Summary of the invention
It is not enough facilitated for a user to solve the problems, such as that existing network evidence deposits card verification mode, this specification is real
Apply that example provides a kind of network preservation of evidence, network evidence deposits card method of calibration and device, technical solution are as follows:
According to the 1st of this specification embodiment the aspect, a kind of network preservation of evidence method is provided, is set applied to evidence service
Standby, the evidence service equipment butts up against block chain network, which comprises
The evidence obtaining request that user sends is received, and is collected evidence for the specified network data of the evidence obtaining request, is obtained
To the network instrument of evidence;
At least one the secondary proof file for being associated with the network instrument of evidence is obtained, and according to the network evidence text
Part and at least one described secondary proof file execute Hash calculation, obtain depositing card cryptographic Hash;
The block chain network will be submitted to comprising the card transaction of depositing for depositing card cryptographic Hash, so as to the block chain network
Card transaction write-in block chain is deposited by described;
And the network instrument of evidence and the corresponding relationship deposited between card cryptographic Hash are recorded, also, by the net
The network instrument of evidence returns to the user.
According to the 2nd of this specification embodiment aspect, a kind of network evidence is provided and deposits card method of calibration, is applied to evidence and takes
Business equipment, the evidence service equipment butt up against block chain network, which comprises
The card verification of depositing that user sends is received to request;It is described deposit card verification request include target electronic file;
According to the corresponding relationship recorded in method described in the 1st aspect, the target electronic file pair is judged whether there is
That answers deposits card cryptographic Hash;
If it exists, then depositing for card cryptographic Hash is deposited comprising described in by block chain network verification and demonstrate,proves whether transaction has been written into
Block chain, and check results are fed back into the user.
According to the 3rd of this specification embodiment the aspect, a kind of network evidence protection device is provided, described device butts up against area
Block chain network, described device include:
Receiving module, receives the evidence obtaining request that user sends, and for the specified network data of the evidence obtaining request into
Row evidence obtaining, obtains the network instrument of evidence;
Computing module obtains at least one the secondary proof file for being associated with the network instrument of evidence, and according to described
The network instrument of evidence and at least one described secondary proof file execute Hash calculation, obtain depositing card cryptographic Hash;
Module is submitted, the block chain network will be submitted to comprising the card transaction of depositing for depositing card cryptographic Hash, so as to described
Block chain network deposits card transaction write-in block chain for described;
Logging modle records the network instrument of evidence and the corresponding relationship deposited between card cryptographic Hash;
The network instrument of evidence is returned to the user by return module.
According to the 4th of this specification embodiment aspect, a kind of network evidence is provided and deposits card calibration equipment, described device docking
In block chain network, described device includes:
Receiving module receives the card verification of depositing that user sends and requests;It is described deposit card verification request include target electronic file;
Judging treatmenting module judges whether there is the mesh according to the corresponding relationship recorded in method described in the 1st aspect
Electronic document is corresponding deposits card cryptographic Hash for mark;If it exists, then card cryptographic Hash is deposited comprising described by block chain network verification
Deposit card transaction whether written block chain, and check results are fed back into the user.
Technical solution provided by this specification embodiment, evidence service equipment not only can will be according to network evidences and corresponding
The obtained card cryptographic Hash of depositing of secondary proof submit to block chain network and carry out depositing card, also will record lower network evidence and deposited with described
Demonstrate,prove the corresponding relationship between cryptographic Hash.So, on the one hand, the network evidence that evidence service equipment only needs to obtain evidence obtaining returns
To user, user only needs the network evidence of keeping oneself care;On the other hand, subsequent can only use of user oneself is held
Some network evidences carry out depositing card verification to the request of evidence service equipment, and the network that evidence service equipment can be submitted according to user is demonstrate,proved
Accordingly and local record network evidence and deposit card cryptographic Hash between corresponding relationship execution deposit card verification.Pass through this specification reality
Example is applied, the burden that user takes care of file is alleviated, improves the convenience that user deposit card verification.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
This specification embodiment can be limited.
In addition, any embodiment in this specification embodiment does not need to reach above-mentioned whole effects.
Specific embodiment
In practical applications, it in order to ensure the network evidence for depositing card has judicial effect, needs to network evidence and corresponding
Secondary proof carry out block chain in the form of binding and deposit card.The reason is that, assume that only carrying out block chain to network evidence deposits card, that
It can not prove the authenticity to the evidence obtaining process of network evidence, leading to network evidence, there is no judicial evidence effect.And it assists
The effect of proof is, it was demonstrated that the evidence obtaining process to network evidence is genuine and believable.
Secondary proof associated by network evidence for example can be the electronics for carrying out the network evidence service provider of network forensics
Signature and/or evidence service equipment execute the evidence obtaining operation log that network forensics generate.
Evidence service equipment generally executes hash algorithm with corresponding secondary proof according to network evidence, obtains depositing card Hash
Value will deposit card cryptographic Hash and submit to block chain network and carry out depositing card.Therefore, if user will carry out network evidence to deposit card school
Test, it is also desirable to network evidence is all submitted into evidence service equipment with corresponding secondary proof so that evidence service equipment according to
The network evidence that user submits calculates cryptographic Hash with corresponding secondary proof, and then is verified in block chain.
This requires: 1, evidence service equipment not only need evidence obtaining obtained network evidence being supplied to user protect
Pipe, it is also necessary to corresponding secondary proof is also provided to user and carry out keeping (what otherwise user can not carry out network evidence deposits card
Verification);2, it when the network evidence that user needs to hold oneself carries out depositing card verification, had both needed to provide net to evidence service equipment
Network evidence, it is also desirable to provide corresponding secondary proof to evidence service equipment.
However, user needs additional keeping secondary proof, when carrying out depositing card verification, also additionally to upload auxiliary card
Bright, this brings unnecessary trouble to user.
In order to make those skilled in the art more fully understand the technical solution in this specification embodiment, below in conjunction with this
Attached drawing in specification embodiment is described in detail the technical solution in this specification embodiment, it is clear that described
Embodiment is only a part of the embodiment of this specification, instead of all the embodiments.The embodiment of base in this manual,
Those of ordinary skill in the art's every other embodiment obtained, all should belong to the range of protection.
Below in conjunction with attached drawing, the technical solution that each embodiment of this specification provides is described in detail.
Fig. 1 is a kind of flow diagram for network preservation of evidence method that this specification embodiment provides, including walks as follows
It is rapid:
S100: the evidence obtaining request that user sends is received, and is taken for the specified network data of the evidence obtaining request
Card, obtains the network instrument of evidence.
The executing subject of this method is the evidence service equipment of network evidence service provider, specifically can be network evidence clothes
The server of business quotient.Block chain program is installed on the evidence service equipment, for carrying out data interaction with block chain network,
Realize docking for the evidence service equipment and block chain network.
In this specification embodiment, the specified network data of evidence obtaining request is usually webpage, is also possible to other nets
Other data stored on network.
The mode that evidence service equipment collects evidence to network data can there are many.By taking network data is webpage as an example,
The accessible webpage of evidence service equipment simultaneously carries out screenshot evidence obtaining to webpage, and obtained screenshot is the network instrument of evidence;Evidence
Service equipment can also execute evidence obtaining process (video-waiting video playing on starting browser-opening webpage-broadcasting webpage
Terminate), the video recorded a video to evidence obtaining process is the network instrument of evidence.
S102: at least one the secondary proof file for being associated with the network instrument of evidence is obtained, and according to the network
The instrument of evidence and at least one described secondary proof file execute Hash calculation, obtain depositing card cryptographic Hash.
In this specification embodiment, evidence service equipment can be provided with secondary proof file generated logic in advance, make
At least one secondary proof can be determined based on the network instrument of evidence after obtaining the network instrument of evidence by obtaining evidence service equipment
File.For example, evidence service equipment can using from the operation log generated during evidence obtaining as secondary proof file,
The private key that evidence service provider can be used signs to the network instrument of evidence, obtains signature file as secondary proof file.
In this specification embodiment, as an alternative embodiment, in step s 102, it can be by the network
The instrument of evidence and at least one described secondary proof file mergences are at an electronic document, using the electronic document being merged into as object
Hash algorithm is executed, obtains depositing card cryptographic Hash.
As another optional embodiment, in step s 102, to the network instrument of evidence and described at least one
A secondary proof file carries out compression processing, obtains compressing file packet (for example, can be also possible to rar format with zip format).
Then, Hash calculation is executed by object of the compressing file packet, obtains depositing card cryptographic Hash.It correspondingly, can be by the file
Compressed package returns to the user, after the user decompresses the compressing file packet, obtains the network instrument of evidence.
In addition, as another optional embodiment, it in step s 302, can be based on the network instrument of evidence
The cryptographic Hash of cryptographic Hash and each secondary proof file constructs Merkel tree;The root cryptographic Hash of the Merkel tree is determined as
Deposit card cryptographic Hash.
S104: the block chain network will be submitted to comprising the card transaction of depositing for depositing card cryptographic Hash.
In this specification embodiment, building is traded comprising depositing the card of depositing of card cryptographic Hash, and will be deposited card transaction and be submitted to area
Block chain network, so that block chain network deposits card transaction write-in block chain for described.
S106: the network instrument of evidence and the corresponding relationship deposited between card cryptographic Hash are recorded, also, by the net
The network instrument of evidence returns to the user.
In this specification embodiment, the network instrument of evidence and at least one described secondary proof file are to bind
Mode, that is, depositing encapsulate in card transaction is to execute Hash according to the network evidence and at least one described secondary proof file to calculate
Card cryptographic Hash that method obtained deposit, rather than the cryptographic Hash of the network instrument of evidence.
In practical applications, on the one hand, for a user, it can be carried out depositing card verification using the network instrument of evidence,
It is natural logic;On the other hand, but there is no write-in block chains for the cryptographic Hash of the network instrument of evidence.Therefore, card clothes are deposited
Business equipment needs to record each of to be written deposit it is corresponding to demonstrate,prove cryptographic Hash which network instrument of evidence be in block chain.In this way, depositing card
Service equipment can be mapped to according to some network instrument of evidence to be verified and deposit card cryptographic Hash accordingly, to will include
The card transaction of depositing for depositing card cryptographic Hash is determined as the anchor point of the network instrument of evidence in block chain.
Furthermore it should be noted that in this specification embodiment, the execution opportunity of step S106 is not specifically limited.
For example, can before executing step S102, execute step S102 simultaneously or execute step S102 after, execute step S106.
In addition, executing the embodiment party that Hash calculation obtains depositing card cryptographic Hash by object of compressing file packet based on above-mentioned
Formula, can for each secondary proof file at least one described secondary proof file, record the secondary proof file with
The corresponding relationship deposited between card cryptographic Hash.In this way, user uses any secondary proof file, can also carry out depositing card school
It tests.
Further, in practical applications, the file format of the network instrument of evidence and any secondary proof file sometimes
File format is different, and the file format of any two secondary proof file is different.For example, the file format of the network instrument of evidence is
Mp4, the file format of the secondary proof file of operation log type are txt, the secondary proof file of service provider's signature type
File format is pdf.
In such a case, it is possible to it is directed to each file format in advance, the corresponding record sheet of creation this document format.Such as
This, can in the corresponding record sheet of file format of the network instrument of evidence, record the network instrument of evidence with it is described
The corresponding relationship between card cryptographic Hash is deposited, and, it can be for each auxiliary card at least one described secondary proof file
Prescribed paper records the secondary proof file with described and deposits card in the corresponding record sheet of file format of the secondary proof file
Corresponding relationship between cryptographic Hash.In this way, search efficiency can be promoted.
In addition, whether recording the network instrument of evidence in this specification embodiment and described deposit being demonstrate,proved between cryptographic Hash
Corresponding relationship still records each secondary proof file and the corresponding relationship deposited between card cryptographic Hash, all specifically includes: with
File is that object executes Hash calculation, obtains the cryptographic Hash of file;The cryptographic Hash and described deposit for recording file are demonstrate,proved between cryptographic Hash
Corresponding relationship.In this way, the evidence service equipment record occupied memory space of corresponding relationship is less, it is not necessarily to storage file sheet
Body.
Fig. 2 is the flow diagram that a kind of network evidence that this specification embodiment provides deposits card method of calibration, including such as
Lower step:
S200: it receives the card verification of depositing that user sends and requests.
The executing subject of method shown in Fig. 2 is evidence service equipment.
It is described deposit card verification request be user need to hold oneself electronic document (can be the network instrument of evidence,
It is also possible to the associated any secondary proof file of the network instrument of evidence, herein referred to as target electronic file) it carries out depositing card school
It is issued when testing and (verifying and whether deposited card).It is described deposit card verification request carry target electronic file.
S202: it is corresponding to judge whether there is the target electronic file for the corresponding relationship recorded in method according to Fig. 1
Deposit card cryptographic Hash.
S204: if it exists, then deposit whether depositing for card cryptographic Hash demonstrate,proves transaction comprising described by block chain network verification
Written block chain, and check results are fed back into the user.
As previously mentioned, evidence service equipment deposits card transaction for each of write-in block chain, record has this to deposit card transaction packet
What is contained deposits each electronic document (or cryptographic Hash of electronic document) corresponding to card cryptographic Hash.Therefore, if there is the target
Electronic document is corresponding to deposit card cryptographic Hash, then evidence service equipment judges that this deposits whether card cryptographic Hash has been write by block chain network
Enter block chain, if had been written into, just illustrate that target electronic file has deposited card, if be not written, just illustrates target electronic text
Part does not deposit card.
Further, card cryptographic Hash is deposited if there is no the cryptographic Hash of the target electronic file is corresponding, then deposit card clothes
Business equipment can refuse the card of depositing and verify request.
Further, in step S204, the suffix name of the available target electronic file of evidence service equipment;Root
According to the suffix name of acquisition, the file type of the target electronic file is determined;Judge the determining corresponding record sheet of file type
In deposit card cryptographic Hash with the presence or absence of the target electronic file is corresponding.
In Fig. 1 and method shown in Fig. 2, evidence service equipment can will not only be demonstrate,proved according to network evidence with corresponding auxiliary
Bright obtained card cryptographic Hash of depositing submits to block chain network and carries out depositing card, also will record lower network evidence with described and deposits card cryptographic Hash
Between corresponding relationship.So, on the one hand, evidence service equipment only needs the network evidence for obtaining evidence obtaining to return to user,
The network evidence that user only needs keeping oneself to be concerned about;On the other hand, user is subsequent can only use the net oneself held
Network evidence deposit card verification to the request of evidence service equipment, evidence service equipment can according to the network evidence that user submits and
Card verification is deposited in the network evidence of local record and the corresponding relationship execution deposited between card cryptographic Hash.By this specification embodiment,
The burden that user takes care of file is alleviated, the convenience that user deposit card verification is improved.
Fig. 3 is a kind of structural schematic diagram for network evidence protection device that this specification embodiment provides, described device pair
It is connected to block chain network, described device includes:
Receiving module 301 receives the evidence obtaining request that user sends, and the network data specified for the evidence obtaining request
It collects evidence, obtains the network instrument of evidence;
Computing module 302 obtains at least one the secondary proof file for being associated with the network instrument of evidence, and according to institute
It states the network instrument of evidence and at least one described secondary proof file executes Hash calculation, obtain depositing card cryptographic Hash;
Module 303 is submitted, the block chain network will be submitted to comprising the card transaction of depositing for depositing card cryptographic Hash, with toilet
It states block chain network and deposits card transaction write-in block chain for described;
Logging modle 304 records the network instrument of evidence and the corresponding relationship deposited between card cryptographic Hash;
The network instrument of evidence is returned to the user by return module 305.
The computing module 302 compresses the network instrument of evidence and at least one described secondary proof file
Processing, obtains compressing file packet;Hash calculation is executed by object of the compressing file packet, obtains depositing card cryptographic Hash.
The compressing file packet is returned to the user by the return module 305.
The logging modle 304, for each secondary proof file at least one described secondary proof file, record
The secondary proof file and the corresponding relationship deposited between card cryptographic Hash.
The file format of the network instrument of evidence is different from the file format of any secondary proof file, and any two are auxiliary
The file format of corroborative evidence prescribed paper is different;
Described device further include: creation module 306 is directed to each file format in advance, and creation this document format is corresponding
Record sheet;
The logging modle 304 records the net in the corresponding record sheet of file format of the network instrument of evidence
The network instrument of evidence and the corresponding relationship deposited between card cryptographic Hash;For each of at least one described secondary proof file
Secondary proof file records the secondary proof file and institute in the corresponding record sheet of file format of the secondary proof file
State the corresponding relationship deposited between card cryptographic Hash.
The logging modle 304 executes Hash calculation by object of file, obtains the cryptographic Hash of file;Record file
Cryptographic Hash and the corresponding relationship deposited between card cryptographic Hash.
Fig. 4 is that a kind of network evidence that this specification embodiment provides deposits card calibration equipment, and described device butts up against block
Chain network, described device include:
Receiving module 401 receives the card verification of depositing that user sends and requests;It is described deposit card verification request include target electronic text
Part;
Judging treatmenting module 402, the corresponding relationship recorded in method according to figure 1, judges whether there is the mesh
Electronic document is corresponding deposits card cryptographic Hash for mark;If it exists, then card cryptographic Hash is deposited comprising described by block chain network verification
Deposit card transaction whether written block chain, and check results are fed back into the user.
The judging treatmenting module 402 obtains the suffix name of the target electronic file;According to the suffix name of acquisition, really
The file type of the fixed target electronic file;Judge to whether there is the target in the determining corresponding record sheet of file type
Electronic document is corresponding to deposit card cryptographic Hash.
The judging treatmenting module 402 executes hash algorithm by object of the target electronic file, obtains the target
The cryptographic Hash of electronic document;The cryptographic Hash for judging whether there is the target electronic file corresponding deposits card cryptographic Hash.
The judging treatmenting module 402 then deposits card verification request if it does not exist described in refusal.
This specification embodiment also provides a kind of computer equipment, includes at least memory, processor and is stored in
On reservoir and the computer program that can run on a processor, wherein processor is realized shown in Fig. 1 or 2 when executing described program
The function of method.
Fig. 5 shows one kind provided by this specification embodiment and more specifically calculates device hardware structural schematic diagram,
The equipment may include: processor 1410, memory 1420, input/output interface 1430, communication interface 1440 and bus
1450.Wherein processor 1410, memory 1420, input/output interface 1430 and communication interface 1440 are real by bus 1450
The now communication connection inside equipment each other.
Processor 1410 can use general CPU (Central Processing Unit, central processing unit), micro- place
Reason device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one
Or the modes such as multiple integrated circuits are realized, for executing relative program, to realize technical side provided by this specification embodiment
Case.
Memory 1420 can use ROM (Read Only Memory, read-only memory), RAM (Random Access
Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 1420 can store
Operating system and other applications are realizing technical solution provided by this specification embodiment by software or firmware
When, relevant program code is stored in memory 1420, and execution is called by processor 1410.
Input/output interface 1430 is for connecting input/output module, to realize information input and output.Input and output/
Module can be used as component Configuration (not shown) in a device, can also be external in equipment to provide corresponding function.Wherein
Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display,
Loudspeaker, vibrator, indicator light etc..
Communication interface 1440 is used for connection communication module (not shown), to realize the communication of this equipment and other equipment
Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly
(such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 1450 include an access, equipment various components (such as processor 1410, memory 1420, input/it is defeated
Outgoing interface 1430 and communication interface 1440) between transmit information.
It should be noted that although above equipment illustrates only processor 1410, memory 1420, input/output interface
1430, communication interface 1440 and bus 1450, but in the specific implementation process, which can also include realizing normal fortune
Other assemblies necessary to row.In addition, it will be appreciated by those skilled in the art that, it can also be only comprising real in above equipment
Component necessary to existing this specification example scheme, without including all components shown in figure.
This specification embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the journey
The function of method shown in Fig. 1 or 2 is realized when sequence is executed by processor.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
As seen through the above description of the embodiments, those skilled in the art can be understood that this specification
Embodiment can be realized by means of software and necessary general hardware platform.Based on this understanding, this specification is implemented
Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words,
The computer software product can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are to make
It is each to obtain computer equipment (can be personal computer, server or the network equipment etc.) execution this specification embodiment
Method described in certain parts of a embodiment or embodiment.
System, method, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can
To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment
The combination of any several equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for method and
For apparatus embodiments, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method
The part of embodiment illustrates.Embodiment of the method described above is only schematical, wherein described be used as separation unit
The module that part illustrates may or may not be physically separated, can be when implementing this specification example scheme
The function of each module is realized in the same or multiple software and or hardware.It can also select according to the actual needs therein
Some or all of the modules achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not making the creative labor
In the case where, it can it understands and implements.
The above is only the specific embodiment of this specification embodiment, it is noted that for the general of the art
For logical technical staff, under the premise of not departing from this specification embodiment principle, several improvements and modifications can also be made, this
A little improvements and modifications also should be regarded as the protection scope of this specification embodiment.