CN110347645B - Electronic file evidence storage method and device - Google Patents

Electronic file evidence storage method and device Download PDF

Info

Publication number
CN110347645B
CN110347645B CN201910531707.8A CN201910531707A CN110347645B CN 110347645 B CN110347645 B CN 110347645B CN 201910531707 A CN201910531707 A CN 201910531707A CN 110347645 B CN110347645 B CN 110347645B
Authority
CN
China
Prior art keywords
hash value
electronic
electronic file
file
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910531707.8A
Other languages
Chinese (zh)
Other versions
CN110347645A (en
Inventor
杨新颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201910531707.8A priority Critical patent/CN110347645B/en
Publication of CN110347645A publication Critical patent/CN110347645A/en
Application granted granted Critical
Publication of CN110347645B publication Critical patent/CN110347645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • G06F16/137Hash-based
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems

Abstract

An electronic document evidence-storing method and device are disclosed. On the one hand, the evidence-based service equipment encapsulates an evidence-based hash value obtained based on at least two electronic files to be authenticated into an evidence-based transaction, and submits the evidence-based transaction to the blockchain network once; on the other hand, the certification service set records the correspondence between each of the at least two electronic files and the certification hash value.

Description

Electronic file evidence storage method and device
Technical Field
The embodiment of the specification relates to the technical field of information, in particular to a method and a device for storing and verifying electronic files.
Background
It is well known that because of the non-deletable, non-tamperable nature of the data written to the blockchain, blockchain techniques can be employed to meet the needs of data certification.
Currently, there are several data logging service providers on the market. The method comprises the steps that a certification service device of a data certification service provider is in butt joint with a blockchain network, on one hand, electronic files uploaded by a user are received, and on the other hand, for each electronic file uploaded by the user, hash values of the electronic files are packaged into certification transactions and submitted to the blockchain network. The blockchain network writes the certification transaction corresponding to a certain electronic file into the blockchain, which means that the certification of the electronic file is realized.
If the user wants to check whether a certain electronic file uploaded by the user is already stored in the blockchain, the user can upload the electronic file to the storage and verification service equipment again for storage and verification, and the storage and verification service equipment can check whether the electronic file is already stored in the blockchain according to the hash value of the electronic file uploaded by the user again.
Based on the prior art, a more efficient method for storing and verifying electronic files is needed.
Disclosure of Invention
In order to solve the problem of low efficiency of the existing electronic file certification method, the embodiment of the specification provides an electronic file certification method and device, and the technical scheme is as follows:
according to an aspect 1 of embodiments of the present specification, there is provided an electronic document certification method applied to certification service equipment, the certification service equipment interfacing with a blockchain network, the method including:
acquiring at least two electronic files to be stored;
performing hash calculation according to the at least two electronic files to obtain a stored hash value;
constructing a forensic transaction comprising the forensic hash value, and submitting the forensic transaction to the blockchain network so that the blockchain network writes the forensic transaction into a blockchain;
and recording the corresponding relation between each electronic file and the certification hash value for each electronic file.
According to the 2 nd aspect of the embodiments of the present specification, there is provided a certification verification method for an electronic file, which is applied to a certification service device, the certification service device being docked to a blockchain network, the method including:
receiving a certificate storing verification request sent by a user; the certification verification request comprises a target electronic file;
judging whether a certificate hash value corresponding to the target electronic file exists or not according to the corresponding relation recorded in the method in the 1 st aspect;
if so, checking whether the proving transaction containing the proving hash value is written into the blockchain through the blockchain network, and feeding back a checking result to the user.
According to a 3 rd aspect of embodiments of the present specification, there is provided an electronic document authentication device, the device interfacing with a blockchain network, the device comprising:
the acquisition module is used for acquiring at least two electronic files to be stored;
the calculation module is used for performing hash calculation according to the at least two electronic files to obtain a stored certificate hash value;
a submitting module is constructed, a forensic transaction containing the forensic hash value is constructed, and the forensic transaction is submitted to the blockchain network, so that the blockchain network writes the forensic transaction into a blockchain;
and the corresponding relation recording module is used for recording the corresponding relation between each electronic file and the evidence-storing hash value according to each electronic file.
According to a 4 th aspect of embodiments of the present specification, there is provided a certification verification apparatus for an electronic document, the apparatus interfacing with a blockchain network, the apparatus comprising:
the receiving module is used for receiving a certificate storing and checking request sent by a user; the certification verification request comprises a target electronic file;
a judgment processing module for judging whether a stored hash value corresponding to the target electronic file exists or not according to the corresponding relation recorded in the method of any one of claims 1 to 4; if so, checking whether the proving transaction containing the proving hash value is written into the blockchain through the blockchain network, and feeding back a checking result to the user.
According to the technical scheme provided by the embodiment of the specification, on one hand, the certificate storing service equipment packages a certificate storing hash value obtained based on at least two electronic files to be stored into one certificate storing transaction, and submits the certificate storing transaction to a blockchain network once, so that more than one electronic file can be anchored in the blockchain through one transaction submitting operation; on the other hand, the certification service equipment records the corresponding relation between each electronic file in the at least two electronic files and the certification hash value, so that the record of which certification transaction in the blockchain each electronic file is specifically anchored in is equivalent to that, and the certification verification of a single electronic file is not influenced. According to the embodiment of the specification, the efficiency of verifying the electronic file can be improved on the premise that verification of the electronic file is not affected.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the embodiments of the disclosure.
Further, not all of the effects described above need be achieved in any of the embodiments of the present specification.
Drawings
In order to more clearly illustrate the embodiments of the present description or the technical solutions in the prior art, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present description, and other drawings may be obtained according to these drawings for a person having ordinary skill in the art.
FIG. 1 is a schematic diagram of a prior art method of electronic document authentication;
FIG. 2 is a schematic diagram of an electronic document certification method according to an embodiment of the present disclosure;
FIG. 3 is a schematic flow chart of a method for storing and verifying electronic files according to an embodiment of the present disclosure;
FIG. 4 is a schematic flow chart of a method for verifying a certificate of an electronic file according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic document storage device according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a certificate-holding and checking device for electronic files according to an embodiment of the present disclosure;
fig. 7 is a schematic diagram of a computer device for configuring the apparatus of the embodiments of the present specification.
Detailed Description
In the existing electronic document certification method, as shown in fig. 1, a single certification and a single verification are performed on an electronic document. Specifically, assuming that the user wants to document more than one electronic file, the electronic file needs to be uploaded to the document service device separately for each electronic file, the document service device encapsulates the hash value of the electronic file into a document transaction and submits the document transaction to the blockchain network, and the document transaction is finally written into the blockchain by the blockchain network, which means that the electronic file is anchored in the blockchain, so that the document is document stored. And if the verification is required to be carried out on a certain electronic file, positioning an anchor point of the electronic file in the blockchain according to the hash value of the electronic file (namely, the verification transaction containing the hash value of the electronic file), and if the anchor point exists, confirming that the verification is passed.
In the embodiment of the present disclosure, as shown in fig. 2, batch verification and single verification are performed on the electronic files, so that the efficiency of verifying the electronic files can be improved on the premise that verification of the single electronic file is not affected.
In order for those skilled in the art to better understand the technical solutions in the embodiments of the present specification, the technical solutions in the embodiments of the present specification will be described in detail below with reference to the drawings in the embodiments of the present specification, and it is apparent that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments obtained by a person skilled in the art based on the embodiments in the present specification shall fall within the scope of protection.
The following describes in detail the technical solutions provided by the embodiments of the present specification with reference to the accompanying drawings.
Fig. 3 is a flow chart of a method for storing and verifying an electronic file according to an embodiment of the present disclosure, including the following steps:
s300: and acquiring at least two electronic files to be authenticated.
The execution subject of the method is a certification service device of a data certification service provider, which can be a server of the data certification service provider. And the evidence storage service equipment is provided with a blockchain program for carrying out data interaction with the blockchain network so as to realize the butt joint of the evidence storage service equipment and the blockchain network.
The electronic files described herein are files that are generated in digital devices and environments, stored in carriers such as magnetic tapes, magnetic discs, optical discs, etc., and read, processed, and transferred over a communication network by devices such as computers. For example, in the context of web page evidence, the electronic file to be stored may be a web page screenshot file or a video file recording the process of evidence web page.
S302: and executing hash calculation according to the at least two electronic files to obtain a certification hash value.
As an optional implementation manner, in step S302, the at least two electronic files may be packaged into a file package, and a hash algorithm is performed with the file package as an object, to obtain a verification hash value.
As another optional implementation manner, in step S300, the certificate service device may specifically obtain a file compression packet (for example, may be in a zip format or may be in an rar format), where the file compression packet is obtained after compressing at least two electronic files to be authenticated. In step S302, a hash calculation is performed with the file compression packet as an object, to obtain a verified hash value.
Further, in step S300, at least two electronic files to be authenticated uploaded by the user may be received, and compression processing is performed on the at least two electronic files to obtain a file compression package. The file compression package uploaded by the user can also be received.
Further, as another alternative embodiment, in step S302, a merck tree may be constructed based on the hash value of each of the at least two electronic files to be authenticated; and determining the root hash value of the merck tree as a evidence hash value.
S304: and constructing a forensic transaction containing the forensic hash value, and submitting the forensic transaction to the blockchain network.
In the embodiment of the specification, the certificate hash value obtained based on at least two electronic files to be authenticated is written into the certificate transaction, and the certificate transaction is submitted to the blockchain network, so that the blockchain network writes the certificate transaction into the blockchain. Therefore, more than one electronic file can be anchored into the blockchain in batches through one transaction submitting operation, and the verification efficiency of the electronic file is improved.
S306: and recording the corresponding relation between each electronic file and the certification hash value.
In the present embodiment, the anchors of the at least two electronic files in the blockchain are identical (i.e., anchored to the same certification transaction), however, the certification transaction encapsulates not the hash value of the single electronic file, but one certification hash value derived from the at least two electronic files.
In practical applications, a user often needs to check the certificate of a single electronic file, and typically submits the single electronic file to a certificate authority to request checking. For the certification service set, the anchor point of the electronic file cannot be located in the blockchain only according to the electronic file.
Therefore, the forensic service apparatus needs to record which electronic files corresponding to each forensic hash value written in the blockchain are. In this way, the certification service device can map a certain electronic file to be verified to a corresponding certification hash value, so as to determine the certification transaction containing the certification hash value as an anchor point of the electronic file in the blockchain.
In addition, in the embodiment of the present specification, the execution timing of step S306 is not particularly limited. For example, step S306 may be performed before step S302 is performed, step S302 is performed simultaneously, or step S302 is performed thereafter.
Further, in step S306, for each electronic file, a hash calculation may be performed with the electronic file as an object, to obtain a hash value of the electronic file; then, the corresponding relation between the hash value of each electronic file and the stored hash value is recorded.
Fig. 4 is a flowchart of a method for verifying a certificate of an electronic file according to an embodiment of the present disclosure, including the following steps:
s400: and receiving a certification verification request sent by the user.
The method shown in fig. 4 is performed by a certification service set.
The certification verification request is issued when a user needs to perform certification verification (i.e., verify whether a certification has been already stored) on an electronic file to be certified (referred to herein as a target electronic file) that has been uploaded to a certification service device before the user. And the certification verification request carries the target electronic file.
S402: and judging whether a stored hash value corresponding to the hash value of the target electronic file exists or not according to the corresponding relation recorded in the method shown in fig. 3.
S404: if so, checking whether the proving transaction containing the proving hash value is written into the blockchain through the blockchain network, and feeding back a checking result to the user.
As described above, the certification service apparatus records, for each certification transaction written in the blockchain, each electronic file (or a hash value of an electronic file) corresponding to a certification hash value included in the certification transaction. Therefore, if the stored-certificate hash value corresponding to the target electronic file exists, the stored-certificate service equipment judges whether the stored-certificate hash value is written into the blockchain through the blockchain network, if so, the stored-certificate of the target electronic file is indicated, and if not, the stored-certificate of the target electronic file is indicated.
Further, if the forensic hash value corresponding to the target electronic file does not exist, the forensic service device may reject the forensic verification request.
By the method shown in fig. 3 and fig. 4, on one hand, the certificate service device encapsulates the certificate hash value obtained based on at least two electronic files to be authenticated into one certificate transaction, and submits the certificate transaction to the blockchain network once, so that more than one electronic file can be anchored in the blockchain through one transaction submitting operation; on the other hand, the certification service equipment records the corresponding relation between each electronic file in the at least two electronic files and the certification hash value, so that the record of which certification transaction in the blockchain each electronic file is specifically anchored in is equivalent to that, and the certification verification of a single electronic file is not influenced. According to the embodiment of the specification, the efficiency of verifying the electronic file can be improved on the premise that verification of the electronic file is not affected.
Fig. 5 is a schematic structural diagram of an electronic document authentication device according to an embodiment of the present disclosure, where the device interfaces with a blockchain network, and the device includes:
the obtaining module 501 obtains at least two electronic files to be authenticated;
the calculating module 502 performs hash calculation according to the at least two electronic files to obtain a stored certificate hash value;
a build commit module 503 builds a forensic transaction comprising the forensic hash value and commits the forensic transaction to the blockchain network so that the blockchain network writes the forensic transaction to a blockchain;
the correspondence recording module 504 records, for each electronic file, a correspondence between the electronic file and the prover hash value.
The acquiring module 501 acquires a file compression package; the file compression package is obtained after at least two electronic files to be stored are compressed;
the calculating module 502 performs hash calculation with the file compression packet as an object to obtain a stored hash value.
The obtaining module 501 receives at least two electronic files to be authenticated uploaded by a user, and compresses the at least two electronic files to obtain a file compression package; or receiving a file compression packet uploaded by a user.
The computing module 502 constructs a merck tree based on the hash value of each electronic file; and determining the root hash value of the merck tree as a evidence hash value.
The correspondence record module 504 performs hash computation with respect to each electronic file by taking the electronic file as an object to obtain a hash value of the electronic file; and recording the corresponding relation between the hash value of each electronic file and the certification hash value.
Fig. 6 is a schematic structural diagram of a certification verification device for electronic files according to an embodiment of the present disclosure, where the device interfaces with a blockchain network, and the device includes:
the receiving module 601 receives a certificate storing and checking request sent by a user; the certification verification request comprises a target electronic file;
the judging and processing module 602 judges whether a stored certificate hash value corresponding to the target electronic file exists according to the corresponding relation recorded in the method shown in fig. 3; if so, checking whether the proving transaction containing the proving hash value is written into the blockchain through the blockchain network, and feeding back a checking result to the user.
The judging and processing module 602 rejects the certificate-storing verification request if the certificate-storing verification request does not exist.
The embodiments of the present disclosure also provide a computer device at least including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the functions of the methods shown in fig. 3 or 4 when executing the program.
FIG. 7 illustrates a more specific hardware architecture diagram of a computing device provided by embodiments of the present description, which may include: a processor 1410, a memory 1420, an input/output interface 1430, a communication interface 1440, and a bus 1450. Wherein processor 1410, memory 1420, input/output interface 1430, and communication interface 1440 enable communication connections among each other within the device via a bus 1450.
The processor 1410 may be implemented by a general-purpose CPU (Central Processing Unit ), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc. for executing relevant programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1420 may be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory ), static storage device, dynamic storage device, or the like. The memory 1420 can store an operating system and other application programs, and when the technical solutions provided in the embodiments of the present specification are implemented in software or firmware, relevant program codes are stored in the memory 1420 and invoked by the processor 1410 to be executed.
The input/output interface 1430 is used to connect with an input/output module to achieve information input and output. The input/output module may be configured as a component in a device (not shown) or may be external to the device to provide corresponding functionality. Wherein the input devices may include a keyboard, mouse, touch screen, microphone, various types of sensors, etc., and the output devices may include a display, speaker, vibrator, indicator lights, etc.
The communication interface 1440 is used to connect a communication module (not shown in the figure) to enable the present device to interact with other devices for communication. The communication module may implement communication through a wired manner (such as USB, network cable, etc.), or may implement communication through a wireless manner (such as mobile network, WIFI, bluetooth, etc.).
Bus 1450 includes a path to transfer information between elements of the device (e.g., processor 1410, memory 1420, input/output interface 1430, and communication interface 1440).
It should be noted that although the above-described device only shows processor 1410, memory 1420, input/output interface 1430, communication interface 1440, and bus 1450, in particular implementations, the device may include other components necessary to achieve proper operation. Furthermore, it will be understood by those skilled in the art that the above-described apparatus may include only the components necessary to implement the embodiments of the present description, and not all the components shown in the drawings.
The present description also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the functions of the method shown in fig. 3 or 4.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
From the foregoing description of embodiments, it will be apparent to those skilled in the art that the present embodiments may be implemented in software plus a necessary general purpose hardware platform. Based on such understanding, the technical solutions of the embodiments of the present specification may be embodied in essence or what contributes to the prior art in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments or some parts of the embodiments of the present specification.
The system, method, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. A typical implementation device is a computer, which may be in the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email device, game console, tablet computer, wearable device, or a combination of any of these devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the method and apparatus embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, with reference to the description of the method embodiments in part. The above-described method embodiments are merely illustrative, in that the modules illustrated as separate components may or may not be physically separate, and the functions of the modules may be implemented in the same piece or pieces of software and/or hardware when implementing the embodiments of the present disclosure. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
The foregoing is merely a specific implementation of the embodiments of this disclosure, and it should be noted that, for a person skilled in the art, several improvements and modifications may be made without departing from the principles of the embodiments of this disclosure, and these improvements and modifications should also be considered as protective scope of the embodiments of this disclosure.

Claims (15)

1. An electronic document certification method applied to certification service equipment, wherein the certification service equipment is in butt joint with a blockchain network, and the method comprises the following steps:
acquiring at least two electronic files to be stored;
performing hash calculation according to the at least two electronic files to obtain a stored hash value;
constructing a forensic transaction comprising the forensic hash value, and submitting the forensic transaction to the blockchain network so that the blockchain network writes the forensic transaction into a blockchain;
and recording the corresponding relation between each electronic file and the certification hash value for each electronic file.
2. The method of claim 1, wherein the obtaining at least two electronic files to be authenticated specifically comprises:
acquiring a file compression package; the file compression package is obtained after at least two electronic files to be stored are compressed;
performing hash calculation according to the at least two electronic files to obtain a certification hash value, wherein the method specifically comprises the following steps:
and carrying out hash calculation by taking the file compression packet as an object to obtain a certification hash value.
3. The method of claim 2, obtaining a file compression package, specifically comprising:
receiving at least two electronic files to be authenticated uploaded by a user, and compressing the at least two electronic files to obtain a file compression package;
or alternatively
And receiving the file compression packet uploaded by the user.
4. The method of claim 1, wherein the hash calculation is performed according to the at least two electronic files to obtain a verified hash value, and specifically comprises:
constructing a merck tree based on the hash value of each electronic file;
and determining the root hash value of the merck tree as a evidence hash value.
5. The method of claim 1, wherein recording, for each electronic file, a correspondence between the electronic file and the proved hash value, specifically comprises:
aiming at each electronic file, carrying out hash calculation by taking the electronic file as an object to obtain a hash value of the electronic file;
and recording the corresponding relation between the hash value of each electronic file and the certification hash value.
6. A forensic verification method for an electronic file, applied to a forensic service device, the forensic service device interfacing to a blockchain network, the method comprising:
receiving a certificate storing verification request sent by a user; the certification verification request comprises a target electronic file;
the corresponding relation recorded in the method according to any one of claims 1 to 4, judging whether a stored certificate hash value corresponding to the target electronic file exists;
if so, checking whether the proving transaction containing the proving hash value is written into the blockchain through the blockchain network, and feeding back a checking result to the user.
7. The method of claim 6, the method further comprising:
and if not, rejecting the certification verification request.
8. An electronic document certification device, the device interfacing to a blockchain network, the device comprising:
the acquisition module is used for acquiring at least two electronic files to be stored;
the calculation module is used for performing hash calculation according to the at least two electronic files to obtain a stored certificate hash value;
a submitting module is constructed, a forensic transaction containing the forensic hash value is constructed, and the forensic transaction is submitted to the blockchain network, so that the blockchain network writes the forensic transaction into a blockchain;
and the corresponding relation recording module is used for recording the corresponding relation between each electronic file and the evidence-storing hash value according to each electronic file.
9. The apparatus of claim 8, the acquisition module to acquire a file compression package; the file compression package is obtained after at least two electronic files to be stored are compressed;
and the calculation module performs hash calculation by taking the file compression packet as an object to obtain a certification hash value.
10. The device of claim 9, wherein the obtaining module receives at least two electronic files to be authenticated uploaded by a user, and compresses the at least two electronic files to obtain a file compression package; or receiving a file compression packet uploaded by a user.
11. The apparatus of claim 8, the computing module to construct a merck tree based on the hash value of each electronic file; and determining the root hash value of the merck tree as a evidence hash value.
12. The apparatus of claim 8, wherein the correspondence recording module performs, for each electronic file, a hash calculation with respect to the electronic file to obtain a hash value of the electronic file; and recording the corresponding relation between the hash value of each electronic file and the certification hash value.
13. A forensic verification device for electronic files, the device interfacing to a blockchain network, the device comprising:
the receiving module is used for receiving a certificate storing and checking request sent by a user; the certification verification request comprises a target electronic file;
a judgment processing module for judging whether a stored hash value corresponding to the target electronic file exists or not according to the corresponding relation recorded in the method of any one of claims 1 to 4; if so, checking whether the proving transaction containing the proving hash value is written into the blockchain through the blockchain network, and feeding back a checking result to the user.
14. The apparatus of claim 13, the determination processing module to reject the challenge request if not.
15. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1-7 when the program is executed by the processor.
CN201910531707.8A 2019-06-19 2019-06-19 Electronic file evidence storage method and device Active CN110347645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910531707.8A CN110347645B (en) 2019-06-19 2019-06-19 Electronic file evidence storage method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910531707.8A CN110347645B (en) 2019-06-19 2019-06-19 Electronic file evidence storage method and device

Publications (2)

Publication Number Publication Date
CN110347645A CN110347645A (en) 2019-10-18
CN110347645B true CN110347645B (en) 2023-10-10

Family

ID=68182385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910531707.8A Active CN110347645B (en) 2019-06-19 2019-06-19 Electronic file evidence storage method and device

Country Status (1)

Country Link
CN (1) CN110347645B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866265A (en) * 2019-11-19 2020-03-06 腾讯科技(深圳)有限公司 Data storage method, device and storage medium based on block chain
CN110879903B (en) * 2019-11-20 2024-02-02 京东科技信息技术有限公司 Evidence storage method, evidence verification method, evidence storage device, evidence verification equipment and evidence verification medium
CN113297223B (en) * 2021-05-31 2022-08-02 浙江数秦科技有限公司 Block chain-based electronic data real-time certificate storing system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815530A (en) * 2016-12-26 2017-06-09 北京爱接力科技发展有限公司 Data deposit card method, data verification method and device
CN109101572A (en) * 2018-07-17 2018-12-28 何晓行 Card method, apparatus and server, storage medium are deposited based on block chain
CN109582885A (en) * 2018-10-31 2019-04-05 阿里巴巴集团控股有限公司 It is a kind of that the method and device that block chain deposits card is carried out to webpage by webpage monitoring
CN109614766A (en) * 2018-10-31 2019-04-12 阿里巴巴集团控股有限公司 It is a kind of that the method and device that block chain deposits card is carried out to webpage by file acquisition
WO2019078623A1 (en) * 2017-10-17 2019-04-25 주식회사 코인플러그 Blockchain-based payment method, and payment server using same

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815530A (en) * 2016-12-26 2017-06-09 北京爱接力科技发展有限公司 Data deposit card method, data verification method and device
WO2019078623A1 (en) * 2017-10-17 2019-04-25 주식회사 코인플러그 Blockchain-based payment method, and payment server using same
CN109101572A (en) * 2018-07-17 2018-12-28 何晓行 Card method, apparatus and server, storage medium are deposited based on block chain
CN109582885A (en) * 2018-10-31 2019-04-05 阿里巴巴集团控股有限公司 It is a kind of that the method and device that block chain deposits card is carried out to webpage by webpage monitoring
CN109614766A (en) * 2018-10-31 2019-04-12 阿里巴巴集团控股有限公司 It is a kind of that the method and device that block chain deposits card is carried out to webpage by file acquisition

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于私有链的存证云盘系统方案设计;黄永洪等;《信息技术与标准化》;20180710(第07期);全文 *

Also Published As

Publication number Publication date
CN110347645A (en) 2019-10-18

Similar Documents

Publication Publication Date Title
TWI688281B (en) Payment assistance method, device and equipment
CN110334542B (en) Network evidence preservation and network evidence preservation verification method and device
CN110347645B (en) Electronic file evidence storage method and device
CN108965250B (en) Digital certificate installation method and system
US11379836B2 (en) Methods and systems for recording data based on plurality of blockchain networks
US10911251B2 (en) Blockchain ledger authentication
CN111899097B (en) Method and system for accepting blockchain certification transaction
WO2020155839A1 (en) Blockchain-based method and device for performing scene-based deposition on face information
CN110347745B (en) Time service authentication method, device and equipment for block chain type account book
CN110147410B (en) Data verification method, system, device and equipment in block chain type account book
CN113535721A (en) Data writing method and device
EP3813001A1 (en) Data reading method based on a plurality of block chain networks and system
US11916898B2 (en) Multi-legged network attribution using tracking tokens and attribution stack
WO2023241060A1 (en) Data access method and apparatus
CN110516463B (en) Method and apparatus for generating information
CN113220640B (en) Arbitration method and device based on block chain
WO2022028196A1 (en) Payment verification method and system
CN111027972A (en) Data verification method and device based on block chain and electronic equipment
CN111464319B (en) Transaction storage and signature verification method based on centralized block chain type account book
KR102089629B1 (en) Method for processing data and an electronic device thereof
CN111899104B (en) Service execution method and device
CN110278241B (en) Registration request processing method and device
CN112711955A (en) NFC information transmission method, NFC information transmission device and NFC terminal
CN112379967B (en) Simulator detection method, device, equipment and medium
CN109255596B (en) Method and device for getting password red envelope

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40015740

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant