CN110674532A - Tamper-proof method and device for evidence file - Google Patents
Tamper-proof method and device for evidence file Download PDFInfo
- Publication number
- CN110674532A CN110674532A CN201910866445.0A CN201910866445A CN110674532A CN 110674532 A CN110674532 A CN 110674532A CN 201910866445 A CN201910866445 A CN 201910866445A CN 110674532 A CN110674532 A CN 110674532A
- Authority
- CN
- China
- Prior art keywords
- evidence
- called
- evidence file
- verification
- hash value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides an evidence file tamper-proofing method and device, wherein the method comprises the following steps: determining a hash value corresponding to the evidence file to be called; carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result; and determining whether the evidence file to be called is tampered according to the verification result, storing the hash value of the evidence file in a block chain, and performing consensus matching verification on the hash value of the evidence file to be called in the block chain when the evidence file is called, so that whether the evidence file to be called is tampered can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Description
Technical Field
The invention relates to the technical field of file processing, in particular to an evidence file tamper-proofing method and device.
Background
The evidence file is a data file, which is usually used as record information of an event (such as a contract, a transaction record, a plan book and the like), and the evidence file has the possibility of being tampered from any stage from establishment to destruction, and once the evidence file is tampered, the evidence file has a great influence on the event. However, sometimes, after the evidence file is tampered, it is impossible to know whether the evidence file has been tampered in time, and therefore, when the called evidence file is a tampered file, a situation that is unfavorable to an owner of the evidence file often occurs, and therefore, the actual situation of the evidence file needs to be known in time.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides an evidence file tamper-proofing method and device.
The embodiment of the invention provides an evidence file tamper-proofing method, which comprises the following steps:
determining a hash value corresponding to the evidence file to be called;
carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and determining whether the evidence file to be called is tampered or not according to the verification result.
Optionally, before the evidence file to be called is called, a step of storing the evidence file is further included, where the step includes:
determining a hash value corresponding to the evidence file;
and carrying out consensus storage verification on the hash value of the evidence file in the block chain node, and synchronously storing the hash value after the verification is passed.
Optionally, before performing consensus storage verification on the hash value of the evidence file, an identity verification step is further included, where the identity verification step includes: and carrying out consensus identity verification on the node certificate in the block chain node, and carrying out Hash value consensus storage on the evidence file after the verification is passed.
Optionally, the method further comprises the step of counting the storage number of the evidence files and the verification number of the evidence files to be called.
An embodiment of the present invention provides an evidence file tamper-proofing device, including:
the scanning module is used for determining a hash value corresponding to the evidence file to be called;
the matching module is used for carrying out consensus matching verification on the hash value of the evidence file to be called in the block chain node to obtain a verification result;
and the determining module is used for determining whether the evidence file to be called is tampered according to the verification result.
Optionally, the system further comprises a storage module, configured to perform consensus storage verification on the hash value of the evidence file in the blockchain node, and store the hash value of the evidence file synchronously after the verification passes;
correspondingly, the scanning module is further configured to determine a hash value corresponding to the evidence file before the evidence file to be called is called.
Optionally, the system further includes an identity verification module, configured to perform consensus identity verification on the node certificate in the blockchain node before performing consensus storage verification on the hash values of the evidence files, and notify the storage module to perform hash value consensus storage of the evidence files after the verification is passed.
Optionally, the system further comprises a counting module, configured to count the storage number of the evidence files and the verification number of the evidence files to be called.
The embodiment of the invention provides electronic equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the steps of the evidence file tamper-proofing method.
Embodiments of the present invention provide a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the above-mentioned evidence file tamper-proofing method.
According to the tamper-proof method and device for the evidence file, the hash value of the evidence file is stored in the block chain, and when the evidence file is called, the hash value of the evidence file to be called is subjected to consensus matching verification in the block chain, so that whether the evidence file to be called is tampered or not can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flowchart of an embodiment of a tamper-proofing method for an evidence document according to the present invention;
FIG. 2 is a flowchart of an embodiment of a tamper-proofing method for an evidence document according to the present invention;
FIG. 3 is a flowchart of an embodiment of a tamper-proofing method for evidence files according to the present invention;
FIG. 4 is a block diagram of an embodiment of an apparatus for tamper-proofing an evidence document according to the present invention;
FIG. 5 is a block diagram of an embodiment of an apparatus for tamper-proofing an evidence document according to the present invention;
FIG. 6 is a block diagram of an embodiment of an apparatus for tamper-proofing an evidence document according to the present invention;
FIG. 7 is a block diagram of an embodiment of an electronic device according to the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows an evidence file tamper-proofing method provided by an embodiment of the present invention, which includes:
s11, determining a hash value corresponding to the evidence file to be called;
s12, carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and S13, determining whether the evidence file to be called is tampered or not according to the verification result.
With respect to the above steps S11-S13, it should be noted that, in the embodiment of the present invention, the hash value is a unique and extremely compact numerical representation of a piece of data file, i.e., the hash value may correspond to a unique identifier of a piece of data file. The evidence file is the basis of an event, and the event itself is greatly influenced once the evidence file is tampered. Therefore, when one of the evidence files needs to be called, it is necessary to know whether the called evidence file is tampered. In the embodiment of the invention, the evidence file which is to be called and is not verified whether the evidence file is tampered or not is used as the evidence file to be called.
In the embodiment of the invention, the consensus technology of the block chain is adopted to verify whether the evidence file is tampered. In a blockchain system, each blockchain node may be a server platform capable of service handling. The collection, storage, modification and the like of the evidence files can be realized from the server platform.
When an evidence file to be called needs to be called, the server platform firstly scans and determines the hash value corresponding to the evidence file to be called. Confirming the hash value is prior art and the detailed process is not described here.
After the hash value of the evidence file to be called is confirmed, the hash value is sent to each node of the block chain, and all nodes in the block chain perform a consensus matching verification processing process on the hash value. Here, the consensus matching verification is to match the hash value of the evidence file to be called with the hash value stored by the node by adopting a consensus algorithm. And all nodes in the block chain are matched with the hash value of the evidence file to be called according to the stored hash value to obtain a verification result, namely a result of whether the evidence file is matched or not, and the verification result is fed back to the server platform. When the verification result is that all nodes in the block chain store the hash value of the evidence file to be called, that is to say, all nodes in the block chain agree on the fact that the hash value of the evidence file to be called is stored. At this point, the server platform can know that the evidence file to be called has not been tampered. On the contrary, that is, the fact that all nodes in the blockchain do not agree on storing the hash value of the evidence file to be called, the server platform may know that the evidence file to be called is tampered or may know that the evidence file to be called is a new evidence file.
According to the tamper-proof method for the evidence file, the hash value of the evidence file is stored in the block chain, and when the evidence file is called, the hash value of the evidence file to be called is subjected to consensus matching verification in the block chain, so that whether the evidence file to be called is tampered or not can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Fig. 2 shows an evidence file tamper-proofing method provided by an embodiment of the present invention, including:
s21, determining a hash value corresponding to the evidence file;
s22, carrying out consensus storage verification on the hash value of the evidence file in the block chain node, and synchronously storing after the verification is passed;
s23, determining a hash value corresponding to the evidence file to be called;
s24, carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and S25, determining whether the evidence file to be called is tampered or not according to the verification result.
With respect to the above step S21 and step S22, it should be noted that, in the embodiment of the present invention, to know whether the evidence file already existing on the server platform is tampered with, the hash value of the evidence file is necessarily stored on the block chain first. If the hash value of the evidence file to be called does not exist on the block chain, the judgment lacks practical significance, and in this case, the called evidence file may be used as a new evidence file or a non-important evidence file.
In a blockchain system, each blockchain node may be a server platform capable of service handling. The collection, storage, modification and the like of the evidence files can be realized from the server platform. When an evidence file needs to be stored, the server platform scans and determines the hash value corresponding to the evidence file. The tamper-proof method for the evidence file only stores the hash value of the evidence file on the block chain actually, so that the storage resource space of the block on the chain can be reduced. The server platform sends the hash value of the evidence file to each node of the block chain, and performs a consensus storage verification processing process on the hash value. In the consensus storage verification, a consensus algorithm is adopted to enable all nodes on the block chain to agree on the event of storing the hash value of the evidence file, namely, the stored hash value of the evidence file can be determined to be legal. After consensus is achieved, each node on the blockchain stores a hash value of the evidence file.
Regarding the above steps S23-S25, it should be noted that these steps are the same as the above steps S11-S13 in principle, and are not described again here.
In addition, in a further embodiment based on the embodiment of the invention, the server platform can also count the storage number of the evidence files and the verification number of the evidence files to be called, and the actual situation of the evidence files in a period of time is counted.
According to the tamper-proof method for the evidence file, the hash value of the evidence file is stored in the block chain, and when the evidence file is called, the hash value of the evidence file to be called is subjected to consensus matching verification in the block chain, so that whether the evidence file to be called is tampered or not can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Fig. 3 shows an evidence file tamper-proofing method provided by an embodiment of the present invention, including:
s31, carrying out consensus identity authentication on the node certificate in the block chain node, and carrying out Hash value consensus storage on the evidence file after the authentication is passed;
s32, determining a hash value corresponding to the evidence file;
s33, carrying out consensus storage verification on the hash value of the evidence file in the block chain node, and synchronously storing after the verification is passed;
s34, determining a hash value corresponding to the evidence file to be called;
s35, carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and S36, determining whether the evidence file to be called is tampered or not according to the verification result.
With respect to the step S31, it should be noted that, in the embodiment of the present invention, in the blockchain, the data to be stored needs to be legal and authentic. Therefore, the node which needs to upload data can pass identity authentication, wherein the identity authentication comprises user identity, equipment identity, program identity and the like, and all information of valid identity can be verified. In the embodiment of the invention, the server platform sends the node certificate to the block chain, and performs the process of consensus identity authentication on the node certificate. In the consensus identity verification, a consensus algorithm is adopted to enable all nodes in the block chain to agree on the event that the node identity is acknowledged according to the node certificate, and after the agreement, the server platform can perform hash value consensus storage on the evidence file.
Regarding the above steps S32-S36, it should be noted that these steps are the same as the steps S21-S25 in principle, and are not described again here.
According to the tamper-proof method for the evidence file, the hash value of the evidence file is stored in the block chain, and when the evidence file is called, the hash value of the evidence file to be called is subjected to consensus matching verification in the block chain, so that whether the evidence file to be called is tampered or not can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Fig. 4 shows an apparatus for preventing tamper of evidence document provided by an embodiment of the present invention, which includes a scanning module 41, a matching module 42, and a determining module 43, wherein:
the scanning module 41 is configured to determine a hash value corresponding to the evidence file to be called;
the matching module 42 is configured to perform consensus matching verification on the hash value of the to-be-called evidence file in a block chain node to obtain a verification result;
and the determining module 43 is configured to determine whether the evidence file to be called is tampered according to the verification result.
Since the principle of the apparatus according to the embodiment of the present invention is the same as that of the method according to the above embodiment, further details are not described herein for further explanation.
It should be noted that, in the embodiment of the present invention, the relevant functional unit may be implemented by a hardware processor (hardware processor).
According to the tamper-proof device for the evidence files, the hash values of the evidence files are stored in the block chain, and when the evidence files are called, the hash values of the evidence files to be called are subjected to consensus matching verification in the block chain, so that whether the evidence files to be called are tampered or not can be determined according to the verification result, the actual conditions of the evidence files can be timely known, and the follow-up processing actions of the evidence files can be timely arranged.
Fig. 5 shows an apparatus for tamper-proofing an evidence document, which includes a scanning module, a matching module 42, a determining module 43, and a storage module 44, where the scanning module includes a first scanning module 411 and a second scanning module 412, where:
the first scanning module 411 is configured to determine a hash value corresponding to the evidence file before the evidence file to be called is called;
the storage module 44 is configured to perform consensus storage verification on the hash values of the evidence files in the blockchain nodes, and store the hash values synchronously after the verification is passed;
the second scanning module 412 is further configured to determine a hash value corresponding to the evidence file to be called;
the matching module 42 is configured to perform consensus matching verification on the hash value of the to-be-called evidence file in a block chain node to obtain a verification result;
and the determining module 43 is configured to determine whether the evidence file to be called is tampered according to the verification result.
Furthermore, the system also comprises a counting module which is used for counting the storage number of the evidence files and the verification number of the evidence files to be called.
Since the principle of the apparatus according to the embodiment of the present invention is the same as that of the method according to the above embodiment, further details are not described herein for further explanation.
It should be noted that, in the embodiment of the present invention, the relevant functional unit may be implemented by a hardware processor (hardware processor).
According to the tamper-proof device for the evidence files, the hash values of the evidence files are stored in the block chain, and when the evidence files are called, the hash values of the evidence files to be called are subjected to consensus matching verification in the block chain, so that whether the evidence files to be called are tampered or not can be determined according to the verification result, the actual conditions of the evidence files can be timely known, and the follow-up processing actions of the evidence files can be timely arranged.
Fig. 6 shows an apparatus for preventing evidence document from being tampered, which includes an identity verification module 45, a scanning module, a matching module 42, a determination module 43, and a storage module 44, where the scanning module includes a first scanning module 411 and a second scanning module 412, where:
the identity authentication module 45 is configured to perform consensus identity authentication on the node certificate in the block chain node before performing consensus storage authentication on the hash value of the evidence file, and inform the storage module of performing hash value consensus storage on the evidence file after the authentication is passed;
the first scanning module 411 is configured to determine a hash value corresponding to the evidence file before the evidence file to be called is called;
the storage module 44 is configured to perform consensus storage verification on the hash values of the evidence files in the blockchain nodes, and store the hash values synchronously after the verification is passed;
the second scanning module 412 is further configured to determine a hash value corresponding to the evidence file to be called;
the matching module 42 is configured to perform consensus matching verification on the hash value of the to-be-called evidence file in a block chain node to obtain a verification result;
and the determining module 43 is configured to determine whether the evidence file to be called is tampered according to the verification result.
Since the principle of the apparatus according to the embodiment of the present invention is the same as that of the method according to the above embodiment, further details are not described herein for further explanation.
It should be noted that, in the embodiment of the present invention, the relevant functional unit may be implemented by a hardware processor (hardware processor).
According to the tamper-proof device for the evidence files, the hash values of the evidence files are stored in the block chain, and when the evidence files are called, the hash values of the evidence files to be called are subjected to consensus matching verification in the block chain, so that whether the evidence files to be called are tampered or not can be determined according to the verification result, the actual conditions of the evidence files can be timely known, and the follow-up processing actions of the evidence files can be timely arranged.
Fig. 7 illustrates a physical structure diagram of an electronic device, and as shown in fig. 7, the electronic device may include: a processor (processor)71, a communication Interface (Communications Interface)72, a memory (memory)73 and a communication bus 74, wherein the processor 71, the communication Interface 72 and the memory 73 are communicated with each other via the communication bus 74. Processor 71 may call logic instructions in memory 73 to perform the following method: determining a hash value corresponding to the evidence file to be called; carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result; and determining whether the evidence file to be called is tampered or not according to the verification result.
In addition, the logic instructions in the memory 73 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
An embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the tamper-proofing method for an evidence file provided in the foregoing embodiments when executed by a processor, and the tamper-proofing method includes: determining a hash value corresponding to the evidence file to be called; carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result; and determining whether the evidence file to be called is tampered or not according to the verification result.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. An evidence document tamper-proofing method, comprising:
determining a hash value corresponding to the evidence file to be called;
carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and determining whether the evidence file to be called is tampered or not according to the verification result.
2. The tamper-proof method for the evidence file according to claim 1, further comprising a step of storing the evidence file before the evidence file to be called is called, the step comprising:
determining a hash value corresponding to the evidence file;
and carrying out consensus storage verification on the hash value of the evidence file in the block chain node, and synchronously storing the hash value after the verification is passed.
3. The tamper-proofing method for the evidence file according to claim 2, further comprising an identity verification step before the common storage verification of the hash value of the evidence file, the step comprising: and carrying out consensus identity verification on the node certificate in the block chain node, and carrying out Hash value consensus storage on the evidence file after the verification is passed.
4. The tamper-proofing method for the evidence files according to claim 1, further comprising the step of counting the number of stored evidence files and the number of verifications of the evidence files to be called.
5. An apparatus for tamper-proofing an evidence document, comprising:
the scanning module is used for determining a hash value corresponding to the evidence file to be called;
the matching module is used for carrying out consensus matching verification on the hash value of the evidence file to be called in the block chain node to obtain a verification result;
and the determining module is used for determining whether the evidence file to be called is tampered according to the verification result.
6. The tamper-resistant device for the evidence files according to claim 5, further comprising a storage module, configured to perform consensus storage verification on the hash values of the evidence files in the blockchain nodes, and store the hash values synchronously after the verification is passed;
correspondingly, the scanning module is further configured to determine a hash value corresponding to the evidence file before the evidence file to be called is called.
7. The tamper-resistant device for the evidence file according to claim 6, further comprising an identity verification module, configured to perform consensus identity verification on the node certificate in the blockchain node before performing consensus storage verification on the hash value of the evidence file, and notify the storage module to perform hash value consensus storage of the evidence file after the verification is passed.
8. The tamper-resistant device for the evidence files according to claim 5, further comprising a statistic module for counting the storage number of the evidence files and the verification number of the evidence files to be called.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the steps of the method of tamper-proofing an evidence file according to any one of claims 1 to 4.
10. A non-transitory computer readable storage medium, on which a computer program is stored, which, when executed by a processor, performs the steps of the method for tamper-proofing an evidence document according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910866445.0A CN110674532B (en) | 2019-09-12 | 2019-09-12 | Tamper-proof method and device for evidence file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910866445.0A CN110674532B (en) | 2019-09-12 | 2019-09-12 | Tamper-proof method and device for evidence file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110674532A true CN110674532A (en) | 2020-01-10 |
CN110674532B CN110674532B (en) | 2021-08-03 |
Family
ID=69076767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910866445.0A Active CN110674532B (en) | 2019-09-12 | 2019-09-12 | Tamper-proof method and device for evidence file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110674532B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113312326A (en) * | 2020-02-26 | 2021-08-27 | 伊姆西Ip控股有限责任公司 | Method, electronic device and computer program product for storage management |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018026727A1 (en) * | 2016-08-01 | 2018-02-08 | Cryptowerk Corp. | Computer-implemented method and system of tamper-evident recording of a plurality of service data items |
CN109067543A (en) * | 2018-07-24 | 2018-12-21 | 腾讯科技(深圳)有限公司 | Digital certificate management method, device, computer equipment and storage medium |
CN109766390A (en) * | 2019-01-16 | 2019-05-17 | 杭州趣链科技有限公司 | A kind of tamper-evident means diploma system based on block chain |
CN110061851A (en) * | 2019-04-28 | 2019-07-26 | 广州大学 | A kind of across trust domain authentication method and system of decentralization |
-
2019
- 2019-09-12 CN CN201910866445.0A patent/CN110674532B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018026727A1 (en) * | 2016-08-01 | 2018-02-08 | Cryptowerk Corp. | Computer-implemented method and system of tamper-evident recording of a plurality of service data items |
CN109067543A (en) * | 2018-07-24 | 2018-12-21 | 腾讯科技(深圳)有限公司 | Digital certificate management method, device, computer equipment and storage medium |
CN109766390A (en) * | 2019-01-16 | 2019-05-17 | 杭州趣链科技有限公司 | A kind of tamper-evident means diploma system based on block chain |
CN110061851A (en) * | 2019-04-28 | 2019-07-26 | 广州大学 | A kind of across trust domain authentication method and system of decentralization |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113312326A (en) * | 2020-02-26 | 2021-08-27 | 伊姆西Ip控股有限责任公司 | Method, electronic device and computer program product for storage management |
US11947427B2 (en) | 2020-02-26 | 2024-04-02 | EMC IP Holding Company LLC | Method, electronic device, and computer program product for storage management using blockchain |
CN113312326B (en) * | 2020-02-26 | 2024-04-16 | 伊姆西Ip控股有限责任公司 | Method, electronic device and computer program product for storage management |
Also Published As
Publication number | Publication date |
---|---|
CN110674532B (en) | 2021-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2021507339A5 (en) | ||
CN109784870B (en) | Contract management method, contract management device, computer equipment and computer readable storage medium | |
CN110083604B (en) | Data right confirming method and device | |
CN109684878B (en) | Privacy information tamper-proofing method and system based on block chain technology | |
CN110223075B (en) | Identity authentication method and device, computer equipment and storage medium | |
CN109543457B (en) | Method and device for controlling calling between intelligent contracts | |
CN106327140B (en) | Method and device for monitoring data modification | |
CN113656780A (en) | Cross-link access control method and device | |
CN113743833B (en) | Production control method and system based on identification analysis | |
CN112000853B (en) | Method for generating/feeding back unique identifier of equipment, medium, client and server | |
CN111028077B (en) | Intelligent contract protection method and system based on input filter | |
CN110266765B (en) | Real-time updating method and device for Internet of things online consensus node based on block chain | |
CN111817859A (en) | Data sharing method, device, equipment and storage medium based on zero knowledge proof | |
CN110674532B (en) | Tamper-proof method and device for evidence file | |
CN112184436A (en) | Data synchronization method, electronic device and readable storage medium | |
CN115242434A (en) | Application program interface API identification method and device | |
CN111917760B (en) | Network collaborative manufacturing cross-domain fusion trust management and control method based on identification analysis | |
CN110381114B (en) | Interface request parameter processing method and device, terminal equipment and medium | |
EP3174263A1 (en) | Apparatus and method for verifying detection rule | |
CN111585978A (en) | Method, client, server and system for intercepting false requests | |
CN110598479A (en) | Data processing method and device and computer readable storage medium | |
CN112765588B (en) | Identity recognition method and device, electronic equipment and storage medium | |
CN112700327B (en) | User confirmation method, device and system in financial scene | |
CN112751807B (en) | Secure communication method, device, system and storage medium | |
CN109960919B (en) | Contract signing method and block link point equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |