CN110033259A - Data based on block chain deposit card method and device, electronic equipment - Google Patents

Data based on block chain deposit card method and device, electronic equipment Download PDF

Info

Publication number
CN110033259A
CN110033259A CN201811432455.5A CN201811432455A CN110033259A CN 110033259 A CN110033259 A CN 110033259A CN 201811432455 A CN201811432455 A CN 201811432455A CN 110033259 A CN110033259 A CN 110033259A
Authority
CN
China
Prior art keywords
data
computing environment
terminal device
block chain
safe computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811432455.5A
Other languages
Chinese (zh)
Other versions
CN110033259B (en
Inventor
郑坤坤
翁欣雨
王林青
蒋海滔
张鸿
李富强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811432455.5A priority Critical patent/CN110033259B/en
Priority to CN202111243033.5A priority patent/CN113793151A/en
Publication of CN110033259A publication Critical patent/CN110033259A/en
Priority to TW108132026A priority patent/TWI721552B/en
Priority to PCT/CN2019/110650 priority patent/WO2020108114A1/en
Application granted granted Critical
Publication of CN110033259B publication Critical patent/CN110033259B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

It discloses a kind of data based on block chain and deposits card method, applied to the pluggable equipment docked with terminal device;Wherein, the pluggable equipment is equipped with safe computing environment;Private key corresponding with the pluggable equipment is stored in the safe computing environment;It include: the data summarization for obtaining the collected target data of terminal device;It is signed based on private key corresponding with the pluggable equipment to the data summarization in the safe computing environment;The data summarization after signature is distributed to the block chain, to be verified based on the corresponding public key of the private key to the signature of the data summarization by the node device in block chain, and after the signature verification passes through, the data summarization is carried out to data in block chain and deposits card.

Description

Data based on block chain deposit card method and device, electronic equipment
Technical field
This specification one or more embodiment is related to block chain technical field more particularly to a kind of number based on block chain Method and device, electronic equipment are demonstrate,proved according to depositing.
Background technique
Block chain technology is also referred to as distributed account book technology, is that one kind is participated in " remembering jointly by several calculating equipment Account ", the emerging technology of common a complete distributed data base of maintenance.Since block chain technology has decentralization, openly Transparent, every calculating equipment can participate in data-base recording and respectively calculate that data synchronization can be rapidly performed by between equipment Characteristic so that block chain technology is widely applied in numerous fields.
Summary of the invention
This specification proposes that a kind of data based on block chain deposit card method, pluggable applied to what is docked with terminal device Equipment;Wherein, the pluggable equipment is equipped with safe computing environment;It stores in the safe computing environment and is inserted with described Pull out the corresponding private key of equipment;The described method includes:
Obtain the data summarization of the collected target data of the terminal device;
The data summarization is carried out based on private key corresponding with the pluggable equipment in the safe computing environment Signature;
The data summarization after signature is distributed to the block chain, it is described to be based on by the node device in block chain The corresponding public key of private key verifies the signature of the data summarization, and after the signature verification passes through, by the data Abstract carries out data in block chain and deposits card.
Optionally, the data summarization of the collected target data of the terminal device is obtained, comprising:
Receive the data summarization by the collected target data of the terminal device that the terminal device is sent;Alternatively, Receive that the terminal device sends by the collected target data of the terminal device, and the target data described in local computing Into data summarization.
Optionally, the data are plucked based on private key corresponding with the pluggable equipment in the safe computing environment It signs, comprising:
Obtain the identity information of the pluggable equipment inputted using user;
Authentication is carried out using user for described based on the identity information got;
If passed through for described using the authentication of user, it is based on inserting with described in the safe computing environment The corresponding private key of equipment is pulled out to sign to the data summarization.
Optionally, key schedule is stored in the safe computing environment;
The method also includes:
Obtain the identity information of the pluggable equipment inputted when for the first time using the pluggable equipment using user;
Authentication is carried out using user for described based on the identity information got;
If passed through for described using the authentication of user, call the key raw in the safe computing environment The private key and public key are generated at algorithm;And
The private key of generation is bound with described using the identity information of user, and by binding relationship in the peace Full computing environment is stored.
Optionally, the data are plucked based on private key corresponding with the pluggable equipment in the safe computing environment It signs, comprising:
Obtain the identity information of the pluggable equipment inputted using user;
Determine the private key whether stored in the safe computing environment with identity information binding;
If so, based on the private key bound with the identity information to the data summarization in the safe computing environment It signs.
Optionally, the data summarization after signature is distributed to the block chain, comprising:
The data summarization after signature is distributed to the block chain;Alternatively, the data summarization after signature is sent out It send to the terminal device, the data summarization is distributed to the block chain by the terminal device.
Optionally, the terminal device includes law-enforcing recorder or automobile data recorder;The target data includes video The combination of one or more of data, audio data, image data.
Optionally, the pluggable equipment is equipped with USB interface;The pluggable equipment passes through the USB interface and institute It states terminal device and realizes hardware docking.
Optionally, the pluggable equipment is equipped with the safe computing chip of SE;The safe computing environment is based on described The safe computing environment that the safe computing chip of SE is built.
Optionally, the pluggable equipment is equipped with LED light;The method also includes:
Control the working condition that the LED light prompts the user with the pluggable equipment;Wherein, the working condition Working condition including executing operation in the described safe computing environment;And fortune is completed in the safe computing environment The working condition of calculation.
This specification also proposes that a kind of data based on block chain deposit card device, inserts applied to what is docked with terminal device Pull out equipment;Wherein, the pluggable equipment is equipped with safe computing environment;Stored in the safe computing environment with it is described can The corresponding private key of swappable device;Described device includes:
Module is obtained, the data summarization of the collected target data of the terminal device is obtained;
Signature blocks, based on private key corresponding with the pluggable equipment to the data in the safe computing environment Abstract is signed;
The data summarization after signature is distributed to the block chain, to be set by the node in block chain by release module It is standby that the signature of the data summarization is verified based on the private key corresponding public key, and after the signature verification passes through, The data summarization is carried out to data in block chain and deposits card.
Optionally, the acquisition module:
Receive the data summarization by the collected target data of the terminal device that the terminal device is sent;Alternatively, Receive that the terminal device sends by the collected target data of the terminal device, and the target data described in local computing Into data summarization.
Optionally, the signature blocks:
Obtain the identity information of the pluggable equipment inputted using user;
Authentication is carried out using user for described based on the identity information got;
If passed through for described using the authentication of user, it is based on inserting with described in the safe computing environment The corresponding private key of equipment is pulled out to sign to the data summarization.
Optionally, key schedule is stored in the safe computing environment;
Described device further include:
Authentication module obtains inputting when for the first time using the pluggable equipment using user for the pluggable equipment Identity information;Authentication is carried out using user for described based on the identity information got;
Generation module is called in the safe computing environment if passed through for described using the authentication of user The key schedule generates the private key and public key;And by the private key of generation and the body using user Part information is bound, and binding relationship is stored in the safe computing environment.
Optionally, the signature blocks:
Obtain the identity information of the pluggable equipment inputted using user;
Determine the private key whether stored in the safe computing environment with identity information binding;
If so, based on the private key bound with the identity information to the data summarization in the safe computing environment It signs.
Optionally, the release module:
The data summarization after signature is distributed to the block chain;Alternatively, the data summarization after signature is sent out It send to the terminal device, the data summarization is distributed to the block chain by the terminal device.
Optionally, the terminal device includes law-enforcing recorder or automobile data recorder;The target data includes video The combination of one or more of data, audio data, image data.
Optionally, the pluggable equipment is equipped with USB interface;The pluggable equipment passes through the USB interface and institute It states terminal device and realizes hardware docking.
Optionally, the pluggable equipment is equipped with the safe computing chip of SE;The safe computing environment is based on described The safe computing environment that the safe computing chip of SE is built.
Optionally, the pluggable equipment is equipped with LED light;Described device further include:
Control module controls the working condition that the LED light prompts the user with the pluggable equipment;Wherein, institute Stating working condition includes that the working condition of operation is executed in the described safe computing environment;And in the safe operation ring The working condition of operation is completed in border.
This specification also proposes a kind of pluggable equipment, comprising:
Processor;
For storing the memory of machine-executable instruction;
Wherein, card is deposited with the data based on block chain based on block chain by read and execute memory storage The corresponding machine-executable instruction of control logic, the processor is prompted to:
Obtain the data summarization of the collected target data of terminal device;Wherein, the pluggable equipment and the terminal Equipment interconnection;The pluggable equipment is equipped with safe computing environment;It stores in the safe computing environment and is inserted with described Pull out the corresponding private key of equipment;
The data summarization is carried out based on private key corresponding with the pluggable equipment in the safe computing environment Signature;
The data summarization after signature is distributed to the block chain, it is described to be based on by the node device in block chain The corresponding public key of private key verifies the signature of the data summarization, and after the signature verification passes through, by the data Abstract carries out data in block chain and deposits card.
In above technical scheme, on the one hand, since pluggable equipment is equipped with safe computing environment, and in the safety Private key corresponding with pluggable equipment is stored in computing environment;Therefore by the way that pluggable equipment and terminal device are carried out hardware Docking, so that it may which safe computing environment is easily provided for terminal device;So that pluggable equipment can be used as general peace Devices at full hardware carries out hardware docking from different terminal devices, safe computing environment is provided for different terminal devices;Moreover, When terminal device needs to carry out depositing card on block chain by collected data, the safety that can be carried on pluggable equipment It in computing environment, is signed using the private key of storage to the collected data of terminal device, and by the data publication after signature Data, which are carried out, to block chain deposits card, so as to avoid the data for depositing card on block chain from illegally being distorted in communication process, Ensure the data safety when depositing card data on block chain;
On the other hand, by improving to the process that progress data deposit card on block chain, terminal device can be needed no longer The original contents of collected data are deposited into card on block chain, but the data of the original contents of collected data are plucked Card is deposited on block chain, so that terminal device can be used as the hinge of physical world and the world Lian Shang, will more easily be adopted The data collected carry out depositing card on block chain;Moreover, for the third party for obtaining the collected data of terminal device, by In the data summarization of the data by that will obtain, matched with the data summarization for the data for depositing card on block chain, so that it may Easily to carry out legitimate verification to the data of acquisition;Therefore, allow terminal device using collected data as card According to third party is submitted to, the availability of the collected data of terminal device can be obviously improved.
Detailed description of the invention
Fig. 1 is the flow chart that a kind of data based on block chain that an exemplary embodiment provides deposit card method;
Fig. 2 is a kind of hardware structure diagram for pluggable equipment that an exemplary embodiment provides;
Fig. 3 is the schematic diagram that a kind of pluggable equipment that an exemplary embodiment provides is docked with terminal device;
Fig. 4 is the schematic diagram that another pluggable equipment that an exemplary embodiment provides is docked with terminal device;
Fig. 5 is the structural schematic diagram for a kind of electronic equipment that an exemplary embodiment provides;
Fig. 6 is the block diagram that a kind of data based on block chain that an exemplary embodiment provides deposit card device.
Specific embodiment
Since the data stored in block chain have the characteristic that can not be distorted, stores data on block chain and do Data deposit card, are the current main trends of industry.
However, in practical applications, for some flow datas;For example, law-enforcing recorder or automobile data recorder collect The data such as video flowing, audio stream;The memory space of the occupancy as needed for its own is larger, then can not usually be directly stored in area It carries out depositing card on block chain.
But in some scenes, this kind of flow data but there is strong to deposit card demand;For example, depositing the field of card in the administration of justice Scape may submit to judicial department as evidence for law-enforcing recorder or the collected video flowing of automobile data recorder.
Due to lacking data authentication means, legitimacy of this kind of flow data as evidence, it will usually which there are extensive queries.Cause This, for this kind of flow data, best processing mode is also stored in progress data office on block chain and deposits card;It is also desirable to These legitimacies of the data as judicial evidence for depositing card can more easily be verified.
Based on the above demand, this specification proposes that a kind of utilization pluggable equipment is terminal device Build Security operation ring Border, the collected data of terminal device easily to be carried out depositing on block chain the technical solution of card.
When realizing, can the Build Security computing environment on pluggable equipment in advance, stored in safe computing environment Private key corresponding with pluggable equipment, and docked by the way that pluggable equipment is carried out hardware with terminal device, completion will be built Safe computing environment is supplied to terminal device;
For example, SE (Secure Element, safety element) safe computing chip can be carried on pluggable equipment, it is Pluggable equipment Build Security budget environment stores private key corresponding with pluggable equipment in safe computing environment.Meanwhile it can To reserve the general-purpose interfaces such as USB on the terminal device, pluggable equipment is accessed eventually by these general-purpose interfaces End equipment realizes that hardware docks with terminal device, the safe computing environment for building completion is supplied to terminal device.
Further, for terminal device after collecting and needing to deposit the data of card on block chain, pluggable equipment can be with Obtain terminal device collected target data data summarization;
For example, terminal device can calculate the data summarization of collected target data, then by calculated data summarization It is sent to pluggable equipment;Alternatively, collected target data can be transmitted directly to pluggable equipment by terminal device, by can Swappable device is locally carrying out digest calculations, obtains the data summarization of the target data.
Pluggable equipment obtain terminal device collected target data data summarization after, can be pluggable In the safe computing environment that equipment is carried, the private key based on storage carries out signature processing to the data summarization of the target data, so The data summarization after signature is distributed to block chain afterwards.
For example, the data summarization after signature directly can be distributed to block chain by pluggable equipment;Alternatively, pluggable set It is standby data summarization after signature to be sent to terminal device, the data summarization after signature is distributed to area by terminal device Block chain.
Node device in block chain is available pluggable with this after receiving the data summarization after the signature of publication The corresponding public key of the private key of equipment is then based on the public key and verifies to the signature of the data summarization;If signature verification is logical It crosses, which can be stored into block chain to progress data and deposit card.
In above technical scheme, on the one hand, since pluggable equipment is equipped with safe computing environment, and in the safety Private key corresponding with pluggable equipment is stored in computing environment;Therefore by the way that pluggable equipment and terminal device are carried out hardware Docking, so that it may which safe computing environment is easily provided for terminal device;So that pluggable equipment can be used as general peace Devices at full hardware carries out hardware docking from different terminal devices, safe computing environment is provided for different terminal devices;Moreover, When terminal device needs to carry out depositing card on block chain by collected data, the safety that can be carried on pluggable equipment It in computing environment, is signed using the private key of storage to the collected data of terminal device, and by the data publication after signature Data, which are carried out, to block chain deposits card, so as to avoid the data for depositing card on block chain from illegally being distorted in communication process, Ensure the data safety when depositing card data on block chain;
On the other hand, by improving to the process that progress data deposit card on block chain, terminal device can be needed no longer The original contents of collected data are deposited into card on block chain, but the data of the original contents of collected data are plucked Card is deposited on block chain, so that terminal device can be used as the hinge of physical world and the world Lian Shang, will more easily be adopted The data collected carry out depositing card on block chain;Moreover, for the third party for obtaining the collected data of terminal device, by In the data summarization of the data by that will obtain, matched with the data summarization for the data for depositing card on block chain, so that it may Easily to carry out legitimate verification to the data of acquisition;Therefore, allow terminal device using collected data as card According to third party is submitted to, the availability of the collected data of terminal device can be obviously improved.
This specification is described below by specific embodiment and in conjunction with specific application scenarios.
Referring to FIG. 1, Fig. 1 is that a kind of data based on block chain that one embodiment of this specification provides deposit card method, answer Pluggable equipment for being docked with terminal device;Wherein, which is equipped with safe computing environment;The safe operation Private key corresponding with the pluggable equipment is stored in environment;The method executes following steps:
Step 102, the data summarization of the collected target data of the terminal device is obtained;
Step 104, private key corresponding with the pluggable equipment is based in the safe computing environment to the data Abstract is signed;
Step 106, the data summarization after signature is distributed to the block chain, by the node device in block chain The signature of the data summarization is verified based on the private key corresponding public key, and after the signature verification passes through, it will The data summarization carries out data in block chain and deposits card.
The block chain described in this specification can specifically include privately owned chain, shared chain and alliance's chain etc., in this theory Without being particularly limited in bright book.
For example, in one scenario, above-mentioned block chain specifically can be server, domestic silver by Third-party payment platform Alliance's chain that row server, overseas bank server and several user node equipment are formed as member device.The connection The operator of alliance's chain can rely on alliance's chain, to dispose based on alliance's chain online it is cross-border transfer accounts, assets transfer etc. In line service.
Above-mentioned terminal device may include that block chain can be added as node device, and by collected data in area Carry out depositing any form of terminal device of card on block chain;
For example, in practical applications, above-mentioned terminal device can specifically include law-enforcing recorder or automobile data recorder etc.. Law-enforcing recorder or automobile data recorder can be used as node and block chain are added, and by collected such as video data, audio The flow datas such as data carry out depositing card on block chain.
Wherein, data are carried out depositing card on block chain, refers to and carries out persistence in block chain for data as evidence Storage.
Above-mentioned target data, including it is collected by terminal device, it needs to complete in the distributed data base of block chain Data deposit any type of data of card;
For example, above-mentioned target data specifically can be the acquisition of the terminal devices such as law-enforcing recorder or automobile data recorder The flow datas such as the video data, audio data, the image data that arrive.
In the present specification, it can be terminal device Build Security computing environment, and utilize the safe computing environment built, Carry out private key of the storage and maintenance for needing the data for depositing card on block chain to sign on terminal device.
When realizing, can the Build Security computing environment on pluggable equipment in advance, deposited in the safe computing environment Private key corresponding with pluggable equipment is stored up, and by way of being docked pluggable equipment with terminal device, will can inserted The safe computing environment for building completion in equipment is pulled out, terminal device is supplied to.
In this way, it can no longer need to be transformed the hardware environment of terminal device, in the hard of terminal device New hardware is introduced in part environment to come for terminal device Build Security computing environment, and is only needed by by pluggable equipment and end End equipment is carried out, is docked, so that it may easily provide safe computing environment for terminal device, pluggable equipment is made Hardware docking is carried out from different terminal devices for general hardware, safe computing environment is provided for different terminal devices.
Wherein, the concrete mode docked between terminal device and pluggable equipment, in the present specification without spy It does not limit, those skilled in the art can flexibly be selected when the technical solution of this specification is put into effect;
In a kind of implementation shown, pluggable equipment can specifically be connect by the hardware provided on terminal device Mouthful, realize that hardware docks with terminal device.
Certainly, in practical applications, in addition to the hardware interface that pluggable equipment illustrated above is provided by terminal device, Other than realizing that hardware docks with terminal device, in practical applications, it can also be realized and be docked by software interface;
For example, in one implementation, blue tooth interface can also be provided on the terminal device, and pluggable equipment can be with By the blue tooth interface on terminal device, bluetooth connection is established with terminal device, wireless data communication is carried out and realizes docking.
Wherein, in the hardware environment of terminal device Build Security computing environment concrete mode, in the present specification Without being particularly limited to.
It, can be using the solution based on SE (Secure Element, safety element) in a kind of embodiment shown Scheme is pluggable equipment Build Security computing environment.
Under the solution, the safe computing chip of SE can be introduced in the hardware environment of pluggable equipment, utilized The private key of the safe computing chip storage and maintenance pluggable equipment of SE, carrys out Build Security computing environment.
Fig. 2 is referred to, Fig. 2 is a kind of hardware structure diagram of pluggable equipment shown in this specification.
As shown in Fig. 2, above-mentioned pluggable equipment can specifically include shell, PCB circuit board inside housings is set, is pacified The safe computing chip of USB interface, SE and LED light lamp in PCB circuit board.
Wherein, the safe computing chip of above-mentioned SE is electrically connected with USB interface, for providing safe operation towards pluggable equipment Environment, storage and maintenance private key corresponding with pluggable equipment.
Above-mentioned USB interface is electrically connected with the safe computing chip of above-mentioned SE, is docked for carrying out hardware with terminal device;
For example, referring to Fig. 3 and Fig. 4, by taking terminal device is Portable recording equipment as an example, can be set in Portable recording Standby upper offer USB jack, provides USB interface, user can be by meeting the USB on pluggable equipment on pluggable equipment Mouthful, it is inserted into the USB jack of the Portable recording equipment, realizes that hardware docks with the Portable recording equipment.
Wherein, it should be noted that USB interface described in this specification refers in USB device as USB Slave One end;And USB jack described in this specification, refer to one end in USB device as USB host.
Above-mentioned LED light is electrically connected with the safe computing chip of above-mentioned SE, current for prompting the user with pluggable equipment Working condition;
For example, can use the processing capacity of the safe computing chip of SE itself, in the safe computing chip of SE when realizing Some control logics for being used to control LED light to prompt the working condition of pluggable equipment are implanted into, passes through SE and calculates safely Chip executes these control logics, prompting the user with the working condition of pluggable equipment.
Wherein, in the present specification, the working condition of pluggable equipment can specifically include just in above-mentioned safe operation ring The working condition of operation is executed in border;And the working condition of operation is completed in above-mentioned safe computing environment.
For example, based on the private key that the safe computing environment stores, being acquired to terminal device in above-mentioned safe computing environment To target data carry out signature processing during, above-mentioned pluggable equipment can be referred to as just in above-mentioned safe computing environment The middle working condition for executing operation;And in above-mentioned safe computing environment, the private key based on safe budget environment storage is to end After the completion of the collected target data signature processing of end equipment, above-mentioned pluggable equipment can be referred to as in above-mentioned safe operation ring The working condition of operation is completed in border.
It should be noted that being patrolled by the specific control that LED light prompts the user with the working condition of pluggable equipment Volume, those skilled in the art can be defined when the technical solution of this specification is put into effect based on actual demand, In the present specification without being particularly limited to;
For example, above-mentioned control logic specifically can be in a kind of implementation shown, pluggable equipment is in SE safety During executing operation in the safe computing environment that computing chip provides, it can control the LED light and be in the shape being always on State, to indicate that pluggable equipment is in " just in operation " this working condition;And when pluggable equipment calculates safely core in SE After completing operation in the safe computing environment that piece provides, it can control the LED light and be in the state extinguished, to indicate to insert It pulls out equipment and is in " operation terminates " this working condition.
In another implementation shown, above-mentioned control logic is specifically also possible to pluggable equipment in SE safety During executing operation in the safe computing environment that computing chip provides, it can control the LED light and keep extinguishing, carry out table Show that pluggable equipment is in " in operation " this working condition;And when pluggable equipment is in the safety of the safe computing chip offer of SE After completing operation in computing environment, it can control the LED light and repeatedly flashed according to preset frequency, to indicate to insert It pulls out equipment and is in " operation terminates " this working condition.
Certainly, in this specification, except through introducing the safe computing chip of SE in the hardware environment of pluggable equipment Mode, other than pluggable equipment Build Security computing environment, in practical applications, it is clear that can also be by others side Formula carries safe computing environment for pluggable equipment;
For example, in a kind of embodiment shown, it can be using based on TEE (Trusted Execution Environment, credible performing environment) solution, be terminal device Build Security computing environment.In this solution Under, the software environment of hardware existing in the hardware environment of pluggable equipment (such as existing main process task chip) can be carried out Transformation (does not need to introduce additional safe computing chip), and credible performing environment is built in the software environment, can using this The private key for believing performing environment storage and maintenance pluggable equipment, carrys out Build Security computing environment.
For another example, in the another embodiment shown, the solution based on SE+TEE can be used, is taken for terminal device Build safe computing environment.Under the solution, it can use the safe computing chip of SE and carry out storage and maintenance pluggable equipment Private key, using TEE come towards pluggable equipment provide safety computing environment.
In the present specification, above-mentioned pluggable equipment can be used as node device and be added to block chain (also referred to as equipment Cochain), and will private key corresponding with the pluggable equipment, deposited in the safe computing environment built for the pluggable equipment Storage and maintenance.
Wherein, private key corresponding with pluggable equipment, specifically can be the private key held by pluggable equipment, is also possible to The private key of pluggable equipment held using user.
That is, " private key corresponding with pluggable equipment " described in this specification, specifically can be pluggable equipment Equipment manufacturer generates in the equipment production phase for the pluggable equipment, and the private key held by the pluggable equipment;It can also It is independently what the user generated by pluggable equipment to be by pluggable equipment when user is using the pluggable equipment, and The private key held by the individual subscriber.
In a kind of embodiment shown, the private key and public key that pluggable equipment is held can be by equipment manufacturers It is pluggable equipment generation in the equipment production phase, and the private key is written to the peace of the pluggable equipment in advance by equipment manufacturer Storage and maintenance is carried out in full computing environment.
In this case, private key and public key that pluggable equipment is held then use user's with pluggable equipment Identity is not associated with.For the different use users of the pluggable equipment, it can share by equipment manufacturer's default write Enter the same private key in the safe computing environment of the pluggable equipment.
In a kind of embodiment shown, the private key and public key that pluggable equipment is held can also be set by pluggable Standby is independently being generated using user for the pluggable equipment, and the pluggable equipment is written in the private key by pluggable equipment Safe computing environment.
In this case, private key and public key that pluggable equipment is autonomously generated, can be with the use of pluggable equipment The identity of user is associated, and pluggable equipment can use user based on the different identity informations using user for different A pair of of private key and public key are generated respectively, and the private key of generation and each identity information using user are bound respectively, then Binding relationship is subjected to storage and maintenance in safe computing environment.
For example, when realizing, key schedule can be written this in advance and pluggable set by the manufacturer of pluggable equipment Standby safe computing environment.Use user when using pluggable equipment when pluggable equipment, pluggable equipment can prompt Identity information, which is inputted, using user carries out authentication;Wherein, the data type of the identity information inputted using user, Yi Jike Identification authentication mode used by swappable device, in the present specification without particularly limiting;For example, can be using such as The conventional authentication mode of input password perhaps password can also use the certification based on the physiological characteristics such as fingerprint or face Mode.
After pluggable equipment gets the identity information inputted using user, can determine in safe computing environment whether Store the private key with identity information binding;If in safe computing environment and the private of the not stored binding with the identity information Key shows that this using user is the new user for using the pluggable equipment for the first time, and terminal device can be based on getting at this time The identity information carries out authentication using user to this;It is pluggable to set if passed through for this using user identity authentication It is standby that above-mentioned key schedule can be called to generate a pair of of private key and public key in above-mentioned safe computing environment, and by generation Private key and this bound using the identity information of user, then binding relationship is stored in above-mentioned safe computing environment And maintenance.In the present specification, user can be used terminal device and carry out data acquisition, and the safety on the pluggable equipment In computing environment, after being signed based on the private key of the pluggable equipment to collected data, it is distributed on block chain and carries out Data deposit card.
Wherein, in the present specification, terminal device by collected target data when carrying out depositing card on block chain, can Only to need for collected data being locally stored, the data summarization of collected data deposit card i.e. on block chain It can, it is no longer necessary to carry out the original contents of collected data on block chain to deposit card.
It should be noted that in practical applications, if the collected target data of terminal device be such as video data, The flow datas such as audio data, for this kind of flow data when carrying out depositing card on block chain, terminal device can also be according to the preset time Period, stream data carry out the mode that fragment deposits card;
For example, terminal device can be calculated using every N minutes of video data as a fragment by taking video data as an example Then the data summarization of the fragment carries out the data summarization of the fragment depositing card in block chain, and strict guarantee is in block chain On deposit card each fragment data summarization sequence in time, in order to be recalled.
In the present specification, terminal device by collected target data when carrying out depositing card on block chain, it is pluggable The data summarization of the collected target data of the available terminal device of equipment, and in safe computing environment, based on pluggable The private key that equipment is held carries out signature processing to the data summarization of the target data.
Wherein, the data summarization of the collected target data of terminal device, specifically can by terminal device its local into Row calculates, and can also be calculated by pluggable equipment in its local.
In a kind of embodiment shown, terminal device is carrying out collected target data to deposit card on block chain When, it can be in the data summarization of the local computing target data;For example, the data summarization specifically can be based on specific Hash Algorithm calculates the hash value of the target data;Then, terminal device can send out the data summarization of the calculated target data Give the pluggable equipment of docking;And pluggable equipment can receive the data summarization of the target data of terminal device transmission, and By the data summarization of the target data received, in safe computing environment, the private key held based on pluggable equipment is to the mesh The data summarization of mark data carries out signature processing.
In a kind of embodiment shown, terminal device is carrying out collected target data to deposit card on block chain When, the original contents of collected target data can also be sent to pluggable equipment;And pluggable equipment can receive end The target data that end equipment is sent, and the data summarization of the target data received in local computing, then in safe operation ring In border, signature processing is carried out to the data summarization of calculated target data based on the private key that pluggable equipment is held.
Wherein, in a scenario, if in the safe computing environment of pluggable equipment storage and maintenance private key, to set Standby manufacturer is pluggable equipment generation, the private key held by pluggable equipment equipment in the equipment production phase;In this feelings Under condition, the ID authentication mechanism using user to pluggable equipment can be introduced, prompt to input using user identity information into Row authentication;It, can be based on the identity letter got after pluggable equipment gets the identity information inputted using user Breath carries out authentication using user to this;If passed through using the authentication of user for this, pluggable equipment can be In safe computing environment, based on the private key of storage and maintenance in the safe computing environment held by the pluggable equipment, to this Data summarization carries out signature processing.Under another scene, if storage and maintenance in the safe computing environment of pluggable equipment Private key, be terminal device be independently to be generated using user, by the private key for using user to hold;At this point, safe computing environment In be stored in advance and maintain the binding relationship of identity information and private key using user.
In this case, after pluggable equipment gets the identity information inputted using user, peace can be inquired The binding relationship safeguarded in full computing environment determines the private whether stored in safe computing environment with identity information binding Key;If storing the private key of identity information binding in safe computing environment, pluggable equipment can be in safe computing environment In, based on the private key inquired, signature processing is carried out to the data summarization.
Certainly, if in safe computing environment and the private key of the not stored binding with the identity information, show that this uses user For the new user for using the pluggable equipment for the first time, pluggable equipment can make this based on the identity information got at this time Authentication is carried out with user, and after authentication passes through, calls the key schedule stored in safe computing environment, is This generates private key and public key using user, and using the private key generated, carries out signature processing to the data summarization;And it will give birth to At private key and this bound using the identity information of user, then binding relationship is stored in safe computing environment And maintenance.
In the present specification, when pluggable equipment is in safe computing environment, based on the private stored in safe computing environment Key can be by the number after signature after carrying out signature processing completion to the data summarization of the collected target data of terminal device According to abstract, issued in block chain;
For example, a block chain transaction (Transaction) can be constructed based on the data summarization after signature, by the transaction Broadcast diffusion is carried out to other each node devices.
Wherein, the data summarization after signature can directly be issued in block chain by pluggable equipment, can also be by Data summarization after signature is sent to terminal device by pluggable equipment, then is issued in block chain by terminal device.
And the node device in block chain is after receiving the data summarization after the signature of publication, it is available to be transported with safety The corresponding public key of private key stored in environment is calculated, the public key got is then based on and the signature of the data summarization is verified; If the signature verification of the data summarization passes through, which can initiate to the common recognition of the data summarization in block chain Reason, and after data summarization common recognition processing passes through, which is packed into block in block chain and is stored, with complete Card is deposited at the data for the data summarization.
Wherein, it should be noted that common recognition mechanism used by block chain described in this specification, in this specification In without being particularly limited to, in practical applications, the operator of block chain can flexibly be selected based on actual demand.
In the another embodiment shown, terminal device is enterprising in block chain when by collected target data Row is when depositing card, can also be enterprising in block chain together by the data summarization of the description data of the target data and the target data Row deposits card.
In this case, in the safe computing environment of pluggable equipment, based on the private key stored in safe computing environment, When carrying out signature processing to the data summarization of the target data, can by the description information of the data summarization and the target data into The whole signature of row;It signs as a whole after the description information of data summarization and the target data is packaged; Then, by the description data of data summarization and above-mentioned target data after signature, block chain progress data is distributed to and deposit card.
It is handed over for example, a block chain can be constructed based on the description data of the data summarization after signature and above-mentioned target data Easily, which is subjected to broadcast diffusion to other each node devices.
Alternatively, in another case, in the safe computing environment of pluggable equipment, based on being deposited in safe computing environment The private key of storage can also sign when carrying out signature processing to the data summarization of the target data only for the data summarization; Then, by the description data of above-mentioned target data, and by the data summarization after signature, block chain progress data is distributed to and deposit card.
For example, a block can be constructed based on the data summarization after the description data of above-mentioned target data, and signature Chain transaction, carries out broadcast diffusion to other each node devices for the transaction.
Wherein, the particular content that the description information of above-mentioned target data is included, in the present specification without especially limiting It is fixed, in practical applications, arbitrary content relevant to above-mentioned target data can be covered;
In a kind of embodiment shown, due to the acquisition moment of data, collecting location and the relevant object of data, lead to It is often extremely important attribute of the data as the instrument of evidence;Therefore, in the present specification, the description letter of above-mentioned target data Breath, can specifically include in acquisition moment, collecting location and the relevant object of above-mentioned target data of above-mentioned target data One or more combination.
Wherein, in a kind of embodiment shown, the acquisition moment of target data specifically can be terminal device and adopt It when collecting target data, is interacted with time certification center, when what is got from time certification center passes through the authority of certification It carves (timestamp).The collecting location of target data, when can be terminal device and collecting target data, real-time calling terminal device The precise acquisition place that the locating module (such as GPS module) of carrying is got.And object relevant to above-mentioned target data, it can To be terminal device after collecting target data, the related object being manually entered by the legitimate user of the terminal device.
For example, the video data is retouched by taking the collected evidence obtaining video data with accident incidents of law-enforcing recorder as an example Information is stated, can specifically include the authority by certification got at the time of collecting the video data from time certification center Moment, the precise acquisition place that law-enforcing recorder real-time calling locating module is got at the time of collect the video data, with And information of vehicles relevant to the video data, the driver information etc. inputted by law-executor.
In above technical scheme, on the one hand, since pluggable equipment is equipped with safe computing environment, and in the safety Private key corresponding with pluggable equipment is stored in computing environment;Therefore by the way that pluggable equipment and terminal device are carried out hardware Docking, so that it may which safe computing environment is easily provided for terminal device;So that pluggable equipment can be used as general peace Devices at full hardware carries out hardware docking from different terminal devices, safe computing environment is provided for different terminal devices;
Moreover, can be set pluggable when terminal device needs to carry out depositing card on block chain by collected data It in the safe computing environment of standby upper carrying, is signed using the private key of storage to the collected data of terminal device, and will label Data publication to block chain after name carries out data and deposits card, so as to avoid depositing the data of card on block chain in communication process It is middle illegally to be distorted, ensure the data safety when depositing card data on block chain;
For example, a pluggable equipment can be previously-completed equipment cochain, the public affairs as the identity on block chain are obtained Private key pair, and private key is safeguarded and stored in safe computing environment.When user needs the equipment of a not cochain When depositing card on block chain, user can be set collected data by by the USB interface on pluggable equipment, being inserted into the terminal In standby USB jack, realizes that hardware docks with the terminal device, the safe computing environment of pluggable equipment is supplied to terminal and is set It is standby, come the equipment that the terminal device is efficiently transformed into cochain, card is deposited to complete the data on block chain.Into One step, when the terminal device is after completion data deposit card, user needs just by the collected data of other terminal devices When depositing card on block chain, identical operation can be executed, hardware is carried out with above-mentioned pluggable equipment and docks, efficiently should come The equipment that terminal device is also transformed into cochain.
On the other hand, by improving to the process that progress data deposit card on block chain, terminal device can be needed no longer The original contents of collected data are deposited into card on block chain, but the data of the original contents of collected data are plucked Card is deposited on block chain, so that terminal device can be used as the hinge of physical world and the world Lian Shang, will more easily be adopted The data collected carry out depositing card on block chain;Moreover, for the third party for obtaining the collected data of terminal device, by In the data summarization of the data by that will obtain, matched with the data summarization for the data for depositing card on block chain, so that it may Easily to carry out legitimate verification to the data of acquisition;Therefore, allow terminal device using collected data as card According to third party is submitted to, the availability of the collected data of terminal device can be obviously improved.
For example, for terminal devices such as law-enforcing recorder or automobile data recorders, it is only necessary to by collected video data, The original contents of the flow datas such as audio data are being locally stored, and by the data summarization of the original contents of these flow datas in block Card is deposited on chain, it is no longer necessary to the original contents of these flow datas will be carried out depositing card on block chain;
Moreover, user is submitting to third using law-enforcing recorder or the collected flow data of automobile data recorder as evidence When square mechanism (such as judiciary or insurance company), the data that the third-party institution only needs to recalculate the data of acquisition are plucked It wants, the data summarization of the data is matched with the data summarization for the data for depositing card on block chain, so that it may easily Legitimate verification is carried out to the data of acquisition, so that in this way, law-enforcing recorder or driving note can be obviously improved Record high availability of the collected data of instrument as lawful evidence file.
Corresponding with above method embodiment, this specification additionally provides a kind of data based on block chain and deposits card device Embodiment.The embodiment that the data based on block chain of this specification deposit card device can be using on an electronic device.Wherein, institute Stating electronic equipment can be the pluggable equipment docked with terminal device;The electronic equipment is equipped with safe computing environment, institute State and store private key corresponding with the electronic equipment in safe computing environment, Installation practice can by software realization, It can be realized by way of hardware or software and hardware combining.Taking software implementation as an example, as the device on a logical meaning, It is that computer program instructions corresponding in nonvolatile memory are read by memory by the processor of electronic equipment where it What middle operation was formed.For hardware view, as shown in figure 5, the data based on block chain for this specification deposit card device institute In a kind of hardware structure diagram of electronic equipment, in addition to processor shown in fig. 5, memory, network interface and non-volatile memories Except device, the electronic equipment in embodiment where device can also include other generally according to the actual functional capability of the electronic equipment Hardware repeats no more this.
Fig. 6 is the block diagram that a kind of data based on block chain shown in one exemplary embodiment of this specification deposit card device.
Referring to FIG. 6, the data based on block chain are deposited card device 60 and can be applied and set in aforementioned electronics shown in fig. 5 In standby, include: obtaining module 601, signature blocks 602 and release module 603.
Module 601 is obtained, the data summarization of the collected target data of the terminal device is obtained;
Signature blocks 602, based on private key corresponding with the pluggable equipment to described in the safe computing environment Data summarization is signed;
The data summarization after signature is distributed to the block chain, by the node in block chain by release module 603 Equipment verifies the signature of the data summarization based on the corresponding public key of the private key, and passes through in the signature verification Afterwards, the data summarization is subjected in block chain data and deposits card.
In the present embodiment, the acquisition module 601:
Receive the data summarization by the collected target data of the terminal device that the terminal device is sent;Alternatively, Receive that the terminal device sends by the collected target data of the terminal device, and the target data described in local computing Into data summarization.
In the present embodiment, the signature blocks 602:
Obtain the identity information of the pluggable equipment inputted using user;
Authentication is carried out using user for described based on the identity information got;
If passed through for described using the authentication of user, it is based on inserting with described in the safe computing environment The corresponding private key of equipment is pulled out to sign to the data summarization.
In the present embodiment, key schedule is stored in the safe computing environment;
Described device 60 further include:
Authentication module 604 (is not shown) in Fig. 5, and obtain the pluggable equipment uses user can described in for the first time The identity information inputted when swappable device;Recognized for described using user's progress identity based on the identity information got Card;
Generation module 605 (is not shown) in Fig. 5, if passed through for described using the authentication of user, in the peace The key schedule is called to generate the private key and public key in full computing environment;And by the private key of generation with It is described to be bound using the identity information of user, and binding relationship is stored in the safe computing environment.
In the present embodiment, the signature blocks 602:
Obtain the identity information of the pluggable equipment inputted using user;
Determine the private key whether stored in the safe computing environment with identity information binding;
If so, based on the private key bound with the identity information to the data summarization in the safe computing environment It signs.
In the present embodiment, the release module 603:
The data summarization after signature is distributed to the block chain;Alternatively, the data summarization after signature is sent out It send to the terminal device, the data summarization is distributed to the block chain by the terminal device.
In the present embodiment, the terminal device includes law-enforcing recorder or automobile data recorder;The target packet Include the combination of one or more of video data, audio data, image data.
In the present embodiment, the pluggable equipment is equipped with USB interface;The pluggable equipment is connect by the USB Mouth realizes that hardware docks with the terminal device.
In the present embodiment, the pluggable equipment is equipped with the safe computing chip of SE;The safe computing environment is base In the safe computing environment that the safe computing chip of the SE is built.
In the present embodiment, the pluggable equipment is equipped with LED light;Described device 60 further include:
Control module 606 (is not shown) in Fig. 5, controls the LED light and prompts the user with the pluggable equipment Working condition;Wherein, the working condition includes that the working condition of operation is executed in the described safe computing environment;And The working condition of operation is completed in the safe computing environment.
The function of modules and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The module of explanation may or may not be physically separated, and the component shown as module can be or can also be with It is not physical module, it can it is in one place, or may be distributed on multiple network modules.It can be according to actual The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not In the case where making the creative labor, it can understand and implement.
System, device, module or the module that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment The combination of any several equipment.
Corresponding with above method embodiment, this specification additionally provides a kind of embodiment of pluggable equipment.This can be inserted Pulling out equipment includes: processor and the memory for storing machine-executable instruction;Wherein, processor and memory are usually logical Cross internal bus interconnection.In other possible implementations, the equipment is also possible that external interface, with can be with Other equipment or component are communicated.
In the present embodiment, the control that card is deposited with the data based on block chain stored by reading and executing the memory The corresponding machine-executable instruction of logic processed, the processor are prompted to:
Obtain the data summarization of the collected target data of terminal device;Wherein, the pluggable equipment and the terminal Equipment interconnection;The pluggable equipment is equipped with safe computing environment;It stores in the safe computing environment and is inserted with described Pull out the corresponding private key of equipment;
The data summarization is carried out based on private key corresponding with the pluggable equipment in the safe computing environment Signature;
The data summarization after signature is distributed to the block chain, it is described to be based on by the node device in block chain The corresponding public key of private key verifies the signature of the data summarization, and after the signature verification passes through, by the data Abstract carries out data in block chain and deposits card.
In the present embodiment, the control that card is deposited with the data based on block chain stored by reading and executing the memory The corresponding machine-executable instruction of logic processed, the processor are prompted to:
Receive the data summarization by the collected target data of the terminal device that the terminal device is sent;Alternatively, Receive that the terminal device sends by the collected target data of the terminal device, and the target data described in local computing Into data summarization.
In the present embodiment, the control that card is deposited with the data based on block chain stored by reading and executing the memory The corresponding machine-executable instruction of logic processed, the processor are prompted to:
Obtain the identity information of the pluggable equipment inputted using user;
Authentication is carried out using user for described based on the identity information got;
If passed through for described using the authentication of user, it is based on inserting with described in the safe computing environment The corresponding private key of equipment is pulled out to sign to the data summarization.
In the present embodiment, key schedule is stored in the safe computing environment;
It is corresponding by the control logic for depositing card with the data based on block chain for reading and executing the memory storage Machine-executable instruction, the processor are prompted to:
Obtain the identity information of the pluggable equipment inputted when for the first time using the pluggable equipment using user;
Authentication is carried out using user for described based on the identity information got;
If passed through for described using the authentication of user, call the key raw in the safe computing environment The private key and public key are generated at algorithm;And
The private key of generation is bound with described using the identity information of user, and by binding relationship in the peace Full computing environment is stored.
In the present embodiment, the control that card is deposited with the data based on block chain stored by reading and executing the memory The corresponding machine-executable instruction of logic processed, the processor are prompted to:
Obtain the identity information of the pluggable equipment inputted using user;
Determine the private key whether stored in the safe computing environment with identity information binding;
If so, based on the private key bound with the identity information to the data summarization in the safe computing environment It signs.
In the present embodiment, the control that card is deposited with the data based on block chain stored by reading and executing the memory The corresponding machine-executable instruction of logic processed, the processor are prompted to:
The data summarization after signature is distributed to the block chain;Alternatively, the data summarization after signature is sent out It send to the terminal device, the data summarization is distributed to the block chain by the terminal device.
In the present embodiment, the pluggable equipment is equipped with LED light;
It is corresponding by the control logic for depositing card with the data based on block chain for reading and executing the memory storage Machine-executable instruction, the processor are prompted to:
Control the working condition that the LED light prompts the user with the pluggable equipment;Wherein, the working condition Working condition including executing operation in the described safe computing environment;And fortune is completed in the safe computing environment The working condition of calculation.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to this specification Other embodiments.This specification is intended to cover any variations, uses, or adaptations of this specification, these modifications, Purposes or adaptive change follow the general principle of this specification and undocumented in the art including this specification Common knowledge or conventional techniques.The description and examples are only to be considered as illustrative, the true scope of this specification and Spirit is indicated by the following claims.
It should be understood that this specification is not limited to the precise structure that has been described above and shown in the drawings, And various modifications and changes may be made without departing from the scope thereof.The range of this specification is only limited by the attached claims System.
The foregoing is merely the preferred embodiments of this specification, all in this explanation not to limit this specification Within the spirit and principle of book, any modification, equivalent substitution, improvement and etc. done should be included in the model of this specification protection Within enclosing.

Claims (21)

1. a kind of data based on block chain deposit card method, applied to the pluggable equipment docked with terminal device;Wherein, described Pluggable equipment is equipped with safe computing environment;Private corresponding with the pluggable equipment is stored in the safe computing environment Key;The described method includes:
Obtain the data summarization of the collected target data of the terminal device;
It is signed based on private key corresponding with the pluggable equipment to the data summarization in the safe computing environment;
The data summarization after signature is distributed to the block chain, to be based on the private key by the node device in block chain Corresponding public key verifies the signature of the data summarization, and after the signature verification passes through, by the data summarization Data are carried out in block chain deposits card.
2. being wrapped according to the method described in claim 1, obtaining the data summarization of the collected target data of the terminal device It includes:
Receive the data summarization by the collected target data of the terminal device that the terminal device is sent;Alternatively, receiving The terminal device send by the collected target data of the terminal device, and the target data described in local computing into Data summarization.
3. according to the method described in claim 1, based on corresponding with the pluggable equipment in the safe computing environment Private key signs to the data summarization, comprising:
Obtain the identity information of the pluggable equipment inputted using user;
Authentication is carried out using user for described based on the identity information got;
If passed through using the authentication of user for described, based on pluggable being set with described in the safe computing environment Standby corresponding private key signs to the data summarization.
4. according to the method described in claim 1, storing key schedule in the safe computing environment;
The method also includes:
Obtain the identity information of the pluggable equipment inputted when for the first time using the pluggable equipment using user;
Authentication is carried out using user for described based on the identity information got;
If passed through for described using the authentication of user, calls the key to generate in the safe computing environment and calculate Method generates the private key and public key;And
The private key of generation is bound with described using the identity information of user, and binding relationship is transported in the safety Environment is calculated to be stored.
5. according to the method described in claim 4, based on corresponding with the pluggable equipment in the safe computing environment Private key signs to the data summarization, comprising:
Obtain the identity information of the pluggable equipment inputted using user;
Determine the private key whether stored in the safe computing environment with identity information binding;
If so, being carried out based on the private key bound with the identity information to the data summarization in the safe computing environment Signature.
6. according to the method described in claim 1, the data summarization after signature is distributed to the block chain, comprising:
The data summarization after signature is distributed to the block chain;Alternatively, the data summarization after signature is sent to The terminal device, the data summarization is distributed to the block chain by the terminal device.
7. according to the method described in claim 1, the terminal device includes law-enforcing recorder or automobile data recorder;The mesh Mark data include the combination of one or more of video data, audio data, image data.
8. according to the method described in claim 1, the pluggable equipment is equipped with USB interface;The pluggable equipment passes through The USB interface realizes that hardware docks with the terminal device.
9. according to the method described in claim 1, the pluggable equipment is equipped with the safe computing chip of SE;The safe operation Environment is the safe computing environment built based on the safe computing chip of the SE.
10. according to the method described in claim 1, the pluggable equipment is equipped with LED light;The method also includes:
Control the working condition that the LED light prompts the user with the pluggable equipment;Wherein, the working condition includes The working condition of operation is executed in the described safe computing environment;And operation is completed in the safe computing environment Working condition.
11. a kind of data based on block chain deposit card device, applied to the pluggable equipment docked with terminal device;Wherein, institute It states pluggable equipment and is equipped with safe computing environment;It is stored in the safe computing environment corresponding with the pluggable equipment Private key;Described device includes:
Module is obtained, the data summarization of the collected target data of the terminal device is obtained;
Signature blocks, based on private key corresponding with the pluggable equipment to the data summarization in the safe computing environment It signs;
The data summarization after signature is distributed to the block chain, by the node device base in block chain by release module The signature of the data summarization is verified in the private key corresponding public key, and after the signature verification passes through, by institute It states data summarization and carries out data in block chain and deposit card.
12. device according to claim 11, the acquisition module:
Receive the data summarization by the collected target data of the terminal device that the terminal device is sent;Alternatively, receiving The terminal device send by the collected target data of the terminal device, and the target data described in local computing into Data summarization.
13. device according to claim 11, the signature blocks:
Obtain the identity information of the pluggable equipment inputted using user;
Authentication is carried out using user for described based on the identity information got;
If passed through using the authentication of user for described, based on pluggable being set with described in the safe computing environment Standby corresponding private key signs to the data summarization.
14. device according to claim 11, key schedule is stored in the safe computing environment;
Described device further include:
Authentication module obtains the identity of the pluggable equipment inputted when for the first time using the pluggable equipment using user Information;Authentication is carried out using user for described based on the identity information got;
Generation module, if passed through for described using the authentication of user, in the safe computing environment described in calling Key schedule generates the private key and public key;And the private key of generation and the identity using user are believed Breath is bound, and binding relationship is stored in the safe computing environment.
15. according to the method for claim 14, the signature blocks:
Obtain the identity information of the pluggable equipment inputted using user;
Determine the private key whether stored in the safe computing environment with identity information binding;
If so, being carried out based on the private key bound with the identity information to the data summarization in the safe computing environment Signature.
16. device according to claim 11, the release module:
The data summarization after signature is distributed to the block chain;Alternatively, the data summarization after signature is sent to The terminal device, the data summarization is distributed to the block chain by the terminal device.
17. device according to claim 11, the terminal device includes law-enforcing recorder or automobile data recorder;It is described Target data includes the combination of one or more of video data, audio data, image data.
18. device according to claim 11, the pluggable equipment is equipped with USB interface;The pluggable equipment is logical It crosses the USB interface and realizes that hardware docks with the terminal device.
19. device according to claim 11, the pluggable equipment is equipped with the safe computing chip of SE;The safety fortune Calculating environment is the safe computing environment built based on the safe computing chip of the SE.
20. device according to claim 11, the pluggable equipment is equipped with LED light;Described device further include:
Control module controls the working condition that the LED light prompts the user with the pluggable equipment;Wherein, the work It include that the working condition of operation is executed in the described safe computing environment as state;And in the safe computing environment Complete the working condition of operation.
21. a kind of pluggable equipment, comprising:
Processor;
For storing the memory of machine-executable instruction;
Wherein, the control that card is deposited with the data based on block chain based on block chain stored by reading and executing the memory The corresponding machine-executable instruction of logic processed, the processor are prompted to:
Obtain the data summarization of the collected target data of terminal device;Wherein, the pluggable equipment and the terminal device Docking;The pluggable equipment is equipped with safe computing environment;It stores in the safe computing environment and pluggable is set with described Standby corresponding private key;
It is signed based on private key corresponding with the pluggable equipment to the data summarization in the safe computing environment;
The data summarization after signature is distributed to the block chain, to be based on the private key by the node device in block chain Corresponding public key verifies the signature of the data summarization, and after the signature verification passes through, by the data summarization Data are carried out in block chain deposits card.
CN201811432455.5A 2018-11-28 2018-11-28 Block chain-based data evidence storing method and device and electronic equipment Active CN110033259B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201811432455.5A CN110033259B (en) 2018-11-28 2018-11-28 Block chain-based data evidence storing method and device and electronic equipment
CN202111243033.5A CN113793151A (en) 2018-11-28 2018-11-28 Block chain-based data evidence storing method and device and electronic equipment
TW108132026A TWI721552B (en) 2018-11-28 2019-09-05 Block chain-based data storage method and device, and electronic equipment
PCT/CN2019/110650 WO2020108114A1 (en) 2018-11-28 2019-10-11 Blockchain-based data attestation method and apparatus, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811432455.5A CN110033259B (en) 2018-11-28 2018-11-28 Block chain-based data evidence storing method and device and electronic equipment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202111243033.5A Division CN113793151A (en) 2018-11-28 2018-11-28 Block chain-based data evidence storing method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN110033259A true CN110033259A (en) 2019-07-19
CN110033259B CN110033259B (en) 2021-08-31

Family

ID=67235273

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111243033.5A Pending CN113793151A (en) 2018-11-28 2018-11-28 Block chain-based data evidence storing method and device and electronic equipment
CN201811432455.5A Active CN110033259B (en) 2018-11-28 2018-11-28 Block chain-based data evidence storing method and device and electronic equipment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202111243033.5A Pending CN113793151A (en) 2018-11-28 2018-11-28 Block chain-based data evidence storing method and device and electronic equipment

Country Status (3)

Country Link
CN (2) CN113793151A (en)
TW (1) TWI721552B (en)
WO (1) WO2020108114A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111079136A (en) * 2019-11-07 2020-04-28 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
WO2020108114A1 (en) * 2018-11-28 2020-06-04 阿里巴巴集团控股有限公司 Blockchain-based data attestation method and apparatus, and electronic device
CN112966042A (en) * 2019-12-12 2021-06-15 成都鼎桥通信技术有限公司 Law enforcement recorder information processing method and system based on block chain

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112182609B (en) * 2020-09-25 2024-02-02 中国建设银行股份有限公司 Block chain-based data uplink storage method, block chain-based data uplink traceability device and block chain-based data uplink traceability device
CN112153151B (en) * 2020-09-28 2024-02-02 山西万佳印业有限公司 Intelligent manufacturing workshop safety management method and system based on blockchain
CN112887375B (en) * 2021-01-13 2022-08-05 中南林业科技大学 Block chain-based message verification method and equipment
CN112734578B (en) * 2021-01-18 2024-02-13 北交金科金融信息服务有限公司 Enterprise parallel purchase and financing information service platform based on blockchain technology
CN112968782B (en) * 2021-04-07 2023-04-28 北京安天网络安全技术有限公司 Security evaluation method and system based on alliance chain
CN116957579A (en) * 2021-04-27 2023-10-27 支付宝(杭州)信息技术有限公司 Data storage method and device based on blockchain
CN113326504B (en) * 2021-07-01 2022-07-05 厦门致联科技有限公司 Block chain chaining method for preventing data tampering
TWI828055B (en) * 2022-01-28 2024-01-01 林楠桂 Vehicle transaction intelligent program certificate storage method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169125A (en) * 2017-05-31 2017-09-15 北京小米移动软件有限公司 The dispensing statistics acquisition methods and device of multimedia resource
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system
CN107959676A (en) * 2017-11-27 2018-04-24 杭州云象网络技术有限公司 A kind of back end hot-plug method for supporting block chain technology secrecy system
CN108632381A (en) * 2018-05-14 2018-10-09 济南浪潮高新科技投资发展有限公司 A kind of environment measure of supervision and system based on block chain
CN108717431A (en) * 2018-05-11 2018-10-30 中国科学院软件研究所 A kind of electronic evidence based on block chain deposits card, verification method and system

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI528217B (en) * 2014-07-02 2016-04-01 柯呈翰 A method and system for adding dynamic labels to a file and encrypting the file
EP3292484B1 (en) * 2015-05-05 2021-07-07 Ping Identity Corporation Identity management service using a block chain
US20160342989A1 (en) * 2015-05-21 2016-11-24 Mastercard International Incorporated Method and system for processing blockchain-based transactions on existing payment networks
US10402792B2 (en) * 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US20170124464A1 (en) * 2015-10-28 2017-05-04 Fractal Industries, Inc. Rapid predictive analysis of very large data sets using the distributed computational graph
KR101727126B1 (en) * 2015-12-29 2017-04-14 주식회사 코인플러그 Method and server for notarizing and verifying file
KR101772553B1 (en) * 2015-12-29 2017-08-30 주식회사 코인플러그 Method and server for notarizing and verifying file
CN107820238B (en) * 2016-09-12 2024-05-03 国民技术股份有限公司 SIM card, blockchain application security module, client and security operation method thereof
CN106452785B (en) * 2016-09-29 2019-05-17 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN107395557B (en) * 2017-03-28 2020-05-15 创新先进技术有限公司 Service request processing method and device
CN107392040B (en) * 2017-04-28 2019-08-09 阿里巴巴集团控股有限公司 A kind of method and device of common recognition verifying
CN107342866A (en) * 2017-06-30 2017-11-10 上海策赢网络科技有限公司 Electronic document verification method, equipment and system
CN107888375A (en) * 2017-11-08 2018-04-06 深圳市携网科技有限公司 A kind of electronic evidence safety system and method based on block chain technology
CN207504911U (en) * 2017-11-17 2018-06-15 北京亿生生网络科技有限公司 A kind of data deposit system based on block chain technology
CN108092982B (en) * 2017-12-22 2020-10-23 广东工业大学 Data storage method and system based on alliance chain
CN108549825A (en) * 2018-03-14 2018-09-18 中链科技有限公司 A kind of file deposits card, verification and the means of proof and device
CN108898389B (en) * 2018-06-26 2021-05-18 创新先进技术有限公司 Content verification method and device based on block chain and electronic equipment
CN113095822A (en) * 2018-06-27 2021-07-09 创新先进技术有限公司 Intelligent contract calling method and device based on block chain and electronic equipment
CN113434592A (en) * 2018-10-31 2021-09-24 创新先进技术有限公司 Block chain-based data evidence storing method and device and electronic equipment
CN109583230A (en) * 2018-10-31 2019-04-05 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN109660350A (en) * 2018-10-31 2019-04-19 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN113793151A (en) * 2018-11-28 2021-12-14 创新先进技术有限公司 Block chain-based data evidence storing method and device and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169125A (en) * 2017-05-31 2017-09-15 北京小米移动软件有限公司 The dispensing statistics acquisition methods and device of multimedia resource
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system
CN107959676A (en) * 2017-11-27 2018-04-24 杭州云象网络技术有限公司 A kind of back end hot-plug method for supporting block chain technology secrecy system
CN108717431A (en) * 2018-05-11 2018-10-30 中国科学院软件研究所 A kind of electronic evidence based on block chain deposits card, verification method and system
CN108632381A (en) * 2018-05-14 2018-10-09 济南浪潮高新科技投资发展有限公司 A kind of environment measure of supervision and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国人民银行科技司: "《移动金融关键技术与标准解读》", 31 March 2016, 中国金融出版社 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020108114A1 (en) * 2018-11-28 2020-06-04 阿里巴巴集团控股有限公司 Blockchain-based data attestation method and apparatus, and electronic device
CN111079136A (en) * 2019-11-07 2020-04-28 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN111079136B (en) * 2019-11-07 2022-02-11 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN112966042A (en) * 2019-12-12 2021-06-15 成都鼎桥通信技术有限公司 Law enforcement recorder information processing method and system based on block chain

Also Published As

Publication number Publication date
WO2020108114A1 (en) 2020-06-04
CN113793151A (en) 2021-12-14
TW202020701A (en) 2020-06-01
CN110033259B (en) 2021-08-31
TWI721552B (en) 2021-03-11

Similar Documents

Publication Publication Date Title
CN110033259A (en) Data based on block chain deposit card method and device, electronic equipment
CN109660350A (en) Data based on block chain deposit card method and device, electronic equipment
CN109639410A (en) Data based on block chain deposit card method and device, electronic equipment
TWI706368B (en) Block chain-based service leasing method, device, system and electronic equipment
CN108898389B (en) Content verification method and device based on block chain and electronic equipment
CN109583230A (en) Data based on block chain deposit card method and device, electronic equipment
CN109345259A (en) Virtual resource transfer method, device, medium and electronic equipment based on block chain
CN110401715B (en) Resource collection task management method, device, storage medium and system
CN105391840B (en) Automatically create destination application
CN109146679A (en) Intelligent contract call method and device, electronic equipment based on block chain
CN110060111A (en) Based on the invoice access method and device of block chain, electronic equipment
CN110889772B (en) Policy processing method and device, computer equipment and storage medium
CN108492180A (en) Assets management method and device, electronic equipment
CN112132293A (en) Calculation method, device, equipment and medium in longitudinal federal learning
CN108985257A (en) Method and apparatus for generating information
CN112257876A (en) Federal learning method, apparatus, computer device and medium
CN111340482B (en) Conflict detection method, device, node equipment and storage medium
CN111080443B (en) Block chain-based service processing method, device, equipment and storage medium
CN108694238A (en) Business data processing method, device based on block chain and storage medium
CN104850990A (en) Payment method and system thereof, key terminal and key support system
CN111339086A (en) Block processing method, and data query method and device based on block chain
CN110598460B (en) Block chain-based electronic signature method and device and storage medium
CN204614018U (en) A kind of payment system, key terminal and key support system
CN110046522A (en) Method for processing business and device, electronic equipment based on block chain
CN111212074B (en) Blockchain-based qualification identification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40010795

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant