is avoided, and the safety and the accuracy of the information of the target real object are improved.
A specific embodiment of S203 is described below.
In S203, the blockchain storage network may serve as a database for storing current information and historical information of the target object.
The blockchain storage network may be a network of at least one storage node; moreover, each storage node is connected with at least one server, and can receive a request for adding, deleting and modifying data sent by the server connected with the storage node. In addition, since different nodes can be connected through P2P and data synchronization is performed, data stored in different storage nodes is the same in the blockchain storage network.
In addition, in the blockchain storage network, each storage node can utilize a blockchain formed by at least one block for storage, and the synchronization of the storage data among different storage nodes can be performed through a consensus algorithm (for example, a raft algorithm), so that the storage data in each storage node in the blockchain storage network is ensured to be the same.
For the convenience of understanding and explaining the storage manner of the storage node, the related contents of the block chain and the blocks will be described in turn.
Each block chain is used for storing the current digital fingerprints of the same target object at different times so as to record the information parameters of the same target object at different times; furthermore, each block chain is a chain of at least one block in chronological order.
Each block is used to store a block chain ID, a block ID, a current digital fingerprint, and a timestamp, and only one current digital fingerprint can be stored in each block.
The blockchain ID is used to uniquely identify the blockchain in which the block is located in the blockchain storage network, and each blockchain ID can be determined according to the current digital fingerprint stored in the first block in the blockchain. For example, when the current digital fingerprint is represented by a hash value, then each blockchain ID may be the current digital fingerprint stored for the first chunk on the blockchain.
The block ID is used to uniquely identify the block in the blockchain in which the block is located, and the block ID corresponding to each block is numbered in the order in which the block is added to the blockchain in which the block is located. For example, when a first block, a second block, and a third block are added to a first block chain in sequence in chronological order, the block ID of the first block may be 0, the block ID of the second block may be 1, and the block ID of the third block may be 2.
The time stamp is used to record the generation time of the block.
The above is the related knowledge of the block chain and the block.
In addition, since the information parameters of each target real object at different times are stored in the blockchain storage network, the blockchain storage network can respond to a digital fingerprint search request, a digital fingerprint addition request, a new chain creation request, a digital fingerprint verification request sent by the server, a digital fingerprint search request according to a user public key, and the like.
Based on the related content of the above-described blockchain storage network, S203 may specifically be: when the ownership certificate is verified, the server acquires the old digital fingerprint from the current digital fingerprint and sends a verification request including the old digital fingerprint to the blockchain storage network so that the blockchain storage network verifies the validity of the old digital fingerprint.
In the present application, the method for verifying the validity of the old digital fingerprint can adopt various embodiments, and one embodiment will be described as an example below.
As an embodiment, as shown in fig. 6, the verification of the validity of the old digital fingerprint may specifically be:
s601: the block chain storage network searches according to the old digital fingerprint to determine whether a digital fingerprint matched with the old digital fingerprint exists in a storage node of the block chain storage network; if yes, go to S602; if not, go to S605.
S602: and the block chain storage network acquires block information for storing the old digital fingerprint according to the old digital fingerprint.
S603: judging whether the block is the latest block on the block chain where the block is located according to the block information, if so, executing S604; if not, go to S605.
S604: the old digital fingerprint is determined to be valid and feedback information including the validity of the old digital fingerprint is sent to the server.
S605: determining that the old digital fingerprint is invalid, and transmitting feedback information including the invalidity of the old digital fingerprint to the server.
In the above specific implementation manner of the method for verifying validity of an old digital fingerprint provided by the present application, in the implementation manner, it is first determined whether a digital fingerprint matching the old digital fingerprint is stored in a block chain storage network, and if so, it indicates that the old digital fingerprint provided by a target user is historical information of a target object, at this time, it needs to further determine whether a block in which the old digital fingerprint is stored is a latest block on a block chain where the block is located, and if so, it indicates that the old digital fingerprint provided by the target user is a state of the target object before information update is performed, and at this time, it may be determined that the old digital fingerprint is valid. Therefore, the old digital fingerprint provided by the target user is ensured to be used for recording the latest historical information which is far away from the current state of the target object, so that the current digital fingerprint generated according to the old digital fingerprint is ensured to be updated based on the information recorded by the old digital fingerprint, and the omission of the historical change information of the target object is avoided.
The above is a specific implementation manner of S203, in this implementation manner, the server may verify validity of the old digital fingerprint by using data stored in the blockchain storage network, so as to ensure that a state of the target real object corresponding to the current digital fingerprint and a state of the target real object corresponding to the old digital fingerprint are two adjacent states, thereby ensuring that information recorded by the current digital fingerprint is updated based on information recorded by the old digital fingerprint, and avoiding omission of historical change information of the target real object.
A specific embodiment of S204 is described below.
As an embodiment, S204 may specifically be:
s2041: the server determines whether the old digital fingerprint is valid according to the feedback information of the block chain storage network, and if so, executes S2042; if not, go to S2045.
S2042: the server sends the current digital fingerprint and the ownership certificate to the blockchain storage network.
S2043: and the block chain storage network acquires the old digital fingerprint according to the current digital fingerprint, searches according to the old digital fingerprint and acquires the old block in which the old digital fingerprint is stored.
S2044: the blockchain storage network creates a new block after the old block and stores the current digital fingerprint, ownership certificate, timestamp, block ID of the new block, blockchain ID into the new block.
Wherein, the timestamp can be obtained according to the creation time of the new block; the block ID of the new block can be obtained by increasing the block ID of the old block; the block chain ID may be obtained from the block chain ID in the old block.
It should be noted that, since the old digital fingerprint in the current digital fingerprint stored in the new block can associate and connect the new block with the old block, the old block can be searched according to the old digital fingerprint information in the new block in the subsequent searching process.
S2045: and the server sends prompt information of storage failure to the client.
In this embodiment, the server may store the current digital fingerprint verified by the user public key verification and the blockchain storage network into the blockchain storage network, so as to complete updating of the storage information of the target entity, ensure that the corresponding information in all states of the target entity is stored in the blockchain storage network, and ensure the integrity of the history information of the target entity.
In the embodiment, the current digital fingerprint verified by the user public key and the validity of the blockchain storage network is stored in the blockchain storage network, so that the information storage of the target entity is realized. In the method, the current digital fingerprint is used for recording the current information of the target real object, so that the current digital fingerprint stored in the block chain storage network can accurately store the current information of the target real object, and the accuracy of real object information storage is improved. In addition, because the current digital fingerprint also comprises the old digital fingerprint used for recording the historical information of the target object, when the old digital fingerprint is verified to be valid by using the stored information in the block chain storage network, whether the currently changed information occurs on the stored information of the target object can be confirmed, so that no information omission exists between the current digital fingerprint stored in the block chain storage network and the stored old digital fingerprint, the omission of the changed information of the target object is avoided, the information corresponding to the target object in each stage can be stored in the block chain storage network, the integrity of the information storage of the target object is realized, a subsequent user can accurately and quickly find all the historical information of the target object by using all the information of the target object stored in the block chain storage network, and the user can carry out transaction under the condition that all the information of the target object is known, the user is prevented from being cheated because the user does not know certain information of the target object, and the rights and interests of the user are maintained.
In the entity information storage method provided in the above embodiment of the method, the current digital fingerprint verified by the user public key verification and the validity verification of the blockchain storage network is stored in the blockchain storage network, so that the information storage of the target entity is realized.
In addition, in order to further ensure the safety of physical information storage and the integrity of historical information, the embodiment of the present application further provides another physical information storage method, which will be explained and explained below with reference to the accompanying drawings.
Method embodiment two
For the sake of brevity, the same contents as those in the first method embodiment are not described again.
Referring to fig. 7, this figure is a flowchart of a physical information storage method provided in the second embodiment of the present application.
The entity information storage method provided by the embodiment of the application specifically comprises the following steps:
s701: and acquiring the current digital fingerprint of the target real object according to the received information storage request.
The specific implementation of S701 is the same as that of S201, and is not described herein again.
It should be noted that, if the current digital fingerprint is the digital fingerprint of the target real object acquired for the first time, the old digital fingerprint may be a preset value; the preset value is a preset value, for example, the preset value may be 0.
S702: and when the information storage request is used for requesting to update the storage information of the target real object, verifying the ownership certificate acquired from the current digital fingerprint according to the user public key.
The specific implementation of S702 is the same as that of S202, and is not described herein again.
S703: when the ownership certificate passes the verification, sending an old digital fingerprint verification request to the blockchain storage network so that the blockchain storage network can verify whether the old digital fingerprint is valid; wherein the old digital fingerprint authentication request comprises an old digital fingerprint obtained from the current digital fingerprint.
The specific implementation of S703 is the same as that of S203, and is not described herein again.
S704: and when the old digital fingerprint is determined to be valid according to the feedback information of the block chain storage network, the current digital fingerprint and the ownership certificate are sent to the notarization institution, so that the notarization institution judges whether the target user has the legal ownership of the target real object or not.
The notarization institution can determine whether the target user has legal ownership of the target object or not according to the current digital fingerprint and the ownership certificate; moreover, when the justice authority determines that the target user has legal ownership of the target entity, the justice authority will send feedback including a confirmation signature to the server; when the justice authority determines that the target user does not have legal ownership of the target physical object, the justice authority will send feedback to the server including the verification failure.
Therefore, the server can know whether the target user has legal ownership of the target real object or not according to the feedback of the justice mechanism, and therefore the safety of real object information storage can be further guaranteed.
S705: and when the confirmation signature fed back by the notarization institution is received, the current digital fingerprint, the ownership certificate and the confirmation signature are sent to the block chain storage network so as to facilitate the block chain storage network to carry out uplink storage.
As an embodiment, S705 may specifically be:
s7051: and when the confirmation signature fed back by the notarization institution is received, sending the current digital fingerprint, the ownership certificate and the confirmation signature to the block chain storage network.
S7052: the blockchain storage network verifies the validation signature.
S7053: and when the signature is verified, acquiring the old digital fingerprint according to the current digital fingerprint by the block chain, searching according to the old digital fingerprint, and acquiring the old block in which the old digital fingerprint is stored.
The specific implementation of S7053 is the same as the specific implementation of S2043, and is not described herein again.
S7054: the blockchain storage network creates a new block after the old block and stores the current digital fingerprint, ownership certificate, timestamp, block ID of the new block, blockchain ID into the new block.
The specific implementation of S7054 is the same as the specific implementation of S2044, and is not described herein again.
The above is a specific embodiment of S705.
S706: and when the information storage request is used for requesting storage information of a newly-built target real object, verifying the ownership certificate acquired from the current digital fingerprint according to the user public key.
When the information storage request is used for requesting storage information of a newly-built target real object, it indicates that no information of the target real object is stored in the blockchain storage network, and at this time, a new chain may be built for the target real object in the blockchain storage network, and the new chain is used for storing information of the target real object in different change states.
The specific implementation of "verifying the ownership certificate obtained from the current digital fingerprint according to the user public key" in S706 is the same as the specific implementation of "verifying the ownership certificate obtained from the current digital fingerprint according to the user public key" in S202, and is not described herein again.
S707: when the ownership certificate is verified, the current digital fingerprint and the ownership certificate are sent to the blockchain storage network, so that a new chain is created by the blockchain storage network for storage.
As an embodiment, S707 may specifically be:
s7071: when the ownership certificate is verified, the server sends the current digital fingerprint and the ownership certificate to the blockchain storage network.
S7072: a new chain is established in the blockchain storage network, and the blockchain ID of the new chain is obtained.
The blockchain ID of the new chain may be obtained from the current digital fingerprint, e.g., if the current digital fingerprint is a hash value, the blockchain ID of the new chain may be the current digital fingerprint.
S7073: a first chunk on the chain is generated and the current digital fingerprint, ownership certificate, timestamp, chunk ID of the first chunk, and chunk chain ID are stored into the first chunk.
Wherein, the block ID of the first block is 0; the blockchain ID is the blockchain ID of the new chain.
The above is an embodiment of S707.
In order to further ensure the security of information storage, the present application further provides another embodiment of S707, where S707 may specifically be:
s7071: and when the ownership certificate passes the verification, the server sends the current digital fingerprint and the ownership certificate to the notarization institution so that the notarization institution judges whether the target user has the legal ownership of the target real object.
S7072: and when receiving the confirmation signature fed back by the notarization institution, the server sends the current digital fingerprint and the ownership certificate to the block chain storage network.
S7073: the blockchain storage network verifies the validation signature.
S7074: when the signature is verified, a new chain is established in the blockchain storage network, and the blockchain ID of the new chain is obtained.
S7075: a first chunk on the chain is generated and the current digital fingerprint, ownership certificate, timestamp, chunk ID of the first chunk, and chunk chain ID are stored into the first chunk.
The above is another embodiment of S707.
In the above specific implementation manner of the physical information storage method provided in the embodiment of the method of the present application, before the step of sending the current digital fingerprint and the ownership certificate to the blockchain storage network is executed, the method further includes: and sending the current digital fingerprint and the ownership certificate to a notarization institution so that the notarization institution judges whether the target user has legal ownership of the target real object. Therefore, the legal ownership of the target entity by the target user can be further ensured, and the safety of the current digital fingerprint sent to the block chain storage network by the server is further ensured, so that the safety of information storage of the target entity is further ensured. In addition, when the target real object is subjected to information storage for the first time, the server sends the current digital fingerprint verified by the user public key to the block chain storage network, so that the block chain storage network creates a new chain for information storage of the target real object.
In addition, in order to further improve the security of information storage, an embodiment of the present application further provides another implementation of a physical object information storage method, where in this implementation, when ownership of a target physical object changes, before sending an old digital fingerprint verification request to a blockchain storage network, the method further includes: the old ownership certificate obtained from the old digital fingerprint is verified against the old user public key. At this time, when the old ownership certificate is verified, an old digital fingerprint verification request is sent to the blockchain storage network. Therefore, the owner of the target real object before the ownership change and the owner of the target real object after the ownership change are ensured to participate in the process of updating the storage information of the target real object at the same time, and the safety of information updating of the target real object is further ensured.
In the first and second method embodiments, a specific implementation of the physical object information storage method is provided, in which the server stores the current digital fingerprint used for recording the target physical object information in the blockchain storage network, so that the blockchain storage network can store information of the target physical object in all states.
Therefore, in order to obtain information of a target physical object from a block chain storage network so as to facilitate the authorization of the target physical object and query of historical information, an embodiment of the present application further provides a physical object information searching method, which will be explained and explained below with reference to the accompanying drawings.
Method embodiment three
Referring to fig. 8, this figure is a flowchart of a physical object information searching method provided in the third embodiment of the present application.
The method for searching the physical information provided by the embodiment of the application comprises the following steps:
s801: and according to the received information searching request, acquiring the temporary digital fingerprint of the target real object.
The information searching request can be various information searching requests, for example, the information searching request can be a request for confirming ownership of the target physical object, and can also be a request for searching all historical information of the target physical object.
S802: sending a temporary digital fingerprint searching request to the blockchain storage network so that the blockchain storage network can search according to the temporary digital fingerprint; the digital fingerprints stored in the block chain storage network are stored according to the physical information storage method provided in the first method embodiment or the second method embodiment.
The temporary digital fingerprint searching requests corresponding to different information searching requests are different, for example, when the information searching request is a request for confirming ownership of a target real object, the temporary digital fingerprint searching request is used for determining whether a target user has an ownership request of the target real object; and when the information searching request is a request for searching all the historical information of the target real object, the temporary digital fingerprint searching request is used for searching all the historical information requests of the target real object.
S803: and acquiring the physical information according to the feedback information of the block chain storage network.
And aiming at different temporary digital fingerprint searching requests, the block chain storage network sends different feedback information to the server, and at the moment, the server obtains different physical information according to the different feedback information.
For ease of understanding and explanation, two embodiments will be described below as examples.
As an embodiment, when the temporary digital fingerprint search request is used to determine whether the target user has an ownership request of the target real object, then S803 may specifically be:
s8031: and acquiring target block information according to the feedback information of the block chain storage network.
S8032: and when the digital fingerprint stored in the target block is determined to be matched with the temporary digital fingerprint according to the target block information and the target block is determined to be the latest block, determining that the target user has ownership of the target object.
The above is an embodiment of S803, in which the server can confirm whether the target user has ownership of the target entity according to the feedback information sent by the blockchain storage network.
In addition, the present application example further provides another implementation manner of S803, and in this implementation manner, S803 may specifically be:
S803A: and acquiring target chain information of the target block according to the feedback information of the block chain storage network.
S803B: and acquiring all historical information of the target object according to the target chain information.
The above is another embodiment of S803, in which the server can obtain all the history information of the target entity according to the feedback information sent by the blockchain storage network, so that the target user can accurately obtain all the information related to the target entity according to the history information.
The above is a specific embodiment of S803.
In the embodiment, the target user can accurately and quickly find all the historical information of the target entity by using all the information of the target entity stored in the block chain storage network, so that the user can perform transaction under the condition that all the information of the target entity is known, the user is prevented from being cheated because the user does not know some information of the target entity, and the rights and interests of the user are maintained.
Based on the physical information storage method provided in the first method embodiment and the second method embodiment, the present application further provides a physical information storage device, which will be explained and explained below with reference to the accompanying drawings.
Apparatus embodiment one
Referring to fig. 9, the figure is a schematic structural diagram of a physical information storage device provided in the embodiment of the present application.
The utility model provides a material object information storage device includes:
a first obtaining unit 901, configured to obtain a current digital fingerprint of a target entity according to the received information storage request.
A first verifying unit 902, configured to verify the ownership certificate obtained from the current digital fingerprint according to the user public key when the information storage request is used to request to update the storage information of the target entity.
A second verification unit 903, configured to send an old digital fingerprint verification request to the blockchain storage network when the ownership certificate passes verification, so that the blockchain storage network verifies whether the old digital fingerprint is valid; wherein the old digital fingerprint verification request comprises an old digital fingerprint obtained from the current digital fingerprint.
The storage unit 904 is configured to send the current digital fingerprint and the ownership certificate to the blockchain storage network when it is determined that the old digital fingerprint is valid according to the feedback information of the blockchain storage network, so that the blockchain storage network performs uplink storage.
As an embodiment, in order to further improve the security and integrity of the physical information storage, the physical information storage apparatus further includes:
and the third verification unit is used for sending the current digital fingerprint and the ownership certificate to the notarization institution when the old digital fingerprint is determined to be valid according to the feedback information of the block chain storage network, so that the notarization institution judges whether the target user has the legal ownership of the target real object.
At this time, the storage unit 904 is specifically configured to, when receiving the confirmation signature fed back by the notarization authority, send the current digital fingerprint, the ownership certificate, and the confirmation signature to the blockchain storage network, so that the blockchain storage network performs uplink storage.
As an embodiment, in order to further improve the security and integrity of the physical information storage, the first obtaining unit 901 specifically includes:
the system comprises a database, a database and a database, wherein the database is used for storing information of a target real object; the information storage request comprises the current digital fingerprint of the target real object;
and/or the presence of a gas in the gas,
and the system is used for acquiring the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object according to the received information storage request, and generating the current digital fingerprint of the target real object according to the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object.
As an embodiment, in order to further improve the security and integrity of the physical information storage, when the ownership of the target physical object is changed, the physical information storage apparatus further includes:
the fourth verification unit is used for verifying the old ownership certificate acquired from the old digital fingerprint according to the old user public key;
at this time, the second verifying unit 903 is specifically configured to send an old digital fingerprint verification request to the blockchain storage network when the ownership certificate passes verification and the old ownership certificate passes verification.
As an embodiment, in order to further improve the security and integrity of the physical information storage, the physical information storage apparatus further includes:
and the fifth verification unit is used for verifying the ownership certificate acquired from the current digital fingerprint according to the user public key when the information storage request is used for requesting the storage information of the newly-built target real object.
And the sixth verification unit is used for sending the current digital fingerprint and the ownership certificate to the blockchain storage network when the ownership certificate passes verification so as to create a new chain for storage by the blockchain storage network.
As an implementation manner, in order to further improve the security and integrity of the physical information storage, the digital fingerprint is generated according to the old digital fingerprint, the ownership certificate and the characteristic parameters by using the mercker tree;
the ownership certificate is generated according to the characteristic parameters and the private key of the user; the user private key and the user public key correspond to each other one by one.
In the above specific implementation manner of the object information storage device provided in the first embodiment of the application device, in this implementation manner, the current digital fingerprint verified by the user public key verification and the validity verification of the blockchain storage network is stored in the blockchain storage network, so that information storage of the target object is achieved. In the device, because the current digital fingerprint is used for recording the current information of the target real object, the current digital fingerprint stored in the block chain storage network can accurately store the current information of the target real object, thereby improving the accuracy of the real object information storage. In addition, because the current digital fingerprint also comprises the old digital fingerprint used for recording the historical information of the target object, when the old digital fingerprint is verified to be valid by using the stored information in the block chain storage network, whether the currently changed information occurs on the stored information of the target object can be confirmed, so that no information omission exists between the current digital fingerprint stored in the block chain storage network and the stored old digital fingerprint, the omission of the changed information of the target object is avoided, the information corresponding to the target object in each stage can be stored in the block chain storage network, the integrity of the information storage of the target object is realized, a subsequent user can accurately and quickly find all the historical information of the target object by using all the information of the target object stored in the block chain storage network, and the user can carry out transaction under the condition that all the information of the target object is known, the user is prevented from being cheated because the user does not know certain information of the target object, and the rights and interests of the user are maintained.
Based on the first method embodiment, the second method embodiment, the third method embodiment and the first device embodiment, the present application further provides a device for searching physical information, which will be explained and explained below with reference to the accompanying drawings.
Device embodiment II
Referring to fig. 10, this figure is a schematic structural diagram of a physical information searching apparatus provided in a second embodiment of the apparatus of the present application.
The utility model provides a device is seeked to material object information includes:
a second obtaining unit 1001, configured to obtain a temporary digital fingerprint of a target entity according to the received information search request.
A searching unit 1002, configured to send a temporary digital fingerprint searching request to a blockchain storage network, so that the blockchain storage network searches according to the temporary digital fingerprint; the digital fingerprints stored in the block chain storage network are stored according to the physical information storage method provided by the first method embodiment or the second method embodiment.
A third obtaining unit 1003, configured to obtain the physical information according to the feedback information of the blockchain storage network.
As an embodiment, in order to further improve accuracy and efficiency of searching for physical information, the third obtaining unit 1003 is specifically configured to:
the first acquisition subunit is used for acquiring target block information according to feedback information of the block chain storage network when the temporary digital fingerprint search request is used for determining whether a target user has an ownership request of a target real object;
and the second acquisition subunit is used for determining that the target user has ownership of the target object when the digital fingerprint stored in the target block is determined to be matched with the temporary digital fingerprint according to the target block information and the target block is determined to be the latest block.
As an embodiment, in order to further improve accuracy and efficiency of searching for physical information, the third obtaining unit 1003 is specifically configured to:
the third obtaining subunit is configured to, if the temporary digital fingerprint search request is used to search all historical information requests of the target object, obtain target chain information where the target block is located according to the feedback information of the block chain storage network;
and the fourth acquisition subunit is used for acquiring all historical information of the target object according to the target chain information.
In this embodiment, the target user can accurately and quickly find all the historical information of the target entity by using all the information of the target entity stored in the block chain storage network, so that the user can perform a transaction under the condition that all the information of the target entity is known, the user is prevented from being cheated because the user does not know some information of the target entity, and the rights and interests of the user are maintained.
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b and c may be single or plural.
The foregoing is merely a preferred embodiment of the invention and is not intended to limit the invention in any manner. Although the present invention has been described with reference to the preferred embodiments, it is not intended to be limited thereto. Those skilled in the art can make numerous possible variations and modifications to the present teachings, or modify equivalent embodiments to equivalent variations, without departing from the scope of the present teachings, using the methods and techniques disclosed above. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical essence of the present invention are still within the scope of the protection of the technical solution of the present invention, unless the contents of the technical solution of the present invention are departed.

Claims (11)

1. A real object information storage method is characterized by comprising the following steps:
acquiring the current digital fingerprint of a target real object according to the received information storage request;
when the information storage request is used for requesting to update the storage information of the target real object, verifying the ownership certificate acquired from the current digital fingerprint according to a user public key;
when the ownership certificate passes the verification, sending an old digital fingerprint verification request to a blockchain storage network so that the blockchain storage network can verify whether the old digital fingerprint is valid; wherein the old digital fingerprint authentication request comprises an old digital fingerprint obtained from the current digital fingerprint;
and when the old digital fingerprint is determined to be valid according to the feedback information of the block chain storage network, sending the current digital fingerprint and the ownership certificate to the block chain storage network so that the block chain storage network can carry out uplink storage.
2. The method of claim 1, wherein prior to sending the current digital fingerprint and the ownership certificate to the blockchain storage network, further comprising:
sending the current digital fingerprint and the ownership certificate to a notarization institution so that the notarization institution can judge whether a target user has legal ownership of the target object or not;
the sending the current digital fingerprint and the ownership certificate to the blockchain storage network specifically includes:
and when a confirmation signature fed back by the notarization institution is received, sending the current digital fingerprint, the ownership certificate and the confirmation signature to the block chain storage network.
3. The method according to claim 1, wherein the obtaining a current digital fingerprint of the target entity according to the received information storage request specifically comprises:
acquiring the current digital fingerprint of the target real object from the received information storage request; wherein the information storage request comprises a current digital fingerprint of the target real object;
and/or the presence of a gas in the gas,
and acquiring the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object according to the received information storage request, and generating the current digital fingerprint of the target real object by using the Mercker tree according to the old digital fingerprint, the ownership certificate and the characteristic parameters of the target real object.
4. The method according to claim 1, wherein before sending the old digital fingerprint verification request to the blockchain storage network when the ownership of the target entity is changed, further comprising:
verifying an old ownership certificate acquired from the old digital fingerprint according to an old user public key;
the sending the old digital fingerprint verification request to the blockchain storage network specifically includes:
and when the old ownership certificate is verified, sending an old digital fingerprint verification request to the blockchain storage network.
5. The method of claim 1, further comprising:
when the information storage request is used for requesting to newly build storage information of the target real object, verifying an ownership certificate acquired from the current digital fingerprint according to a user public key;
and when the ownership certificate is verified, sending the current digital fingerprint and the ownership certificate to the blockchain storage network so that the blockchain storage network can create a new chain for storage.
6. The method of claim 1, wherein the digital fingerprint is generated from old digital fingerprints, ownership certificates, and feature parameters using a merkel tree;
the ownership certificate is generated according to the characteristic parameters and a user private key; the user private key corresponds to the user public key one by one.
7. A method for searching physical information is characterized by comprising the following steps:
acquiring a temporary digital fingerprint of a target real object according to the received information searching request;
sending a temporary digital fingerprint searching request to a block chain storage network so that the block chain storage network can search according to the temporary digital fingerprint; wherein, the digital fingerprints stored in the block chain storage network are stored according to the physical information storage method of any one of claims 1 to 6;
and acquiring physical information according to the feedback information of the block chain storage network.
8. The method according to claim 7, wherein if the temporary digital fingerprint search request is used to determine whether a target user has a request for ownership of the target physical object, the obtaining physical object information according to the feedback information of the blockchain storage network specifically comprises:
acquiring target block information according to the feedback information of the block chain storage network;
and when the digital fingerprint stored in the target block is determined to be matched with the temporary digital fingerprint according to the target block information, and the target block is determined to be the latest block, determining that the target user has ownership of the target real object.
9. The method according to claim 7, wherein if the temporary digital fingerprint search request is used for searching all historical information requests of a target entity, the obtaining entity information according to the feedback information of the blockchain storage network specifically includes:
acquiring target chain information of a target block according to the feedback information of the block chain storage network;
and acquiring all historical information of the target object according to the target chain information.
10. A physical information storage device, comprising:
the first acquisition unit is used for acquiring the current digital fingerprint of the target real object according to the received information storage request;
the first verification unit is used for verifying the ownership certificate acquired from the current digital fingerprint according to a user public key when the information storage request is used for requesting to update the storage information of the target real object;
a second verification unit, configured to send an old digital fingerprint verification request to the blockchain storage network when the ownership certificate passes verification, so that the blockchain storage network verifies whether the old digital fingerprint is valid; wherein the old digital fingerprint authentication request comprises an old digital fingerprint obtained from the current digital fingerprint;
and the storage unit is used for sending the current digital fingerprint and the ownership certificate to the blockchain storage network when the old digital fingerprint is determined to be valid according to the feedback information of the blockchain storage network, so that the blockchain storage network can perform uplink storage.
11. The utility model provides a device is seeked to material object information which characterized in that includes:
the second acquisition unit is used for acquiring the temporary digital fingerprint of the target object according to the received information searching request;
the searching unit is used for sending a temporary digital fingerprint searching request to the block chain storage network so that the block chain storage network can search according to the temporary digital fingerprint; wherein, the digital fingerprints stored in the block chain storage network are stored according to the physical information storage method of any one of claims 1 to 6;
and the third acquisition unit is used for acquiring the physical information according to the feedback information of the block chain storage network.
CN201910193985.7A 2019-03-14 2019-03-14 Physical information storage method and device and physical information searching method and device Active CN109918874B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910193985.7A CN109918874B (en) 2019-03-14 2019-03-14 Physical information storage method and device and physical information searching method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910193985.7A CN109918874B (en) 2019-03-14 2019-03-14 Physical information storage method and device and physical information searching method and device

Publications (2)

Publication Number Publication Date
CN109918874A CN109918874A (en) 2019-06-21
CN109918874B true CN109918874B (en) 2022-09-02

Family

ID=66964930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910193985.7A Active CN109918874B (en) 2019-03-14 2019-03-14 Physical information storage method and device and physical information searching method and device

Country Status (1)

Country Link
CN (1) CN109918874B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11146381B2 (en) * 2018-11-16 2021-10-12 Adobe Inc. Traceability of edits to digital documents via distributed ledgers
CN110598462B (en) * 2019-09-29 2023-06-23 腾讯科技(深圳)有限公司 Data presentation method, device, system, electronic equipment and storage medium
CN116091049B (en) * 2023-04-12 2023-07-07 中科商用(临沂)技术有限公司 Payment method and device based on big data and blockchain and cloud platform

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170178072A1 (en) * 2015-12-22 2017-06-22 Intel Corporation System, Apparatus And Method For Transferring Ownership Of A Smart Delivery Package
CN106097030A (en) * 2016-04-29 2016-11-09 北京太云科技有限公司 The data processing method of a kind of assets based on block chain, Apparatus and system
CN106534317B (en) * 2016-11-17 2019-09-03 杭州云象网络技术有限公司 A kind of calamity based on block chain technology is for cloud storage system construction method
CN107276973A (en) * 2016-12-10 2017-10-20 江苏恒为信息科技有限公司 A kind of internet article identity mark is built and verification method
WO2018119587A1 (en) * 2016-12-26 2018-07-05 深圳前海达闼云端智能科技有限公司 Data processing method, device, and system, and information acquisition apparatus
US10581841B2 (en) * 2017-02-13 2020-03-03 Zentel Japan Corporation Authenticated network
US10102526B1 (en) * 2017-03-31 2018-10-16 Vijay K. Madisetti Method and system for blockchain-based combined identity, ownership, integrity and custody management
CN108696358B (en) * 2017-04-06 2021-05-04 中国移动通信有限公司研究院 Digital certificate management method and device, readable storage medium and service terminal
CN107231351B (en) * 2017-05-25 2021-01-08 远光软件股份有限公司 Electronic certificate management method and related equipment
CN107506661B (en) * 2017-08-15 2020-04-24 河南真二互联网科技有限公司 Method for generating house historical record based on block chain
CN107508812B (en) * 2017-08-29 2020-10-23 广东工业大学 Industrial control network data storage method, calling method and system
CN107807951B (en) * 2017-09-18 2020-10-13 联动优势科技有限公司 Block chain generation method, data verification method, node and system
CN107819777B (en) * 2017-11-17 2020-07-24 利姆斯(北京)区块链技术有限公司 Data evidence storing method and system based on block chain technology
CN107888382B (en) * 2017-11-24 2019-11-19 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of methods, devices and systems of the digital identity verifying based on block chain
CN108805573B (en) * 2018-04-21 2022-04-15 深圳市元征科技股份有限公司 Information verification method, server and storage medium
CN108846603A (en) * 2018-05-31 2018-11-20 深圳市零度智控科技有限公司 Logistics retroactive method, user equipment, storage medium and device based on block chain
CN109189853B (en) * 2018-08-08 2021-05-28 众安信息技术服务有限公司 Method and device for synchronizing data between block chains
CN109088871B (en) * 2018-08-14 2021-10-08 深圳市人民政府金融发展服务办公室 Data transmission method and system based on block chain technology
CN109191124B (en) * 2018-08-16 2021-02-26 北京京东尚科信息技术有限公司 Block chain network, deployment method and storage medium
CN109034851B (en) * 2018-09-05 2022-03-08 深圳正品创想科技有限公司 Commodity anti-counterfeiting tracing method and device based on block chain and block chain link points
CN109102308A (en) * 2018-09-05 2018-12-28 深圳正品创想科技有限公司 Merchandise news maintaining method, block chain node and its system based on block chain
CN109450638B (en) * 2018-10-23 2021-11-02 国科赛思(北京)科技有限公司 Block chain-based electronic component data management system and method
CN109462483B (en) * 2018-11-27 2022-09-30 平安科技(深圳)有限公司 Block chain based mail evidence storage method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN109918874A (en) 2019-06-21

Similar Documents

Publication Publication Date Title
US11797982B2 (en) Digital ledger authentication using address encoding
CN108573381B (en) Data processing method and device
US20210336785A1 (en) Blockchain Generation Apparatus, Blockchain Verification Apparatus, and Program
CN106504094B (en) Transaction matching method and system of distributed general ledger system based on block chain technology
CN109918874B (en) Physical information storage method and device and physical information searching method and device
US20220391360A1 (en) Image blockchain system and method
US20180323964A1 (en) Blockchain Generation Apparatus, Blockchain Generation Method, Blockchain Verification Apparatus, Blockchain Verification Method, and Program
Forte et al. Beyond Bitcoin-Part I: A critical look at blockchain-based systems
US11461771B2 (en) Hybrid digital ledger control with address encoding
CN109542888A (en) The data modification and synchronous method of block chain, device, equipment and storage medium
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
CN111125756A (en) Data right-confirming system and method for zero trust and protecting data privacy
CN111324661A (en) User cooperation method, device and medium based on block chain
US11769146B1 (en) Blockchain transactional identity verification
CN109146683A (en) A kind of information management and Verification System using block chain
CN117616410A (en) Multiparty computing in a computer slicing environment
CN111414434A (en) Block chain-based data transaction management network, transaction device and storage medium
US20200175514A1 (en) Using a blockchain to establish a web of trust
US11544788B1 (en) Systems and methods for tokenization, management, trading, settlement, and retirement of renewable energy attributes
WO2019028442A1 (en) Evolving actual possession token with verifiable evolution state
KR102487467B1 (en) System and method for donating nft using nft server address
CN114846765B (en) Method and apparatus for providing decentralised identity verification
CN114358948A (en) NFT atom exchange method, system, computer-readable storage medium and terminal device
KR101934958B1 (en) Connection authentication method using black-chain and apparatus therefor
CN113239255A (en) Heterogeneous data resource sharing method and device, computer equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 401121 b7-7-2, Yuxing Plaza, No.5 Huangyang Road, Yubei District, Chongqing

Applicant after: Chongqing duxiaoman Youyang Technology Co.,Ltd.

Address before: 201800 room j1328, 3 / F, building 8, 55 Huiyuan Road, Jiading District, Shanghai

Applicant before: SHANGHAI YOUYANG NEW MEDIA INFORMATION TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
TA01 Transfer of patent application right

Effective date of registration: 20211228

Address after: 100193 Room 606, 6 / F, building 4, West District, courtyard 10, northwest Wangdong Road, Haidian District, Beijing

Applicant after: Du Xiaoman Technology (Beijing) Co.,Ltd.

Address before: 401121 b7-7-2, Yuxing Plaza, No.5 Huangyang Road, Yubei District, Chongqing

Applicant before: Chongqing duxiaoman Youyang Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant