CN110995446B - Evidence verification method, device, server and storage medium - Google Patents

Evidence verification method, device, server and storage medium Download PDF

Info

Publication number
CN110995446B
CN110995446B CN201911246519.7A CN201911246519A CN110995446B CN 110995446 B CN110995446 B CN 110995446B CN 201911246519 A CN201911246519 A CN 201911246519A CN 110995446 B CN110995446 B CN 110995446B
Authority
CN
China
Prior art keywords
evidence
hash value
algorithm
certificate
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911246519.7A
Other languages
Chinese (zh)
Other versions
CN110995446A (en
Inventor
蔡弋戈
秦青
王乐庆
杨晨
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911246519.7A priority Critical patent/CN110995446B/en
Publication of CN110995446A publication Critical patent/CN110995446A/en
Application granted granted Critical
Publication of CN110995446B publication Critical patent/CN110995446B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The embodiment of the invention discloses an evidence verification method, an evidence verification device, electronic equipment and a storage medium. The evidence verification method comprises the following steps: acquiring a certificate storing identification corresponding to the target electronic evidence; acquiring a target block corresponding to the evidence storing identification in the block chain network, and extracting an evidence certificate from the target block; and when the evidence certificate is a legal certificate and is consistent with the target electronic evidence, confirming that the target electronic evidence is valid. Therefore, data written into the blockchain network cannot be tampered, so that the evidence certificate of the blockchain network can be guaranteed to be authentic and is not tampered. And comparing the target electronic evidence with the evidence certificate in the target block, and determining whether the target electronic evidence is tampered according to the condition whether the target electronic evidence is consistent with the evidence certificate in the block chain network. Therefore, the court can verify whether the electronic evidence to be used is tampered according to the evidence certificate in the block chain.

Description

Evidence verification method, device, server and storage medium
Technical Field
The invention relates to the technical field of evidence security, in particular to an evidence verification method, an evidence verification device, a server and a storage medium.
Background
With the development of science and technology, electronic commerce and trade activities and many other network-based interpersonal communications are occurring in large quantities, and electronic files have become important carriers for transferring information and recording facts. In these aspects, once a dispute or case occurs, the related electronic files become important evidences, and the electronic files can be understood as electronic evidences. Electronic evidence is electronic data that is studied as evidence that can prove case-related facts. But the security of the electronic evidence is difficult to guarantee, for example, the electronic evidence is easy to be tampered, and the electronic evidence obtained by a court is likely to be the evidence of illegal tampering.
Disclosure of Invention
The embodiment of the invention provides an evidence verification method, an evidence verification device, electronic equipment and a storage medium.
In one aspect, an embodiment of the present invention provides an evidence verification method, including:
acquiring a certificate storage identifier corresponding to the target electronic evidence;
acquiring a target block corresponding to the evidence storing identification in a block chain network, and extracting an evidence certificate from the target block, wherein the evidence certificate is generated according to an initial electronic evidence after an evidence management organization verifies the legality of the initial electronic evidence corresponding to the target electronic evidence;
and when the evidence certificate is a legal certificate and is consistent with the target electronic evidence, confirming that the target electronic evidence is valid.
In some embodiments, the evidence certificate includes evidence content information;
when the evidence certificate is a legal certificate and is consistent with the target electronic evidence, confirming that the target electronic evidence is valid comprises:
verifying the validity of the evidence content information;
when the evidence content information is legal, comparing the evidence content information with the target electronic evidence;
and when the target electronic evidence is consistent with the evidence content information, confirming that the target electronic evidence is valid.
In some embodiments, the evidence content information is data encrypted by an evidence encryption algorithm, and the verifying the validity of the evidence content information includes:
decrypting the evidence content information by using an evidence decryption algorithm corresponding to the evidence encryption algorithm;
and when the decryption is successful, confirming that the evidence content information is legal.
In some embodiments, the evidence certificate further includes data size information of the evidence content information, and the verifying the validity of the evidence content information before decrypting the evidence content information by using an evidence decryption algorithm corresponding to the evidence encryption algorithm further includes:
confirming that the data size of the evidence content information is consistent with the data size information.
In some embodiments, the evidence content information includes a first hash value, the first hash value is obtained by processing an initial electronic evidence corresponding to the target electronic evidence by using a first algorithm, and the comparing the evidence content information with the target electronic evidence includes:
processing the target electronic evidence by using a second algorithm to obtain a second hash value;
comparing the first hash value with the second hash value;
the confirming that the target electronic evidence is valid when the target electronic evidence is consistent with the evidence content information comprises:
and when the hash value relationship corresponds to the algorithm relationship, determining that the target electronic evidence is valid, wherein the hash value relationship is the relationship between a first hash value and a second hash value, and the algorithm relationship is the relationship between the first algorithm and the second algorithm.
In some embodiments, the evidence content information includes a first hash value, the first hash value is obtained by processing, by a first algorithm, encrypted information and an initial electronic evidence corresponding to the target electronic evidence, where the encrypted information is provided by a user providing the initial electronic evidence, and the comparing the evidence content information with the target electronic evidence includes:
acquiring encrypted information provided by the user, and processing the encrypted information and the target electronic evidence by using a second algorithm to obtain a second hash value;
comparing the first hash value with the second hash value;
the confirming that the target electronic evidence is valid when the target electronic evidence is consistent with the evidence content information comprises:
and when the hash value relationship corresponds to the algorithm relationship, determining that the target electronic evidence is valid, wherein the hash value relationship is the relationship between a first hash value and a second hash value, and the algorithm relationship is the relationship between the first algorithm and the second algorithm.
In some embodiments, the first algorithm is different from the second algorithm, and the validating the target electronic evidence when the hash value relationship corresponds to an algorithm relationship comprises:
according to the algorithm relationship, obtaining a target hash value relationship which needs to be met by the first hash value and the second hash value when the target electronic evidence is consistent with the initial electronic evidence;
and when the hash value relation accords with the target hash value relation, confirming that the target electronic evidence is valid.
In a second aspect, an embodiment of the present application further provides an evidence verification apparatus, including:
the identification acquisition module is used for acquiring a certificate storage identification corresponding to the target electronic evidence;
the certificate acquisition module is used for acquiring a target block corresponding to the certificate storage identification in a block chain network and extracting an evidence certificate from the target block, wherein the evidence certificate is generated according to an initial electronic evidence corresponding to the target electronic evidence after an evidence management mechanism verifies the legality of the initial electronic evidence;
and the verification module is used for confirming that the target electronic evidence is valid when the evidence certificate is a legal certificate and conforms to the target electronic evidence.
In some embodiments, the evidence certificate includes evidence content information;
the authentication module includes:
a first verifying unit, configured to verify validity of the evidence content information;
the comparison unit is used for comparing the evidence content information with the target electronic evidence when the evidence content information is legal;
and the second verification unit is used for confirming that the target electronic evidence is valid when the target electronic evidence is consistent with the evidence content information.
In some embodiments, the evidence content information is data encrypted by an evidence encryption algorithm, and the first verification unit is specifically configured to:
decrypting the evidence content information by using an evidence decryption algorithm corresponding to the evidence encryption algorithm;
and when the decryption is successful, confirming that the evidence content information is legal.
In some embodiments, the evidence certificate further includes data size information of the evidence content information, and the verification module further includes a third verification unit configured to confirm that the data size of the evidence content information matches the data size information.
In some embodiments, the evidence content information includes a first hash value, the first hash value is obtained by processing an initial electronic evidence corresponding to the target electronic evidence by using a first algorithm, and the comparing unit is specifically configured to:
processing the target electronic evidence by using a second algorithm to obtain a second hash value;
comparing the first hash value with the second hash value;
the second verification unit is specifically configured to:
and when the hash value relationship corresponds to the algorithm relationship, determining that the target electronic evidence is valid, wherein the hash value relationship is the relationship between a first hash value and a second hash value, and the algorithm relationship is the relationship between the first algorithm and the second algorithm.
In some embodiments, the evidence content information includes a first hash value, the first hash value is obtained by processing, by using a first algorithm, encrypted information and an initial electronic evidence corresponding to the target electronic evidence, where the encrypted information is provided by a user who provides the initial electronic evidence, and the comparing unit is specifically configured to:
acquiring encryption information provided by the user, and processing the encryption information and the target electronic evidence by using a second algorithm to obtain a second hash value;
comparing the first hash value with the second hash value;
the second verification unit is specifically configured to:
and when the hash value relationship corresponds to the algorithm relationship, determining that the target electronic evidence is valid, wherein the hash value relationship is the relationship between a first hash value and a second hash value, and the algorithm relationship is the relationship between the first algorithm and the second algorithm.
In some embodiments, when the first algorithm is different from the second algorithm, and the hash value relationship corresponds to an algorithm relationship, the second verification unit is specifically configured to:
according to the algorithm relationship, obtaining a target hash value relationship which needs to be met by the first hash value and the second hash value when the target electronic evidence is consistent with the initial electronic evidence;
and when the hash value relation accords with the target hash value relation, confirming that the target electronic evidence is valid.
In a third aspect, the present application also provides an electronic device comprising a processor, a memory, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps of the evidence verification method of any of the above embodiments.
In a fourth aspect, embodiments of the present application further provide a computer storage medium, where one or more first instructions are stored, and the one or more first instructions are adapted to be loaded by a processor and to perform the evidence verification method according to any one of the foregoing embodiments.
According to the technical scheme of the embodiment of the application, a certificate storing identification corresponding to the electronic evidence is obtained firstly; then acquiring a target block corresponding to the evidence storage identification, and extracting an evidence certificate from the target block; and when the evidence certificate is a legal certificate and is consistent with the target electronic evidence, confirming that the target electronic evidence is valid. Therefore, data written into the blockchain network cannot be tampered, so that the evidence certificate of the blockchain network can be guaranteed to be authentic and is not tampered. And comparing the target electronic evidence with the evidence certificate in the target block, and determining whether the target electronic evidence is tampered according to whether the target electronic evidence is consistent with the evidence certificate in the block chain network. Therefore, the court can verify whether the electronic evidence to be used is tampered according to the evidence certificate in the block chain, and the phenomenon that the court accepts the tampered electronic evidence without knowing the tampered electronic evidence to cause a large judicial accident is avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a data sharing system according to an embodiment of the present application;
FIG. 2 is a block diagram of a data sharing system according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a data structure when a new block is generated in the data sharing system according to an embodiment of the present application;
FIG. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
FIG. 5 is a schematic flow chart diagram of an evidence verification method according to an embodiment of the present application;
fig. 6 is a scene schematic diagram of an application scenario related to an evidence verification method according to an embodiment of the present application;
fig. 7 is a block diagram of an evidence verification apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
Referring to the data sharing system 100 shown in fig. 1, the data sharing system 100 refers to a system for performing data sharing between nodes, the data sharing system may include a plurality of nodes 101, and the plurality of nodes 101 may refer to respective clients in the data sharing system. Each node 101 may receive input information while operating normally and maintain shared data within the data sharing system based on the received input information. In order to ensure information intercommunication in the data sharing system, information connection can exist between each node in the data sharing system, and information transmission can be carried out between the nodes through the information connection. For example, when an arbitrary node in the data sharing system receives input information, other nodes in the data sharing system acquire the input information according to a consensus algorithm, and store the input information as data in shared data, so that the data stored on all the nodes in the data sharing system are consistent.
Each node in the data sharing system has a node identifier corresponding thereto, and each node in the data sharing system may store a node identifier of another node in the data sharing system, so that the generated block is broadcast to the other node in the data sharing system according to the node identifier of the other node in the following. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address and any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
Figure 448890DEST_PATH_IMAGE001
Each node in the data sharing system stores an identical blockchain, and the blockchains on the nodes form a blockchain system. The block chain is composed of a plurality of blocks, referring to fig. 2, the block chain is composed of a plurality of blocks, the starting block includes a block header and a block main body, the block header stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured.
When each block in the block chain is generated, referring to fig. 3, when the node where the block chain is located receives the input information, the input information is verified, after the verification is completed, the input information is stored in the memory pool, and the hash tree for recording the input information is updated; and then, updating the updating time stamp to the time when the input information is received, trying different random numbers, and calculating the characteristic value for multiple times, so that the calculated characteristic value can meet the following formula:
Figure 290944DEST_PATH_IMAGE002
wherein, SHA256 is a characteristic value algorithm used for calculating a characteristic value; version is version information of the relevant block protocol in the block chain; prev _ hash is a block head characteristic value of a parent block of the current block; merkle _ root is a characteristic value of the input information; ntime is the update time of the update timestamp; nbits is the current difficulty, is a fixed value within a period of time, and is determined again after exceeding a fixed time period; x is a random number; TARGET is a feature threshold, which can be determined from nbits.
Therefore, when the random number meeting the formula is obtained through calculation, the information can be correspondingly stored, and the block head and the block main body are generated to obtain the current block. And then, the node where the block chain is located respectively sends the newly generated blocks to other nodes in the data sharing system where the newly generated blocks are located according to the node identifications of the other nodes in the data sharing system, the newly generated blocks are verified by the other nodes, and the newly generated blocks are added to the block chain stored in the newly generated blocks after the verification is completed.
Therefore, the contents in the blocks in the blockchain are related, and the same blockchain is stored in each node of the blockchain system, so that once the blocks in the blockchain are created, the contents in the blocks cannot be modified, and the security of the data in the blocks in the blockchain can be ensured.
Referring to fig. 4, fig. 4 is a schematic diagram of a hardware structure of an electronic device 400 according to an embodiment of the present disclosure. The electronic device 400 comprises a processor 401, a memory 402, an input output interface 403, and one or more programs stored in the memory 402 and configured to be executed by the processor 401, the programs including instructions to perform the steps of the evidence verification method of any of the following embodiments. Memory 402 includes Random Access Memory (RAM), and disk storage. The input/output interface 403 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The electronic device 400 may be a server device or a terminal device.
Both the original report and the reported report can provide electronic evidence for discovery in the process of litigation, but the court cannot ensure the safety of the electronic evidence, and the electronic evidence is easy to be illegally tampered after the electronic evidence is provided for the court. Since the court can not verify whether the electronic evidence is tampered, if the court unknowingly approves the tampered electronic evidence, a large judicial accident can be caused.
In order to solve the technical problem, the application provides an evidence verification method, after verifying the validity of an electronic evidence, an evidence management organization generates an evidence certificate according to the electronic certificate, and the evidence certificate is stored in a block chain network. The evidence authority may generate an evidence certificate from the electronic certificate, for example, through a CA certificate authority. In particular, a block may be created in a blockchain network for storing the evidence certificate. Thus, when a court or other organization or individual needs to verify whether the electronic evidence is tampered, the evidence certificate can be obtained from the block, and whether the evidence certificate is legal and whether the evidence certificate is matched with the electronic evidence can be verified. If the evidence certificate is legal and the evidence certificate is matched with the electronic evidence, the electronic evidence can be confirmed to be not tampered and is valid electronic evidence. Otherwise, the electronic evidence can be confirmed to be invalid. Therefore, the court can verify whether the electronic evidence to be used is tampered according to the evidence certificate in the block chain, and the phenomenon that the court accepts the tampered electronic evidence without knowing the tampered electronic evidence to cause a large judicial accident is avoided.
Referring to fig. 5, fig. 5 is a schematic flowchart of an evidence verification method according to an embodiment of the present application. The evidence verification method in the embodiment of the present application may be implemented by the electronic device in the embodiment of the present application, may also be implemented by the evidence verification apparatus in the embodiment of the present application, and may also be implemented by the electronic device in which the evidence verification apparatus in the embodiment of the present application is deployed.
501. Acquiring a certificate storing identification corresponding to the target electronic evidence;
the target electronic evidence is electronic evidence of validity to be verified. When the electronic evidence is stored in a block in the block chain network, the block can be marked by using a evidence storing identification corresponding to the electronic evidence. Thus, the corresponding relation among the electronic evidence, the evidence storing identification and the block is established. Then, when the block for storing the evidence certificate of the target electronic evidence needs to be searched, the target block for storing the evidence certificate of the target electronic evidence can be found according to the evidence storing identification of the target electronic evidence.
Specifically, each electronic evidence corresponds to one evidence identifier, and each block for storing the electronic evidence corresponds to one block identifier, so that an evidence-block correspondence table can be established, which includes a correspondence between the evidence identifiers and the block identifiers. An evidence certificate for each evidence identity corresponding to the electronic evidence is stored in the block corresponding to the evidence identity.
When the electronic device is a server device, the server device may receive an evidence verification request sent by the terminal device, where the evidence verification request includes a target electronic evidence to be verified. The server device can find the corresponding evidence storing identification according to the target electronic evidence.
When the electronic device is a terminal device, the terminal device may obtain an evidence verification request triggered by a user, where the evidence verification request includes a target electronic evidence to be verified. And the terminal equipment finds the corresponding evidence storing identification according to the target electronic evidence.
502. And acquiring a target block corresponding to the evidence storage identification, and extracting an evidence certificate from the target block.
And the evidence certificate corresponding to the target electronic evidence is stored in the target block corresponding to the evidence storage identification. The evidence certificate corresponding to the target electronic evidence can be understood as an evidence certificate generated by an evidence management authority according to the initial electronic evidence before the initial electronic evidence corresponding to the target electronic evidence is stored in the block. When the evidence certificate of the electronic evidence is stored in the block of the block chain network, the evidence version corresponding to the evidence certificate stored in the block is the initial electronic evidence. The evidence mark corresponding to the target electronic evidence to be verified also corresponds to an initial electronic evidence.
For example, when the evidence certificate of the electronic evidence a is saved into a block of the blockchain network, the evidence authority generates an evidence certificate a according to the electronic evidence a, and then saves the evidence certificate a into the block, so that the electronic evidence a used for generating the evidence certificate a is the initial electronic evidence. When the electronic evidence A needs to be verified, the electronic evidence A needing to be verified is used as the target electronic evidence. It is understood that the electronic evidence a to be verified is not necessarily the same as the electronic evidence a on which the evidence authority generates the evidence certificate a. If the electronic evidence a is tampered after the evidence certificate a is stored in the block, the electronic evidence a which needs to be verified is different from the electronic evidence a which is based on the evidence certificate a generated by the evidence management authority, and if the electronic evidence a is not tampered after the evidence certificate a is stored in the block, the electronic evidence a which needs to be verified is the same as the electronic evidence a which is based on the evidence certificate a generated by the evidence management authority.
As shown in fig. 6, a blockchain Q is run on each node of each data sharing system, where the blockchain Q includes a block 1, a block 2, a block 3, and an … … block n, and the blockchain Q on each node in the data sharing system constitutes a blockchain system. If the evidence storage identifier corresponding to the electronic evidence A is 2, and the block corresponding to the evidence storage identifier 2 is the block 2, the target block of the block 2 can be determined, and the evidence certificate can be obtained from the block 2.
503. And when the evidence certificate is a legal certificate and conforms to the target electronic evidence, confirming that the target electronic evidence is valid.
A legitimate certificate is a certificate issued by a regular certificate authority. The evidence certificate is consistent with the electronic certificate, which is understood to be generated according to the target electronic evidence. It can be understood that the electronic evidence in the block is generated according to the initial electronic evidence, and if the evidence certificate is generated according to the target electronic evidence, it can be confirmed that the target electronic evidence is consistent with the corresponding initial electronic evidence, and it can be confirmed that the target electronic evidence is valid.
Specifically, the evidence certificate includes evidence content information. The validity of the evidence content information can be verified, when the evidence content information is legal, the evidence content information is compared with the target electronic evidence, and when the target electronic evidence is consistent with the evidence content information, the target electronic evidence is confirmed to be effective. Therefore, the validity of the evidence content information is verified firstly, and when the evidence certificate is an illegal certificate, the evidence content information and the target electronic evidence do not need to be compared, so that computing resources can be saved, and the efficiency of evidence verification can be improved.
In one embodiment, the evidence content information is data encrypted by an evidence authority using an evidence encryption algorithm. The validity of the evidence content information is verified in a mode that the evidence content information is decrypted by an evidence decryption algorithm corresponding to the evidence encryption algorithm; when the decryption is successful, confirming that the evidence content information is legal; when the decryption fails, the proof content information is confirmed to be illegal. The evidence decryption algorithm is a decryption algorithm corresponding to the evidence encryption algorithm. Therefore, the evidence content information is data encrypted by an evidence management mechanism by using an evidence encryption algorithm, so that on one hand, the safety of the evidence content information is ensured, and the evidence content information is prevented from being stolen or tampered; on the other hand, when the validity of the evidence certificate is verified, whether the evidence certificate is a legal certificate can be determined by whether decryption is successful, so that the verification of the validity of the evidence certificate is simpler.
In another embodiment, the evidence certificate includes evidence content information of the initial electronic evidence and data size information of the evidence content information. Before the evidence content information is decrypted by the evidence decryption algorithm corresponding to the evidence encryption algorithm, the data size of the evidence content information is obtained, and after the data size is confirmed to be consistent with the data size information, the evidence content information is decrypted by the evidence decryption algorithm corresponding to the evidence encryption algorithm.
In yet another embodiment, the evidence content information of the initial electronic evidence and the digital signature of the evidence certificate are also included in the evidence certificate. The validity of the proof content information is verified by verifying the validity of the digital signature. Therefore, the validity of the evidence content information is verified by verifying the validity of the digital signature, so that the source of the evidence certificate can be verified accurately, and whether the evidence certificate is a legal certificate or not can be confirmed.
In an optional embodiment, the evidence content information includes a first hash value, and the first hash value is obtained by processing an initial electronic evidence corresponding to the target electronic evidence by using a first algorithm. Therefore, the first hash value obtained by processing the initial electronic evidence corresponding to the target electronic evidence by using the first algorithm is stored in the block, and compared with the method of directly storing the target electronic evidence in the block, on one hand, the storage resources can be saved, on the other hand, the safety of the electronic evidence can be improved, and the electronic evidence is prevented from being stolen or tampered.
In another alternative embodiment, the first hash value is obtained by hashing the initial electronic evidence and the encrypted information of the initial electronic evidence together. The encrypted information of the initial electronic proof is provided by the user of the proof provider. When the court needs to verify whether the target electronic evidence is valid, the user of the evidence provider can provide the encrypted information, and then hash the target electronic evidence and the encrypted information to obtain a second hash value. The encryption information may be, for example, but not limited to, a combination of one or more of a password composed of a character string, biometric information, and motion instruction information. The biometric information may be, for example, but not limited to, a combination of one or more of iris feature information, fingerprint feature information, and face feature information.
The evidence content information and the target electronic evidence are compared in a mode that a second algorithm is utilized to process the target electronic evidence to obtain a second hash value; and comparing the first hash value with the second hash value. When the target electronic evidence is consistent with the evidence content information, the confirming that the target electronic evidence is valid comprises: and when the hash value relationship corresponds to the algorithm relationship, determining that the target electronic evidence is valid, wherein the hash value relationship is the relationship between the first hash value and the second hash value, and the algorithm relationship is the relationship between the first algorithm and the second algorithm.
Specifically, according to the algorithm relationship between the first algorithm and the second algorithm, a target hash value relationship that needs to be satisfied between the first hash value and the second hash value when the first hash value is consistent with the second hash value can be obtained.
The first algorithm and the second algorithm may or may not be the same.
In one embodiment, the first algorithm is the same as the second algorithm, and when the first hash value matches the second hash value, the target hash value relationship that needs to be satisfied between the first hash value and the second hash value is that the first hash value is the same as the second hash value. When the hash value relationship corresponds to the algorithm relationship, confirming that the target electronic evidence is valid comprises: and when the hash value relation is that the first hash value is the same as the second hash value, the target electronic evidence is confirmed to be valid. And when the hash value relationship is that the first hash value is different from the second hash value, determining that the target electronic evidence is invalid. This enables the comparison result to be obtained quickly. The efficiency of evidence verification is improved.
In another embodiment, the first algorithm is different from the second algorithm. Then, a target hash value relationship that needs to be satisfied between the first hash value and the second hash value when the target electronic evidence is consistent with the initial electronic evidence needs to be obtained specifically according to an algorithm relationship between the first algorithm and the second algorithm. And then judging whether the hash value relation between the first hash value and the second hash value meets the target hash value relation. And when the hash value relationship between the first hash value and the second hash value accords with the target hash value relationship, confirming that the first hash value accords with the second hash value, and the hash value relationship corresponds to the algorithm relationship, so that the target electronic evidence is valid. And when the hash value relation between the first hash value and the second hash value does not accord with the target hash value relation, confirming that the first hash value does not accord with the second hash value, and the hash value relation does not correspond to the algorithm relation, wherein the target electronic evidence is invalid. Therefore, the first algorithm is inconsistent with the second algorithm, the safety of the evidence content information can be improved, and the evidence content information is prevented from being cracked or modified.
According to the evidence verification method, the evidence storage identification corresponding to the electronic evidence is obtained firstly; then, acquiring a target block corresponding to the evidence storage identification, and extracting an evidence certificate from the target block; and when the evidence certificate is a legal certificate and is consistent with the target electronic evidence, confirming that the target electronic evidence is valid. Therefore, data written into the blockchain network cannot be tampered, so that the evidence certificate of the blockchain network can be guaranteed to be authentic and is not tampered. And comparing the target electronic evidence with the evidence certificate in the target block, and determining whether the target electronic evidence is tampered according to whether the target electronic evidence is consistent with the evidence certificate in the block chain network. Therefore, the court can verify whether the electronic evidence to be used is tampered according to the evidence certificate in the block chain, and the phenomenon that the court accepts the tampered electronic evidence without knowing the tampered electronic evidence to cause a large judicial accident is avoided.
Referring to fig. 7, an embodiment of the present application further provides an evidence verification apparatus 700, including:
an identifier obtaining module 701, configured to obtain a certificate storing identifier corresponding to the target electronic evidence;
a certificate acquisition module 702, configured to acquire a target block corresponding to the certificate storing identifier in a block chain network, and extract an evidence certificate from the target block, where the evidence certificate is generated according to an initial electronic evidence corresponding to the target electronic evidence after an evidence management authority verifies validity of the initial electronic evidence;
a verification module 703, configured to confirm that the target electronic evidence is valid when the evidence certificate is a legal certificate and matches the target electronic evidence.
In some embodiments, the evidence certificate includes evidence content information;
the verification module 703 includes:
a first verifying unit, configured to verify validity of the evidence content information;
the comparison unit is used for comparing the evidence content information with the target electronic evidence when the evidence content information is legal;
and the second verification unit is used for confirming that the target electronic evidence is valid when the target electronic evidence is consistent with the evidence content information.
In some embodiments, the evidence content information is data encrypted by an evidence encryption algorithm, and the first verification unit is specifically configured to:
decrypting the evidence content information by using an evidence decryption algorithm corresponding to the evidence encryption algorithm;
and when the decryption is successful, confirming that the evidence content information is legal.
In some embodiments, the evidence certificate further includes data size information of the evidence content information, and the verification module further includes a third verification unit configured to confirm that the data size of the evidence content information matches the data size information.
In some embodiments, the evidence content information includes a first hash value, the first hash value is obtained by processing an initial electronic evidence corresponding to the target electronic evidence by using a first algorithm, and the comparing unit is specifically configured to:
processing the target electronic evidence by using a second algorithm to obtain a second hash value;
comparing the first hash value with the second hash value;
the second verification unit is specifically configured to:
and when the hash value relationship corresponds to the algorithm relationship, determining that the target electronic evidence is valid, wherein the hash value relationship is the relationship between a first hash value and a second hash value, and the algorithm relationship is the relationship between the first algorithm and the second algorithm.
In some embodiments, the evidence content information includes a first hash value, the first hash value is obtained by processing, by using a first algorithm, encrypted information and an initial electronic evidence corresponding to the target electronic evidence, where the encrypted information is provided by a user who provides the initial electronic evidence, and the comparing unit is specifically configured to:
acquiring encrypted information provided by the user, and processing the encrypted information and the target electronic evidence by using a second algorithm to obtain a second hash value;
comparing the first hash value with the second hash value;
the second verification unit is specifically configured to:
and when the hash value relationship corresponds to the algorithm relationship, determining that the target electronic evidence is valid, wherein the hash value relationship is the relationship between a first hash value and a second hash value, and the algorithm relationship is the relationship between the first algorithm and the second algorithm.
In some embodiments, when the first algorithm is different from the second algorithm, and the hash value relationship corresponds to an algorithm relationship, the second verification unit is specifically configured to:
according to the algorithm relationship, obtaining a target hash value relationship which needs to be met by the first hash value and the second hash value when the target electronic evidence is consistent with the initial electronic evidence;
and when the hash value relation accords with the target hash value relation, confirming that the target electronic evidence is valid.
According to the technical scheme of the embodiment of the application, a certificate storing identification corresponding to the electronic evidence is obtained firstly; then acquiring a target block corresponding to the evidence storage identification, and extracting an evidence certificate from the target block; and when the evidence certificate is a legal certificate and is consistent with the target electronic evidence, confirming that the target electronic evidence is valid. Therefore, data written into the blockchain network cannot be tampered, so that the evidence certificate of the blockchain network can be guaranteed to be authentic and is not tampered. And comparing the target electronic evidence with the evidence certificate in the target block, and determining whether the target electronic evidence is tampered according to whether the target electronic evidence is consistent with the evidence certificate in the block chain network. Therefore, the court can verify whether the electronic evidence to be used is tampered according to the evidence certificate in the block chain, and the phenomenon that the court accepts the tampered electronic evidence without knowing the tampered electronic evidence to cause a large judicial accident is avoided.
It should be noted that the technical effects and supplementary descriptions in the embodiments of the evidence verification method in the embodiments of the present application are also applicable to the evidence verification apparatus in the embodiments of the present application, and are not described herein again to avoid redundancy.
The embodiment of the invention also provides a computer storage medium (Memory), which is a Memory device in the client and used for storing programs and data. It is understood that the computer storage medium herein may include both a built-in storage medium in the client and, of course, an extended storage medium supported by the client. The computer storage media provides storage space that stores the operating system of the client. Also, one or more instructions, which may be one or more computer programs (including program code), are stored in the memory space for loading and execution by the processor. The computer storage medium may be a high-speed RAM memory, or may be a non-volatile memory (non-volatile memory), such as at least one disk memory; and optionally at least one computer storage medium located remotely from the processor.
In one embodiment, one or more first instructions stored in a computer storage medium may be loaded and executed by a processor to perform the corresponding steps performed by the first client in the data processing embodiments described above; in particular implementations, one or more first instructions in a computer storage medium are loaded by a processor and perform the steps of:
receiving an invoice verification request sent by a terminal, wherein the invoice verification request comprises first invoice information of a target invoice, and the first invoice information comprises a first block hash value and first invoice content information corresponding to the target invoice;
querying a target block corresponding to the first block hash value from the target block chain;
and when the invoice content information in the target block is matched with the first invoice content information, sending a verification passing instruction to the terminal.
In some embodiments, said querying the target chunk corresponding to the first chunk hash value from the target chunk chain comprises:
when the first invoice information comprises a graphic identification code of a target invoice, analyzing the graphic identification code to obtain a first block hash value and first invoice content information corresponding to the target invoice, and inquiring a target block corresponding to the first block hash value from the target block chain.
In some embodiments, the analyzing the graphic identification code to obtain the first block hash value and the first invoice content information corresponding to the target invoice includes:
and accessing the address link corresponding to the graphic identification code to obtain a first block hash value and first invoice content information corresponding to the target invoice.
In some embodiments, the first invoice content information includes an invoice time and first transaction information;
when the invoice content information in the target block is matched with the first invoice content information, sending a verification passing instruction to the terminal comprises:
when the timestamp of the target block is consistent with the billing time, comparing the first transaction information with the transaction information in the target block;
and when the first transaction information is consistent with the transaction information in the target block, sending a verification passing instruction to the terminal.
In some embodiments, the transaction information in the target block is first encrypted transaction information processed by a first algorithm; the comparing the first transaction information with the transaction information in the target block comprises:
processing the first transaction information by using a second algorithm to obtain second encrypted transaction information;
comparing a first relation with a second relation, and determining whether the first transaction information is consistent with the transaction information in the target block according to the comparison relation, wherein the first relation is a relation between the first encrypted transaction information and the second encrypted transaction information, and the second relation is a relation between the first algorithm and the second algorithm.
In certain embodiments, the first algorithm is different from the second algorithm.
In some embodiments, the first transaction information includes a target transaction amount, and the sending a validation pass instruction to the terminal when the first transaction information matches the transaction information in the target block includes:
and when the target transaction amount is consistent with the transaction amount in the target block, sending a verification passing instruction to the terminal.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., compact disk), or a semiconductor medium (e.g., solid state disk), among others. In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of logical division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted or not executed. In addition, the indirect coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, indirect coupling or communication connection of devices or units, and may be electrical or in other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage media may include, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is understood that all products controlled or configured to perform the evidence verification method described herein, such as the evidence verification apparatus, the server, and the storage medium described above, are within the scope of the related products described herein.

Claims (9)

1. An evidence verification method, comprising:
acquiring a certificate storing identification corresponding to the target electronic evidence;
acquiring a target block corresponding to the evidence storage identification in a block chain network, and extracting an evidence certificate from the target block, wherein the evidence certificate is generated according to an initial electronic evidence corresponding to the target electronic evidence after an evidence management organization verifies the legality of the initial electronic evidence, the evidence certificate comprises evidence content information of the initial electronic evidence, the evidence content information comprises a first hash value, and the first hash value is obtained by processing the initial electronic evidence corresponding to the target electronic evidence by using a first algorithm;
when the evidence certificate is a legal certificate, processing the target electronic evidence by using a second algorithm to obtain a second hash value;
if the first algorithm is different from the second algorithm, obtaining a target hash value relation which needs to be met by the first hash value and the second hash value when the target electronic evidence is in accordance with the initial electronic evidence according to an algorithm relation between the first algorithm and the second algorithm;
and when the hash value relation between the first hash value and the second hash value accords with the target hash value relation, determining that the target electronic evidence is valid.
2. The evidence verification method of claim 1, wherein confirming that the evidence certificate is a legitimate certificate comprises:
and verifying the validity of the evidence content information.
3. The evidence verification method according to claim 2, wherein the evidence content information is data encrypted by an evidence encryption algorithm, and the verifying the validity of the evidence content information comprises:
decrypting the evidence content information by using an evidence decryption algorithm corresponding to the evidence encryption algorithm;
and when the decryption is successful, confirming that the evidence content information is legal.
4. The evidence verification method according to claim 3, wherein the evidence certificate further includes data size information of the evidence content information, and the verifying the validity of the evidence content information before decrypting the evidence content information by using an evidence decryption algorithm corresponding to the evidence encryption algorithm further includes:
confirming that the data size of the evidence content information is consistent with the data size information.
5. An evidence verification method according to any one of claims 1 to 4,
if the first algorithm is the same as the second algorithm, comparing the first hash value with the second hash value;
and when the hash value relation is that the first hash value is the same as the second hash value, determining that the target electronic evidence is valid.
6. The evidence verification method according to any one of claims 1 to 4, wherein the processing of the first hash value by the first algorithm on the encrypted information and the initial electronic evidence corresponding to the target electronic evidence is performed, the encrypted information is provided by a user who provides the initial electronic evidence, and the processing of the target electronic evidence by the second algorithm to obtain the second hash value comprises:
and acquiring encryption information provided by the user, and processing the encryption information and the target electronic evidence by using a second algorithm to obtain a second hash value.
7. An evidence verification apparatus, characterized in that,
the identification acquisition module is used for acquiring a certificate storage identification corresponding to the target electronic evidence;
a certificate acquisition module, configured to acquire a target block corresponding to the evidence storage identifier in a block chain network, and extract an evidence certificate from the target block, where the evidence certificate is generated according to an initial electronic evidence corresponding to the target electronic evidence after an evidence management authority verifies validity of the initial electronic evidence, the evidence certificate includes evidence content information of the initial electronic evidence, the evidence content information includes a first hash value, and the first hash value is obtained by processing the initial electronic evidence corresponding to the target electronic evidence by using a first algorithm;
the verification module is used for processing the target electronic evidence by using a second algorithm to obtain a second hash value when the evidence certificate is a legal certificate; if the first algorithm is different from the second algorithm, obtaining a target hash value relation which needs to be met by the first hash value and the second hash value when the target electronic evidence is in accordance with the initial electronic evidence according to an algorithm relation between the first algorithm and the second algorithm; and when the hash value relation between the first hash value and the second hash value meets the target hash value relation, determining that the target electronic evidence is valid.
8. An electronic device comprising a processor, a memory, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps in the evidence verification method of any one of claims 1-6.
9. A computer storage medium having stored thereon one or more first instructions adapted to be loaded by a processor and to perform the evidence verification method of any of claims 1-6.
CN201911246519.7A 2019-12-05 2019-12-05 Evidence verification method, device, server and storage medium Active CN110995446B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911246519.7A CN110995446B (en) 2019-12-05 2019-12-05 Evidence verification method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911246519.7A CN110995446B (en) 2019-12-05 2019-12-05 Evidence verification method, device, server and storage medium

Publications (2)

Publication Number Publication Date
CN110995446A CN110995446A (en) 2020-04-10
CN110995446B true CN110995446B (en) 2022-06-24

Family

ID=70090978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911246519.7A Active CN110995446B (en) 2019-12-05 2019-12-05 Evidence verification method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN110995446B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488656A (en) * 2020-12-04 2021-03-12 紫绶(上海)信息科技有限公司 Method, device, processor and storage medium for realizing peer-to-peer multi-party digital service universe management based on block chain
CN112235323B (en) * 2020-12-11 2021-05-07 腾讯科技(深圳)有限公司 Evidence obtaining method and device based on block chain, electronic equipment and readable storage medium
CN112685795B (en) * 2020-12-31 2023-09-05 树根互联股份有限公司 Digital certificate creation method, digital certificate verification method and digital certificate system
CN113343313A (en) * 2021-06-30 2021-09-03 中金金融认证中心有限公司 Verification report validity identification method, legal service system and readable storage medium
CN117251883A (en) * 2023-11-02 2023-12-19 中国南方电网有限责任公司 Data reliability verification method, device, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108985364A (en) * 2018-07-05 2018-12-11 招银云创(深圳)信息技术有限公司 Verification method, device, computer equipment and the storage medium of sealed files
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108985364A (en) * 2018-07-05 2018-12-11 招银云创(深圳)信息技术有限公司 Verification method, device, computer equipment and the storage medium of sealed files
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset

Also Published As

Publication number Publication date
CN110995446A (en) 2020-04-10

Similar Documents

Publication Publication Date Title
CN110995446B (en) Evidence verification method, device, server and storage medium
CN107396360B (en) Block verification method and device
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
US10958436B2 (en) Methods contract generator and validation server for access control of contract data in a distributed system with distributed consensus
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
US20110029555A1 (en) Method, system and apparatus for content identification
US20230353390A1 (en) Method for upgrading certificate of pos terminal, server, and pos terminal
CN106161350B (en) Method and device for managing application identifier
US20200344234A1 (en) Blockchain folding
CN110599207A (en) Invoice verification method, invoice verification device, invoice verification server and storage medium
CN109981680B (en) Access control implementation method and device, computer equipment and storage medium
CN111460400A (en) Data processing method and device and computer readable storage medium
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
CN112448946A (en) Log auditing method and device based on block chain
CN110958239A (en) Method and device for verifying access request, storage medium and electronic device
CN110266653B (en) Authentication method, system and terminal equipment
CN114239072B (en) Block chain node management method and block chain network
CN110138558B (en) Transmission method and device of session key and computer-readable storage medium
CN115906181A (en) Encrypted file right confirming method, device and system based on block chain attribute
CN116383867A (en) Data query method, device, electronic equipment and computer readable medium
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN107770183B (en) Data transmission method and device
CN111740995B (en) Authorization authentication method and related device
CN110034922B (en) Request processing method, processing device, request verification method and verification device
US8755521B2 (en) Security method and system for media playback devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant